page 4 editors note vol 6 no 2 editor’s note vol 6, no 2 (2016) user perspectives on business intelligence the research articles in this issue are related to business intelligence in one way or another. the article by salmasi, talebpour and homayounvala is entitled “identification and classification of organizational level competencies for bi success”. in their research the authors have identified competencies that can be used as a measure to evaluate an organization’s status with regards to business intelligence success. since the study done by adamala and cidrin (2011) this journal has shown a strong interest in user evaluations of business intelligence systems. the article by ghasemi and rowshan presents a new approach to the early warning literature. entrepreneurs are the group that more than anyone else are seeking out early insights and also rewarded by their ability to look ahead. in the literature this is known as “entrepreneurial alertness.” science can never accept that some people are simply born entrepreneurs or have “eureka” moments: we want to understand why and how. from an intelligence perspective picking up early signals can be seen as a signal for which entrepreneurs to follow and listen to. the ability to gather data from social media through the use of bi tools should make this possible once these entrepreneurs are identified. the article by ghasemi and rowshan does not go in this direction, but such research would be welcome in the future. the article by avner entitled “study on competitive intelligence in isreal: 2016 update” is a status report for competitive intelligence within israeli firms. the results are compared with a study conducted by the same author in 2006. the study shows that there has been no significant change in ci practices in israel during the past ten years. it also confirms that competitive intelligence is primarily a tool used by larger organizations. this means that israeli companies have been slower to adopt new business intelligence software, and this is something that respondents see as a problem. the article by solberg søilen entitled “users’ perception of data as a service (daas)” is an investigation into a new market related to business intelligence. on one hand this is a survey addressing one particular type of users—namely market intelligence (mi), competitive intelligence (ci) and business intelligence (bi) professionals and experts—and their preferences. on the other hand, this is a critical analysis about the consequences of the issues addressed by users. it is also an attempt to present daas in a shorter historical perspective. the case study on qoros automotive manufacturing by ahmadinia and karim is an analysis of how the company could enter the european market. it has now been more than a year since jisib decided to publish case studies as articles. the qorors case is not only a good teaching case, but is also a good illustration of how intelligence topics can be tied to marketing questions and the larger question about competitive advantage. as always, we would above all like to thank the authors for their contributions to this issue of jisib. since the beginning of the year the journal has been supported by a three year grant from the swedish research council (vr). this has allowed us to increase the quality in layout design and review the english grammar. on behalf of the editorial board, sincerely yours, prof. dr. klaus solberg søilen halmstad university, sweden editor-in-chief copyright © 2016 jisib, halmstad university. all rights reserved. journal of intelligence studies in business vol. 6, no 2 (2016) p. 4 open access: freely available at: https://ojs.hh.se/ page 4 editors note vol 8 no 1 editor’s note vol 8, no 1 (2018) the disciplines of management and it have indeed merged: new empirical data advancement in the intelligence field can only be achieved through new observations and the presentation of new empirical data. this is a continuous process and includes how we as employees engage with software and technical solutions. just as it is impossible to teach or learn anything in marketing today without a deep understanding of digital marketing, in the same way is it impossible to make advancements in intelligence studies without first-hand experience with business intelligence software and new it-equipment. management and it have indeed merged. this understanding has been an integrated part of jisib since the journal started some eight years ago. and as always, we are less interested in how new technologies are developed (for that there are excellent technical journals) than about the management practice of these developments. this issue follows very much on this track. the article by fatma fourati-jamoussi, claude-narcisse niamba and julien duquennoy entitled “an evaluation of competitive and technological intelligence tools: a cluster analysis of users’ perceptions” is an evaluation of competitive and technological intelligence (cti) tools by students to help designers get the best efficiency out of a monitoring process. the paper finds that user perception is greater than expected and that designers of cti tools must take this in account when developing new products. the authors argue that this is a major reason why new software implementation fails in organizations. the article by ahmad abbaspour, amir hussein amirkhani, ali asghar pour ezzat, and mohammad javad hozori is entitled “identifying and describing sub-processes in strategic intelligence process by qualitative content analysis in inductive way”. the authors set out to identify and describe the sub-processes of the strategic intelligence process in organizational analysis. fourteen main sub-processes are identified to describe the strategic intelligence process. the results give new insight into the strategic intelligence process implementations in organizations. the article by mourad oubrich, abdelati hakmaoui, robert bierwolf and mouna haddani entitled “development of a competitive intelligence maturity model-insights from moroccan companies” identifies six ci dimensions (ci culture of an organization, ci deliverables, ci sourcing, ci cycle, ci investment in terms of resources, ci users and ci application) in ci implantation at three different ci levels (early, mid, world class). the article by avner barnea entitled “israeli start-ups – especially in cyber: can a new model enhance their survival rate?” concludes that the high percentage of failures of israeli start-ups is due to the difficulties in comprehending the competitive landscape. barnea draws this conclusion from having worked and interviewed a number of companies for years. he introduces what he calls the competitive review model to help small companies better prepare themselves for intense competition, especially relevant for the cyber security industry. this issue also features a book review of tetlock and gardner’s superforecasting: the art and science of prediction (2015, crown publishers, new york, ny). as always, we would above all like to thank the authors for their contributions to this issue of jisib. thanks to dr. allison perrigo for reviewing english grammar and helping with layout design for all articles and to the swedish research council for continuous financial support. on behalf of the editorial board, sincerely yours, prof. dr. klaus solberg søilen halmstad university, sweden editor-in-chief copyright © 2017 jisib, halmstad university. all rights reserved. journal of intelligence studies in business vol. 8, no 1 (2018) p. 4 open access: freely available at: https://ojs.hh.se/ page 4 editors note vol 8 no 2 editor’s note vol 8, no 2 (2018) social media intelligence web-intelligence is not new to intelligence studies. it plus intelligence has been the most frequent topic of the issues published the past years. thus vol 8, no 1 (2018) is entitled “the disciplines of management and it have indeed merged: new empirical data”, vol 7, no 1 (2017) “business intelligence, big data and theory” and vol 6, no 3 (2016) “what role does technology play for intelligence studies at the start of the 21st century?”. special issues have looked at the problem of it failures in relation to business intelligence: “how companies succeed and fail to succeed with the implementation of intelligence systems”, vol 7, no 3 (2017) and “how companies work and fail to work with business intelligence, vol 7, no 2 (2017). during the past years companies have indeed learned from their failures. maybe this phase was inevitable as a part of growing up. we see the same development on e-commerce sites: they mostly work well now, but didn’t just a few years ago. a certain difference between countries still exists, but the industry is getting there. closely related to failures of implementation are user perspectives on business intelligence systems, which have resulted in numerous research articles. a well-cited article by adamala and cidrin (2011) led to the development of several models and theories as presented, for example, in vol 6, no 2 (2016) entitled “user perspectives on business intelligence”. the focus in jisib is always technology. it is more a question of which aspect of technology we focus on. in this issue, it is social media or social media intelligence. the paper by gioti and ponis entitled “social business intelligence: review and research directions” is a literature review exploring the new direction of social business intelligence (sbi), where social media meets bi. the last paper is entitled “business intelligence for social media interaction in the travel industry in indonesia”. the authors, yulianto, girsang and rumagit propose a way to develop a data warehouse to analyze data from social media, such as likes, comments and sentiment, applied to the travel industry in indonesia. another aspect of the journal maintains the tradition of intelligence studies in general. intelligence studies must always be broad to be relevant and not to miss important pieces. specialization is a necessity and a curse at the same time. vol 6, no 1 (2016) in entitled “the width and scope of intelligence studies in business”. a part of this width and critique has involved self-reflection. thus earlier articles in jisib often discussed methods. case studies (by country or industry) were always a favorite. in vol 4, no 3 (2014) jisib continued this tradition of publishing case studies. in vol 3, no 2 (2013), the whole issue is dedicated to one country; brazil. analyzing patents analysis has also been a frequent and reoccurring topic. in this issue both of these directions are represented. the third article is entitled “investigating the competitive ıntelligence practices of peruvian fresh grapes exporters,” written by bisson, mercedes, and tong. the authors suggest a number of changes for peruvian grapes exporters to become more competitive based on a ci approach. the fourth paper by shaikh and singhal entitled “an analysis of ip management strategies of ict companies based on patent filings” tries to identify the strategies of five us and indian it companies by analyzing their patents. the first paper by nuortimo is entitled “measuring public acceptance with opinion mining: the case of the energy industry with long-term coal r&d investment projects” and is part of his dissertation in science communication at the faculty of humanities at the university of oulu. the paper shows how opinion mining can be used effectively, and was one of a series presented at the ici conference in bad nauheim this year. many of the earlier papers in jisib came directly from academic or practitioners’ conferences. in vol 2, no 1 (2012) it said: “the journal works in symbioses with a number of conferences. it relies heavily on the contributions of scientific papers presented at these conferences, in particular for these first issues. among these we would in particular like to mention the more scholarly conferences, like vsst, ecis, icticti and siie. in the near future we also hope to receive contributions journal of intelligence studies in business vol. 8, no 2 (2018) p. 4-5 open access: freely available at: https://ojs.hh.se/ from inosa and eckm. we also receive support from members in the more professional conferences related to intelligence studies like ici and scip” (p. 4). and vol 3, no 3 (2013): “the journal continues to draw mainly on articles presented at academic conferences on topics related to competitive intelligence. in 2013 scip organized a first conference in south africa, under the leadership of asa du toit, the journal’s editor for africa.”. and in vol 2, no 3 (2012): “most contributions continue to come from the best papers from a number of conferences related to intelligence studies. two out of five articles come from eckm 2012, which was held 6-7 september in cartagena, spain.” and in vol 2, no 2 (2012) echoed a similar sentiment. today the number of conferences has been reduced for different reasons, which it takes too long to get into here and now. the last group of articles worth mentioning is opinion pieces. these are non-empirical articles. today they are less frequent, but at the beginning they served another role, as pointed out in vol 4, no 1 (2014): “in this issue of jisib we have admitted a large number of opinion pieces. opinion pieces are important to allow for a broader perspective of the field in terms of policies, adaptions of ci in foreign countries and general interest in the form of debates. it also shows the normative qualities that are present in any social science discipline”. at the very beginning it was also made clear that the goal was always to be relevant for practitioners. thus in vol 1, no 1 (2011) we read: “the final aim of the journal is to be of use to practitioners. we are not interested in theory for the sake of theory, and we do not want to publish solutions to small problems which will have no real impact in the intelligence field.”. with your help we try to keep with that goal. as always, we would above all like to thank the authors for their contributions to this issue of jisib. thanks to dr. allison perrigo for reviewing english grammar and helping with layout design for all articles and to the swedish research council for continuous financial support. a special congratulation goes to rainer michaeli for having taken the ici conference to its 10th anniversary. well done, and thank you for the ongoing cooperation. on behalf of the editorial board, sincerely yours, prof. dr. klaus solberg søilen halmstad university, sweden editor-in-chief copyright © 2018 jisib, halmstad university. all rights reserved. issn: 2001-015x v o l 5 , n o 1 ( 2 0 1 5 ) c o n t e n t s yves barlette, katherine gundolf, annabelle jaouen toward a better understanding of smb ceos' information security behavior: insights from threat or coping appraisal pp. 5-17 abdesamad zouine, pierre fenies a new evaluation model of erp system success pp. 18-39 vincent grèzes the definition of competitive intelligence needs through a synthesis model pp. 40-56 jonathan calof 1 , laurent mirabeau 1 , greg richards 1 towards an environmental awareness model integrating formal and informal mechanisms – lessons learned from the demise of nortel pp. 57-69 o p i n i o n s e c t i o n jean-maurice bruneau, pascal frion revisiting sun tzu in the information overload age for applied intelligence education: stop answering, find good questions pp. 70-89 ~ 2 journal contact: mailing address: jisib halmstad university box 823 301 18 halmstad sweden principal contact: prof. dr. klaus solberg søilen school of business and engineering (sbe) email: klaus.solberg_soilen@hh.se copyright © 2015 jisib, halmstad university. all rights reserved. 3 e d i t o r i a l t e a m founding editors prof. henri dou (france), goupe escem prof. per jenster (china), nimi honorary editors prof. john e. prescott (usa), university of pittsburgh prof. bernard dousset (france), toulouse university editor-in-chief dr. klaus solberg søilen (sweden), halmstad university regional associated editors america: prof. g. scott erickson (usa), ithaca college europe: prof. sahbi sidhom (france), nancy university asia: prof. xie xinzhou (china), beijing university africa: prof. adeline du toit (south africa), university of johannesburg t h e e d i t o r i a l b o a r d : dr. mark xu, university of portsmouth, uk dr. subir ranjan das, university of petroleum & energy studies, india associate professor dirk vriens, radboud university, netherlands professor karim baina, école nationale supérieure d'informatique et d'analyse des systèmes (ensias), morocco professor uwe hannig, fachhochschule ludwigshafen am rhein, germany dr. klaus solberg søilen, halmstad university, school of business and engineering, sweden dr. eduardo flores bermudez, bayer schering pharma ag, germany professor kingo mchombu, university of namibia, namibia professor adeline du tout, university of johannesburg, south africa professor pere escorsa, school of industrial engineering of terrassa, politechnical university of catalonia, spain associate professor per frankelius, örebro university, sweden professor malek ghenima, l'université de la manouba, tunisia professor blaise cronin, indiana university, united states dr. john e. prescott, university of pittsburgh, united states dr. michael l neugarten, the college of management, rishon lezion, israel professor mika hannula, tampere university of technology, finnland professor kamel smaili, université nany 2, france professor henri jean-marie dou, atelis competitive intelligence work room of the groupe escem, france professor bernard dousset, toulouse university, france professor g. scott erickson, ithaca college, united states professor sahbi sidom, université nancy 2, france professor xinzhou xie, beijing science and technology information institute, china associate professor jonathan calof, telfer school of management at university of ottawa, canada professor per v. jenster, nordic international management institute, china professor alfredo passos, fundação getulio vargas, brazil professor brigitte gay, esc-toulouse, france professor sophie larivet, ecole supérieure du commerce extérieur (esce), paris, france t h e m a n a g e r i a l b o a r d : way chen, china institute of competitive intelligence (cici) raíner e michaeli, director institute for competitive intelligence gmbh, germany philippe a. clerc, director of ci, innovation & it department at the assembly of the french chambers of commerce and industry, france alessandro comai, director of miniera sl, project leader in world-class ci function, spain pascal frion, director acrie competitive intelligence network, france hans hedin, hedin intelligence & strategy consultancy, sweden mourad oubrich, president of ciems, morocco javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/49') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/18') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/20') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/19') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/21') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/3') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/22') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/23') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/24') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/25') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/26') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/27') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/28') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/6') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/29') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/17') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/16') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/4') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/7') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/8') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/9') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/10') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/12') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/31') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/13') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/14') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/15') 4 journal of intelligence studies in business halmstad, may 25th 2015 e d i t o r i a l n o t e v o l 5 , n o 1 ( 2 0 1 5 ) in this issue of jisib we bring you articles from two different conferences held this spring. the first was the 7 th international competitive intelligence (ici) conference held in strasburg 25-26 th march. the second was the it management annual (aim) conference held in rabat may 20-22. the journal would like to thank the organizers of these conferences for a fruitful cooperation, where jisib editors have served as reviewers of scientific track papers and best paper awards. to keep up with the journals new aim to publish case studies calof et al. present the story of nortel, a canadian telecommunications and data networking equipment manufacturer which went bankrupt in 2009. as always we would first of all like to thank the authors for their contributions to this issue of jisib. on behalf of the editorial board, sincerely yours, prof. dr. klaus solberg søilen editor-in-chief halmstad university i box 823 i s-301 18 halmstad, sweden i tel: +46 35-16 71 00 https://en.wikipedia.org/wiki/telecommunications https://en.wikipedia.org/wiki/networking_equipment issn: 2001-015x v o l 2 , n o 2 ( 2 0 1 2 ) c o n t e n t s brigitte gay competitive intelligence and complex systems pp. 5-14 scott erickson and helen rothberg balancing knowledge management and competitive intelligence, initial insights pp. 15-22 jihene chebbi ghannay and zeineb ben ammar mamlouk zeineb synergy between competitive intelligence and knowledge management a key for competitive advantage pp. 23-34 olivier mamawi foundations of competitive intelligence system to form business coalitions pp. 35-41 gabriela lópez, steve eldridge, salomón montejano and patricia silva competiveness from contextualisation of supply chain knowledge pp. 42-50 mattias nyblom, jenny behrami, tung nikkilä and klaus solberg søilen an evaluation of business intelligence software systems in smes – a case study pp. 51-57 ~ 2 journal contact: mailing address: jisib halmstad university box 823 301 18 halmstad sweden principal contact: dr. klaus solberg søilen school of business and engineering (sbe) email: klaus.solberg_soilen@hh.se copyright © 2011 jisib, halmstad university. all rights reserved. 3 e d i t o r i a l t e a m founding editors prof. henri dou (france), goupe escem prof. per jenster (china), nimi honorary editors prof. john e. prescott (usa), university of pittsburgh prof. bernard dousset (france), toulouse university editor-in-chief dr. klaus solberg søilen (sweden), halmstad university regional associated editors america: prof. g. scott erickson (usa), ithaca college europe: prof. sahbi sidhom (france), nancy university asia: prof. xie xinzhou (china), beijing university africa: prof. adeline du toit (south africa), university of johannesburg t h e e d i t o r i a l b o a r d : dr. mark xu, university of portsmouth, uk dr. subir ranjan das, university of petroleum & energy studies, india assistant professor dirk vriens, radboud university, netherlands professor karim baina, école nationale supérieure d'informatique et d'analyse des systèmes (ensias), morocco professor uwe hannig, fachhochschule ludwigshafen am rhein, germany dr. klaus solberg søilen, halmstad university, school of business and engineering, sweden dr. eduardo flores bermudez, bayer schering pharma ag, germany professor kingo mchombu, university of namibia, namibia professor adeline du tout, university of johannesburg, south africa professor pere escorsa, school of industrial engineering of terrassa, politechnical university of catalonia, spain assistant professor per frankelius, örebro university, sweden professor malek ghenima, l'université de la manouba, tunisia professor blaise cronin, indiana university, united states dr. john e. prescott, university of pittsburgh, united states dr. michael l neugarten, the college of management, rishon lezion, israel professor mika hannula, tampere university of technology, finnland professor kamel smaili, université nany 2, france professor henri jean-marie dou, atelis competitive intelligence work room of the groupe escem, france professor bernard dousset, toulouse university, france professor g. scott erickson, ithaca college, united states professor sahbi sidom, université nancy 2, france professor xinzhou xie, beijing science and technology information institute, china associate professor jonathan calof, telfer school of management at university of ottawa, canada professor per v. jenster, nordic international management institute, china professor alfredo passos, fundação getulio vargas, brazil professor brigitte gay, esc-toulouse, france professor sophie larivet, ecole supérieure du commerce extérieur (esce), paris, france t h e m a n a g e r i a l b o a r d : arik johnson, chairman aurora wdc, united states raíner e michaeli, director institute for competitive intelligence gmbh, germany philippe a. clerc, director of ci, innovation & it department at the assembly of the french chambers of commerce and industry, france alessandro comai, director of miniera sl, project leader in world-class ci function, spain pascal frion, director acrie competitive intelligence network, france hans hedin, vice president business development at global intelligence alliance group, sweden dr. sofiane saadi, directeur général du laboratoire en organisation et gestion des entreprises (loge) algeria. managing director nt2s consulting inc. north vancouver, bc, canada javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/49') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/18') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/20') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/19') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/21') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/3') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/22') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/23') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/24') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/25') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/26') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/27') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/28') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/6') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/29') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/17') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/16') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/4') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/7') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/8') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/9') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/10') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/12') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/31') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/13') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/14') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/15') 4 journal of intelligence studies in business halmstad, september 30 2012 e d i t o r i a l n o t e v o l 2 , n o 2 ( 2 0 1 2 ) the third issue of jisib marks the journal’s first anniversary. again we are delighted to welcome contributions by academics from all over the world, from so many different backgrounds. we also delighted to have contributions from a large number of female authors. this together shows, we believe, that the field of intelligence studies has a truly global reach. most contributions continue to come from best papers from a number of conferences related to intelligence studies. for the articles in this issue we would like to thank in particular our american editor, prof. g. scott erickson. four out of six articles this time come from eckm 2012, which was held 6-7 september in cartagena, spain. track co-chairs for the mini track on competitive intelligence and km was g. scott erickson, ithaca college, ithaca, ny and helen n. rothberg, marist college, poughkeepsie, new york. the article by brigitte gay shows how graphs can be used to illustrate and understand relations between organizations and companies. it illustrates well the degree to which the field of competitive intelligence relies heavily today on the development of new software. the article by scott ericson and helen rothberg clarifies much around the importance of knowledge assets and the study of knowledge management with that of competitive intelligence. few have done more to understand this area than these two authors. their findings have also been published in a new book this year, “intelligence in action” (palgrave macmillan). the contribution by jihene chebbi ghannay and zeineb ben ammar mamlouk zeineb is a literature review that shows the same interdependence between ci and km. the article by olivier mamavi shows what you can do with graphs to identify and understand networks for problems containing big data, in this case companies who have obtained french procurement contracts. the article by gabriela lópez, steve eldridge, salomón montejano and patricia silva shows how to improve supply chain knowledge by a continuous evaluation and contextualization of a company’s own practices. the last article by mattias nyblom, jenny behrami, tung nikkilä and klaus solberg søilen is an investigation into what kind of business intelligence software is used by smes, why, and how companies evaluate their systems. as such its aim is to narrow a gap between theory and practice. on behalf of the editorial board, sincerely yours, dr. klaus solberg søilen halmstad university i box 823 i s-301 18 halmstad, sweden i tel: +46 35-16 71 00 page 4 editors note vol 8 no 3 editor’s note vol 8, no 3 (2018) why you should be interested in intelligence studies in this issue most articles are reflections (bibliometrics, scientometrics) on what has been done in intelligence studies in business (is) and more particularly in competitive intelligence (ci) and business intelligence (bi), so some reflections and analysis on the subject proper seems to be appropriate for these notes. almost all articles in is (ci, competitor intelligence, market intelligence (mi), bi, and competitive technical intelligence (cti)) are empirical contributions that show how to work more effectively with need to know information in business. authors submit empirical articles that solve new and specific problems. it can be a new method, the introduction of a new model or the application of some new technology. during the past eight years, since the journal started, i have written articles on what customers expect from bi (sabanovic & søilen, 2012), about what vendors do to differentiate themselves in bi (søilen & hasslinger, 2012b), and i have done an analysis of previous and similar articles in journal of competitive intelligence & management (jcim) and competitive intelligence review (cir), two journals that in many ways are the predecessors of the journal of intelligence studies in business (jisib) (søilen, 2013). in agostino et al. (2013) we studied how both customers and vendors think about cloud solutions to bi. in søilen (2014) i did a spot check to see if the journal was writing about the topics that practitioners were concerned about, or interested in. the survey showed that jisib was more or less on the right track here, but that practitioners prefer case studies to empirical research articles, which the journal is now soliciting more actively and also publishing. good extensive cases are hard to obtain, but the journal has been publishing a number of empirical articles in the form of industry analysis connected to different countries around the world. in vriens & søilen (2014b) we show how the process of gathering intelligence for disruptive innovation is distinct from other forms of intelligence gathering. in søilen (2015) i try to show some problems that ci has had in the past; with agreeing upon clear definitions, but more fundamentally by clearly showing how the field is different from other disciplines studying information, like the more established journals in management and information systems. the study shows that respondents could not list any analysis that is not used by other areas of study and that a majority of the analyses the respondents think are unique to their own study actually come from the area of strategy and military intelligence. instead it is suggested in the article that what is different is that that intelligence studies bring a number of unique dimensions and perspectives to the social sciences, a new way of seeing and studying business which is an adaptation from military intelligence. in the next article (søilen, 2016) i suggest a research agenda for intelligence studies. i go deeper into the conclusion suggested in søilen (2015): it is suggested that the difference between information science in business, businessand market research and intelligence studies is mainly one of perspective and scope and less one about the content of problems or scientific methods used. intelligence studies in business see the organization much like an intelligence organization, the offspring of the study of state and military intelligence, where the aim is to find information that affect the business as a whole (as in “surrounding world analysis” or in swedish “omvärldsanalys”). a study of intelligence studies –management information or information sciences that does not explain what outside events affect the business becomes sterile and uninteresting. the essence of intelligence is to scan the world for relevant developments, to find out what is going on that effect our organization (need-to-know, strong signals, trends). how to do this should be the focus of the subjects’ research agenda and what sets it apart from other disciplines studying information in a business context. journal of intelligence studies in business vol. 8, no 3 (2018) p. 4-8 open access: freely available at: https://ojs.hh.se/ 5 sometimes this goal seems far away as when reading about how a new technique is applied to an industry in a specific market. sometimes i miss hearing about how basic methods like traveling to foreign countries (the spirit of marco polo) and reading books may be the best methods for understanding what affects an organization. we must always remember that the technology is only there to facilitate the process, it never explains why things happen and it seldom helps us in the actual understanding of the data. statistical analysis does not explain why or how things occur: at best it summarizes what has happened. authors of articles i read in other journals too often miss the difference between correlation and causation. what is then so special and different with intelligence studies? intelligence studies at the present at least are less a series of theories than a new perspective on (micro and macro) economics. intelligence studies is not exclusively about management, but also about economics as it’s just as relevant for how nation states become competitive. it is the suggestion that competitive organizations of all sizes are best organized as intelligence organizations, focusing on the process of gathering, analyzing and delivering need to know information to decision makers. this is a different way of looking at organizations and what they do. competitive organizations today all basically work with information. it is how they work with this information that decides whether or not they will succeed. the importance of building a formal intelligence organization was realized more than two hundred years ago in the military domain with the prussian and russian armies. in the study of business this was first realized with the shift in thinking that came with the information age and the development of computers, the realization that competitive advantage is more about what you know than what machinery you own or how much money you have in your accounts. if the introduction of it represented the 1.0 version of this development, then the introduction of the internet represents the 2.0. many saw this development coming. some experts thought that it would not only lead to intelligence studies being introduced as a special function in the organization but that we would see the implementation of separate departments of intelligence, or that the whole current division and structure of business activities, into marketing hrm, finance, would be abandoned for functions of intelligence gathering. when this did not materialize many started to question the value of the approach all together. many still think that the approach failed, that the perspective has passed and been surpassed by other subjects and disciplines. i disagree. even though things have not happened as quickly as many expected or hoped, we are still moving in that direction now more than ever. b2b digital marketing is a good example. today it is less about push marketing and sales and more about gathering and distributing valuable information to potential customers. when customers see that we are knowledgeable not only about our products but also about the industry we are in, they start to trust us and we are able to build a customer relationship. this is not only changing how b2b marketing is done, but also the competences needed to succeed in b2b marketing. on the state or macro level we are living in a period of (neo-) mercantilism and geoeconomics where intelligence is key. the states that are succeeding economically today are countries like china, singapore, and south korea, but also norway. these are representatives of state capitalism, not free market liberalism. the individualist, liberalist model supported by neoclassical economics and its foundation in the writing of adam smith (not always fairly interpreted, so i prefer to call them the marginalist school), walras, marshall and samuelsson, have greater difficulty convincing readers today. as piketty showed in his vast empirical project about capital, their (our) societies led to an extreme wealth being assembled at the very top with very little trickle-down effects. when the crises came it was the rest of society had to take the hit, while the elites bailed themselves out to save a dysfunctional system. after a period of prosperity, which lasted for some four generations (and was only extended during the past two generations through massive debt), the populations in the western world are experiencing a decline in their standard of living. these causes were all missed by the marginalist school whose members have been advising governments for more than half a century. the consequences of these policies have been massive protests and disbelief almost hatred of their own elites as in the us, but also in france, the uk and italy. the point is that our leading social science paradigms and especially our economic and 6 management theories that brought us here by not being relevant and, worse, by supporting the wrong policies; regardless of the good intentions, which many of my colleagues even doubt. mainstream economics combined with too narrowly and fragmented studies of management obsessed with a method of small empirical investigations have become the supporters, not only of an elite – the status quobut more worryingly of an uncompetitive society. now, for business studies that is almost what we should call a contradiction. our reigning business theories and research are making us less competitive. the new economic powers in the east have copied what has been done well in the west, but it is unlikely that they will copy our leading social science paradigm. it is the message china sends out when it says “…with chinese characteristics”. chinese leaders are following the thinking of drucker, schumpeter, and michael porter; more so than the winners of the nobel prize in economics and their schools of thinking. they are not reading our thousands of small business journals, even though their own scholars are taking a larger part in the work of running them and contributing to them. instead they are first and foremost inspired by their own values, their own history and their own thinkers of strategy and philosophy. china is already a superpower of intelligence gathering, which they see as essential for strategy. not only have our theories of political science been contested, but there is now clear critic of western moralism. there are hardly any independent thinkers outside the western world who believe in the good intentions of western political and economic interferences anymore. as we in the west have failed to keep up the living standard of our middle classes (our promise to the voters) “eastern arguments” are starting to convince a large part of our own populations in the west. the failure of the western world to compete becomes a confirmation of the weaknesses of our strategic thinking (the weakness in our political system to make plans), and in our ideas which at the end is a critic of our reigning social science projects. eastern ideas will be closer to practice. the west is left with a number of paradoxes. for all our interest in strategy during the past two decades we have no strategy, no long term thinking and no major infrastructural projects. instead we are consumed with our immediate problems and crisis handling. we are so obsessed with the critic of china as a dictatorship that we refuse to see that they are undertaking the largest infrastructural project in world history (the belt and road initiative, or bri), that their mercantilist ideas are engulfing our markets but also helping to improve the living standard of people living in the developing world. our media is full of stories about chinese exploitation in the developing world, which also exist, but forgetting that exploitation even slavery used to be our specialty for centuries and the hallmark of the british empire. now, what does this all mean for business studies? it means we have to search for other paradigms other than the existing one if we want to become competitive again. we have to become more interested in what is actually going on in the world, more curious. this reality must be led by business disciplines. some of the more successful university groups in intelligence studies today, like the gretha (le groupe de recherche en économie théorique et appliquée de l’université de bordeaux) at the university of bordeaux, have left the idea of theory building and focus instead on applications and being relevant for industry. as such they have also left much of the article-writing world of academia except as when recording what they have accomplished. the same thinking is well known in the development of new technology. focus is on application. if you have developed something truly new you will try to patent it or apply it. if you publish something valuable in a journal not only will very few read it, but it will also be copied, or stolen. this way of learning by doing is very much the chinese way of doing business, but also of studying business. if society is structured in this way then the experts will be in the practical field, less moved forward by research at the universities. this is already happening in some fields today, as in artificial intelligence (ai). the most respected experts in the field are found in large corporations, like google and facebook. another example is digital marketing. most academics are just running behind, trying to figure out what is happening. a number of social science scholars are reasoning in the same way: to have real impact (not academic impact, measured as a popularity contest among peers of articles and citations in google scholar) they try to go out and change the world. there are many research institutes that think 7 more like this now, particularly in the area of environmental studies, disillusioned by existing social science departments at the more established schools. one example is the iiiee in lund. at the end both developments are important (theory and practice), as we also need to teach new generations of students how to work with intelligence, but it must be based firmly in practice, it must be relevant and it cannot be too narrowly defined. this does not mean we cannot develop theories or focus on causations. i was reading one of the last books by herbert simon the other week, based on some lectures he had given. they reminded me of the last book by schumpeter “history of economic analysis”, published posthumously. both authors tried to explain how their ideas fitted with the evolutionary thinking of charles darwin, an attempt suggested earlier by the german historical school led by wilhelm roscher. a generation after roscher it also found support in the us for a short while, with torstein veblen (before it was picked up again many generations later by kenneth e boulding and others). they realized that a promising path for the social science was to connect to the theories of darwin, but a new superpower demanded a new scientific paradigm. so the attempts halted, except for a few satellites in germany (the international joseph a. schumpeter society) and england (g. m. hodgson). the historical school which was dominating in the 19th century, disappeared, basically i think because fellow economists stopped reading seminal books or even older articles, which are often in german and french. intelligence studies can continue to be relevant by helping organizations become more competitive. it can do this without developing theories. still i think that it can achieve much more by being more rigorous: defining variables, setting up axioms, hypotheses and discussing causations. for my own part, this led to my interest in combining intelligence studies not only with evolutionary theory, but with the disciplines of geopolitics and now geoeconomics. in the early 1990s i started to develop my own ideas of geoeconomics, based on observations of the chinese eclipse and western decline. it was followed by numerous travels and two stays in china, where i started to write the book “geoeconomics”, completed at stanford in 2012. this was done independently of luttwak who i read first much later, and before lorot. geoeconomics helps me understand intelligence studies on a macro level. in 2017 i published an article in jisib called “why the social sciences should be based in evolutionary theory: the example of geoeconomics and intelligence studies”. the historical reasoning in the article basically comes from the same book. at the end of his wonderful book “history of management thought” witzel lines up present and future directions of management thinking. he talks first about what can be expected as asia surpasses the western world economically and he draws lines as to present directions of thinking: sustainability research, but also the information turn, starting with thinkers like toffler, who is also well known in the literature of intelligence studies. it is in this direction of the information turn that intelligence studies in business must be understood and placed, not as the primary venue, at least not at the present. that place has been occupied by the management of information systems (mis) literature with a handful of journals, but as an alternative approach, a niche built around another tradition of management: the organization as an information gathering organism. another established direction in management has focused on decision making. intelligence studies looks as the process that leads up to decisions as decisions can only be as good as the information at hand (ignored by the marginalists, as they typically assume full information) and the (bounded rational) mind that is used to process it. intelligence studies as a discipline today has two main directions, how to work with the process of information gathering (1) and how to set up an organization to fulfill that aim (2). the initial answers to both are the same, much like successful state and military intelligence organizations. the problem is that military organizations and businesses are different, so a direct application is not possible, just like a direct adaptation of geopolitics is not possible. the size and goals of the organizations are different, technology is different, but also in terms of the legal and ethical framework the two forms of intelligence operate within. this is what warrants two distinct and different disciplines. 8 today state intelligence services work less with economic questions but as the success of state capitalism spreads this is bound to change. already today state and military intelligence is learning from the private sector, less vice versa. looking back at more than three decades of studies in intelligence studies (with cir, jcim and jisib) we now have a “discipline” – formally in the sense that there is a catalog and archive for a new body of information produced by a scientific community. we also have a number of regular conferences dedicated to different forms of intelligence studies in business. some of the larger of these conferences are dominated by practitioners, which i rather see as a healthy sign (but i realize that my thinking here is contrary to that of most colleagues). it is a challenge for this small group of scholars to convince the world that the problems studied under the umbrella of intelligence studies in business (a term coined by sheila wright and arik johnson at the ici conference in bad nauheim in 2010) are worth undertaking. when work piles up like now before christmas, i like to think that stevan dedijer, one of the founders of intelligence studies (social intelligence, he called it), would have been pleased if he had lived today and saw how his ideas have evolved and multiplied. what is more fitting then, than to start with the largest bibliometric analysis that has been done on the field of intelligence studies authored by lópez-roble et al. it shows what areas of is are most popular, who the contributors have been and what their contributions have been. the paper by ojinagar is also an analysis of scientific contributions to the field of intelligence studies in business, but is narrower. it analyses 72 papers published in mexico between 2000 and 2015 on competitive intelligence. the paper by garcia-garcia and rodríguez presents another form of bibliometrics, called scientometrics. it’s an example of how scientometrics can be used to show the most influential authors and inter-institutional collaborations in a specific industry, namely additive manufacturing for hand orthoses. the paper by svarre and gaardboe is an analysis of business intelligence tasks, use and users in a workplace setting. the contribution by ottonicar et al. investigates how information literacy and competitive intelligence are connected in business management and information science fields. as always, we would above all like to thank the authors for their contributions to this issue of jisib. thanks to dr. allison perrigo for reviewing english grammar and helping with layout design for all articles and to the swedish research council for continuous financial support. we hope to see as many as possible at the ici conference in luxembourg on may 5-7, 2019. on behalf of the editorial board, sincerely yours, prof. dr. klaus solberg søilen halmstad university, sweden editor-in-chief copyright © 2018 jisib, halmstad university. all rights reserved. 14 competitive intelligence research: an investigation of trends in the literature a.s.a. du toit department of information science, university of pretoria, south africa e-mail: adeline.dutoit@up.ac.za received july 1, accepted september 5 2015 abstract: this article looked at competitive intelligence research reported from 1994 to 2014 in the abi/inform database to determine the development of competitive intelligence as subject field. this development can be attributed to several factors. content analysis was used to establish research patterns and the author based the analysis on the extant literature and on the 338 articles that were gathered from the abi/inform database. only peer-reviewed articles were analysed. the most popular term used in the literature is competitive intelligence, followed by business intelligence and marketing intelligence. the journals in which the articles appeared are scattered and few journals have published more than ten competitive intelligence articles. few authors have published more than five articles. keywords: academic subject field, competitive intelligence, research trends available for free online at https://ojs.hh.se/ journal of intelligence studies in business vol 5, no 2 (2015) 14-21 https://ojs.hh.se/ 15 introduction competitive intelligence is not a new business activity but it is a relatively new academic study field (de pelsmacker, muller, viviers, saayman, cuyvers & jagers 2005, 607). the definition of competitive intelligence is a complicated phenomenon. similar to many new study fields where coalescence around the domain and scope has not occurred, there are numerous definitions of competitive intelligence but no universal definition (pellissier & nenzhelele 2013). according to pellissier & nenzhelele (2013) a possible universal definition of competitive intelligence is: “a process or practice that produces and disseminates actionable intelligence by planning, ethically and legally collecting, processing and analysing information from and about the internal and external or competitive environment in order to help decision-makers in decision-making and to provide a competitive advantage to the enterprise.” with regard to the concept competitive intelligence, “it would seem that there is no commonly accepted term for referring to internal and external intelligence required for business decision-making. market (or marketing) intelligence, competitive intelligence, business intelligence and other terms are all used at various times to describe more or less the same concept” (venter & tustin 2009, 89). competitive intelligence is an interdisciplinary subject field (walker 1994, 271) and according to gabriel and adiele (2012, 27) competitive intelligence is also studied in business management, marketing management, knowledge management and strategic management. solberg-søilen (2010, 201) regards competitive intelligence as a subset of integrated marketing communications and viviers, saayman, muller and calof (2002, 27) say that competitive intelligence is a marketing discipline. according to calof and viviers (2001, 62) competitive intelligence is a subset of knowledge management. there is little known about the extent of competitive intelligence research and competitive intelligence as an academic study field. this article will look at the competitive intelligence peerreviewed articles reported from 1994 to 2014 in the abi/inform database. the research question, which is the major focus of this article, is: to what extent has competitive intelligence as an academic subject field developed over the past 20 years as reported in the abi/inform database? the rationale of the article is to provide a lens of the development of competitive intelligence as an academic study field over the past 20 years. insights would contribute to a generally under-researched body of competitive intelligence knowledge. the rationale of the article is to provide a lens of competitive intelligence research during a period of 20 years through which to appreciate the prevalence of competitive intelligence in economic and management sciences as it is reflected in the abi/inform database. contextualising competitive intelligence as subject field the field of intelligence originated 500 b.c and competitive intelligence originated from military intelligence (adidam, banerjee & shukla 2012, 243). according to powell and bradford (2000, 184) intelligence dates back more than 5 000 years and fourie (1999) regards porter’s work on strategic management and competitiveness as the main contributor to the development of competitive intelligence as an academic subject field. before 1980, competitive intelligence literature focused mainly on intelligence gathering for decision making and competitive intelligence as a formal function was only institutionalised as a formal function in the usa in the 1970s and 1980s (begg & du toit 2007). during the 1990s competitive intelligence grew fast but less attention was given to competitive analysis (du toit & muller 2005, 321). fleisher (2000, 14) states that the “ci boom of the last decade was driven by the increasingly widespread recognition that good information has a direct impact on the bottom line.” during the 1990s research was done 16 that present the watershed between strategic management and competitive intelligence. competitive intelligence is favoured at the expense of strategic management as a subject field and has evolved over the years as a result of the need for enterprises to scan the complex external environment. according to prescott (1999, 41) the research emphasis is nowadays on the strategic implications of competitive intelligence. as discussed in the previous paragraphs, competitive intelligence has traditionally been associated with strategic management and knowledge management (calof & viviers 2001, 62) but is nowadays a relatively new academic study field. competitive intelligence is regarded as the crux of strategic management at an enterprise and enterprises that excel have competitive intelligence as a formal function in their enterprises. the key issues with regard to competitive intelligence research today are the development of intelligence infrastructures for multinational enterprises and the use of social network analysis for intelligence purposes. competitive intelligence is a process comprising the following activities (viviers, saayman & muller 2005, 578-580) – known as the competitive intelligence cycle: planning the collection of information according to key intelligence needs. collection of information from a variety of sources. using analytical tools to analyse the information. packaging of information and communicating it to management. some sceptics (for example weiss 2011) argue that since the late 1990’s only a handful of worthwhile competitive intelligence books have been published. despite its growing popularity dissenting views still linger today. weiss (2011) argues that the potential contribution of competitive intelligence is often oversold. the other criticisms of competitive intelligence are as follows: it is difficult to quantify the direct effect of competitive intelligence in an enterprise (kahaner 1996, 230), since measuring the benefits of competitive intelligence is more qualitative than quantitative (industry canada 2006, 25). the effect that competitive intelligence has on an organisation is indirect (kahaner 1996, 230). according to prescott (1999, 39), the academic literature of strategic management did not have any impact on the development of competitive intelligence as subject field. the unprecedented growth of competitive intelligence in the last twenty years may be attributed to several factors such as: the complexity of the external environment (hitt, ireland & hoskinsson 2000, 208). recognition that information has an impact on the success of enterprises (fleisher 2000, 14). the increase in the pace of business (kahaner 1996, 28). the increase on the availability of information due to the development of information technology (kahaner 1996, 29). an increase in global competition (fleisher & blenkhorn 2001, 25). an increase in the aggressiveness of competition (kahaner 1996, 31). recognition that competitive intelligence is an essential ingredient of effective management (shaker & gembicki 1999, 18). the need for a competitive strategy (west 2001, 28). competitive intelligence research has grown in prominence in the last twenty years suggesting that competitive intelligence is a separate function in an 17 enterprise and a separate subject field (adidam, gojre & kejriwal 2009, 669; calof & skinner 1999, 20; fleisher & bensoussan 2007; kὒhn 2012). competitive intelligence has value to all the business activities of an enterprise and the major attraction of competitive intelligence is that it provides actionable foresight regarding competitive dynamics (prescott 1999, 42). since competitive intelligence is an interdisciplinary subject field, competitive intelligence professionals usually have a variety of educational backgrounds and many do have postgraduate degrees (sewdass & du toit 2014, 187). when these professionals complete a masters or doctoral degree, they usually publish an article on the research conducted and valuable competitive intelligence literature can be found in the relevant dissertations and theses. content analysis of competitive intelligence articles published in the abi/inform database 1995-2014 to answer the research question, the author examined peer-reviewed competitive intelligence articles in the database abi/inform published between 1995 and 2014 and considered the following terms: business intelligence, competitive intelligence, competitor intelligence, marketing intelligence, strategic intelligence and technological intelligence. these terms were published in the title or abstract or subject fields of abi/inform. pendlebury (2010) recommends that when determining the research impact of a subject field, at least five years of research published in publications, should be analysed. content analysis of the articles was used to establish research patterns of the subject field competitive intelligence (harrison & reilly 2011, 10). only peer-reviewed journals were analysed, and not monographs and other vehicles of scholarly communication, since it is agreed that scientific journals publish a significant portion of scientific knowledge in a subject field (bryman 2006, 115). according to creswell and garrett (2008, 323) peerreviewed articles are one of the indicators to measure the extent of growth in a subject field. the term competitive intelligence yielded 11444 references, but the majority of these items were news items and not peer-reviewed articles. a total number of 338 peer-reviewed articles were retrieved. with regard to the term business intelligence, it should be noted that only the articles focusing on the gathering of external information were included. table 1 lists the terms and the number of articles retrieved for the period. concept number of articles competitive intelligence 255 business intelligence 44 marketing intelligence 27 strategic intelligence 5 technological intelligence 4 competitor intelligence 3 total number of articles 338 table 1: articles retrieved from abi/inform for the period 1995-2014 using selected terms according to table 1 the most popular term used in the literature is indeed competitive intelligence, followed by business intelligence and marketing intelligence. the terms competitor intelligence and technological intelligence are not much used in the literature. this indicates competitor intelligence’s fall from usage in the favour of competitive intelligence. the research findings showed that the majority of the published articles (72%) used a descriptive research methodology, followed by case studies (9%). this correlates with the statement by saayman, pienaar, de pelsmacker, viviers, cuyvers, muller and jegers (2008, 384) that competitive intelligence articles are mainly descriptive in nature and that few empirical surveys were published. according to knupfer and mclellan (1996, 1198), descriptive research describes a particular issue or phenomenon and usually answered the what if question. 18 the 338 articles were published in 122 journals which indicated the interdisciplinary nature of the subject field. to emphasized this fact, the journals in which the articles appeared are scattered and are as diverse as global cosmetic industry, internal auditor, journal of legal studies education, journal of manufacturing technology management, journal of medical marketing, journal of social, political, and economic studies, journal of workplace learning, logistics information management, medical marketing and media, mergers and acquisitions, pharmaceutical executive, security management, supply chain management review, team performance management and tqm magazine. table 2 lists the journals containing five or more articles retrieved using all of the six related terms mentioned earlier: journal of intelligence studies in business 38 marketing intelligence & planning 13 south african journal of information management 10 european journal of marketing 7 aslib proceedings 5 interdisciplinary journal of contemporary research in business 5 searcher 5 table 2: journals with five or more competitive intelligence and related articles retrieved from abi/inform for 1995-2014 according to table 2, a very small number of journals (only three) published a high percentage of competitive intelligence articles and only two journals (journal of intelligence studies in business and marketing intelligence & planning) focused exclusively on the publication of intelligence articles. competitive intelligence literature is this very much scattered and published in dozens of journals. competitive intelligence practitioners are very busy and do not write about what they do. the most prolific writers are academics teaching competitive intelligence at institutions of higher education such as j.l. calof, j.e. prescott, a.s.a du toit, s. wright and w. viviers (see table 3). this confirms solberg søilen’s (2014, 62) statement that most users of jisib are academics and researchers. of the 338 articles published, 130 were written by single authors. most of the authors only published one article on competitive intelligence. as indicated in table 3, more than 90% of the authors wrote fewer than five articles. author number of articles calof, j.l. 20 prescott, j.e. 17 du toit, a.s.a. 16 wright, s. 13 solberg søilen, k 11 viviers, w. 11 fleisher, c.s. 10 dou, h. 9 muller, m-l. 9 martin, s. 9 wheaton, k. 8 mcgonagle, j.j. 8 gilad, b. 6 herring, j.p. 6 saayman, a. 6 sewdass, n. 5 pellissier, r. 5 table 3: authors with five or more competitive intelligence articles as retrieved from abi/inform for the period 1995-2014 an analysis of the authorship showed that 43.7% of the most prolific authors were from the united states, 37.5% were from south africa, 12.5% were from canada and 6.3% from france. the impact of research and a peer-reviewed article is often measured by the number of citations it received. google scholar citations were therefore used to determine the impact of the authors mentioned in table 3 on the development of competitive intelligence as subject field. unfortunately the number of citations of the peerreviewed articles of the following authors could not be determined: j.l. calof, w. viviers, m.l. muller, s. martin, k. wheaton, j.j. mcgonagle, b. gilad, j.p. herring, a. saayman and r. pellissier since they do not use google scholar citations. table 4 gives the number of citations of articles by eight authors. 19 table 4 also includes the h-index, which is an indicator of the impact of the publications of an author. author number of citations h-index j.e. prescott 6784 32 s. martin 4599 29 c.s. fleisher 2047 22 h. dou 1421 16 a.s.a. du toit 789 12 s. wright 772 13 k. solberg søilen 161 6 n. sewdass 25 3 table 4: number of citations of peer-reviewed articles according to table 4, the authors with the most impact on the development of competitive intelligence as subject field are j.e. prescott, s. martin and c.s. fleisher. median is the value above and below around which half of all observations fall. it is a measure of the central location, and it is based on the whole distribution of a variable and not affected by extreme values (diamantopoulose & schlegelmich 2000, 95). according to table 5, the median number of pages per article for the terms strategic intelligence, competitor intelligence, technological intelligence, marketing intelligence and business intelligence are much higher than for competitive intelligence. academics are the authors who write longer articles. terms median number of pages per article strategic intelligence 16 competitor intelligence 15 technological intelligence 12 marketing intelligence 8 business intelligence 7 competitive intelligence 5 table 5: median number of pages for articles retrieved from abi/inform for 1995-2014 conclusion this article reviewed competitive intelligence peerreviewed articles published in the abi/inform database from 1995 to 2014 to determine the extent competitive intelligence has developed as an academic subject field. the domain of competitive intelligence is broad and competitive intelligence is an interdisciplinary subject field. the articles published are mainly descriptive in nature, followed by case studies and few empirical studies were published. most of the competitive intelligence articles are published by individual competitive intelligence professionals. few authors have published more than five articles and few journals have published more than ten competitive intelligence articles. content analysis was used to establish research patterns and the author based her analysis on the extant literature and on the 338 articles that were gathered. content analysis is not without pitfalls and the research could have benefited from a triangulation of research methods. for example, interviews with the 17 authors who have published more than five articles might have provided insights that have been obscured by content analysis. the interviews might have revealed a deeper understanding of trends in competitive intelligence research. this limitation of the research is an opportunity for further research. competitive intelligence as subject field deals with relativistic, complex and dynamic social constructs that influence a variety of contexts. more empirical surveys published in peer-reviewed journals provide the possibility to best understand and make assumptions about the complex problems of competitive intelligence as subject field. this will enable competitive intelligence researchers to address all the facets of the complex problems they investigate and will provide a potential for theory 20 building since existing theories may not sufficiently provide a framework to understand, explain and predict the new developments in a unique context. references adidam, p.t., gajre, s. & kejriwal, s. 2009. crosscultural competitive intelligence strategies. marketing intelligence & planning 27(5): 666680. adidan, p.t., banerjee, m. & shukla, p. 2012. competitive intelligence and firm’s performance in emerging markets: an exploratory study in india. journal of business & industrial marketing 27(3):242-254. begg, m. & du toit, a.s.a. 2007. level of importance attached to competitive intelligence at a mass import-retail organization. south african journal of information management 9(4). available http://www.sajim.co.za. [accessed 7 january 2015]. bryman, a. 2006. paradigm peace and the implications for quality. international journal of social research methodology 9(2): 111-126. calof, j. l. & skinner, b. 1999. government’s role in competitive intelligence : what’s happening in canada? competitive intelligence magazine 2(2): 20-23. calof, j.l. & viviers, w. 2001. adding competitive intelligence to south africa’s knowledge management mix. africa insight 31(2): 61-67. creswell, j.w. & garrett, a.l. 2008. the movement of mixed methods research and the role of educators. south african journal of education 28: 321-333. de pelsmacker, p., muller, m.l., viviers, w., saayman, a., cuyvers, l. & jegers, m. 2005. competitive intelligence practices of south african and belgian exporters. marketing intelligence & planning 23(6): 606-620. diamantopoulos, a. & schlegelmich, b. 2000. taking the fear out of data analysis. hampshire: cengage learning emea. du toit, a.s.a. & muller, m.l. 2005. training competitive intelligence analysts via the web: the university of johannesburg experience. journal of education for library and information science 46 (4): 320-332. fleisher, c.s. 2000. an introduction to the management and practice of competitive intelligence (ci) in managing frontiers in ci. edited by c.s. fleisher & d.l. blenkhor. available http://www.questia.com/pm.qst?g+d=101031511 [accessed 10 february 2015]. fleisher, c.s. & bensoussan, b.e. 2007. business and competitive analysis. upper saddle river, n.j: ft press. fleisher, c.s. & blenkhorn, d.l. 2001. managing frontiers in competitive intelligence. connecticut: quorum books. fourie, l.c.h. 1999. world-wide web as an instrument for competitive intelligence in a tertiary educational environment. south african journal of information management 1(2/3. available www.sajim.co.za. [accessed 6 january 2015]. gabriel, j.m.o. & adiele, k.c. 2012. competitive intelligence as panacea for environmental vagaries in nigeria. economic journal of a 2 z 1(1): 25-30. harrison, r.l. & reilly, t.m. 2011. mixed methods design in marketing research. qualitative market research: an international journal 14(1): 7-26. hitt, m., ireland, r. & hoskinsson, r. 2000. case notes for strategic management: competitiveness and globalization. annotated textbook 4(1): 208. industry canada. 2006. competitive intelligence. ottawa: business service centre. kahaner, l. 1996. competitive intelligence – how to gather, analyse, and use information to move your business to the top. 7 th ed. new york: touchstone. knupfer, n.n. & mclellan, h. 1996. descriptive research methodologies. in d.h. jonassen (ed). handbook of research for educational http://www.sajim.co.za/ http://www.sajim.co.za/ 21 communications and technology. new york: macmillan: 1196-1212. kὒhn, m-l. 2012. competitive intelligence: the key to intelligent business. somerset-west: mediator printers. pellissier, r. & nenzhelele, t.e. 2013. towards a universal definition of competitive intelligence. south african journal of information management 15(2). available http://dx.doi.org/10.4102/sajim.v15i2.559. pendlebury, d.a. 2010. white paper: using bibliometrics in evaluating research. philadelphia, pa: thomson reuters. prescott, j.e. 1999. the evolution of competitive intelligence – designing a process for action. proposal management spring: 37-52. saayman, a., pienaar, j., de pelsmacker, p., viviers, w., cuyvers, l., muller, m.l. & jegers, m. 2008. competitive intelligence: construct exploration, validation and equivalence. aslib proceedings: new perspectives 60(4): 383-411. sewdass, n. & du toit, a.s.a. 2014. current state of competitive intelligence in south africa. international journal of information management 34(2): 185-190. shaker, s.m. & gembicki, m.p. 1999. the warroom guide to competitive intelligence. new york: mcgraw-hill. solberg søilen, k. 2014. a survey of users’ perspectives and preferences as to the value of jisib – a spot-check. journal of intelligence studies in business 4(2): 61-67. solberg søilen, k. 2010. boosting innovation and knowledge through delocalization: market intelligence at trade shows. problems and perspectives in management 8(3): 200-207. venter, p. & tustin, d. 2009. the availability and use of competitive and business intelligence in south african business organisations. southern african business review 13(2):88-117. viviers, w., saayman, a. & muller, m.l. 2005. enhancing a competitive intelligence culture in south africa. international journal of social economics 32(7): 576-589. viviers, w., saayman, a., muller, m.l. & calof, j. 2002. competitive intelligence practices: a south african study. south african journal of business management 33(3): 27-37. walker, t.d. 1994. the literature of competitive intelligence. library trends 43(2): 271-284. weiss, a. 2011. aware online magazine. available http://www.quora.com [accessed 17 august 2014]. west, c. 2001. competitive intelligence. new york: palgrave. http://dx.doi.org/10.4102/sajim.v15i2.559 http://www.quora.com/ 35 foundations of competitive intelligence system to form business coalitions olivier mamawi lara / icd 12, rue alexandre parodi, 75010 paris, france omamavi@gmail.com received june 3, revised form 10 september, accepted 22 september 2012 abstract: this study shows how a business can identify the networks allowing to form coalitions to obtain french procurement contracts. to this end, we have represented, by a graph, the 2008 co-branding system. we have detected, in this graph, 1360 strategic networks of which the organization reveals, on the one hand, identical characteristics within business networks, and on the other hand, the role of the dominant parties as to access to industrial labor. from these results, we propose a network cartography allowing us to consider new applications for competitive intelligence. keywords: coalitions, competitive intelligence, procurement contracts, cartography, network analysis. 1. introduction french state procurement contracts, regional authorities and public corporation contracts add up to over 80 billion euros per year. to ease the way for small and medium-sized companies, the reform of the french state procurement code, initiated in january 2006 and applicable since january 2008, encourages responses to invitation to tender through co-transaction. co-transacting is the process by which tendering companies can ally with a group of companies, to tender a collective offer when they cannot, on their own, assume the necessary competences and resources. effectively, co-transacting means forming coalitions, that is to say, “temporary alliances, which are devised, if not negotiated, amongst those who participate” (lemieux, 1998). but organizing a coalition, to share or to distribute resources to respond to the needs of a project, is not easy for companies with sometimes different interests; so, how can a company analyze its (complex) environment to form a coalition and obtain markets? we begin with the following assumptions: the network is a business structure, and the coalition is a specific structure of the network. we present as the main hypothesis that a coalition is formed according to the structure of relations. in consequence, we consider that a company must be able to interpret its strategic environment as to find good partners, and to understand how the structure of interactions determines the formation of the coalition. available for free online at https://ojs.hh.se/ journal of intelligence studies in business 2 (2012) 35-41 mailto:omamavi@gmail.com https://ojs.hh.se/ 36 the management science literature has shown a lot of interest in network alliances. but, studies on the networks, up to now, have mostly looked into the reasons linked to their formation than an understanding of the inter-organizational relations that they imply. the developments surrounding control (piloting) of the networks have been, for the most part, treated as annexes to more general problematic, essentially economic, sociological and strategic (gulati & nohria, 2000). the aim of this communication is to suggest a new perspective concerning non-cooperative projects (yi & shin, 2000), mainly reached through operational research. the issue today is to go beyond the limits of game theory, to aim for an actors theory (massé et al., 2000).to this aim, we wish to suggest the basis of a competitive intelligence system which will permit a reticular perspective of the strategy, keeping in account the complex environment (that's to say interactive and dynamic). we will attempt, in a first stage, to present the theoretical basis of emerging networks within the markets. then, we will explain the method used to encapsulate and study numerous alliance relationships. finally, we will discuss the results obtained through a cartography that enables to localize partners of strategic networks. 2. contributions of economic sociology interorganizational relationships can be considered as “a coordinated system of heterogeneous parties, developing transactions founded on a cooperational relationship, as to collectively pursue a shared aim” (voisin et al., 2004). this system is the result of a process within which the partners bond to exact a mutual benefit. that is to say, a network of parties which is subjected to business circles, and forced to define a balance with its environment. as defined by assens (assens, 2003), the concept of a network puts forward the inter-connection of parties able to participate in exchanges. the link between the parties gives the nature of the exchanges, their periodicity, their strength, their density. the parties hold positions that are apt to evolve, but that testify to a role or a function held in face of the other parties. to understand the frame of a network, many authors (calon, 1989), (cohendet & diani, 2003), prefer the study of relationships between members, rather than a focus on the nature of the parties themselves. they thus judge an approach to networking as a form of transitional organization, of a hybrid tendency, between the market and the hierarchy (williamson, 1985). which is why granovetter (granovetter, 1985) considers that the functioning of a market depends on business conditions. he thus shares, with other protagonists of economic sociology (white, 1981; baker, 1984), the conviction that economic action is a social action, led by various motivations: sociability, recognition, social status and power. to prove the integration of economic actions within business relation systems granovetter (granovetter, 1985) suggests the concept of “embeddedness”. he makes a point of proving that business relations and institutions allow a market to function. a relation is then distinguished by its content (the exchange of a resource), its direction and its strength (level of exchange). by the same perspective, interorganizational relationships can be considered as a means to control environment uncertainty accessing complementary resources. the rating of a company becomes clear when examining the relations network into which it is encompassed. this “strategic network” (gulati & nohria, 2000) relates to all the links held with partners, whether clients, suppliers, competitors or subcontractors. as such, preference goes to working with a particular partner, depending on the level of interactions, sufficient to obtain an optimal transaction, through optimal human links rather than economic ones (voisin et al., 2004). parties using “strong links” (granovetter, 1985) imply frequent contacts, a supply of reciprocal services, and this justifies a sharing of resources. with this approach, the social relationship helps regulate opportunistic behavior, ensures data sharing, and facilitates collective solutions to problems. uzzi (1996) has shown that a relationship based on trust can enhance company advantages (shared risk, ability to react to markets changes, organizational apprenticeship), that purely commercial relationships cannot offer. and as explained by gulati and singh (gulati & singh, 1998), the economic parties tend to exchange, in priority, with known parties, to diminish uncertainty linked to transactions. when a party knowingly mobilizes its network to follow a given strategy, trust becomes a resource of the network, that allows to save on the transaction costs (williamson, 1985), to share resources (richardson, 1972), to reduce measures of control or incitement (gérard, 2000), to avoid asymmetrical data amongst partners (akerlof, 1970), to contain opportunistic attitudes (olson, 1971). as such, one of the main aims of studies on networks was to put to light the cohesion within members as a means to access, share or control resources. beyond opportunistic explanations, linked notably to proximity (geographical or social), two main principles can explain the formation of links and interactions (lin et al., 2001). when parties have the same level of resources and that they are moved by recognition, exchange or protection of their 37 business status, we speak of homophile interactions. in this case, the aim of links is to maintain a level of resources. when, on the contrary, the hierarchical levels are different, and the actions are motivated by the need to obtain better or supplementary resources, this becomes heterophile interactions. in a more general way, parties interact with other parties because they seek backing or safety which allows them to control their turbulent environment, and find a certain stability. this search for control gives rise to regularities (relationships) which form the basis of business networks. the structure of these regularities can be identified. it's the principal of structural equivalence (white, 2001). as reminded by grosseti and godard (2007), two entities are structurally equivalent, within a network, if they occupy the same place or the same position, that is to say, if they have the same trade relations (or relatively similar relations) with given parties. the notion of structural equivalence thus allows to return to the classic notion of a role (or of position), but from a purely structural point of view, through a network analysis, without conjecturing on the weight of these roles. 3. analysis social network analysis considers society as a system of business parties linked by relationships. it is an adapted method to understand and formalize complex phenomenon calling for an interactive system of relations. as such, this method allows to describe, and reconstruct, a network, in a simplified way by a graph. the graph represents the interactions between objects related by links. the development of a quantitative method, originally issuing from sociometry and completed by the help of the theory of graphs, allows today to put forward a set of properties which form a changeable topology. for network analysis (borgatti et al., 2009), three main dimensions (table 1) can be used. the first aims to identify the networks and to describe the manner in which the structures of these networks can burden the members. the connectivity is an indicator which allows to define the limit of the network in a chart. there is a network if there is always a link between two summits of the whole. a network is thus a related component of a graph. the second dimension enables to identify the position, more or less dominant, of a party in the network. it can be assessed through centrality as defined by freeman (1979). the degree of centrality shows the popularity of a party within the network, that is to say, the number of direct connections of one company with the others. the centrality of proximity identifies the companies closest to the sources of power and influence, that is to say, swiftly reached by the other members of the network. the third dimension aims to define the cohesion of homogeneous groups within the network, to analyze structural similarities of the network. 2 parties are thus structurally equivalent if they have identical relationships with the other parties of the network (white, 1981). partitioning techniques allow to detect groups of parties of structural equivalence (navarro & cazabet, 2011). 4. methodology to analyze business networks, we have chosen to study the responses, through co-transacting, to invitation to tender in french public markets. our study is based on the analysis of coalition relationships within company groups. let's be reminded that invitation to tender procedures find themselves in a system aiming to enhance the transparency of deals within the two categories of contributors. the contractors, meaning with the power to adjudicate, can be: the state (ministries), territorial collectivities (administrative districts, departments, regions), public establishments linked to the state and to collectivities, public establishments outside of a business and/or commercial character (universities, schools, certain museums, etc.). the companies making an offer are “submitters”. data used for this study issues from the attribution notices from of the french official journals (boamp). the french official journals publishes the transactions attributed by a french public guarantor, for market sums above €4.000 before tax. from transactions made in 2008, we have selected, with key words, the transactions held only by groups of companies. table 2 details the census of the observed businesses. it shows the number of parties that we identified within the groups. 38 obtaining this data goes through a multi-stage process: extraction, cleaning, filtering, formatting, dedoubling and indexing. the nature of the data used to analyze the groups of companies is held by three variables. the first is allotted to the identification of the parties (business reasons). the second is ascribed to the type of beneficiaries of the transactions (company groups). the third variable concerns the cooperative relation which links the parties within a group. we have considered that there is a cooperative relationship with two companies when they obtain a market within the bounds of co-transaction (a belonging to a group of companies). 5. results we have organized the relational data in the form of a list of adjacency. the list sets out, for each company, all the companies close to it. then, we used the software graphviz (www.graphviz.org is a series of open source tools created by the research labs of at&t, which allow to represent and analyze graphs) to obtain a complete graph of the cooperation relations within the french public market in 2008. the graph highlights numerous sub-graphs (related components) within which there exists a link between any two clusters. these sub-graphs are strategic networks. the graph is composed of 1360 strategic networks having between 2 and 2233 clusters. figure 1 represents the repartition of strategic networks according to their size. the visualization of the complete graph shows company aggregates which correspond to a concentration of links over a limited amount of companies. figure 1: network distribution according to size to understand the manner by which the strategic networks are constituted, we have isolated them. an in-depth study of the largest strategic network allows to produce a number of indicators on the structure of relations: global density of the graph is low (0,0004). it reports the number of existing links and the the number of possible links; local density, or clustering coefficient, is high (0,47). it corresponds to the probability of two close members of a same party being linked; the average distance between two companies is 6,45. this distance corresponds to the length of relationship links between random members of the network. to evaluate the position of parties within the largest related component, we have measured degree centrality. the distribution of degrees (figure 2), that is to say the number of connections a company has in the network, is heterogeneous. the majority of companies have a low degree, and only few companies have a strong degree. put more clearly, we are close to the zipf-paretto law by which 20% of companies attract and generate 80% of network links. these companies are shown up statistically, but also visually in the graph. figure 2: distribution of degrees within the network 6. discussion the analysis of the largest strategic network in french public markets reveals non-trivial characteristics common to other business networks, such as: acknowledgment networks (two individuals are related if they know each other), physical contact networks (two individuals are related if they have been in physical contact), collaboration networks (two individuals are related if they have worked together), exchange networks (two entities are related if they have exchanged for example an email). as such, the great business networks all possess a low global density, a strong local density, shortcuts to the summits, a http://www.graphviz.org/ 39 heterogeneity of degrees and a low average degree. these characteristics are generally attributed to graphs of a large field (strogatz, 2001), in reference to the “small world” in the experience of travers and milgram (travers & milgram, 1969). these characteristics thus compose a organizational model of inter-organizational networks. furthermore, the distribution of degrees within the network highlights the existence of zones more densely connected than others. these zones correspond to groups of companies more strongly connected to each other than to others. they correspond to an entity of companies with common points and between which the links are naturally stronger. from a more general point of view, the complete graph of the co-joining of companies to a group of companies shows us a number of indicators to describe the phenomena of strategic networks within the public markets. but, to profit from these indicators, we need to determine, on an ongoing basis, the position occupied by each company, to understand its role and importance, or which are the affinities allowing a company to acquire or keep a central position in the network. this purpose renders the use of cartography essential. the cartography stems from the graph of each company with its alliance relationships. the chart represents the strategic space within which influences are played out, and the topology allows to classify the companies according to their relationship proprieties. cartography then becomes a reticular lay-out, representing business interactions in the public markets. this lay-out is a space in which the parties communicate information and interact with each other. in fino, the main asset of cartography is its ability to analyze, on an ongoing basis, transactions and relationships within the public markets. this network analysis allows to: represent the companies and their relationships, navigate through the company networks, identify the position of each company on the market, measure the strength of the links (affinities) amongst the companies, determine the role and the status of each company. from this network cartography, we can recognize and act on the strategic environment of a company, and use it as tool of competitive intelligence. in effect, competitive intelligence can be considered as a process with the aim of reducing the part of uncertainty in the taking of any strategic decision (revellic, 1998). so, to be intelligent is the ability to find a solution in a complex environment (massé et al., 2006). this corresponds to the capacity of absorption (zahra & george, 2002) of information to a strategic end, that is to say to its acquisition, its assimilation, its processing and its development. 7. conclusion and future research this study, carried out through data issued by the french official journals (boamp), is an analysis of french public markets throughout 2008. thus, from 54.181 transactions carried out between the contractors and the submitting companies, we were able to observe 4.203 transactions undertaken by coalition companies. the growth of these transactions, with relational information, allowed us to set up a structural analysis. from this, we constitute a data basis on interorganizational relationships. the main contribution of this study is to offer a framework of strategic network analysis within public markets. we set up a cartography giving a graphic representation of alliance networks. it eases their visualization and reveals non-trivial characteristics common to other business networks. but the aim of this study is to propose the basis of an competitive intelligence system. for competitive intelligence can be considered as a process aiming to reduce the uncertainty factor in the taking of any strategic decision (moinet, 2011). the aim, then, would be to provide companies a system of new links references, to help them form coalitions within public markets. to devise an competitive intelligence system, we need to keep in account that networks are where business interactions are made and undone. they can evolve, but also disappear. so we must keep on with this study. to this end, our perspective is to follow up, in a dynamic way, the evolutions and movements of network alliances within public markets over a period of several years. the longitudinal study will try to put forth the emergence and the evolution of strategic networks within public markets. the analysis will be based on the way in which businesses link themselves up and would use the preferential attachment concept described by barabasi and albert (1999). then, the approach that we are considering, the building a system of recommended links would be the following: through a longitudinal study over several years, we would be able to predict new emerging links, which will connect the companies already present in the networks, but which had never been linked previously. supervised training 40 techniques (benchettara et al., 2011) could, then, be applied to build a prediction pattern of new links within the networks to help businesses form winning coalitions. making the decision to form a coalition within public markets means constructing a particular structure of links within a complex system of relations. building a coalition can be considered as a plan of strategic decisions, in which the parties (the companies) can group to obtain earnings (transactions) through their choices (temporary alliances) and keep within the rules (implicit or explicit) which frame or curb their their performances. the earnings depend upon the decisions of parties exterior to the plan, and of which the distribution does not respond to a known probabilist law (uncertain environment). this decision will be defined by the taking into consideration of multiple criteria linked to the scores of relational properties. it will imply, amongst others, the diversity of considered options and the in-depth assessment of each of them, in considering possible profits. acknowledgment: the author wishes to thank frédéric aidouni for his collaboration in collecting data. references akerlof, g. 1970. “the market for ‘lemons’: quality uncertainty and the market mechanism.” quarterly journal of economics 84: 353–374. assens, c. 2003. “le réseau d’entreprises : vers une synthèse des connaissances.” management international 7 (4): 49–59. baker, w.e. 1984. “the social structure of national securities market.” american journal of sociology 96 (3): 589–625. barabàsi, a.l., and r albert. 1999. “emergence of scaling in random networks.” science 286: 509–512. benchettara, n., r. kanawati, and c. rouveirol. 2010. “apprentissage supervisé pour la prédiction de nouveaux liens dans des réseaux sociaux bipartie.” in actes de la 17iéme rencontre de la société francophone de classification sfc2010, 63–66. borgatti, s., a. mehra, d. brass, and g. labianca. 2009. “network analysis in the social sciences.” science (new york, n.y.) 323 (13): 892–5. callon, m. 1989. la science et ses réseaux: genèse et circulation des faits scientifiques. éditions la découverte. charreaux, g. 2000. “la théorie positive de l’agence : positionnement et apports.” revue d’économie industrielle 92: 193–214. cohendet, p., and m. diani. 2003. “l’organisation comme une communauté de communautés croyances collectives et culture d'entreprise,” revue d’économie politique 113: 697–720. freeman, lc. 1979. “centrality in social networks conceptual clarification.” social networks. granovetter, m. 1985. “economic action and social structure: the problem of embeddedness.” american journal of sociology 91 (3): 481–510. grossetti, m., and f. godart. 2007. “harrison white : des réseaux sociaux à une théorie structurale de l’action.” sociologies (17). gulati, r, and n nohria. 2000. “strategic networks.” strategic management journal (4): 1–34. gulati, r., and h. singh. 1998. “the architecture of cooperation: managing coordination, uncertainly and interdependence in strategic alliance.” adminitrative science quartely. lemieux, v. 1998. les coalitions : liens, transactions et contrôles. presses universitaires de france puf. lin, n., k. cook, and r. burt. 2001. social capital: theory and research. massé, g., c. marcon, and n. moinet. 2006. “les fondements de l’intelligence économique : réseaux & jeu d'influence.” market management 6 (1): 84. moinet, n. 2011. intelligence économique : mythes et réalités. cnrs. navarro, e., and r. cazabet. 2011. “détection de communautés, étude comparative sur graphes réels.” information interaction intelligence 11 (1): 77–93. olson, m. 1971. logic of collective action: public goods and the theory of groups. cambridge, harvard university press. revellic, c. 1998. intelligence stratégique sur internet. ed. dunod. richardson, g. 1972. “the organization of industry.” economic journal 82: 883–896. strogatz, s h. 2001. “exploring complex networks.” nature 410 (8): 268–76. travers, j., and s. milgram. 1969. “an experimental study of the small world problem.” sociometry 32 (4). uzzi, b. 1996. “ the sources and consequences of embeddedness for the economic performance of organizations: the network effect,” american sociological review 61 (4): 674– 698. voisin, c., s. ben mahmoud-jouini, and s. edouard. 2004. les réseaux : dimensions organisationnelles et stratégiques. economica. white, h. c. 1981. “where do markets come from?” american journal of sociology 87 (3): 517–58. 41 williamson, o. 1985. the economic institutions of capitalism. free press-collier macmillan. yi, s.-s., and h. shin. 2000. “endogenous formation of research coalitions with spillovers.” international journal of industrial organization 18 (2): 229–256. zahra, s.a., and g. george. 2002. “absorptive capacity: a review, reconceptualization, and extension.” academy of management review 27 (2): 185–203. 1. article jisib 2012 version publiée 32 multiversion document warehouse: an approach to multidimensional analysis kaïs khrouf*, jamel feki*, chantal soulé-dupuy** * mir@cl laboratory university of sfax tunisia, ** irit university of toulouse i – france received 15 december 2010; received in revised form 2 march 2012; accepted 27 april 2012 abstract: document warehouses allow the storage of selected and filtered heterogeneous documents, as well as their exploitation through multidimensional analyses techniques. however, the content of documents is dynamic and changes across time. in practice, decisional analysts may be interested with various versions of documents. thus, the document warehouse should store and manage these versions. this paper presents an extended generic model for document warehouses allowing the management of the multiversion documents. in addition, it interests with multidimensional analysis on documents versions. keywords: document warehouse, multiversion documents, multidimensional analyses 1. introduction nowadays, internet allows an exponential evolution of data volumes stored and exchanged among organizations. these evolutions raise new problems: how to deal with changes undergone by documents? what are these changes and how to detect them? for instance, a user revisiting a document might want to be informed of the document changes since his last visit. in order to maintain various versions of the same warehoused document, we need the concept of document warehouse. the author of (khrouf & soulé-dupuy, 2004) defined the document warehouse as a source of information that is subject-oriented, filtered, integrated, archived (versions), and organized for a process of retrieval, interrogation or analysis. according to this definition, documents integrated in the warehouse could be historized (i.e., retain their evolution over time through different versions). in order to reach this objective, we propose an extension for the document warehouse meta-model defined in (khrouf, feki and soulédupuy, 2011). this extension is expected to manage content changes (i.e., when the document content is modified) and structural changes (i.e., when the document structure changes) that can undergo one document or class of documents. the extended meta-model allows applying techniques of multidimensional analyses on multiversion documents. we distinguish two types of analysis: i) multiversion analysis, i.e., analysis covering all versions for the same document, and ii) recent-version analysis; i.e., analysis relying on the last version of document(s). available for free online at https://ojs.hh.se/ journal of intelligence studies in business 2 (2012) 32-40 33 this paper deals with the problematic of multiversion document warehouse; it is organized as follows. in section 2 we outline some works devoted to the management of multiversion documents. in section 3, we propose an extended meta-model for document warehouse and, in sections 4 to 6 we detail our approach of multidimensional analyses on multiversion documents integrated in the warehouse. finally, we give an overview of our software prototype baptized docware (document warehouse). 2. related works for the management of multiversion documents, several theoretical works have been proposed in the literature; furthermore, software prototypes have emerged. nicolle, alvarez & amghar (2001) consider that the document is a set of independent fragments (parts). they distinguish two types of versions: a document version and a fragment version. in fact, the modification of certain document fragments creates new versions of fragments, and therefore a new version of the whole document. xydiff (cobéna abiteboul & marian, 2002) is a component of xylème (abiteboul, cluet, ferran & rousset, 2002) to manage different versions of a document. every modified item is represented as an xml file, stored in a data warehouse and indexed. these files are used thereafter to reconstruct previous versions of documents. xydiff uses the tree structure of xml documents in order to detect movements and changes taking place on a document. x-diff (wang, dewitt & cai, 2003) is an algorithm for integrating the characteristics of xml structures with standard techniques of tree comparison in order to calculate the differences between two versions of an xml document. the main feature of this algorithm is that xml documents are modeled by unordered tree structures, unlike the work of xydiff. rusu, rahayu & taniar (2006) propose an approach for extracting rules from the changes of version of dynamic xml documents. specifically, the authors propose an algorithm that studies the conduct of versions of xml documents in time and thus determines learning rules to predict document changes in the future. in our work, we are interested not only in the management of document versions (track and detect changes of the document evolution through time), but also for managing the versions of the collections of documents (set of documents gathered in the same class). in addition, we develop a multidimensional analysis approach for these multiversion documents. 3. meta-model for document warehouses 3.1 meta-model description the document warehouse should store pertinent documents in order to apply the multidimensional analyse on these documents; in addition, it should be able to manage the heterogeneity and support the evolution of structures and contents. to do so, we propose the meta-model of figure 1. figure 1: meta-model for multiversion document warehouses specific structures (c) 1..* 1..* associate 1 1..* 1..* 1 1..* genelt namege cardge versgenelt datevge versspeelt datevse information content genatt namega speattc namesa valuesa include s_include define 0..* 0..* generic structures (b) documents (a) 0..* 0..* s_compose1 compose 0..1 contain {ordre} {order} {order} itsgenstr 1..* documents namedoc content (d) {order} 1 ontologies (e) 1..* 1 1 ontologies nameont concept namecpt belong 0..* s_concept assign0..* 0..1 1..* 1 genstr namegs versgenstr datevgs versdoc datevdoc 1..* itsdoc 1 1..* itsversgenstr 34 this metadata includes the following components: •a set of documents (figure 1.a) to be integrated in the document warehouse and their different versions (figure 1.a). •the hierarchical structure of documents. it is made up of two types of structures: i. the generic structure (figure 1.b): it is a common structure for a document set. it is composed of a set of versions each of which is defined by a set of versions of generic elements which can be composed of other versions of generic elements. each of these elements can also be described by generic attributes for example book-id. ii. the specific structure (figure 1.c): it is associated to a single document and has to be compliant/identical to one among the existing versions of generic structures. this structure is defined by a set of versions of specific elements that can include specific attributes. •the content (figure 1.d) is the textual element of the specific structure. •the semantic layer (figure 1.e) is defined using domain ontologies. in our context, ontology is composed of a set of concepts hierarchically organized where each leave concept is described by a set of keywords. 3.2 example figure 2 depicts a simple instantiation example for our meta-model of figure 1. in this example, we manage three versions of the same document doc1: •doc1 is initially compliant to version1 of the generic structure article composed of title and content. •after changes made on the content element, doc1 belongs now to the new version2 of article. •after renaming the content element to section composed of two paragraphs (i.e., dimension and fact), the new version of doc1 is becoming conform to version3 of the generic structure article. figure 2: an instantiation example for the meta-model in figure 1. dw dss … doc1 version1 dw olap … doc1 version2 v1 article v1 title v1 content doc1 v2v1 v2 article v2 content dw dss… olap… dw doc1 version3 v3 v3 article v1 section v1 p v1 p dimension… fact… discovery knowledge data mining olap design kw11 ... kw22 kw23 ... kw12 ... data warehouse kw11 ... 35 3.3 meta-model advantages the meta-model we proposed has the following advantages: •grouping heterogeneous documents having identical or similar structures into classes. this relies on an algorithm for comparing labeled tree structures (ben messaoud, feki, khrouf & zurfluh, 2011) •storing various versions of documents due to evolutions. •adding up of semantics to the documents by linking the textual content to the concepts of domain-ontologies (ben meftah, khrouf, feki, ben kraiem & soulé-dupuy, 2011). •applying multidimensional techniques on documentary information. this feature will be detailed in section four. 3.4 meta-model implementation as shown in figure 1, the meta-model is designed using the unified modeling language (uml) object-oriented modeling. the meta-model implementation is carried out in an object relational dbms (oracle 10g). to ensure this translation, we have used the following transformation rules: •classes are transformed into tables. •for one-to-many relationships implementation, we have two alternatives: use one mono-valuated link or one multi-valued link in the opposite direction. we opted for the mono-valuated link as they facilitate the generation phase of views necessary for the multidimensional analyses. example 1 •we implement many-to-many relationships using multi-valuated links, specifically by using a list of references as nested tables. example 2 •for inheritance, we opted for mono-valued links from subclasses to super-classes in order to separate the two structures, generic and specific. figure 3: the navigational diagram of the proposed meta-model in figure 1 versdoc versgenstr id_doc datedoc itsvgs id_vgs datevgs 319 04/02/2012 17 01/02/2012 716 05/04/2012 24 05/04/2012 1426 14/05/2012 versgenstr versgenelt id_vgs datevgs itsvge id_vge datevgs 17 01/02/2012 67 01/02/2012 68 01/02/2012 24 05/04/2012 85 05/04/2012 inheritge itsgenstr specific structures (c) associate genelt id_ge namege cardge versgenelt id_vge datevge versspeelt id_vse datevse information id_cont content genatt id_ga namega speattc id_sa namesa valuesa include s_include generic structures (b) documents (a) s_compose compose contain documents id_doc namedoc content (d) ontologies (e) ontologies id_ont nameont concept id_cpt namecpt belong s_concept assign genstr id_gs namegs versgenstr id_vgs datevgs versdoc id_vdoc datevdoc itsdoc itsversgenstr inheritega inheritevge define 36 3.5 meta-model instantiation the integration of a document into the warehouse is accomplished through the three following steps: i. extraction of the specific structure for the document by using a parser; it includes the document tags and its hierarchical structure. ii. comparison of the specific structure of the document with the generic structures stored in the warehouse. this step is accomplished through an algorithm which calculates a similarity degree to compare labeled tree structures (ben messaoud, feki, khrouf & zurfluh, 2011). iii. insertion of the document content, information and list of keywords into the warehouse while linking the textual information to one or more concepts that also are characterized by keywords. we use the information retrieval techniques to perform this step (reference). 4. multidimensional analyses the document warehouse is intended to allow decision-making. to do so, we adopt the multidimensional model (kimball & ross, 2002) that considers an analyzed subject as a point within a space having several dimensions. this model relies on the concepts of fact and dimension. the fact represents the subject to be analyzed as the number of articles and, the dimensions represent the context of recording the fact such as author, publication year and conference. dimensions are made up of attributes organized, from the finest to the greatest granularity, into hierarchies. figure 3 describes our proposed multidimensional process to analyze textual information stored in the document warehouse. figure 4: multidimensional analysis process in following section, we detail the first two phases of this process. 5. phase 1: construction of the document mart schema let us remember that a generic structure gathers a set of documents having identical or similar structures. the decision makers can focus on a generic structure to perform his/her analyses. the first step consists in (1) selecting the analysis context through the choice of the generic structure on which analyses will be applied, and then (2) selecting the type of analysis: analysis covering all versions or relying only on the last version of documents. during step two, the decision-maker selects the multidimensional schema components, one fact and a set of related dimensions: •a fact represents a subject of analysis, composed of a set of attributes describing the business activity. these attributes are called measures or indicators and have numeric values. as an example, let us consider the fact publication that has the measure number of published articles. •the dimensions represent the analysis axes of measures. this means that the measures of an activity are observed according to these different dimensions. for instance, measures of the publication fact can be analyzed according to the several dimensions as author, year, and concept. in addition, the decision-maker indicates the order of dimensions and the aggregation function (count, sum, max, min and avg) to be applied to the fact measures. in the third step, the decision-maker can select specific values or introduce predicates in order to filter data for analysis. we distinguish two types of data filtering: •dimension filtering through which the user can select values on a dimension. •fact filtering where the user restricts the values of the fact measures using the comparison operators (<, >, <>, <=, >=, =). example: let us analyze the number of publications addressing the data warehouse concept by author and by year. construction of mart schema warehouse multidimensional schema document mart multidimensional table automatic generation of mart visualization multidimensional table 37 figure 5: affectation of analysis components once all these document mart schema-components are defined, the next phase generates the document mart. in our approach, this generation is automatically performed. 6. phase 2: automatic generation of document mart the decision-maker task is now completed and the automatic generation produces a document mart instantiated from the warehouse. to simplify this generation, we decompose it into two complementary steps namely view generation for each analysis component, element or concept, and joining and grouping generated views. 6.1 views generation for analysis component the first step is to recover the identifiers of the versions of documents belonging to the same generic structure and concerned by the analysis. •multiversion analysis select id_vdoc from versdoc vd whre vd.itsversgenstr.itsgenstr.sags.namegs = 'namegs'; •recent version analysis select vd.itsdoc.id_doc, max(datevdoc) from versdoc vd group by vd.itsdoc.id_doc; secondly, we recuperate trough a sub-query three attributes: (1) the identifier of each document. (2) the identifier of the common ancestor of analysis components. (3) the concerned information. these sub-queries are merged by the sql union operator to obtain a single view. the sub-query the system generates is the following. select 'id_vdoc', (1) i.associate.s_compose.s_compose....id_vse, (2) i.content (3) from information i (4) where i.associate in (select nt.adrvse from the (select vd.contain from versdoc vd where id_doc= 'id_doc')nt);(5) --if the dimension is a generic element and i.associate.inheritvge.inheritege.namege= 'namege' (6) --if the dimension is a concept and i.contain.namecpt='namecpt' (7) where: (1) document identifier (2) identifiers of specific elements those inherit from the first common ancestor of all analysis elements. (3) content of the specific element. (4) meta-model table name. (5) selection of the specific elements belonging to the document id_doc. (6) selected name of the generic element (when a dimension is based on a generic element). (7) name of the concept on which a dimension is based. note that the fact view is generated in the same way like dimensions; the s_compose denotes the link between a specific element and its father conference name year language thematics thematic dates submission notification registration conf committee program member papers paper title authors abstract authorfact (count) dimension 2 information system database cube data warehouse olap dimension 1 dimension 3 38 specific element so then the occurrences of s_compose equal the number of levels between a chosen element and its ancestor. as an example, for the year dimension (cf. figure 5) and the document 314 the system generates the following script. select '314', i.associate.s_compose.id_vse, i.content from information i where i.associate in (select nt.adrvse from the (select vd.contain from versdoc vd where id_doc= '314')nt); and i.associate.inheritvge.inheritege.namege= 'year' the ancestor element of the analysis components (abstract, author, year, title) is conference. there is one level between year and conference. that’s why s_compose is 1. for the analysis component data warehouse concept (cf. figure 5), the system generates the following script for the same document id 314. select '314', i.associate.s_compose.s_compose.s_compose.id_ se, i.content from information i where i.associate in (select nt.adrvse from the (select vd.contain from versdoc vd where id_doc= '314')nt); and i.contain.namecpt='datawarehouse' the number of levels between abstract and conference (ancestor element of the analysis components) is 3. thus the occurrences of s_compose equal 3. 6.2 joining and grouping generated views after generating the view for the fact and its dimension views, we follow by linking these views on their two first attributes, thus we generate a new view called joint. for our running example, it is the following. create view joint (datawarehouse, year, author, title) as select datawarehouse, year, author, title from datawarehouse d1, year d2, author d3, title f where d1.doc = d2.doc and d2.doc = d3.doc and d3.doc = f.doc and d1.anc = d2.anc and d2.anc = d3.anc and d3.anc = f.anc; to generate the final view that describes the document mart we group by all dimensions and apply the count function. create view result (datawarehouse, year, author, nb) as select datawarehouse, year, author, count(title) from join group by datawarehouse, year, author; figure 6 displays the result, obtained with the generated view, in a multidimensional table. figure 6: multidimensional table 7. docware prototype: experimentation to validate our proposals we developed the software prototype docware (document warehouse) for the integration and the analysis of textual data. specifically, docware provides the two following main features: first it determines the generic and specific structures of documents and then inserts these documents automatically into the document warehouse, and secondly assists the administrator (or even skilled decision-makers) during the construction of the document mart. in the remainder we illustrate some functionalities of docware through the following example. suppose we want to count the number of scientific papers dealing with the data warehouse concept, by author and publication year. •context accessing the document warehouse content we find that the documents describing the papers are grouped into the generic structure conference. it contains all necessary elements to perform the analysis (abstract, year and author). nb 2007 1 1 2008 * 2009 2 … … concept data warehouse publication foulen dupont 39 •approach we follow the three steps of our approach. i. choice of analysis context: we start by defining the generic structure for the document mart to be constructed. thus, the system displays. among the list of stored structures in the warehouse, we choose the generic structure conference that will be visualized by a tree (figure 7). ii. selection of analysis components: we specify the role (dimension or fact) of elements to build the mart by using contextual menus. chosen elements are automatically highlighted by using different shapes and colors for dimensions (read) and facts (yellow). in our example, we assign the data warehouse concept to the generic element abstract as the first dimension. then, we select the generic elements year and author as the second and third dimensions. finally, the measure is the count of titles. to assign a concept to a generic element, docware displays the list of all existing ontologies in the warehouse; this enables us to choose the appropriate ontology (cf. figure 8). iii. filtering: as we want to analyze the count of papers for the authors of this paper, we apply a filter on the third dimension. the system displays all author values; among them we select the three following names: kaïs khrouf, jamel feki and chantal soulédupuy. •result to visualize the result, docware creates views according the approach described in section 6 and displays the result multidimensional table (cf. figure 9). figure 7: affectation of a fact and dimensions figure 8: affectation of concept for the generic element abstract 40 figure 9: the result multidimensional table 8. conclusion the document warehouse allows flexible manipulation of heterogeneous collections of documents based on their structures and contents. in this paper, we extended the document warehouse meta-model toward a metamodel that supports multiversion document warehouse. this is for integrating a new feature: the management and analysis of multiple versions of documents. as documents evolution may concern their structure and/or content, we addressed the storage of versions compliant to a same document structure, as well as versions compliant to a multiple document structures. decision makers could be interested with the document evolutions, or even ignore them. therefore, we suggested two types of analysis on documents namely: i) multiversion analysis; i.e., covering all versions for a same document; and ii) recent-version analysis; i.e., analysis relying only on the last version of documents. in our proposed approach, each document version is compliant to a version of specific structure. furthermore, various versions of the same document are able to be compliant to several versions of generic structures. as an immediate perspective, we aim to extend the process of multidimensional analysis by integrating personalization criteria and metadata; this could be done by the user himself or by an assisted process. in addition, semantic aspects during the analysis process are interesting; they can help decision makers to get better analytics. acknowledgement we would like to kindly thank dr mohamed mbarki and ms maha azabou (master degree student) for their contribution to the implementation of the docware system prototype. references abiteboul s., cluet s., ferran g., rousset m.c. (2002). the xyleme project, computer networks, 39(3): 225-238, 2002. ben meftah s., khrouf k., feki j., ben kraiem m., soulé-dupuy c. (2012). document warehouse: integration of semantic structures, international conference on information systems ans intelligence economic, djerba, tunisia. ben messaoud i., feki j., khrouf k., zurfluh g. (2011). unification of xml document structures for document warehouse (docw), international conference on enterprise information systems, p. 85-94, beijing, china. cobéna g., abiteboul s. & marian a. (2002). detecting changes in xml documents. in international conference on data engineering (icde’2002), p. 41-52, san jose, california, usa. kimball r. & ross m. (2002). the data warehouse toolkit (2 edition). new york: john wiley & sons. khrouf k. & soulé-dupuy c. (2004). a textual warehouse approach: a web data repository, (p. 101-124). hershey: idea group publishing. khrouf k., feki j., soulé-dupuy c. (2011). an approach of multidimensional analysis of document. international conference on information systems ans intelligence economic, marrakech, morocco. nicolle c., alvarez a., amghar y. (2001). managing versions and links for structured legacy documents, international symposium on information systems and engineering (ise’2001), june 25-28, las vegas, nevada, usa. rusu l.i., rahayu j.w., taniar d. (2006). mining changes from versions of dynamic xml documents, p. 312, workshop on knowledge discovery in xml documents (kdxd), p. 3-12, singapore. wang y., dewitt d.j., cai j.y. (2003). x-diff: an effective change detection algorithm for xml documents, international conference on data engineering (icde’03), p. 519-530, bangalore, india. vol6no1paper5 rodriguez to cite this article: rodríguez salvador, m. and hernández de menéndez, a.m. (2016) major advances in ophthalmology: emergence of bio-additive manufacturing. journal of intelligence studies in business. vol 6, no 1. pages 59-65. article url: https://ojs.hh.se/index.php/jisib/article/view/143 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index major advances in ophthalmology: emergence of bio-additive manufacturing marisela rodríguez salvadora and ana marcela hernández de menéndezb tecnológico de monterrey, escuela de ingeniería y ciencias, ave. eugenio garza sada 2501, monterrey, n.l., méxico, 64849; amarisrod@itesm.mx; bmarcelahernandez@itesm.mx journal of intelligence studies in business please scroll down for article major advances in ophthalmology: emergence of bioadditive manufacturing marisela rodríguez salvador* and ana marcela hernández de menéndez tecnológico de monterrey, escuela de ingeniería y ciencias, ave. eugenio garza sada 2501, monterrey, n.l., méxico, 64849 *corresponding author: marisrod@itesm.mx received 3 january 2016; accepted 5 may 2016 abstract important efforts to discover new ways to combat illnesses are being carried out worldwide. in this sense, bio-additive manufacturing is an innovative technology that will revolutionize the health industry, as it provides the possibility to develop three-dimensional bio devices, such as body tissues and even organs. this research explores the most novel inventions of bio-additive manufacturing in ophthalmology. the main aim is to support the decision making of the research community and the organizations involved in this industry. the major advances, organizations, research focuses and main countries involved in the ophthalmology field were identified. to accomplish this, a scientometric patent analysis was carried out using advanced data mining software and consultations with experts. insights show a global research trend toward the development of lenses, followed by prosthesis and implants. bio-additive manufacturing is now in a nascent s-curve phase; however, important advances are being carried out. keywords 3d bioprinting, 3d printing, additive manufacturing, bio-additive manufacturing, biomedical devices, bioprinting, health, ophthalmic devices, ophthalmology, sientometrics, patent analysis 1. introduction additive manufacturing, also known as 3d printing and rapid prototyping, is an innovative technology that enables the development of products in an additive way by fusing or depositing materials in layers to produce a three-dimensional physical object (delgado, ciurana, and rodríguez 2012). the first technique was developed by charles hull in the early 1980s (schubert, van langeveld, and donoso 2014). since then, the industry has grown, and as a consequence, the number of patents has increased (rodríguez et al. 2014). high value products can be developed with this technology, including artwork, automotive parts, architectural models, dental bridges, jewellery and ductwork for mobile hospitals. versatility is one of the core advantages that 3d printing offers (conner et al. 2014). in addition, it allows for customized designs (euromonitor 2013) and product manufacturing with complex geometries and superior quality (campbell et al. 2011). a wide range of sectors could benefit from this technology, particularly the health industry, which presently needs to develop more innovative processes to face global changes in sustainability. worldwide markets demand high quality services and products at affordable prices (kivisaari et al. 2013). bioadditive manufacturing applications are growing rapidly and are expected to revolutionize the entire industry (schubert, van langeveld, and donoso 2014) with tools that facilitate education, surgical planning and organ transplantation research (huang and zhang 2014). journal of intelligence studies in business vol. 6, no. 1 (2016) pp. 59-65 open access: freely available at: https://ojs.hh.se/ 60 the purpose of this research was to identify the main organizations, their research focus, the major advances and the main countries involved in bio-additive manufacturing applied to ophthalmology. for this aim, a scientometric patent analysis was developed. the insights obtained could be useful to key players in the healthcare industry, particularly those who focus on researching emerging technologies to enhance innovative applications in ophthalmology. this paper is organized as follows. first, a review of additive manufacturing applied to health care is presented. second, current applications of this technology in the ophthalmology field are explored. third, an overview of the scientometric patent analysis is provided. fourth, the methodology applied is explained. lastly, the results are analyzed, and the conclusions are presented. 2. literature review 2.1 additive manufacturing: applications in the health care industry additive manufacturing has been used for decades, mainly in the manufacturing industry to produce prototypes (schubert, van langeveld, and donoso 2014). a wider adoption of this innovative technology is expected in the next two to five years due to its rapid diffusion into other industries. currently, its application has been extended to accessories, assembly parts and medical devices, including prosthesis (wohlers associates 2013), eye glasses and implants (schubert, van langeveld, and donoso 2014). as an example of its applications in health care, this technology is used to produce customized dental braces. the dental impression is converted into an stereolithography (stl) file, and then the braces are printed to fit the patient’s anatomy (conner et al. 2014). 3d printing offers valuable solutions for bone implant production. novel materials, such as cobalt–chromium– molybdenum alloy, can be used with this technology, allowing for the integration of a prosthetic component with a surrounding bone, which increases surgery success (stenlund et al. 2015). bio-additive manufacturing will play a determinant role in the health sector, considering the growing interest in developing breakthrough products that could change people’s lives, resulting in its global use (basiliere and shanler 2015). the use of bio-additive manufacturing in the health industry began with the production of medical devices that could repair, replace or control body functions. currently, it also includes the development of pre-surgery planning tools, surgical cutting templates (burton and shanler 2014) and custom-made products, providing patients and doctors with significant benefits that range from reduced time invested in surgery, to expedited patient recovery, to a higher likelihood of successful interventions. additive manufacturing also provides the possibility of printing tissue and organs directly, and it has enabled researchers to develop heart valves and cartilage tissue, among other body components. as the technology advances, the probability of developing functional tissues and organs using additive manufacturing will increase. in 20 years, it is expected that this technology will also offer the possibility of developing organs, such as eyes, hearts, livers and kidneys (ventola 2014). 2.2 bio-additive manufacturing in ophthalmology the potential uses of bio-additive manufacturing in ophthalmology are promising. complex three-dimensional models for ophthalmologists’ training are expected to be developed in the near future, enhancing the learning experience. moreover, advanced models of a patient’s eye anatomy could be reproduced and as a result, surgeons would be able to practice before an intervention, increasing precision and success (huang and zhang 2014). although more research is needed, there are significant advances in this area. along these lines, a 3d hollow eye model was fabricated almost 10 years ago using a rapid prototyping machine in which the purpose was to test a novel cleaner for healing complications in retinal diseases treatments. the inner walls of the model were coated with 5% bovine serum albumin to mimic the surface properties of the human retina (chan et al. 2015). important research has also been carried out for developing ophthalmological surgical instruments. for example, an ophthalmic speculum and a customized spatula have been developed using bio-additive manufacturing technology. they are currently undergoing prototype testing and a computer aided design (cad) development stage, respectively (lupeanu et al. 2014). by means of bio-additive manufacturing, the development of a printed cornea is a real 61 possibility. for example, a research group from massey university and auckland university have discovered how to print cornea replacements using collagen (mechatronics and robotics research group of massey university 2015). this development is in the proof of concept stage. although the use of bio-additive manufacturing in ophthalmology is still limited, there is a significant potential for the development of ocular tissues, such as conjunctiva, sclera and corneas. also, the printing of artificial lenses, glaucoma valves and a variety of medical implants developed in customized processes will be a reality in the future (huang and zhang 2014). moreover, the use of additive manufacturing in the development of flexible optical lenses for smartphones has been reported as well (sung et al. 2015). with additional research, this progress allows for the possibility of producing high-quality ophthalmic lenses for human use. ophthalmology is expected to be an important industry for future developments and innovations in bio-additive manufacturing (huang and zhang 2014). 2.3 scientometric patent analysis important studies have applied quantitative methods of analysis to evaluate scientific and technological literature production in the health domain. they have shown how research trends could improve the management and establishment of new strategies. one example is the investigation developed by zhang et al. (2013), who analyzed research papers on health management with the purpose of identifying the current status of collaborative activities and research topics in the field. their main objective was to develop insights for policy makers to allocate health research funds in a more precise manner; however, when analyzing technologies, patents emerge as an important source for developing valuable insights, in addition to scientific production. patents are highly valuable mechanisms for protecting innovations. they provide important competitive advantages, such as the invention right of for twenty years (weenen et al. 2013). in addition, patents are considered good indicators of the technological innovation process (hidalgo-nuchera, iglesias-pradas, and hernández-garcía 2009; rodríguez and tello 2012 utilization). in fact, they are frequently seen as a level of r&d activities and are widely used to determine research trends as well as development profiles (tsuji 2012). moreover, 90% of all available technological information can be found in patent publications (blackman 1995). they represent an accessible, reliable, updated and standardized source of information (de souza antunes et al. 2012). most importantly, they provide a way to envisage technology trajectories and to identify ongoing developments of organizations (companies, government agencies, centers, universities, etc.) (rodríguez et al. 2014). patents are used frequently as an indicator of technology research; its statistical analysis offers valuable insights (huang and yang 2013), as is the case for scientometrics applications, which involves the statistical analysis of technological literature. since the 1980s, extensive literature regarding patent analysis has been produced, causing a large growth in the early 2000s (ranaei et al. 2014). however, for additive manufacturing technology, there is still scarce patent analysis research. previous studies (rodríguez et al. 2014; uk intellectual property office patent informatics team 2013; gridlogics technologies 2014; tsuji 2014) have focused on determining patent activity from a general perspective rather than in regards to a specific sector or application. in this research, a scientometric patent analysis on additive manufacturing applied in the ophthalmology field was developed. 3. method a scientometric patent analysis was developed during this study. the research began with a broad analysis of the field and included the application of patseer software and consultation with experts. patseer is a global patent database and research platform with integrated analytic tools covering more than 92 million records from the main authorities worldwide (sinha and pandurangi 2015). patents were retrieved from 19 patent authorities. the time period covered in this research depended on the authority coverage, which ranged from 1782 to 2015 (april 29). the “title” and “abstract” fields as well as the following queries were considered: (3d print* or additive manufactur* or bioprint* or rapid prototyp* or rapid manufactur*) and (eye* or ophthalm*). table 1 research focuses and recent inventions of organizations, ordered by family patents. family patent refers to the same patent application or the publication of a single invention protected by different authorities by a common owner. family patent no. patent publication number application date invention description organization research focus: lenses 1 wo2015014381a1 (single patent) july 31, 2013 a method for ophthalmic lens using additive manufacturing. it includes constituting voxels of one or more compositions, wherein manufacturing a threedimensional at least one of the compositions comprises one or more pre-polymers or polymers. essilor international sa (france) 2 wo2015014380a1 (single patent) july 31, 2013 a method using additive manufacturing technologies and processes to manufacture a three-dimensional ophthalmic lens with a high management level of the homogeneity during the construction. essilor international sa (france) 3 fr3006622a1 family patent: wo2014195654a1 june 7, 2013 a process for manufacturing an ophthalmic lens having at least one optical function. it comprises the step of additively manufacturing an intermediate optical element. essilor international sa (france) 4 fr3006623a1 family patent: wo2014195653a1 june 7, 2013 a process for manufacturing an ophthalmic lens having at least one optical function characterized by comprising a step of additively manufacturing the ophthalmic lens. essilor international sa (france) 5 fr3008196a1 (single patent) july 8, 2013 a method for manufacturing an ophthalmic lens having at least one optical function, comprising the step of providing a starting optical system of the lens with a basic optical function and the step of additively manufacturing an additional optical element of the lens. essilor international sa (france) 6 ca2884801a1 family patent: wo2014049284a1 sept 26, 2013 a method for manufacturing an ophthalmic lens comprising a marking step for producing permanent technical marks. it comprises a step of additive manufacturing of a body and first and second surfaces. essilor international sa (france) 7 fr2985214b1 family patent: wo2013098511a1 dec 29, 2011 a template for an ophthalmic lens produced by additive rapid prototyping. essilor international sa (france) 8 cn102854639a (single patent) sept 21, 2012 a manufacturing process of photosensitive resin eyeglasses. with the adoption of the manufacturing process, optometry prescription data can be directly input into rapid prototyping equipment in a factory or eyeglass store. jiangsu wanxin optical co. ltd. (china) research focus: prosthesis 9 cn104091506a (single patent) july 24, 2014 the invention discloses a novel three-dimensional simulation eye. according to the novel threedimensional simulation eye, the 3d printing technology is adopted. liu qinghuai (individual) (china) 10 gb2504665a family patent: gb201211903d0 july 4, 2012 a method of manufacturing an artificial eye is presented. a digital image of an iris may be acquired and transferred to a substrate either by 3d printing or a transfer material, such as a dye sublimation film. manchester metropolitan university (uk) 11 gb2487055a (single patent) jan 5, 2011 a method of manufacturing an artificial eye is presented. in one embodiment, the image of the iris is cad modelled, and the substrate may be formed as an inherent part of the transfer step by a 3d printer using silica powder and then bound using cyanoacrylate. fripp design ltd. (uk) research focus: implants 12 de102012011311a1 (single patent) june 10, 2012 the invention relates to an intraocular lens that has a front side at which light occurs and a back side at which the light emerges. the lens is manufactured by an injection molding process, rapid prototyping or laser sintering. becker hartwig (individual) (germany) 4. results and discussion additive manufacturing applications in ophthalmology are in a nascent stage; only 33 patents were initially identified. a data cleaning process known as standardization (randall et al. 2013) was conducted manually to remove irrelevant information and to homogenize organizations’ names. after this process, a total of 17 patents were analyzed. this information was organized and categorized, resulting in 12 family patents (the same patent application or the publication of a single invention protected by different authorities by a common owner), which are shown in table 1. the results obtained show that the main research focus of bio 3d printing in ophthalmology is on the development of ophthalmic lenses. essilor international sa has 7 families in this area. for example, this company patented the process development of ophthalmic lenses and its intermediate or additional elements. incremental innovations of root patents have been developed through the application of additive manufacturing technology. additionally, jiangsu wanxin optical co. ltd. has patented an invention for producing photosensitive resin eyeglasses. prosthesis advances emerge as the second main research focus, which include 3 families. liu qinghuai (individual), manchester metropolitan university and fripp design ltd. have patented the development of artificial eyes. the third research focus is on implants. becker hartwig (individual) patented the creation of an intraocular lens. figure 1 shows that the top country in patenting these innovations is france (fr: 5 families), followed by the united kingdom (gb: 2 families), china (cn: 2 families) and germany (de: 1 family). in addition, 2 families were first filed to be protected in all european union countries at the same time (ep: 2 families). the identification and analysis of the inventions presented show the first efforts devoted to the application of bio-additive manufacturing in the field of ophthalmology. industry and academy are attempting to identify superior solutions to manage eye illnesses. this technology is in a nascent stage; however, the results show promising advances. bio-additive manufacturing provides the possibility to develop breakthrough innovations to improve patients’ conditions. 5. conclusions valuable insights were obtained through the scientometric patent analysis developed. the application of bio-additive manufacturing in the field of ophthalmology is still in its infancy. the majority of inventions found correspond to products developed to be used outside the human body, which represents the lowest risk for patients. this fact could be related to the novelty of the technology. figure 1 top countries for the development of ophthalmic inventions, determined by family patents. 64 the findings of this study show that the main research focus is on the development of lenses due primarily to the invention activity of essilor international sa. the second focus is related to the development of prosthesis, such as artificial eyes. in this sense, bio 3d additive manufacturing technology is mainly used to simplify the manufacturing processes and to create additional realism in the devices. only one invention belongs to the research focus group of implants, and this corresponds to the development of an intraocular lens. regarding the top country of protection, france occupies the leader position, particularly as a consequence of the patent activity of one company (essilor international sa). the results of this research offer valuable knowledge on emerging technologies and breakthrough innovations in ophthalmology. acknowledgements this research was supported by tecnologico de monterrey through centro de innovación en diseño y tecnología and its research group in advanced manufacturing. 6. references basiliere, p., and shanler, m. 2015. “hype cycle for 3d printing , 2014.” gartner, july 21. http://www.gartner.com/technology/home.jsp blackman, m. 1995. “provision of patent information: a national patent office perspective” 17 (2): 115–23. burton j, and shanler, m. "3d printing of medical devices". in hype cycle for 3d printing 2014. gartner, july 21. http://www.gartner.com/technology/home.jsp campbell, t., williams, c., ivanova, o., and banning, g. 2011. “could 3d printing change the world?” atlantic council, october 15. http://3dprintingindustry.com/wpcontent/uploads/2013/05/atlantis-report-on3d-printing.pdf. chan, y-k., wong, d., yeung, h.k., man, p.k., and shum, h.c. 2015. “a low-molecularweight oil cleaner for removal of leftover silicone oil intraocular tamponade.” investigative ophthalmology and visual science 56 (2): 1014–22. doi:10.1167/iovs.1415061. conner, b.p., manogharan, g.p., martof, a.n., rodomsky, l.m., rodomsky, c.m., jordan, d.c., and limperos, j.w. 2014. “making sense of 3-d printing: creating a map of additive manufacturing products and services.” additive manufacturing 1: 64–76. doi:10.1016/j.addma.2014.08.005. de souza antunes, a., de menezes, m., henrique da silva, c., nunes, j., and lins mendes, f. 2012. “trends in nanotechnology patents applied to the health sector.” recent patents on nanotechnology 6 (1): 29–43. doi:10.2174/187221012798109309. delgado, j., ciurana, j., and rodríguez, c.a. 2012. “influence of process parameters on part quality and mechanical properties for dmls and slm with iron-based materials.” international journal of advanced manufacturing technology 60 (5-8): 601–10. doi:10.1007/s00170-011-3643-5. euromonitor. 2013. " future watch: the rise of 3d printing a second industrial revolution or just lego for adults." euromonitor international, january 28. http://www.euromonitor.com/ gridlogics technologies. 2014. "3d printing technology insight report. an analysis of patenting activity around 3d printing from 1990-current." gridlogics technologies pvt. ltd. http://www.patentinsightpro.com/techreports. html hidalgo-nuchera, a., iglesias-pradas, s., and hernández-garcía, á. 2009. “utilización de las bases de datos de patentes como instrumento de vigilancia tecnológica.” el profesional de la informacion 18 (5): 511–20. doi:10.3145/epi.2009.sep.04. huang, m-h., and yang, h-w. 2013. “a scientometric study of fuel cell based on paper and patent analysis.” journal of library and information studies 11(2): 1–24. doi:10.6182/jlis.2013.11(2).001. huang, w., and zhang, x. 2014. “3d printing: print the future of ophthalmology.” investigative ophthalmology and visual science 55 (8): 5380–81. doi:10.1167/iovs.1415231. kivisaari, s., saari, e, lehto, j., kokkinen, l., and saranummi, n. 2013. “system innovations in the making: hybrid actors and the challenge of up-scaling.” technology analysis & strategic management 25 (2): 187– 201. doi:10.1080/09537325.2012.759202. 65 lupeanu, m.e., rennie, a.e.w., rosu, m.m., and moagar-poladian, g. 2014. “research strategy on developing additive manufactured bespoke ophthalmic instruments assisted by an online integrated platform.” upb scientific bulletin, series d: mechanical engineering 76 (2): 143–62. mechatronics and robotics research group of massey university. "research. 2015." http://mechatronics.massey.ac.nz/research.ht ml. ranaei, s., karvonen, m., suominen, a., and kassi, t. 2014. “forecasting emerging technologies of low emission vehicle.” 2014 portland international conference on management of engineering & technology (picmet), 2924–37. randall, s., ferrante, a., boyd, j., and semmens, j. 2013. “the effect of data cleaning on record linkage quality.” bmc medical informatics and decision making 13 (1): 64. doi:10.1186/1472-6947-13-64. rodríguez, m., cruz, p., avila, a., olivares, e., and arellano, b. 2014. “strategic foresight: determining patent trends in additive manufacturing.” journal of intelligence studies in business 4 (3): 42–62. http://scholar.google.comhttps//ojs.hh.se/index .php/jisib/article/view/104. rodríguez, m., and tello, m.a. 2012. “applying patent analysis with competitive technical intelligence: the case of plastics.” journal of intelligence studies in business 2 (1): 51–58. http://www.scopus.com/inward/record.url?eid =2-s2.0-84905713951&partnerid=tzotx3y1. schubert, c., van langeveld, m.c., and donoso, l.a. 2014. “innovations in 3d printing: a 3d overview from optics to organs.” the british journal of ophthalmology 98 (2): 159–61. doi:10.1136/bjophthalmol-2013-304446. sinha, m., and pandurangi, a. 2015.“guide to practical patent searching and how to use patseer for patent search and analysis.” gridlogics technologies pvt. ltd. http://patseer.com/2015/04/e-book-patentsearching stenlund, p., kurosu, s., koizumi, y., suska, f., matsumoto, h., chiba, a., and palmquist, a. 2015. “osseointegration enhancement by zr doping of co-cr-mo implants fabricated by electron beam melting.” additive manufacturing 6: 6–15. doi:10.1016/j.addma.2015.02.002. sung, y-l., jeang, j., lee c-h., and chuan, w. 2015. “in vivo deep brain imaging of rats using oral-cavity illuminated photoacoustic computed tomography.” journal of biomedical optics 20 (4). doi:10.1117/1.jbo.20. tsuji, y.s. 2012. “profiling technology development process using patent data analysis: a case study.” technology analysis & strategic management 24 (3): 299–310. doi:10.1080/09537325.2012.655417. tsuji, y.s. 2014. "market and r&d trends in 3d printing." kobunshi. 63:538-539. uk intellectual property office patent informatics team. 2013. "3d printing. a patent overview." intellectual property office. november. https://www.gov.uk/government/publications/ 3d-printing-a-patent-overview. ventola, l.. 2014. “medical applications for 3d printing: current and projected uses.” pharmacy and therapeutics 39 (10): 704–11. http://www.ptcommunity.com/system/files/pdf /ptj3910704.pdf. weenen, t. c., pronker, e. s., commandeur, h. r., and claassen, e. 2013. “patenting in the european medical nutrition industry: trends, opportunities and strategies.” pharmanutrition 1 (1):13–21. doi:10.1016/j.phanu.2012.10.003. zhang, c., yu, q., fan, q., and duan, z.. 2013. “research collaboration in health management research communities,” 13:52. wohlers associates. 2013. "additive manufacturing and 3d printing state of the industry. annual worldwide progress report." wohlers associates. https://wohlersassociates.com/state-of-theindustry-reports.html vol6no3paper1 singh to cite this article: singh, s.k. (2016) geospatial analysis of census data for targeting new businesses using geoeconomics. journal of intelligence studies in business. 6 (3) 5-12. article url: https://ojs.hh.se/index.php/jisib/article/view/175 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index geospatial analysis of census data for targeting new businesses using geoeconomics sushant k. singha avirtusapolaris corporation, santa clara, california, usa; sushantorama@gmail.com journal of intelligence studies in business please scroll down for article editor-in-chief: klaus solberg søilen included in this printed copy: geospatial analysis of census data for targeting new businesses using geoeconomics business intelligence through patinformatics: a study of energy efficient data centres using patent data nishad deshpande, shabib ahmed and pp. 13-26 alok khode cross-cultural strategic intelligence solutions for leveraging open innovation opportunities journal of intelligence studies in business v ol 6 , n o 3 , 2 0 1 6 j ou rn a l of in telligen ce s tu d ies in b u sin ess issn: 2001-015x vol. 6, no. 3 2016 alexandru capatina, gianita bleoju pp. 27-38 and kiyohiro yamazaki business intelligence evaluation model in enterprise systems using fuzzy promethee mansoureh maadi, mohammad javidnia pp. 39-50 and malihe khatami sushant k. singh pp. 5-12 economic and industrial espionage at the start of the 21st century – status quaestionis klaus solberg søilen pp. 51-64 geospatial analysis of census data for targeting new businesses using geoeconomics sushant k. singha avirtusapolaris corporation, santa clara, california, usa *corresponding author: sushantorama@gmail.com received 10 october 2016; accepted 25 november 2016 abstract geoeconomics plays a vital role in encouraging goods and services on new marketplaces. selecting a “sweet-spot” for new businesses is one of the biggest challenges for new entrepreneurs, enterprises, and investors, especially in the restaurant industry. this paper aims to present a novel geospatial methodological approach for new businesses using census data to answer an important business question: where i should start my new asian cuisine restaurant? state and zip code tabulation area (zcta) level data on race and income, downloaded from the us census website, were applied for the analysis. arcgis software was used as a geospatial analytics tool for hotspot analysis and for producing maps. based on the state level standard deviation map, california was found to have the second-highest relative asian population as gauged by the standard deviation (std. dev.) from the mean (1.5-2.5 std. dev.), after hawaii (>2.5 std. dev.), and followed by new jersey, new york, nevada, and washington. the state of california was selected for further investigation. seventeen of 58 counties were found to be asian community hotspots in california. a majority (48%, 854 of 1763) of the zcta were found to be asian community hotspots in these zip codes in this state, and this was statistically significant. only 9% (163 of 1763) of the zcta were not statistically significant asian community hotspots, while 43% of the zcta were found to be statistically significant coldspots of asian communities in california. among the 17 hotspot counties of asian communities, 14 were also derived as hotspots of mean income. the road layer map revealed that these zctas are well connected to major roads in the state. new entrepreneurs, enterprises, and investors, those who are willing to open and or invest in new restaurants, but are not sure about the location, could target hotspot zctas in these counties for asian cuisine. integrating arcgis with census data for producing maps of statistically significant potential business locations could be used as an important decision-making tool for opening new businesses. keywords analytics, arcgis, asian, business, california, census, geospatial, restaurants, zcta 1. introduction geoeconomics is described as a theoretical and an applied science, and a methodical trend in socioeconomic geography, and can be applied in temporal, spatial, and political economic systems encouraging goods and services in new marketplaces (alayev 1983, anokhin and lachininskii 2015). it is also considered to be a multidisciplinary science investigating economic activities and is defined as “the study of spatial, cultural, and strategic aspects of resources, with the aim of gaining a sustainable competitive advantage” (søilen 2012). since geoeconomics lies on a trifold of scientific domains, including sociology, geography, and economics, each component plays a vital role in promoting new economic activities at local and global levels (renner journal of intelligence studies in business vol. 6, no. 3 (2016) pp. 5-12 open access: freely available at: https://ojs.hh.se/ 6 1942, lachininskii 2013, anokhin and lachininskii 2015). therefore, the geoeconomic space, which is a complex network transborder system, is vital in promoting new business activities (gay 2012, søilen 2012, anokhin and lachininskii 2015). furthermore, the local economic groups may strongly influence the regional economic performance (porter 2003). besides, the economic, legal, political, infrastructure, ecological, technical, cultural, and social factors are vital macroenvironments that help in business decisionmaking processes (søilen 2012). selecting a “sweet-spot” for new businesses is one of the biggest challenges for new entrepreneurs, enterprises, and investors. in this study, a “sweet-spot” is defined as a geographic location where the likelihood of maximizing the benefits is the highest for a new business, considering the local environments. the location information plays a vital role in the establishment of new industries as it impacts the economic growth of the firms as well as the socioeconomic, environmental, and political status of the establishment area (bhat et al. 2014, demiriz and ekizoğlu 2015, mishra et al. 2015). the locational information could help in retail site selection (karadeniz 2009), preventing retail banking fraud (demiriz and ekizoğlu 2015), financing commercial real estate acquisitions by real estate investment trusts (conklin et al. 2016), fast-food industry (austin et al. 2005) and much more. moreover, the location could also impact the business-level innovation (jordan 2015). the impact of taxes, subsidies and incentives, environmental regulations, quality of life and amenities, labor costs and availability, technical infrastructure, transportation, and accessibility have been reported as the most important factors in the assessment of finding potential locations for new businesses (kimelberg and williams 2013, bhat et al. 2014). however, the socioeconomics and demographics of the potential customers are largely ignored in most of the studies. this could adversely impact a newly established business or firm. for example, in the restaurant industry, the theme, food quality, ambiance, aesthetics, the service, and economic shifts play a vital role in the success and the failure of the business (murillo 2010, kimelberg and williams 2013). nevertheless, selecting the wrong customer neighborhood, poor accessibility, and a less dense population in the surroundings may unfavorably impact the new establishments (murillo 2010). according to location theory, firms or enterprises tend to assess where and why economic activities happen so that they can maximize benefits (north 1955, kimelberg and williams 2013, dubé et al. 2016). in this process, in most cases, non-spatial data, which are outcomes of small or large surveys, have been applied assessing the potential locations for establishing a new business (kimelberg and williams 2013). these surveys are very expensive and have inherent reliability challenges. therefore, targeting a location for a new business based on the analysis of the survey data with a small sample size could be a big concern for entrepreneurs, investors, and enterprises. the united states (us) census captures socioeconomics, demographics, and business information of the us population that could be used in business decision-making. however, this non-spatial data still lacks a geographical/spatial context. spatial data have the advantage of showing patterns on maps and letting the users connect the dots, taking neighborhood geographies into consideration. historically, presenting facts and figures on a map have played a vital role in both the political and the economic contexts (søilen 2012). geospatial analytics have emerged as an important method for the spatial and temporal analysis of data in various domains for informed decision-making (prato et al. 1995, boulos et al. 2011, rey et al. 2015, singh 2015, singh and vedwan 2015, supak et al. 2015, singh et al. 2016). however, in business, it is still in the rudimentary stages. the reason could be the lack of vision for integrating geospatial tools, such as arc geographical information system (arcgis), in business decision-making. similarly, the census data has been always available for public and private use, though it has not been integrated and/or used in business decision-making. the main goal of this paper is to attempt to bridge the above-mentioned gaps and integrate us census data with arcgis to help new businesses answer an important business question: where i should start my new asian cuisine restaurant? there could be several business questions similar to this. the state of california in the usa has been the center of economic growth with maximum wages and opportunities (porter 2003). because of the high rate of diverse immigration, the state became a hotspot for ethnic cuisine specially restaurants (porter 2003, capps 2007). the restaurant industry is 7 one of the fastest growing industries, and small to large business entities could be impacted if a poor site is chosen to start a business. the small business entities may not have enough resources to evaluate site selection. therefore, the current approach, described in this paper, could be a cost-effective and more efficient way of selecting a site for new businesses within the restaurant industry. however, the approach could be adapted for any other industries. 2. materials and methods the state and the zip code level population data for asian immigrants and household mean income in the zip code areas were used. state and zip code tabulation area (zcta) shapefiles were applied to perform geospatial analyses and to create maps. 2.1 data collection 2.1.1 state and zcta level asian population data the state level race data was downloaded from the american community survey (acs). a detailed description of the acs and the data is found in the 2016 us census (us-census 2016). the acs offers a total of nine different combinations of races at zcta level. for the current study, only hd01_vd05 (i.e. asian alone) was selected. a detailed description on the zcta can be found at the us census site (us-census 2016). in brief, the “zctas are generalized areal representations of the united states postal service (usps) zip code service areas,” however, the “usps zip codes are not areal features but a collection of mail delivery routes” (us-census 2016). 2.1.2 zcta level income data the zcta level mean income data was downloaded from the acs. the acs offers a total of 27 different combinations of mean income at zcta level. for the current study, only hc02_est_vc02 (i.e. estimated mean income in dollars by all households) was selected (us-census 2016). 2.1.3 state and zcta shapefiles state and zcta shapefiles were downloaded from the us census website (us-census 2014, 2015, 2016). these shapefiles were used to produce maps for geospatial analysis. 2.2 data integration to arcgis, analysis, and mapping the state and the zcta data were joined to the shapefiles within the arcgis environment using geoid as a join key (esri 2012). arcgis is a mapping software, developed by figure 1 a standard deviation map of the asian population in the united states. 8 the environmental systems research institute (esri), that offers several geospatial analytical tools (esri 2014). for all mapping and geospatial analyses, arcgis version 10.3.1 was used (esri 2014). 2.2.1 standard deviation mapping there are seven standard classification methods (manual, defined, equal, geometrical interval, quantile, natural breaks, and standard deviation) available in arcgis to spatially display numerical data on a map (esri 2012, 2014, 2016). the state level asian population data, used in this study, is available in absolute numbers and in percentage. the standard deviation classification method was applied to produce a classification map of asian populations at the state level. in this method, arcmap derives the mean and standard deviation and produce maps displaying which feature polygons deviate (positively and negatively) from the mean (esri 2014, 2015). based on the positive deviation and the highest standard deviation values, california was selected for further analysis. 2.2.2 hotspot analysis the hotspot analysis is one of the spatial statistical analysis tools in arcmap that was applied for mapping spatial statistically significant clusters of high values (hotspots) and low values (coldspots) (esri 2014, 2016). the output feature class is in the form of a shapefile with a giz-score, gip-value, and gi_bin. the giz-score and gip-value measure the statistical significance and the gi_bin represents the confidence intervals at 90, 95, and 99% (esri 2014, 2016). 3. results and discussion 3.1 state level distribution of asian population in the us the analysis revealed that the highest relative percentage (38%) of people identifying as asian live in hawaii, followed by 13% in california, 8.6% in ney jersey, 7.6% in new york, 7.4% in nevada, and 7.3% in washington. although hawaii has the highest relative asian population, california was used for this case study because of the availability of other relevant data and the interest of new entrepreneurs, enterprises, and investors in california (figure 1). later, the focus for further investigation was california and all the zctas in the state. 3.2 zcta level distribution of asian populations in the us the zcta is the smallest census unit and may offer more specific information on the figure 2 hotspot and coldspot map of asian communities in the zip code tabulation areas of california, united states. 9 socioeconomics, demographics, and businesses of those who live within the zcta boundaries. the hotspot analysis of asian communities clearly indicated two hotspots in california (figure 2). there are 1763 zctas in california. the zcta level hotspot analysis of the asian population revealed that a majority (48%, 854 of 1763) of the zctas were found to be statistically significant asian community hotspots (figure 2). only 9% (163 of 1763) of the zctas were not statistically significant hotspots of asian communities, while 43% of the zctas were found to be statistically significant coldspots of asian communities in california (figure 2). this further explains that 854 zctas are densely populated with asian communities and could be potential locations for opening new asian cuisine restaurants. california has 58 counties (figure 2), of which 17 counties are hotspots of asian communities. contra costa, los angeles, marin, orange, san francisco, san mateo, santa clara, and santa cruz counties were found to be hotspots of asian communities. however, merced, monterey, riverside, san bemardino, san diego, san joaquin, solano, stanislaus, and ventura counties were partially categorized as hotspots of asian communities in california (figure 2). 3.3 zcta level distribution of mean income in california, us the mean income in california zctas ranges between $9,471 and $413,643. furthermore, the hotspot analysis of zcta level mean income revealed that a majority (51% 894 of 1763) of the zctas were found to be hotspots of mean income, and this was statistically significant (figure 3) in the state. thirty-nine percent (746 of 1763) of the zctas were found to be statistically significant coldspots relative to the mean income, while 10% (170 of 1763) of the zctas were statistically not significant hotspots relative to the mean income in the california. the hotspots of mean income cover a total of 20 counties (figure 3). marin, san francisco, san mateo, santa clara, santa cruz, napa, solano, contra costa, ventura, los angeles, and orange counties were found to be hotspots of mean income in the zctas in the state. on the other hand, the areas of sonoma, monterey, lake, yolo, san joaquin, stanislaus, santa barbara, riverside, and san diego were partially indicated as hotspots of mean income in the zctas in the state. the common figure 3 hotspot and coldspot map of mean income in the zip code tabulation area of california, united states. 10 counties with the hotspots of asian communities and mean income were derived (table 1). table 1 hotspot counties and the coverage of asian population and mean income in california, united states. *nhs = not a hotspot. sl. no asian population hotspots coverage of the county asian mean income 1 contra costa county entire entire 2 los angeles county entire entire 3 marin county entire entire 4 merced county partial nhs* 5 monterey county partial partial 6 orange county entire entire 7 riverside county partial partial 8 san bemardino county partial nhs* 9 san diego county partial partial 10 san francisco county entire entire 11 san joaquin county partial partial 12 san mateo county entire entire 13 santa clara county entire entire 14 santa cruz county entire entire 15 solano county partial entire 16 stanislaus county partial nhs* 17 ventura county partial entire out of 17 counties with hotspots of asian communities (figure 2), 14 counties were either fully or partially identified as the hotspots of mean income (table 1, figure 2 and 3) in california. only three hotspot counties with asian communities, including merced, san bemardino, and stanislaus were not hotspots of mean income (table 1). therefore, the above 14 counties could be targeted for new business establishments of asian cuisine restaurants (table 1). 3.4 hotspot zctas with roads, availability in california, us as discussed in the introduction, the accessibility to the facilities plays an important role in the success of a newly established business. therefore, the hotspot map of the asian population was overlaid with a road layer to see whether the hotspot zctas are close enough to roads and accessibility is not a constraint (figure 4). both of the hotspots were found to have a good network of roads (figure 4). consequently, the 14 listed counties (table 1) meet three major criteria for opening an asian cuisine restaurant in california: high asian population, higher mean income, and greater road network. 4. conclusions geoeconomics can be examined at the lowest, low, middle, upper, and top geographical levels (anokhin and lachininskii 2015). in this study, the lowest geographic unit, the zcta, was used to show how social, economic, and geographic components could potentially impact new businesses. additionally, arcgis offers several tools for geospatial analysis and could be used as decision-making tool for informed business management within geoeconomics. moreover, census data offer various significant insights for the establishments of new businesses as well as for the existing businesses. integrating arcgis with census data could help businesses accomplish their goals, starting from locating new sites to predicting their business growth. the socioeconomic and demographic data are freely available at the zcta level. these could be applied for informed business decisionmaking through geospatial analytics using arcgis. in this study, only race, mean income, and road network data were used for the analysis. however, the us census offers several other important attributes such as gender, age, occupation, and household, housing, and business data, and much more. these attributes could be applied in the selection of new business sites and/or for other business needs. the current geospatial approach described in this paper is a costeffective, easy, and efficient way of selecting 11 new business sites and could be used by small as well as large business entities within and outside the restaurant industry. acknowledgements this work is purely for research purposes and does not necessarily represent the official views of the organization author is associated with. the author did not receive any grant for this study and declares no conflict of interest publishing this article. 5. references alayev, e. (1983). "sotsial'no-ekonomicheskaya geografiya. ponyatiyno-terminologicheskiy slovar'." m. mysl. anokhin, a. and s. lachininskii (2015). "evolution of the ideas and contents of geoeconomic studies." regional research of russia 5(1): 90-95. austin, s. b., s. j. melly, b. n. sanchez, a. patel, s. buka and s. l. gortmaker (2005). "clustering of fast-food restaurants around schools: a novel application of spatial statistics to the study of food environments." american journal of public health 95(9): 1575-1581. bhat, c. r., r. paleti and p. singh (2014). "a spatial multivariate count model for firm location decisions." journal of regional science 54(3): 462-502. boulos, m. n. k., t. viangteeravat, m. n. anyanwu, v. r. nagisetty and e. kuscu (2011). "web gis in practice ix: a demonstration of geospatial visual analytics using microsoft live labs pivot technology and who mortality data." international journal of health geographics 10(1): 1. capps, r. (2007). "the characteristics of unauthorized immigrants in california, los angeles county, and the united states." conklin, j. n., m. diop and m. qiu (2016). "the importance of location in the financing of property acquisitions by reits." available at ssrn 2741222. demiriz, a. and b. ekizoğlu (2015). using location aware business rules for preventing retail banking frauds. anti-cybercrime (icacc), 2015 first international conference on, ieee. dubé, j., c. brunelle and d. legros (2016). "location theories and business location decision: a micro-spatial investigation in canada." the review of regional studies 46(2): 143. esri (2012). arcgis for desktop 10.1. usa, environmental systems research institute. esri (2014). arcgis 10.3 for desktop, environmental systems research institute redlands, ca usa. figure 4 hotspot and coldspot map of the asian population overlaid with a road layer in the zip code tabulation areas of california, united states. 12 esri. (2015). "arcmap: classifying numerical fields for graduated symbology." retrieved september 03, 2015, 2016, from http://desktop.arcgis.com/en/arcmap/10.3/map /working-with-layers/classifying-numericalfields-for-graduated-symbols.htm. esri. (2016). "arcgispro: data classification methods." retrieved september 03, 2016, 2016, from http://pro.arcgis.com/en/proapp/help/mapping/symbols-and-styles/dataclassification-methods.htm. esri. (2016). "arcmap: hot spot analysis (getisord gi*)." retrieved september 03, 2016, 2016, from http://desktop.arcgis.com/en/arcmap/10.3/tool s/spatial-statistics-toolbox/hot-spotanalysis.htm. gay, b. (2012). "competitive intelligence and complex systems." journal of intelligence studies in business 2(2). jordan, d. (2015). "location and business-level product innovation in vietnam: regional differences and drivers." australasian journal of regional studies 21(2): 232. karadeniz, m. (2009). "the importance of retail site selection in marketing management and hypothetical approaches used in site selection." deniz bilimleri ve mühendisliği dergisi 5(3). kimelberg, s. m. and e. williams (2013). "evaluating the importance of business location factors: the influence of facility type." growth and change 44(1): 92-117. lachininskii, s. (2013). "experience on the typology of geoeconomic risks." geography and natural resources 34(2): 111-117. mishra, s., s. p. mohanty, s. k. pradhan and r. hota (2015). "importance of location classification using rough set approach for the development of business establishment." international journal of computer applications 119(24). murillo, l. (2010). "elements food group marketing plan." north, d. c. (1955). "location theory and regional economic growth." the journal of political economy: 243-258. porter, m. (2003). "the economic performance of regions." regional studies 37(6-7): 549-578. prato, t., y. wang, t. haithcoat, c. barnett and c. fulcher (1995). "converting hydric cropland to wetland in missouri: a geoeconomic analysis." journal of soil and water conservation 50(1): 101-106. renner, g. t. (1942). human geography in the air age (a text for high school students), macmillan. rey, s. j., l. anselin, x. li, r. pahle, j. laura, w. li and j. koschinsky (2015). "open geospatial analytics with pysal." isprs international journal of geo-information 4(2): 815-836. singh, s. k. (2015). assessing and mapping vulnerability and risk perceptions to groundwater arsenic contamination: towards developing sustainable arsenic mitigation models (order no. 3701365). available from proquest dissertations & theses full text. (1681668682). ph.d. dissertation/thesis, montclair state university. singh, s. k., s. a. brachfeld and r. w. taylor (2016). evaluating hydrogeological and topographic controls on groundwater arsenic contamination in the mid-gangetic plain in india: towards developing sustainable arsenic mitigation models. emerging issues in groundwater resources, advances in water security. a. fares. switzerland, springer international publishing. singh, s. k. and n. vedwan (2015). "mapping composite vulnerability to groundwater arsenic contamination: an analytical framework and a case study in india." natural hazards 75(2): 1883-1908. søilen, k. s. (2012). geoeconomics, bookboon. supak, s., g. brothers, d. bohnenstiehl and h. devine (2015). "geospatial analytics for federally managed tourism destinations and their demand markets." journal of destination marketing & management 4(3): 173-186. uc-census. (2014). "geography: tiger/line® shapefiles and tiger/line® files: roads." retrieved september 03, 2016, 2016, from http://www2.census.gov/geo/tiger/tiger2014 /roads/. us-census. (2015). "geography: tiger/line® shapefiles and tiger/line® files." retrieved september 03, 2015, 2015, from https://www.census.gov/geo/mapsdata/data/tiger-line.html. us-census. (2016). "american fact finder: american community survey." retrieved september 03, 2016, 2016, from http://factfinder.census.gov/faces/nav/jsf/page s/programs.xhtml?program=acs. us-census. (2016). "geography: cartographic boundary shapefiles zip code tabulation areas (zctas)." retrieved september 03, 2016, 2016, from https://www.census.gov/geo/mapsdata/data/cbf/cbf_zcta.html. us-census. (2016). "geography: zip code tabulation areas (zctas)." retrieved september 03, 2016, 2016, from https://www.census.gov/geo/reference/zctas.ht ml. the competitive intelligence process, an answer to the problem-oriented mechanisms of the knowledge creation : speech analysis as a strategy methodological appropriated 97 competitive intelligence and knowledge creation outward insights from an empirical survey mourad oubrich allal al fassi avenue, madinat al irfane rabat-institutesmorocco oubrich@inpt.ac.ma received 20 august 2011; received in revised form 23 august 2011; accepted 31 december 2011 abstract: the 21st century is characterized by many transformations which have had an impact on the growth of companies, such as aggressive competition, layoff plans, terrorist attacks and rising oil prices. it is of importance for a company to develop a protection against future impediments. this can be done by creating knowledge through a competitive intelligence process, which is the main focus of this article. with different theories about knowledge creation and competitive intelligence at hand, a qualitative empirical study was developed. the article presents how a company’s strategic intent, mission and strategic objectives can act as a guide for the competitive intelligence process, in order to gain the information necessary to find opportunities and eliminate threats. keywords: competitive intelligence, knowledge creation, knowledge management available for free online at https://ojs.hh.se/ journal of intelligence studies in business 1 (2011) 97-106 mailto:oubrich@inpt.ac.ma https://ojs.hh.se/ 98 1. introduction 1.1 creating competitiveness the list given in the abstract is not exhaustive of the events that disrupt the international economic order and affect the growth of countries and companies. if we are able to draw conclusions from observing the environment, perform relevant actions involved in discontinuities and give them a useful meaning, it should be be possible to anticipate events, at least in theory. in order to forecast future developments it is necessary to identify the process that shapes knowledge creation in a company. the question so far is how we can help companies look forward to the future to protect themselves against threats and exploit opportunities. this question forces us to look beyond the competitiveness of a company and ask how they can sustain themselves over time. a development of a competitive intelligence process that boosts knowledge creation and innovation is a straightforward manner to ensure competitiveness. this article focuses on the knowledge creation part. it shows how the creation of new knowledge can be done in a competitive intelligence process. 1.2 problem definition this study pursues two main issues: 1) the determination of the different mechanisms able to create knowledge and 2) how these mechanisms can develop new knowledge. to that end, the article will shed light on the difference between information and knowledge, as pointed out above. this clarification allows us to understand in depth how a competitive intelligence process creates new knowledge. 2. materials 2.1 research context beginning in the mid-1980s, michael e. porter formed the basis of strategic thinking in business. according to porter (1990) competitive strategy is about being different. it means deliberately choosing a different set of activities to deliver a unique mix of value. moreover, the essence of strategy is choosing to perform activities differently than rivals do (porter, 1990). in the beginning of the 90s, his approach was criticized. the first critique was addressed by hamel and prahalad (1989). hamel (1996) explained that strategy should be stretched, not fit; competition should shape industry futures rather than merely positions within existing industries and resources should be leveraged rather than allocated. indeed, since then the research in competitive strategy has integrated the hamel and prahalad’s (1989) approach such as barney (1991). in his article he argued that sustained competitive advantage derives from the resources and capabilities a firm controls; that is valuable, rare, imperfectly imitable, and not substitutable. however, the diffusion of the resource-based view in strategic management and related disciplines has been both dramatic and controversial and has involved considerable theoretical developments and empirical testing (barney, wright & ketchen, 2001). the issue regarding how competitive intelligence drives knowledge creation is becoming a major concern for many organizations. research that has been undertaken around knowledge creation and the competitive intelligence process is somewhat rare (du toit, 2003). in this research, we are going to suggest a way to help organizations to set up an efficient competitive intelligence process that allow them to create new knowledge. to do so, it is necessary to understand both competitive intelligence and knowledge creation. 2.2 theoretical objectives there tends to be confusion between the concepts competitive intelligence and knowledge management. definition 1. knowledge management is the capturing, filing and categorization of the information. definition 2. competitive intelligence is the focusing, analyzing and “actioning” of data (du toit, 2003). without knowledge management it is not possible to create competitive intelligence, as competitive intelligence requires access to information. however, without competitive intelligence, knowledge management becomes a fruitless exercise of filing and categorizing information (calof, 2001). the authors give their definition of the competitive intelligence concept. they believe competitive intelligence has the following characteristics: 1. it is an art of collecting, processing and storing information to be made available to people at all levels of the firm to help shape its future and protect it against current competitive threats 2. it should be legal and respect codes of ethics 3. it involves a transfer of knowledge from the environment to the organization within established rules (rouach and santi, 2001). in this way, the intelligence cycle consists of four, by now well-known, stages that are essential to the process of decision-making: planning, collecting, 99 analyzing and disseminating value-added information. to exploit information needs to be upto-date with market changes. it demands the learning of methods and strategies that supports the use of information for decision-making. to be successful in this environment, the actors need to acquire new combinations of skills. in particular, they need to learn skills that allow them to find, manage and share information and knowledge (du toit, 2003). according to levet (2001), the transformation of information to knowledge implies the mobilization of capacities to interpret and to give sense by learning. achard and bernat (1998) points out that a manager has a role in enriching data throughout the information cycle to transform information into exploitable intelligence, which can be used by decision-makers. in doing so, the organizations need to create a shared space for individual and collective knowledge creation – both physically and mentally. figure 1: the information cycle 2.3 empirical objectives in the absence of a conceptual framework for competitive intelligence, it is appropriate to use a qualitative research strategy. our research adopted a qualitative methodology due to the need for rich data that can facilitate the generation of theoretical categories. furthermore, a qualitative method is appropriate in new topic areas to develop a deeper understanding of the phenomenon and to aid theory development (eisenhardt, 1989). in doing so, the study began by interviewing 20 directors engaged in competitive intelligence (60% are competitive intelligence directors). the empirical study started in october 2003 and was wound up by march 2004. 3. theoretical framework 3.1 competitive intelligence there are many definitions of competitive intelligence. the society of competitive intelligence professionals defines the term as: the process of ethically collecting, analyzing and disseminating accurate, relevant, specific, timely, foresighted and actionable intelligence regarding the implications of the business environment, competitors and the organization itself. according to calof (2001), competitive intelligence is defined as: an actionable recommendation arisen from a systematic process, involving planning, gathering, analyzing and disseminating information on the external environment, for opportunities or developments that have the potential to affect a company or a country’s competitive situation. despite the positive impact and growth of competitive intelligence, there exists a variety of associated ethical issues that are still unresolved. first we notice that competitive intelligence is different from industrial espionage. for example, (rittenburg et al. 2006) go further and propose a theoretical framework that outlines various factors that impact ethical decision-making in competitor intelligence gathering situations. they highlight that ethical decision-making for competitive intelligence gathering can be proactively managed. crane (2005) point out that industrial espionage or spying is both unethical and illegal. there is sometimes a fine line between the legitimate tactics of competitive intelligence gathering and the illegitimate practice of industrial espionage. at the end competitive intelligence is conducted in order to gain more knowledge about things to come so that today’s decisions can be based more solidly on available expertise than before. prescott (1999) outlines a decision-oriented approach to design a competitive intelligence program. 3.2 knowledge creation knowledge creation is often like a moot question for any organization that operates in a competitive environment. some researchers recognize the importance of knowledge for the competitive advantage of the firms. but, despite a great deal of discussion about knowledge creation, relatively little empirical evidence is available. to describe knowledge creation, this paragraph adopts the nonaka and takeuchi’s (1994) model. this model outlines two fundamental elements of organizational knowledge creation theory: epistemology and knowledge conversion. nonaka and takeuchi (1994) highlight that one dimension of the knowledge creation process can be drawn from a distinction between two types of knowledge, identified by polanyi (1966): tacit and explicit. 100 figure 2: the seci model this process, put together with the four basic seci epistemological processes, shapes the well-known knowledge-spiral of the company. nonaka and konno (1998) define the concept of “ba” – a susceptible environment for knowledge creation in terms of networks, teams, and open organizational designs. furthermore, nonaka and takeuchi (1995) describe the cognitive approach to knowledge creation as schemata – mental models and beliefs. it can be described as a perception which reflects our image of reality and our vision of the future. they consider this form of knowledge creation to be achieved through metaphors, pictures and experiences. 3.3 competitive intelligence process the competitive intelligence process is portrayed in figure 1 as a continuous process, which is improved through feedback. moreover, a distinction can be made between information and knowledge through this process. the notions of information and knowledge are often used in a different manner in the literature, including by those of authors who treat learning from an “informational perspective”. the necessity to distinguish between information and knowledge is important for the pursuit of this research. if admitted that information contributes to the improvement of the knowledge, as claimed by the authors of the informational approach of the organizational learning, such as argyris (1976); argyris (1993); cohen and levinthal (1990); huber (1991); nonaka (1994), these two notions cannot be considered conceptually as equivalent. knowledge drifts implies a certain transformation of information. according to huber (1991), information designates a structured togetherness of data transporting a sense (or signal) whereas knowledge is a product generated by the treatment (interpretation) of information. for information that can be acquired, knowledge must be developed. for argyris (1993), information constitutes an input necessary to the initiation and to the formalization of learning. the author defines information as being a flux of messages (or of signals) and knowledge like a belief verified concerning the human action that is founded on a flux of information. he uses this definition as formulated by nonaka (1994); that all knowledge is founded on a basis, more or less complex, of information. a version of nonaka and takeuchi’s (1995) definition of information will be used in this paper: a structured togetherness of data providing some indications of the nature or the evolution of a fact, of a given phenomenon, and the notion of knowledge as being a true and justified belief. our research could not exclude reflections around this distinction between information and knowledge. levet (2001) considers that the strategic dimension of competitive intelligence process resides in the triptych; appropriation (of information) – interpretation (of information) – action. the appropriation is about the knowledge of an enterprise and the interpretation consists of clearing the sense of the strategy. finally the action is founded on knowledge. therefore the role of competitive intelligence is to create knowledge from information. furthermore, competitive intelligence creates knowledge in terms of insights and understanding, known as tacit knowledge in users’ heads. the outcome of competitive intelligence is decisions that improve and optimize business decisions (du toit 2003). 4. theoretical results from a theoretical framework standpoint, organizational learning is a central mechanism in knowledge creation theory. the appropriate way to organize for effective knowledge creation would be to combine various types of organizational learning according to the strategic needs of an organization. regarding organizational learning, the reflection was here based on argyris and schôn’s (1978) work. the authors defined organizational learning as a process that implies the detection and the correction of an error. they distinguished two types of organizational learning (simple and double loop). the learning in simple loop is a compartmental process of adaptation and response or correction of error in the schema map or established organizational routines (learning by improvement of the basis of possessed knowledge). whereas the learning in double loop is a cognitive process that, according to 101 ingham (1994), implies a heuristic imaginative critique. it can be modifications in the diagrams of knowledge and answers or the production of new diagrams. in light of the discussions and theory presented above, this process can then quite easily be represented (argyris & schôn, 1978). figure 3: theory of action recent discussion on organizational learning and knowledge creation has emphasized the role of sharing common strategic intent and collective representation in knowledge generation. these new concepts and their relationships with organizational learning is explained below: 1. organizational learning as change in collective representations: argyris and schôn (1978) propose the basic foundation of the theory of action. from this theory we see how actors build their representation from information. to do that, the actors constantly refer to a collective framework or cognitive schema to act. in this sense, a competitive intelligence process can be seen as a place where the actors try to make up new representation regarding competitors, customers, and clients. the actors in this process interact in order to refine, to complete their representations; to test them and to evolve. in the same tentative explanation of organizational learning as knowledge creation mechanism, cyert and march (1963) note that learning comes from a prompt or continual gap between a level of aspiration associated with an objective and the real level of performance. 2. organizational learning as a result of a situational gap provoked by a strategic intent change: charue (1992) specifies that there is organizational learning when the members of the organization construct actionable knowledge in relation to the organization’s strategic intent. according to campbell and yeung (1991) and lipton (1996), strategic intent is the answer to the question: why does the company exist? company number position title industry interview method 1 director, competitive intelligence energy site 2 director, communication and marketing industrial chemicals site 3 director, human resource management utility site 4 director, competitive intelligence industrial products site 5 director, competitive intelligence energy site 6 director, strategy utility site 7 director, marketing services site 8 director, competitive intelligence automotive site 9 director, competitive intelligence it services site 10 director, competitive intelligence chemical industry site 11 director, knowledge management it services site 12 director, competitive intelligence services site 13 director, competitive intelligence energy site 14 director, knowledge management telecom site 15 director, competitive intelligence energy site 16 director, competitive intelligence semiconductor site 17 director, competitive intelligence transportation site 18 director, competitive intelligence electronics site 19 director, knowledge management utility site 20 senior director, strategic planning electronics site table 1: companies studied 102 ∑ speech % speech number of significant word number of word per speech % word/speech ci director 12 60 334 42151 0,64 others director 8 40 193 24372 0,36 ∑ 20 100 527 66523 1 table 2: summary of data collected 5. empirical study in this paper, a novel approach for competitive intelligence process is developed from conceptual and empirical study. the study aims to give more insight to mangers who wants to set up a competitive intelligence process to create knowledge necessary for making better decision. it is presented empirically how competitive intelligence is crucial for any company or organization which operates in a competitive environment. 5.1 general premises in the proposed model, information is considered the main input to the competitive intelligence process. on one hand, organizational learning is the center of this process and leads to knowledge creation. this knowledge is derived from two main sub mechanisms – strategic intent and collective representation. on the other hand, this model is oriented towards the creation of new products and services that are valuable, rare and imperfectly imitable. as a result, the following hypotheses can summarize the links that exists between competitive intelligence and knowledge management: hypothesis 1. competitive intelligence is the process that allows a company to create new knowledge regarding their competitors, customers, clients, suppliers and technologies. hypothesis 2. technological, competitive and environmental knowledge are created by a competitive intelligence process, as actors learn from the external and the internal environment. hypothesis 3. organizational learning happens when strategic intent is renewable through a competitive intelligence process. hypothesis 4. organizational learning happens, when collective representation is changed through a competitive intelligence process. in order to test the above hypothesis, the different variables are translated into measurements. table 3 shows the different measurements related to the variable’s model. variable measurement (1) direction and vision what are we looking for? what can we expect to happen in the future? are we sure that we have the sufficient information about our environment? (2) information gathering press, books, database, forum, convention informal networks (supplier, customers, competitors, subcontractor, etc.), who gathers the information? (3) information analysis internal and external experts meetings of analysis tools data processing (spss, data mining) (4) information disseminating meetings reports intranet e-mails phone calls (5) knowledge creation to tacit to explicit socialization externalization from tacit knowledge maps groupware knowledge portals workflow knowledge-based systems knowledge portals internalization combination from explicit innovation support tools intranet electronic document management business intelligence knowledge portals errors the system of roles is inefficient the rules for working are not clear the interface of the expertise domains is fuzzy bad use of the tools and techniques 103 (6) organizational learning corrections change of the structure change of the culture modification to the rules improvement in the management (7) collective representation change in the representations regarding external environment (threats / opportunities) change in the representations regarding internal environment (strengths / weaknesses). belief change (8) strategic intent renewal strategic plan renewal strategic objectives engagement of the actors table 3: measurement 5.3 analyzing data the number of data analysis tools in management is numerous. in our study, speech analysis was done. analysis of speech requires that certain questions should be asked with regard to the research question. to obtain answers to questions, speech must then be translated as far as possible into a measurable quantity. table 2 presents the most common occurrences detected by tropes software in 20 speeches. based on statistics generated by the tropes software, a contingency table was built. it is composed of 20 rows that represent the company and five columns that represent a variable. this table was used for quantitative analysis. in doing so, two techniques were used: the spearman rank correlation and factorial correspondence analysis. ci kc ol si rep c1 21 15 18 15 11 80 c2 4 10 13 19 7 53 c3 5 13 41 21 16 96 c4 19 9 18 29 11 86 c5 23 20 4 20 10 77 c6 12 26 30 20 14 102 c7 12 20 9 14 9 64 c8 32 39 19 26 16 132 c9 20 19 12 18 8 77 c10 26 53 10 24 22 135 c11 11 47 16 47 19 140 c12 8 35 5 14 17 79 c13 12 27 9 12 8 68 c14 9 20 16 8 15 68 c15 50 43 16 33 18 160 c16 26 36 26 17 14 119 c17 27 45 17 6 16 111 c18 10 29 13 21 23 96 c19 7 18 7 12 3 47 c20 14 21 20 23 11 89 total 348 545 319 399 268 1879 table 4: contingency table speech / variable (20 speech) legend: ci = competitive intelligence kc = knowledge creation ol = organizational learning si = strategic intent rep = representation c number = company number the spearman rank correlation coefficient was used to discover the strength of a link between two variables. the research looks at the strength of the link between ci and kc, ol and kc, si and ol, rep and ol. when written in mathematical notation the spearman rank formula looks like this, where: d = the difference between the ranks of corresponding values of x and y n = the number of pairs of values. the use of a non-parametric test was justified by the small size of the sample (20 speeches). the test was carried out by using statview. spearman's rank correlation provides a distribution free test of independence between two variables. to do this, 104 spearman rank correlation provides two parameters : r = spearman's rank correlation coefficient. p = thresholds of significance (10%). table 5 show a strong relationship between ci and kc. by this result, the first hypothesis is confirmed. ci-kc ol-kc si-ol rep-ol r 0,493 -0,024 0,325 0,246 p 0,031 0,915 0,156 0,283 result correlated not correlated not correlated not correlated table 5: spearman's rank correlation coefficient (whole sample) 5.4 empirical results the result of the study showed a significant relationship between ci and kc. however, other relationships had no claim. the full analysis cannot focus only on spearman’s rank correlation. other authors have identified several limitations to this method, especially when the sample size is small (<30). to complete the test, our study used factorial correspondence analysis to measure a manager’s perception to different variables in the theoretical model. as mentioned, the contingency table drawn from lexical statistics and generated by tropes was used for the analysis. spss gave us the following result: company number factor 1 factor 2 c1 ,560 c2 ,132 c3 c4 ,198 c5 ,330 ,880 c6 ,441 c7 ,935 ,341 c8 ,731 ,678 c9 ,401 ,802 c10 ,902 ,331 c11 ,729 c12 ,917 c13 ,979 ,234 c14 ,615 c15 ,363 ,953 c16 ,683 ,246 c17 ,715 ,282 c18 ,756 c19 ,908 ,136 c20 ,472 table 6: correspondence analysis for factorial analysis note: high correlation (>,50) medium correlation (between ,25 et ,50) low correlation (<, 25). observe that factorial analysis of correspondences can only be based on the 19th speech. it says that the competitive intelligence director strongly contributed to the explanation of the factorial axis 2 (>50). smes did not participate in the factorial axis 2. a functional distinction was identified between smes and larger companies regarding the relationship between ci-kc, ol-kc, si-lo, repol. three homogeneous block profile speeches could be identified, that contribute to the construction of the factor 1: (c7, c10, c12, c13, c19), (c8, c11, c18), (c14, c16). two blocks of speech profiles involved in the formation of the factor 2 were detected: (c5, c9), (c1, c8). this classification is significant because it contributes to finding the speeches that give more information regarding the variable model. for example, g1 explains the kc, while as g2 is interested in ci and the rep, and g3 gives more information about is. variable profile variable speech side side + variable profile variable speech 0,999 0,979 0,935 g1 0,917 0,908 0,902 kc c13 c7 c12 c19 c10 105 0,756 0,731 0,729 0,715 g2 0,705 0,683 0,615 0,520 c18 c8 c11 c17 rep c16 c14 ci c4 c1 c3 ol -0,386 g4 -0,191 -0,181 -2,39 e -02 0,472 0,441 0,401 g3 0,363 0,379 0,330 0,132 c20 c6 c9 c15 si c5 c2 table 7: variable profile and variable speech note: g = group of companies with similar perception 8. conclusions the model is based on a competitive intelligence process and the theory of action developed by argyris and schôn (1978). according to havenga and botha (2003) the entire process should be guided by the company’s strategy. the company’s strategic intent, mission and strategic objectives should act as a constant guide for the competitive intelligence process. this paper describes a novel approach for competitive intelligence. it explains in theory how competitive intelligence can add value to companies by creating new knowledge. the views of several writers are assembled to describe the process, although they have different emphases. fuld (2000) believes that competitive intelligence should build on and around the culture of the organisation. our research claims that competitive intelligence allows companies to create new knowledge, if they can learn to align their competitive intelligence process with strategic intent and with collective representation. it means that companies should know how to use their competitive intelligence strategically to find new opportunities and minimize risks. acknowledgements the author feels a debt of gratitude to all directors for their openness, helpfulness and their insightful comments regarding this work. may their spirit continue to enlighten their lives and those of others. references achard, p, bernat, j.-p. 1998. l’intelligence économique: mode d’emploi. adbs editions. argyris, c, schôn, d. 1978. organizational learning: a theory of action perspective. adison wesley. barney, j, 1991. firm resources and sustained competitive advantage, journal of management, n°17. barney, j.b, wright, m, ketchen, d.j. 2001. the resource-based view of the firm: ten years after 1991. journal of management 27 (6). calof, j. 2001. competitive intelligence and the small firm—requirements and barriers. available online at url: http://www.sbaer.edu/research/2001/icsb/a6-2.htm. campbell, a, yeung, s. 1991a. creating a sense of mission, long range planning, vol 24, n°2. charue, f. 1992. les entreprises peuvent elles apprendre, cahiers du crg, n°9, paris. cohen, w. levinthal, d. 1994. fortune favors the prepared firm, management science, vol 40, n°2. crane, a. 2005. in the company of spies: when competitive intelligence gathering becomes industrial espionage, business horizons, vol 48 (3). du toit, a.s.a. 2003. competitive intelligence in the knowledge economy: what is in it for south african manufacturing enterprises? international journal of information management, volume 23, issue 2, april. eisenhardt, k. m. 1989. building theories from case study research, academy of management review, vol 14, n°4. fuld, l. 2000. intelligence software: reality or still virtual reality? fuld et co, cambridge, massachusetts. available online at url: http://www.fuld.com hamel, g. 1996. strategy as revolution, harvard business review, vol 74. hamel, g. prahalad, c.k. 1989. strategic intent, harvard business review, n°3. hannan, m.t, freeman, j. 1989. organizational ecology. harvard university press havenga, j. botha, d. 2003. developing competitive intelligence in the knowledge based organization. available online at url: http://www.saoug.org.za/archive/2003/0312a.pd f http://www.saoug.org.za/archive/2003/0312a.pdf http://www.saoug.org.za/archive/2003/0312a.pdf 106 huber, g.p. 1991. organizational learning: the contributing processes and the literature, organization science, 2, 1. ingham, m. 1994. l’apprentissage organisationnel dans les coopérations, revue française de gestion, n° 97, janvier-février. levet, j. l. 2001. intelligence économique: mode de pensée, mode d’action, economica, paris. lipton, m. 1996. demystifying the development of an organizational vision, sloan management review, summer. nonaka, i. 1994. a dynamic theory of organizational knowledge creation, organization science, vol 5. nonaka, i, konno, n. 1998. "the concept of 'ba': building a foundation for knowledge creation." california management review 40(3). nonaka, i, takeuchi, h. 1994. the knowledge creating company. oxford university press. nonaka, i, takeuchi, h. 1995. the knowledge creating company. how japanese companies create the dynamics of innovation. ny: oxford university press. nonaka, i, takeuchi, h. (eds). 1997. la connaissance créatrice. la dynamique de l’entreprise apprenante. de boeck université, bruxelles. oubrich, m. 2005. la création des connaissances dans un processus d’intelligence économique, phd dissertation, aix marseille university, france. polanyi, m. 1966. the tacit dimension. garden city, ny: doubleday porter, m.e. 1990. the competitive advantage of nations. new york, the free press. prescott, j.e. 1999. the evolution of competitive intelligence: designing a process for action, apmp spring. available online at url: http://www.apmp.org/fv-154.aspx rouach, d, santi, p. 2001. competitive intelligence adds value: five intelligence attitudes, european management journal vol. 19, no. 5, october. rittenburg, et al. 2006. an ethical decision-making framework for competitor intelligence gathering, journal of business ethics, vol 70. available online at url: http://www.springerlink.com/content/e3582656 18678457/ http://www.apmp.org/fv-154.aspx http://www.springerlink.com/content/e358265618678457/ http://www.springerlink.com/content/e358265618678457/ 15 balancing knowledge management and competitive intelligence, initial insights scott erickson 1 and helen rothberg 2 1 ithaca college, ithaca, usa gerickson@ithaca.edu 2 marist college, poughkeepsie, usa hnrothberg@aol.com received 20 may, revised form 11 september, accepted 25 september 2012 abstract: this paper reports on a large-scale study of how industries balance knowledge development with knowledge protection. in particular, we look at specific industries and the competitive imperatives to increase knowledge assets (or not) and to conduct competitive intelligence activities (or not). this analysis is based on our previously established spf framework, though we have developed new measures and a new database that more reliably establish industry conditions. the paper explains the different results seen in different industries by examining four markedly different spf environments. based on these different environments, we can begin to explore some of the possible explanations for the differences (characteristics of relevant knowledge, value chain insights, life cycle stage, etc.). keywords: competitive intelligence, intellectual capital, knowledge management, strategy, spf framework 1. background the intersection of knowledge management (km) and competitive intelligence (ci) is an area ripe for exploration. in the past few years, we have firmly established that different conditions exist concerning the need or wisdom to aggressively pursue knowledge management and the growth of a firm’s intellectual capital (ic), especially when different conditions exist concerning the need to protect knowledge assets from competitive incursion. we developed a framework for examining these different conditions some years ago and have attached data to the framework in a piecemeal manner in more recent work. we have even more recently constructed a new, full data set classifying firms by the imperative of knowledge management development in their industry (standard ic levels of the industry, presumably what is necessary to compete) and by the level of competitive intelligence activity in their industry (representing the competitive threat to their ic). with this database, we are able to classify firms according to these conditions, providing guidance to managers about appropriate levels of investment in km development and protection. more to the point of this paper, we are also able to analyze the database in more detail, with the aim of uncovering the specific variables that might give even more insight into when a firm should pursue aggressive knowledge development (or not) and when it should pursue ci activities or counterintelligence (or not). these results can be classified into four broad categories, the spf available for free online at https://ojs.hh.se/ journal of intelligence studies in business 2 (2012) 15-22 mailto:gerickson@ithaca.edu mailto:hnrothberg@aol.com https://ojs.hh.se/ 16 framework, we have developed (rothberg & erickson 2005). these categories are based on relative high/low values of required ic and relative high/low threats due to ci activity. a full overview of the database will be available soon (erickson & rothberg 2012). in this paper, we present some instructive examples of firms and industries illustrating the key combinations of circumstances that can be instructive to both scholars and practitioners. 2. literature review our full database is founded on the idea that knowledge assets can confer competitive advantage, but the nature and value of that competitive advantage can vary by circumstances. this conceptual basis is strongly established in the literature, albeit in diverse disciplines. knowledge management (km) and intellectual capital (ic) are related concepts concerning the store of knowledge assets within an organization. ic is the stock concept, referring to the amount of knowledge in the organization, something beyond simple data or information (zack 1999b; zander & kogut 1995). km refers to attempts to better manage these knowledge assets, distributing them, growing them, or otherwise better identifying and applying them. interest exists in these fields because more and more scholars and practitioners are seeing them as potential sources of competitive advantage. while the view of knowledge as a competitive weapon has been with us for a long time (schumpeter 1934), it has grown in sophistication and detail in the past couple of decades. penrose (1959) had discussed the value of an organization’s knowledge stock. nelson & winter (1982) extended the thought with the concept of knowledge flows leading to knowledge growth and superior performance. better management of intangibles or organizational knowledge, then, would be a path to competitive advantage (winter 1987). this view fits in well with the resource-based view of the firm, with knowledge as the key organizational resource. from that perspective, knowledge becomes a unique, defensible competitive differentiator (decarolis & deeds 1999, grant 1996, gupta & govindarajan 2000a, zack 1999a). as a result, the aspects of measuring and managing knowledge drew interest. once again, the distinction between stocks and flows (dierickx & cool 1989) was important, with the idea that the identified stocks could be managed more strategically, adding to the flow of knowledge to the organization (teece 1998). techniques such as the balanced scorecard (kaplan & norton 1992) helped to measure the knowledge assets more precisely while methods to better manage them also developed apace (davenport & prusak 1997, edvinsson & malone 1997, stewart 1997). to better understand the nature of the these knowledge assets, researchers also worked on classifications, with the idea that different types of assets may have different impacts and may need to be managed differently. within the field, the categories of human capital, structural capital, and relational capital (bontis 1999, edvinsson & sullivan 1997) became standard. human capital is about job-related knowledge, structural capital about persistent organizational knowledge assets such as corporate culture or organizational form, and relational capital about knowledge concerning external parties (customers, partners, regulators, etc.). competitive capital, knowledge about competitors, is also discussed in some variations (rothberg & erickson 2002). a second, but equally important distinction between knowledge assets related to explicitness. tacit knowledge was described as more personal, harder to explain, codify, or transmit while explicit knowledge is codifiable and sharable (polanyi 1967). which of these a piece of knowledge is and will become is critical to how it is managed (nonaka & takeuchi 1995). explicit knowledge lends itself to information technology applications while tacit knowledge typically involves more personal tools such as communities of practice (boisot 1995, choi & lee 2003, schulz & jobe 2001). based on this foundation, the fields of km and ic have largely focused on in-depth empirical analyses of specific firms or small groups of firms. these have included studies of best practices (davenport, delong & beers 1998, gupta & govindarajan 2000b, hansen, nohria & tierney 1999, zack 1999b) or bottom-up measurements of knowledge assets, including individual components such as human capital (mouritsen, larsen, & bukh 2002). conditional factors and their impact on km have also been explored (kogut & zander 1992, nahapiet & ghoshal 1998, zander & kogut 1995). what this all amounts to is a fairly good understanding of km at the firm level, including how it might benefit an organization competitively, how to measure knowledge assets, and how to most effectively pursue knowledge growth. in our mind, this state of affairs leaves two big holes. initially, there is an implicit assumption that more knowledge is always better, or at least always worth the cost to obtain or grow it. given the scholarship 17 suggesting that there are variety of different types of knowledge assets and an even wider variety of variables affecting how they are developed, one could make the case that there are probably some more circumstance-based choices to be made on how to pursue km. this idea could be taken even further when we bring in the complicating factor of competitive intelligence (ci) activity (asis 1999, gilad & herring 1996). the presence of ci makes overdevelopment of km not only of questionable impact but potentially even dangerous, as spreading the knowledge too far can leave it vulnerable to a competitor’s ci operation. there is a case to be made that the degree to which to develop knowledge assets is a strategic choice, depending on competitive conditions (rothberg & erickson 2005). consequently, firms may be well-advised to develop a more strategic approach, assessing whether and how far to develop and distribute knowledge assets. but, how can we make that choice? surprisingly, little empirical work has been done that might shed light on this question. as noted earlier, there have been some firm-specific studies on the impact of km installations or how individual pieces of ic impact performance. but beyond some interesting case studies (mcevily & chakravarthy 2002), whether more and better km actually makes a difference in financial performance is one of the great unanswered questions of the discipline. and the obvious related question is whether the impact of km will vary by circumstances, given differences in an industry or in a specific firm. 3. strategy and knowledge assets this paper reports on the preliminary results of a major study to address this question. financial data on thousands of firms was collected and analyzed, specifically looking at a variation of tobin’s q (tobin & brainard 1977) to assess the level of knowledge assets in companies. in this case, we used market capitalization to assets (rather than replacement cost of assets) to get a sense of the value of intangible assets in each organization. these data were paired with data from a proprietary benchmarking study from ci consulting firm fuld & company. the fuld & company data indicated the level of ci activity in individual firms and, by extension, within specific industries. the level and frequency of ci operations in each industry provide a sense of the aggressiveness of ci in those industries. based on these data, we were able to organize industries into broad classifications regarding the necessity of aggressive knowledge development in order to compete (high-knowledge industries) vs. the necessity to protect knowledge (highcompetitive intelligence industries) (erickson & rothberg 2012). one might expect that these classifications would match up, with knowledge valued highly by both originator and competitor (or not). we have not found this to be the case. the conceptual foundations of other potential combinations (high knowledge development, low competitive intelligence and vice versa) were established some years ago (rothberg & erickson 2005) and have been fleshed out over time, including in this new study. in the original work, we termed this the spf framework, with the following characteristics defining the four basic categories. in this short paper, we don’t have the space to fully flesh out the conceptual details or all the reasoning behind them, but the basic structure breaks down as: spf 45: high knowledge development priority, high competitive intelligence activity. knowledge is highly valued by both the originator and its competitors. spf 30: low knowledge development priority, high competitive intelligence activity. knowledge development is difficult or unimportant for the originator but of considerable interest to its competitors. spf 15: high knowledge development priority, low competitive intelligence activity. knowledge is highly valued by the originator but of little interest to competitors. spf 5: low knowledge development priority, low competitive intelligence activity. knowledge has little value to either originator or its competitors. these pose very different circumstances for managing knowledge, and decision-makers would be well-advised to make note of their environment and develop and/or protect accordingly. to help us better understand these different scenarios and also to help practitioners with understanding what contributes to a firm/industry finding itself in its particular set of circumstances, we looked at what characteristics are common to industries in the same group and which are different across groups. these results are described more widely elsewhere (erickson & rothberg 2012). here, we look at illustrative industries from each group. with a concrete example in place, it’s easier to see how and why the industry finds itself classified the way it is, as well as what 18 characteristics might be typical of industries and firms that are in its group, as opposed to others. the results are interesting in terms of providing insights into the different circumstances that face km practitioners as we look to provide them with a more strategic approach to shepherding knowledge assets. 4. results as noted, the spf framework broadly categorizes industries and firms by the knowledge development and competitive intelligence variables noted above. the groups’ categories include: spf 45 (high km, high ci) spf 30 (low km, high ci) spf 15 (high km, low ci) spf5 (low km, low ci) table 1 presents illustrative industries falling into each group, along with descriptive metrics concerning knowledge development and competitive intelligence activities. substantial differences are clear across the categories, and we’ll further develop these and other characteristics of each group in the following discussion. table 1: spf categorization and characteristics spf 45 (high km/high ci) is represented by sic 2835/6 diagnostic and biological products, including firms such as genzyme and amgen. according to the measures we applied, this group has a high level of knowledge assets, with a cap/asset ratio of 2.41, well above the average of 1.02 for the entire data set. this characteristic is confirmed by the cap/book value ratio of 4.37, which is similarly high above the universal average of 2.68. these types of firms have valuable intangible assets that make them worth much more than the value of their physical assets, so knowledge is important in this industry and presumably critical to being competitive. given the high relatively level of physical assets ($8 billion per firm, on average, as represented in the table), the high ratio value is especially indicative of the importance of knowledge assets. even from a sizable tangible asset base, the ratio of intangible assets is quite high. the industry also has a high level of competitive intelligence activity, with 6 different firms in our database reporting some level of ci operation, with the majority possessing a fairly advanced capability. firms competing in this industry face quite a number of seasoned ci groups arrayed against them, all interested in acquiring other firms’ knowledge assets. other features of this group that we notice here and in our wider database are complex operations, a wide variety of types of knowledge, multiple value chain activities requiring a high level of knowledge, and early maturity in the life cycle with evidence of continued innovation. while the wider database includes both manufacturing and service operations for both business-to-consumer (b2c) and business-to-business (b2b) purposes, what all have in common are complex operational processes, as is the case with this industry. biological products, in particular have a very tricky, complicated operation with lots of variables affecting the success and the quality of the output. most of the products and processes are regulated and so require processes to be described and approved by the food & drug administration. companies work to perfect their processes before filing the version they will then be required to follow. knowledge here, although complex, is not specific and can often be employed elsewhere by the originating firm (or by an acquiring ci operation). 19 explicit and tacit knowledge are both visible here. while some innovation and production processes may become explicit, there are also softer knowledge assets such as customer relationships (with retailers, insurers, and doctors), regulatory relationships (with the fda), and treatmentspecific competencies. similarly, and as the previous list suggests, there are a variety of types of knowledge asset, including human, structural, and relational. the examples also illustrate how the knowledge assets are distributed throughout the value chain, from operations to distribution to marketing and sales, interacting at several points with support activities, particularly technology development, infrastructure, and human resources. and while all the firms in our database are of a certain size (annual sales over $1 billion) and so almost certainly in the maturity stage of the life cycle, firms in this industry seem to be clearly at an early stage, as growth is still possible, especially in specific treatment categories. innovation is also extremely important, with extensive investment in r&d and new product development. spf 30 (low km, high ci), on the other hand, has a similar level of aggressive ci activity but a far lower km score. in this case, we use the example of sic 6311 life insurance. here, the ci activity is similar to what we saw in the previous case, with seven different firms reporting ci operations and almost all of those at an advanced level. ci is aggressive and notable. the knowledge score, on the other hand, is much lower. here, the main cap/asset ratio we used to construct and analyze the database is only 0.11 (again versus a universal average of 1.02). the cap/book ratio is 1.12, also well below the database average of 2.68. given the unique circumstances of this industry, that latter value is particularly important here, as financial services companies typically have a tremendous amount of financial assets, a fact that would tend to depress the ratio as that large value would be in the denominator when looking at cap/asset. but if we use cap/book, the biasing factor is less extreme. most of these financial assets will be borrowed, and so with cap/book (book corresponds to assets less liabilities), that comes into play and essentially tamps down that high level of assets with borrowed assets cancelling out much of the total assets. so the fact that both measures agree that this industry has low knowledge assets is important. knowledge is less critical to success in this industry and so aggressive knowledge development is a questionable strategy. as would be expected, this group has enormous assets compared to others, but, again, these are usually financial assets rather than physical. in line with that, more industries in spf 30 are services than in spf 45, and what manufacturing we see in spf 30 is usually less complex. knowledge is often explicit, with occasional tacit insights (which may be important but hard to engineer or copy), complex, but specific to particular purposes (though not necessarily specific to the originating firm). intellectual capital of all types is present but at lower levels, and knowledge is apparent all along the value chain, but is not as ubiquitous—rather than appearing in many places for a single firm, it is here and there, in a more spotty manner. insurance companies, for example, do create new products or approaches, but they are usually incrementally different, not dramatic innovations. specific competencies in areas like marketing/sales, underwriting, claims processing, or other areas make differences for firms, but only at the margins. much of what these firms do is similar. those differences at the margins, however, the tacit insights that drive new approaches, are exactly what attract the interest of competitors. difficult for the originating firm to invent, but often rapidly copied once introduced. as would be expected, this industry is considerably more mature than what we saw with the diagnostic/biological group. products are more commoditized, market shares more stable, and innovation more measured. there is little new under the sun, but what there is tends to be taken up quickly by competitors. spf 15 (high km, low ci) is back to a high value placed on knowledge assets but now with minimal or non-existent competitive intelligence activity. the example industry here is sic 4731 freight transport. the cap/asset ratio is 2.29 (far above the 1.02 average) and cap/book ratio is 4.28 (above 2.68). physical assets are often at lower levels. competitive intelligence activity is low. in the freight industry, there is no evidence of any ci, as none was reported by any firms in that classification. knowledge is valuable but competitors seem to have little interest in aggressively pursuing it. part of that may be because the valuable knowledge is right out in the open and takes no effort to procure from a competitor. but our evidence suggests other things going on as well, such as some other complication that may make it difficult for a competitor to use the knowledge in the same way. what we see in this category are industries with complex operations, including manufacturing, natural resources, or services such as retail. knowledge is often explicit though once again with tacit insights, complex, and specific to the originating firm. all types of intellectual capital are present, human, structural, and relational. along the value chain, valuable knowledge can be found 20 almost anywhere but is really concentrated in processes and logistics. industries are well into the maturity stage of the life cycle, to the degree that many of these industries, consolidation has driven competition down to a couple of large firms surrounded by a variety of smaller niche players. when the dominant firms do uncover new knowledge insights, others may have trouble copying them because of a lack of similar scale, lack of an installed base, or other blockers such as strong brands or distribution agreements. with freight transport, we have extremely complex processes involved in scheduling equipment, logistics, and moving freight from point a to point b. providers have established relationships with customers, regulators, facilities operators (e.g. ports, distribution centers), and others that are both difficult to break into and difficult to duplicate. providers also tend to specialize in particular products or geographical areas. companies find ways to develop new knowledge and improve, but that knowledge is often specific to their circumstances and so of little interest to competitors, even if out in the open. spf 5 (low km, low ci) includes industries where knowledge appears to have little value for either originators or their competitors. sic 263 paperboard is the illustrative industry here. this industry has a cap/asset ratio of only 0.28 (versus the overall 1.02 average) and cap/book ratio of 1.48 (2.68 overall average). assets are a little heavy, as each of these manufacturers likely owns forests full of raw materials, but are near the full dataset average and not nearly as potentially biasing as those of financial services firms. there is no reported ci activity in this industry. industries in spf 5 are heavily skewed toward services, especially distribution and transmission. knowledge is highly explicit but often not proprietary, so an established base of knowledge is shared throughout these industries. complexity is limited and knowledge is not particularly specific. intellectual capital types vary but there is little of importance except perhaps structural capital (which, again, is universally known). knowledge in these industries is present in the value chain primarily in processes and logistics. industries are in late maturity, with established processes and competitors filling established roles. there is little new or innovative and very little valuable proprietary knowledge. paperboard manufacturers are in a late maturity industry. the technology behind making cardboard packaging materials is well-known and present throughout the industry. any new innovations, such as incorporating more recycled content into some products, is easily copied by competitors with minimal effort. there’s just very little new in this industry, very little of value to be discovered (apparently), and very little to pursue from competitors, as reflected in the data. 5. conclusions this paper reports on a small piece of a larger study looking at the conditions under which firms develop and protect knowledge assets. based on the idea that knowledge management is a more strategic activity than is commonly recognized, the larger product looks to classify industries and firms according to industry practices and data reflecting the importance of knowledge assets when compared to competitive intelligence threats. based on the larger data set, we reported on four examples that illustrate the usefulness of the approach in several ways. initially, just the basic data used to identify these industries shows the considerable differences between industries putting a high value on knowledge (ratios of 2.41 and 2.29 according to our metric) and those with lower values (0.11 and 0.28). these are, on the face, clearly different situations for managing knowledge. similarly, there are industries with aggressive competitive intelligence activity (numerous firms with highlevel operations), posing a threat to proprietary knowledge assets, and others with no apparent ci. again, these are clearly quite different circumstances. with this framework, we use this opportunity to try to describe more specifically what the tendencies are in each of the selected classifications of knowledge competition. by looking at asset levels, types of industries (manufacturing or service), types and characteristics of knowledge, critical value chain activities, and life cycle stage, we can start to get a read on circumstances and appropriate managerial responses. with a better understanding of all these facets, we can offer more guidance to practitioners on when and how to aggressively pursue knowledge assets as well as when and how to protect the same. acknowledgements: the authors appreciatively acknowledge fuld & company for providing some of the data used in this study. references american society for industrial security (asis)/pricewaterhousecoopers. (1999) trends in proprietary information loss, asis, alexandria, va. boisot, m. (1995) is four firm a creative destroyer? competitive learning and knowledge flows in the technological strategies of firms. research policy, 24, 489-506. 21 bontis, n. (1999) managing organizational knowledge by diagnosing intellectual capital: framing and advancing the state of the field. international journal of technology management, 18 (5-8), 433-462. choi, b. & lee, h. (2003) an empirical investigation of km styles and their effect on corporate performance. information & management, 40, 403-417. davenport, t.h., delong, d.w. & beers, m.c. (1998) successful knowledge management projects. sloan management review, (winter), 43-57. davenport, t.h. & prusak, l. (1997) working knowledge: how organizations manage what they know. harvard business school press: boston, ma. decarolis, d.m. & deeds, d.l. (1999) the impact of stocks and flows of organizational knowledge on firm performance: an empirical investigation of the biotechnology industry. strategic management journal, 20, 953-968. dierickx, i. & cool, k. (1989) asset stock accumulation and sustainability of competitive advantage. management science, 35, 1504-1514. edvinsson, l. & malone, m. (1997) intellectual capital. harper business: new york. edvinsson, l. & sullivan, p. (1996) developing a model for managing intellectual capital. european management journal, 14(4), 356-364. erickson, g.s. & rothberg, h.n. (2012) intelligence in action: strategically managing knowledge assets.palgrave macmillan: london. gilad, b. & herring, j., eds. (1996) the art and science of business intelligence. jai press: greenwich, ct. grant, r.m. (1996) toward a knowledge-based theory of the firm. strategic management journal, 17(winter),109-122. gupta, a.k. & govindarajan, v. (2000a) knowledge flows within multinational corporations. strategic management journal, 21, 473-496. gupta, a.k. & govindarajan, v. (2000b) knowledge management’s social dimension: lessons from nucor steel. sloan management review, (fall), 71-80. hansen, m.t., nohria, n. & tierney, t. (1999) what’s your strategy for managing knowledge? harvard business review, (march/april), 106 116. kaplan, r.s. & norton, d.p. (1992) the balanced scorecard: measures that drive performance. harvard business review, 70(1), 71-79. kogut, b. & zander, u. (1992) knowledge of the firm, combinative capabilities, and the replication of technology. organization science, 3(3), 383-397. mcevily, s.k. & chakravarthy, b. (2002) the persistence of knowledge-based advantage: an empirical test forproduct performance and technological knowledge. strategic management journal. 23, 285-305. mouritsen, j., larsen, h.t. & bukh, p.n. (2002) understanding intellectual capital statements: designing and communicating knowledge management strategies, in world congress on intellectual capital readings, bontis, n. ed., butterworth-heinemann: woburn, ma. nahapiet, j. & ghoshal, s. (1998) social capital, intellectual capital, and the organizational advantage. academyof management review, 23(2), 242-266. nelson, r.r. & winter, s.g. (1982) an evolutionary theory of economic change. belknap press: cambridge, ma. nonaka, i. & takeuchi, h. (1995) the knowledge creating company: how japanese companies create the dynamics of innovation. oxford university press: new york. penrose, e.t. (1959) the theory of growth of the firm. basil blackwell: oxford. polanyi, m. (1967) the tacit dimension. doubleday: new york. rothberg, h.n. & erickson, g.s. (2005) from knowledge to intelligence: creating competitive advantage in the next economy. elsevier butterworth-heinemann: woburn, ma. rothberg, h.n. & erickson, g.s. (2002) competitive capital: a fourth pillar of intellectual capital? in world congress on intellectual capital readings, bontis, n. ed., elsevier butterworth-heinemann: woburn, ma. schulz, m. & jobe, l.a. (2001) codification and tacitness as knowledge management strategies: an empirical exploration. journal of high technology management research, 12, 139-165. schumpeter, j.a. (1934) the theory of economic development. harvard university press: cambridge, ma. stewart, t.a. (1997) intellectual capital: the new wealth of organizations. doubleday: new york. teece, d.j. (1998) capturing value from knowledge assets: the new economy, markets for know-how, and intangible assets. california management review, 40(3), 55-79. tobin, j. & brainard, w. (1977) asset markets and the cost of capital in economic progress, private values, and public policy: essays in honor of william fellner, in nelson, r. & balassa, b., eds., north holland: amsterdam. winter, s.g. (1987) knowledge and competence as strategic assets, in the competitive challenge: strategies of industrial innovation and renewal, teece, d.j. ed., ballinger publishing co.: cambridge, ma. zack, m.h. (1999a) developing a knowledge strategy. california management review, 41(3), 125-145. 22 zack, m.h. (1999b) managing codified knowledge. sloan management review, (summer), 45-58. zander, u. & kogut, b. (1995) knowledge and the speed of transfer and imitation of organizational capabilities: an empirical test. organization science, 6(1), 76-92. vol8no1paper2abbaspour_etal to cite this article: abbaspour, a., amirkhani, a.h., ezzat, a.a.p. and hozori, m.j .. (2018) id en tifyin g an d d escribin g su b-pro cesses in t he strate gic in te lli gen ce process by qualitative content analysis in an inductive way. journal of intelligence studies in business. 8 (1) 16-24. article url: https://ojs.hh.se/index.php/jisib/article/view/283 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index identifying and describing sub-processes in the s t r a t e g i c i n t e l li g e n c e p r o c e s s b y qu a l i t a t i ve c o n t e n t a n a l y si s i n a n i n d u c t i ve wa y ahmad abbaspoura*, amir hussein amirkhania, ali asghar pour ezzatb and mohammad javad hozoria adepartment of management, payame noor university, tehran, iran; bfaculty of management, university of tehran, iran; *aabbaspuor@yahoo.com journal of intelligence studies in business please scroll down for article identifying and describing sub-processes in the strategic intelligence process by qualitative content analysis in an inductive way ahmad abbaspoura*, amir hussein amirkhania, ali asghar pour ezzatb and mohammad javad hozoria adepartment of management, payame noor university, tehran, iran; bfaculty of management, university of tehran, iran corresponding author (*): aabbaspuor@yahoo.com accepted 9 march 2018 abstract the purpose of this study was to identify and describe the sub-processes of the strategic intelligence process in organizational level analysis. data were collected by searching the major academic and practitioner books, theses and journals in the ebsco, google scholar and irandoc databases in persian and english. nine thousand pages of text data were examined using content analysis. fourteen main sub-processes were identified to describe the strategic intelligence process: (1) identification of strategic environments and prioritizing them, (2) determination of organizational information needs and prioritizing them, (3) determination of monitoring period for each section of strategic environment and organization key information needs (kin), (4) determination of information sources and assessment of information capturing, (5) external information scanning, (6) internal information extracting, (7) setting criteria for gathered information assessment, (8) information filtering, categorizing and abstracting, (9) information analysis, (10) interpretation and sense making (intelligence generation), (11) determination of intelligence users and intelligence distribution media, (12) intelligence distribution, (13) feedback from recipients, revision and adjustment, intelligence storage, and (14) intelligence use. the results provided useful insight for strategic intelligence process implementation in organizations and its effectiveness evaluation. the innovative aspect of this study is its response to a lack studies about strategic intelligence process modelling. keywords competitive intelligence, strategic intelligence, process, content analysis, inductive way 1. introduction the notion of strategy is multi-dimensional and multifaceted and includes many meaning (leonard and mintzberg 1996). in this way, strategic intelligence (si) has many definitions too. cohen (2009, 31) states she can account "for at least 25 different expressions in english publications" for the notion of si, by studying books and articles published since 1967. this difference of views has led to some instability of terminology and lack of consensus in the si body of knowledge. mcdowell (2009) reported some difficulty for analysts and practitioners who want do research in si. many authors have written in this regard, acknowledging the disagreement about si process and procedures in many organizations (kruger 2010, marchand and hykes 2007, brouard 2007, xu and kaye 2007, liebowitz, 2006). here, we want to analysis relevant texts about si processes to: 1) find a journal of intelligence studies in business vol. 8, no. 1 (2018) pp. 16-24 open access: freely available at: https://ojs.hh.se/ 17 basic consensus among authors about essential activities that are causing strategic intelligence. 2) identify executive requirements that impose strategic intelligence on organizations and 3) identify the sub-processes of strategic intelligence. 2. theoretical framework intelligence is a comprehensive word, and many types of intelligence known in organizations are under the umbrella of this term. according to liebowitz (2006): artificial intelligence (ai), business intelligence (bi), and competitive intelligence (ci), are different forms of intelligence at the organizational level of analysis. liebowitz (2006, 14) has suggested a framework of intelligence to integrate many kinds of intelligence in organizations. figure 1 indicates liebowitz’s (2006, 14) comprehensive model and shows the inclusion of different types of organizational levels of intelligence. according to liebowitz (2006, 13): "the inner layer refers to ai. this is the field of developing intelligent systems to support or, in some cases, replace the decision maker". although the benefits of ai techniques can be gained, in liebowitz’s (2006) opinion, this does not necessarily mean that other intelligence layers must use ai techniques. he admits that because of the model's comprehensiveness, he introduced artificial intelligence into the model. the next layer in the intelligence framework refers to knowledge management (km). according to bali et al. (2009, 7) km is defined as: "comprised a set of tools, techniques, tactics and technologies aimed at maximizing an organization's intangible assets through the extraction of relevant data, pertinent information and germane knowledge, to facilitate superior decisionmaking so that an organization attains and maintains sustainable competitive advantage". jennex (2009, 4) define km as: “the practice of selectively applying knowledge from previous experiences of decision-making to current and future decision-making activities with the express purpose of improving the organization's effectiveness". km refers to how the organization's knowledge can be used for innovation, essential knowledge retention, loyalty creation, and employees’ productivity improvement. for gaining, organizing and sharing knowledge, ai techniques can be used. business intelligence (bi) has been placed in the next layer of figure 1. the knowledge management and business intelligence (kmbi 2005) workshop defined bi as an: “active model-based, and prospective approach to discover and explain hidden, decision relevant aspects in large amounts of business data to better inform business decision processes”. turban et al. (2007, 24) define bi as “an umbrella term that combines architecture, tools, databases, analytical tools, applications, and methodologies” that “give business managers and analysts the ability to conduct appropriate analysis” on historical and current business data. how to effectively manage the organization's internal information, to improve organizational performance and to align implementation and strategy, are the key issues of bi. liebowitz (2006, 14), has introduced competitive intelligence (ci) in the fourth layer of figure 1. bi focuses on the internal and often quantitative data of the organization; however, ci focuses on data outside the organization, often qualitative in nature. these data refer to the competitive aspect of the external environment of an organization (liebowitz 2006, britt 2006, mcgonagle and vella 2002). the society of km bi ai ci si figure 1 framework of intelligentsia (liebowitz 2006,14). 18 competitive intelligence professionals (scip 2007) has defined ci as: “a systematic and ethical program for gathering, analyzing, and managing external information that can affect a company’s plans, decisions, and operations”. ci is information, which is gathered from the market, then analyzed to provide recommendations and solutions to decisionmakers; all of these are done in a legal and ethical way (miller 2000). ci means creating a systematic plan capturing organizational external information and knowledge, as well as analyzing and managing this information and knowledge, to improve the organizational decision-making capacity (jones 2009, calof and wright, 2008, liebowitz 2006). the last layer in liebowitz’s (2006, 14) framework of intelligence is strategic intelligence (si), which includes all types of intelligences in organization. si helps the organization make the best strategic decisions. the top managers of an organization have to anticipate the future of the organization to gain competitive advantage. to do this, they must have intelligence about the trend and direction of the changes that occur in the following areas: resources, customer expectations, emerging technologies that affect business and customers’ behavior, political and social change, incentive and restrictive laws (marchand and hykes 2007). according to cohen (2009) there is no common, consensual definition of si. each author, according to her/his research background, has defined si. for this reason, in table 1, different definitions and perspectives of si are presented. considering the definitions given in table 1, there is no general consensus among scholars involved in the si phenomenon; and the body of knowledge about this phenomenon is fragmented. so, using the methodological suggestion of elo and kyngäs (2008), a qualitative content analysis method was used to address the aims of this paper. 3. methodology in terms of qualitative versus quantitative methodologies, we use a qualitative methodology to identify and describe si subprocesses. from the ontological point of view, the qualitative methodology is placed in a holistic-inductive paradigm (sarantakos 2004). a qualitative methodology is used when there is some concern about understanding a phenomenon, and the goal is not to measure the relationship between variables. content analysis as a research method is a systematic and objective means of describing and quantifying phenomena (krippendorff 1980, downe-wamboldt 1992, sandelowski 1995). it is also known as a method of analyzing documents (elo and kyngäs 2008). table 1 different definitions of si at the organizational level of analysis. author definition tham and kim (2002, 2) strategic intelligence can be identified as what a company needs to know of its business environment to enable it to gain insight into its present processes, anticipate and manage change for the future, design appropriate strategies that will create business value for customers, and improve profitability in current and new markets global intelligence alliance (2004, 5) a systematic and continuous process of producing needed intelligence of strategic value in an actionable form to facilitate long-term decision making. liebowitz (2006, 22) si is the aggregation of the other types of intelligentsia to provide value-added information and knowledge toward making organizational strategic decisions. marchand and hykes (2007,1) strategic intelligence is about having the right information in the hands of the right people at the right time so that those people are able to make informed business decisions about the future of the business. brouard (2007, 122) strategic intelligence could be defined as the output of the informational process by which an organization stays attuned to its environment in order to make decisions and then act in pursuit of its objectives. mcdowell (2009, 24) the specific objective for strategic intelligence is to provide accurate, long-range intelligence to enable effective high-level planning and management of law enforcement resources to meet the overall perceived threat. cohen (2009, 49) si is a formalized process of research, collection, information processing and distribution of knowledge useful to strategic management. 19 content analysis is (elo and kyngäs 2008, 109): "a method that be used in an inductive or deductive way. which of these is used is determined by the purpose of the study. if there is not enough former knowledge about the phenomenon or if this knowledge is fragmented, the inductive approach is recommended". in an inductive way, concepts and classifications are extracted from the data. the qualitative content analysis in the inductive method has three main steps: preparation, organizing and reporting (elo and kyngäs 2008). these steps are shown in figure 2. 3.1 trustworthiness there is a lot of struggle between authors about the appropriate terms for evaluating the validity of qualitative research. many terms such as rigor, validity, reliability and trustworthiness were developed for this purpose (koch and harrington 1998). the most widely used criteria for evaluating qualitative content analysis are those developed by lincoln and guba (1985). they used the term "trustworthiness". the aim of trustworthiness in a qualitative inquiry is to support the argument that the research’s findings are "worth paying attention to" (elo et al. 2014, 2). lincoln and guba (1985) have suggest five options for assessing the trustworthiness of qualitative research. these are credibility, dependability, conformability, transferability, and authenticity. elo et al. (2014, 3) proposed a checklist for researchers attempting to improve the trustworthiness of a content analysis study. in this paper, we use their proposed checklist and the points to be reported according to their checklist (elo et al. 2014), according to the following headings. 3.2 data collection method material for this study included all published texts and literature in persian and english about strategic intelligence. we used a twostage strategy for selecting material. first, we searched the major academic and practitioner journals and books in the ebsco, google scholar and irandoc databases using the keywords "strategic intelligence" in persian and english for the period from 1967 to the present (march 2017). this time frame was selected because it corresponds to the period during which si appeared in the management field (cohen 2009). second, we checked the reference lists of the articles and books obtained through the initial search to uncover additional studies. in total, a little more than nine thousand text data sheets were collected for review. 3.3 sampling strategy in qualitative research, the sampling strategy is selected based on the methodology and subject and there is no requirement for generalizability of the results (higginbottom 2004). the most commonly used method in content analysis studies is purposive sampling (kyngäs et al. 2011). in this research, purposive sampling was also used. two criteria were used to select appropriate samples: (1) texts should be in the business or organization context; and (2) examine si at preparation phase selecting the unit of analysis making sense of the data and whole organizing phase open coding coding sheets grouping categorization abstraction reporting the analyzing process and the results model, conceptual system, conceptual map or categories figure 2 figure 2 preparation, organizing and resulting phases in the content analysis process by the inductive approach. (elo and kyngäs 2008, 110). 20 the organizational level of analysis. it has been suggested that the saturation of data may indicate the optimal sample size (guthrie et al. 2004, sandelowski 1995a). by definition, saturated data ensure replication in categories, which in turn verifies and ensures comprehension and completeness (morse et al. 2002). the saturation law in this study was "three new texts do not add new code to the study" and "all extracted code can be included in previous categories". 3.4 selecting the unit of analysis in this research, we selected the sentence as unit of analysis. because the meanings we want to extract are infinitive phrases; so the sentence size seems to be appropriate. 3.5 categorization and abstraction after each text was coded, codes were shifted to the codebook. then the codes were reexamined and grouped. groups that had overlapping meanings built the abstract categories of the research. this process continued until saturation of categories was reached. co-researchers checked the categories to ensure no overlap between categories and concepts, and then overlapping categories and concepts were integrated. in the next step, several experts in si were asked to examine the conceptual similarity between categories and concepts. in this way, fourteen abstract categories were identified as si subprocesses. 3.6 interpretation for avoidance of excessive interpretation, only clear and unambiguous sentences were selected for open coding, and hidden concepts in the texts were ignored. according to elo et al. (2014) co-researchers checked out all analyzing process steps. 3.7 representativeness face validities were used to improve the trustworthiness of the research findings. some experts were asked to evaluate research findings, and their assessment was that the results are realistic. 4. findings fourteen main categories (sub-processes) were established to describe the si process: identification of strategic environments and prioritizing them, determination of organizational information needs and prioritizing them, determination of a monitoring period for each section of strategic environment and organization key information needs (kin), determine information sources and assess information capturing ways, external information scanning, internal information extracting, setting criteria for gathered information assessment, information filtering, categorizing and abstracting, information analysis, interpretation and sense making (intelligence generation), determination of intelligence users and intelligence distribution media, intelligence distribution, feedback from recipients, revision and adjustment, intelligence storage, and intelligence use. 4.1 identification of strategic environment and prioritizing them in the opinion of most of the contributors, the identification of important areas of the environment is one of the main activities in the si process. "dividing the environment into sectors to monitor is the first solution proposed" (cohen 2009, 144). "in a limited resource context or in a desire for efficiency and optimization, prioritization of sections and axes of surveillance seems vital to ensure the effectiveness of surveillance practiced" (cohen 2009, 148). therefore, in order to achieve the expected outcomes of a si system, the strategic areas of the organization's environment should be identified and prioritized. 4.2 determination of organizational information needs and prioritizing them some contributors identify the beginning of the si process by ascertaining the organization's needs and problems. according to mcdowell (2009), si is an organizational level of analysis issue and deals with issues and problems which are identified in the structure, goals or nature of organizations so one of the important steps in the si process is to recognize the organization's problems. "as the first stage of the intelligence cycle, the strategic intelligence system is concerned with the establishing of parameters for what information is 21 required, what priorities should be established, and what indicators should be monitored" (kruger 2010,110). 4.3 determination of monitoring period for each section of strategic environment and organization key information needs (kin) nowadays, constant changes are one of the main characters of the organizational environment. for this reason, some authors, considering the perceived uncertainty of different parts of the environment, embedded the determination of monitoring period for each section of strategic environment and organization key information needs as essential activities in the si process (kruger 2010, cohen 2009, montgomery and weinberg 1998). 4.4 determination of information sources and assess information capturing ways information overflow convinced some authors that planning for identifying relevant, reliable, valid, and up to date resources makes the process of si more effective and prevents overflow of information and its related costs. according to cohen (2009, 157): "to ensure the effectiveness of information collection and to avoid wasting corporate resources, which are by definition limited, it is necessary to select information sources and the most valuable information". 4.5 external information scanning and internal information extracting almost in all of the texts which were analyzed, information gathering activity was identified as the most important phase of the si process. according to marchand and hykes (2007, 5) the collecting phase, which "focuses on ways of gathering information that are relevant and potentially meaningful" one of the steps that makes the si process effective. but the origin of the gathered information led to some disagreement among authors. on the one hand, some authors (for example, kruger 2010, cohen 2009, marchand and hykes 2007) believed that the internal environment of an organization's information gathering system and external environment of the organization's information gathering are the same; on the other hand, there are authors (xu and kaye 2007, montgomery and weinberg 1998) who believed that these two areas have different information gathering approaches. 4.6 setting criteria for gathered information assessment most authors agree on the evaluation of the information gathered. however, some have recommended setting criteria for the evaluation of information: "in other words, volume, diversity and quality of information sources, and the existence of control to verify value seem vital for the effectiveness of surveillance" (cohen 2009, 159). while others only assess the validity and reliability of information: "[analysis of gathered information] simply cannot occur until and unless the collected information has been brought together in appropriate sets and then considered for its reliability, relevance, and believability value" (mcdowell 2009, 195). 4.7 information filtering, categorizing and abstracting in recent years, most authors have emphasized categorizing and abstracting refined information. they believe in the benefits that these activities bring. these activities save time and money for the organization and provide a more effective analysis of the data. some even believe that this activity should be done according to user preferences and feedback (ong et al. 2007). 4.8 information analysis compared to the research and collection phase, there is not much said in the literature about the other phases of the si process, in particular the information processing phase, which is central to the activity of si (cohen 2009). the difference between the authors in this phase is their attitude to the method of analysis. cohen (2009) has focused more on the introduction of analytical techniques and their application for information processing, however mcdowell (2009) has suggested instructions for preparing data, for methods of selecting an analysis tool, and auxiliary resources for information processing. 22 nonetheless, the goal of the authors was to turn data into information. that is, the output of this stage should be a meaningful and believable piece of information. "analysis creates information by linking data together and identifying patterns and trends" (brouard 2007, 124). 4.9 interpretation and sense making (intelligence generation) some authors who have written in the field of si believe that information analysis is not enough to generate intelligence. in the opinion of this group of experts, the interpretation of the analyzed information creates intelligence and advice for action. but there is no consensus on how to interpret information and generate intelligence. in daft and weick’s (1984) point of view: "interpretation pertains to process by which managers translate data into knowledge and understanding about the environment. this process will vary according to the means for equivocality reduction and the assembly rules that govern information processing behavior among managers" (291). 4.10 determination of intelligence users and intelligence distribution media almost all contributors have confirmed that the si user's identification and determination of si finding distribution media are activities in the si process context. "the first problem is to distribute the information to the right recipients, i.e. those interested by it and liable to use it." (cohen 2009, 179). "the distribution of the products of surveillance activity be by written, oral, electronic channels, etc. numerous and varied. some studies list the most widely used methods of information distribution" (ibid 180-81). 4.11 intelligence distribution in many references about the process of si, considering the distribution of intelligence is a key part of the process (kruger 2010; mcdowell 2009; brouard 2007; ong et al. 2007; xu and kaye 2007; montgomery and weinberg 1998). according to cohen (2009, 179): "the role of distribution in [si] surveillance effectiveness is therefore obvious: information which is collected, processed, stored but not distributed is not used, which reduces [si] surveillance effectiveness to zero." 4.12 feedback from recipients, revision and adjustment, intelligence storage the recipient’s feedback on transmitted information is recommended by many authors. it is the best way to improve the quality of information. they recommend the implementation of a feedback contract encouraging users to issue feedback on each item of information transmitted (cohen 2009; brockhoff 1992; prescott and smith 1989). 4.13 intelligence use most authors agree on identifying a separate phase in the si process as the intelligence use stage. mcdowell (2009) has called this phase "recommendations". daft and weick (1984) named this stage "strategy formulation and decision making". 5. discussion and conclusion strategic intelligence in the organizational level of analysis is an abstract phenomenon that exists only in the minds of organization members where it appears as cognitive maps of a socially constructed reality. it enacts inter-subjectively in nature. those who coined this term’s intention was to respond to the information needs of decision makers at the strategic level of the organization (seitovirta 2011, liebowitz 2006, miller 1996). to make an inter-subjective meaning, share an opinion and understand this phenomenon, si components and steps describing it seem essential. a process that develops an organizational strategic intelligence consists of fourteen sub-processes. the way each of these sub-processes is implemented depends on the organization's age and size, and perceived complexity of the organization's environment by top managers (daft and weick 1984). one of the weaknesses of the qualitative content analysis method is that it does not provide tools for modeling or prioritizing classes and concepts created (elo and kyngäs 2008). for this reason, the sub-processes identified in this research do not have the order or priority. the process modeling of these sub-processes needs further research. 23 si in the organizational level of analysis is a term which is used to describe some intelligence activities. these activities are meaningful in the context of strategic planning and strategic management (marin 2015). si is about creating a shared common understanding of the internal and external environment in an organization member's minds. whenever these shared understandings are created in the organization it can be assured that appropriate strategies are selected; which are appropriate to the circumstances and the nature of the organization (pirttimäki 2007). for an organization to have an si attribute, it must do the following activities in some ways: (1) identification of strategic environments, (2) determination of organizational information needs, (3) determination of monitoring periods, (4) determination of information capturing ways, (5) external information scanning, (6) internal information extracting, (7) setting criteria for gathered information assessment, (8) information filtering, categorizing and abstracting, (9) information analysis, (10) interpretation and sense making (intelligence generation), (11) determination of intelligence users and intelligence distribution media, (12) intelligence distribution, (13) feedback from recipients, revision and adjustment, intelligence storage, (14) intelligence use. 6. references bali, r.k. and wickramasinghe, n. and lehaney, b. (2009). knowledge management primer. new york: routledge. britt, p. (2006). the new competitive intelligence: raising the confidence quotient. kmworld, 15(10), 10-24. brouard, f. (2007). awareness and assessment of strategic intelligence: a diagnostic tool, in xu, m. (ed). managing strategic intelligence. (pp. 122-140). hershey, pa: information science reference. calof, j.l & wright, s. (2008). competitive intelligence: a practitioner, academic and inter-disciplinary perspective. european journal of marketing. 42(7/8). 717 730. cohen, c. (2009). business intelligence: evaluation and impact on performance. london: iste. cole, f.l. (1988). content analysis: process and application. clinical nurse specialist, 2(1), 53–57. daft, r., & weick, k. (1984). toward a model of organizations as interpretation systems. the academy of management review, 9(2), 284-95. downe-wamboldt, b. (1992). content analysis: method, applications, and issues. health care for women international, 13(3), 313-321. elo, s. & kyngäs, h. (2008). the qualitative content analysis process. journal of advanced nursing, 62(1), 107-115. elo, s., kääriäinen, m., kanste, o., pölkki, t., utriainen, k. and kyngäs, h. (2014). qualitative content analysis. sage open, 4(1), p.215824401452263. fernández-villacañas marín, m. (2015). the global strategic intelligence management. in: learning and thinking skills. [online] university of alcalá (uah). available at: http://europehomeproject.eu/resources/learning-materials [accessed 14 jul. 2016]. guthrie, j., yongvanich, k., & ricceri, f. (2004). using content analysis as a research method to inquire into intellectual capital reporting. journal of intellectual capital, 5, 282-293. jennex, m.e. (2009). knowledge management, organizational memory, and transfer behavior: global approaches and advancements. hershey, pa: information science reference. jones, r.b. (2009). it's eleven o'clock... do you know what your competition is doing? adhesives & sealants industry. issue 4. 14 19. knowledge management and business intelligence (kmbi) workshop, available from http://wm2005.iese.fraunhofer.de, germany, 2005. koch, t., & harrington, a. (1998). reconceptualizing rigour: the case for reflexivity. journal of advanced nursing, 28, 882-890. krippendorff, k. (1980). content analysis: an introduction to its methodology. sage publications, newbury park. kruger, j. (2010). a study of strategic intelligence as a strategic management tool in the long-term insurance industry in 24 south africa (master of commerce). university of south africa. leonard, e. and mintzberg, h. (1996). the rise and fall of strategic planning. journal of marketing, 60(4), p.129. liebowitz, j. (2006). strategic intelligence: business intelligence, competitive intelligence, and knowledge management. boca raton, fl.: auerbach publications. taylor & francis group. marchand, d. and hykes, a. (2007). leveraging what your company really knows: a process view of strategic intelligence, in xu, m. (ed). managing strategic intelligence. pp. 1-13. hershey, pa: information science reference. mcdowell, d. (2009). strategic intelligence. lanham, md.: scarecrow press. mcgonagle, j. and vella, c.m. (2002). a case for competitive intelligence: 90% of the information a company needs to understand its market and competitors and to make key decisions is already public. information management journal. 36(4). 35-40. miller, j. (2000). millennium intelligence: understanding and conducting competitive intelligence in the digital age. medford, n.j.: cyberage books. miller, j.p. (1996) information science and competitive intelligence: possible collaborators? bulletin of the american society for information science and technology. 23 (1). 11-13. montgomery, d.b. and weinberg, c.b. (1998). toward strategic intelligence systems. marketing management. 6(4). 44-52. pirttimäki, v. (2007) business intelligence as a managerial tool in large finnish companies, doctoral dissertation. tampere, tampere university of technology. sandelowski, m. (1995). qualitative analysis: what it is and how to begin. research in nursing & health, 18(4), 371-375. sarantakos, s. (2004). social research. basingstoke: palgrave macmillan. seitovirta, l.c. (2011). the role of strategic intelligence in corporate decision making, department of management and international business, aalto university school of economics. tham, k.d. and kim, h.m. (2002). towards strategic intelligence with ontology based enterprise modelling and abc. proceedings of the iber conference, las vegas, nv. turban, e. and aronson, j.e. and liang, t. and sharda, r. (2007). decision support and business intelligence systems. 8th edition. upper saddle river, n.j.: pearson prentice hall. xu, m. & kaye, r. (2007). the nature of strategic intelligence, current practice and solutions, in xu, m. (ed). managing strategic intelligence. pp. 36-53. hershey, pa: information science reference. microsoft word content accessibility and semantic networks processed on foreign natural language analysis.docx content accessibility and semantic networks processed on foreign natural language analysis bernard dousset, anass elhaddadi, josiane mothe * * institut de recherche en informatique de toulouse, irit umr 5505 université de toulouse, université paul sabatier 118, route de narbonne, f-31062 toulouse cedex 9 (france) dousset@irit.fr haddadi@irit.fr mothe@irit.fr received 1 june 2011; received in revised form 1 august 2011; accepted 15 december 2011 abstract: in this paper we present a methodology that makes it possible to mine a document collection from a domain without knowing the language in which the documents are written. we describe in detail a method, tools and results that can be used within a digital library context for science watch and competitive intelligence. we consider a collection associated with the aquaculture domain written in chinese and extracted from a digital library. based on the original coding (unicode) of the data and the tag marking the structure of the documents, we extract key elements (authors, phrases, etc.) from within the domain and analyse them. the results are displayed in the form of graphs and networks. we extract people networks and semantic networks before examining their evolution over a period of several years. the principles developed in this paper can be applied to any language. keyword: text mining, graph, semantic network, social network, weak signals, competitive intelligence. 1. introduction accessing information generally implies that the user understands the language that a document is written in. to counter the problem of reading documents in a language with which the user is not familiar, online translators can be of assistance. indeed such translations are available, for example, from google or systran. however, reading an entire document translated using a machine is not entirely satisfactory: some sentences can be difficult to understand, particularly when the original document is written using long sentences or a language which is rich some tasks involve reading many documents, particularly in relation to decision tasks or scientific monitoring. in this paper we consider a related problem, the analysis of a large collection of documents extracted from a digital library where the documents focus on a particular domain. in specific terms, the problem we tackle is the analysis of available for free online at https://ojs.hh.se/ journal of intelligence studies in business 1 (2011) 5-18 6 semantic and people networks from documents written in a foreign language, that the user does not understand. these networks are first created by considering the entire set in a homogeneous form; then we suggest a method to analyse partitioned sets the information is broken down according to the period of time in which it occurs and several periods are fused together so that development of people networking activities can be easily observed. in order to analyse these documents and extract these networks, when the language used in the documents cannot be understood, we set forth a method based on the extraction of n-grams. in the case of chinese, for example, the analysis is based on n-grams of ideograms that correspond to key elements from within the domain (authors, journals, keywords, etc.). more specifically, we take advantage of the structure of some resources to extract key elements such as phrases taken from editors’ keywords and we build dictionaries. these dictionaries are used to analyse free text, either directly or by cross referencing reliable elements with other extracted elements using statistically-based automatic methods. to illustrate our method, we describe the analysis of a document set extracted from the scientific digital library in the chinese scientific journals database (cqvip). we also give some clues on how to manage other resources in a similar fashion, such as the al jazeera information site in arabic and an on-line korean collection, ekoreanstudies.com. this paper is set out as follows: we first present some related work in section 2, then we present the method for chinese. section 3 presents the raw data and the pre-processing before analysis can take place. the analysis is presented in section 4. section 5 presents other examples with arabic and korean. section 6 concludes the article. 2. related work many articles take into account the problem of document access when documents are written in a language that the user is not familiar with or does not use as a primary language. in cross-lingual retrieval for example, users query information corresponding t o their information needs using their own language and the system retrieves documents written in a foreign language (peters 2009). many approaches are employed to resolve this problem. query translation is one of them (he, wang, oard and nossal 2003) (lu, xu and shlomo 2008). reading documents which are not written in a language the user is familiar with is a major issue. li, cao and li (2003) present an english reading-assistance system that suggests translations of words and phrases based on mining techniques. gaolin, hao and fumihito (2006) show a method to predict possible english meanings according to each component of a chinese term. the second aspect we study in this paper refers to the automatic extraction of people and semantic networks based on the mining of scientific publications. analysing scientific publications to discover trends and understand the structure of a scientific field and the evolution of scientific communities or topics has been widely explored in literature, in particular, but not exclusively, in scientometrics (leydesdorff 1995). different types of analysis can be undertaken. in information science, citation and co-citation analysis have been studied in the past as a mean of monitoring scientific activities (white and mccain 1998) (white 2003). citation analysis is used to identify core groups of publications, authors and journals. conversely, co-citation analysis is used to detect networks of authors or to map topics and authors or journals (white 2003) (zitt and bassecoulard 1994). groupings other than authors can be used for the purposes of correlation analysis. mining scientific publications such as keywords, journals, etc. are presented in mothe and dkaki (1998). digital libraries usually deliver results in the form of lists of related elements (lists of related publications or authors) even though it has been shown that graphical interfaces play an important role in displaying the results of analysis to users (chen 2002) (geroimenko and chen 2002). in this context, graphs or networks are powerful methods of visualisation, mainly because linking concepts or elements together is a common mining technique. another reason is that a network is easy to understand, even by a naïve user. in mothe, chrisment, dkaki, dousset and karouach (2006) scientific publications are mined in order to highlight groups of authors and their geographic relationships. this paper extends on an earlier work by dousset (2009). this new version aims at spreading the results for an international reach. 3. chinese as a case study 3.1 raw data we considered the scientific digital library (dl) http://www.cqvip.com. the dl brings together a large number of chinese scientific publications (figure 1). a search engine is available on the main page of the site to retrieve documents in response to a query in chinese (figure 2). since queries can be just a few words, it is easy to write a query in chinese corresponding to the field of interest by simply taking any dictionary or translator. for example, “aquaculture” in french corresponds to “aquiculture” in english and “ ” in chinese. next we can click on the relevant button to obtain the first references (some of the fields are hidden). several options are then possible: gather the references as visualized by copypasting to an editor such as ms word, download all the fields, or ask an engine to download everything. for example, we managed to select 3,000 references in the aquiculture field from 2004-2007. since the information is coded in unicode format (in the form “〹”) it is possible to extract n-grams or sequences of ideograms that correspond either to keywords or to actors in the field (newspapers, conferences, organizations, laboratories and authors). free text (title and summary) can also be used in order to detect new sequences of terms that may be unknown to domain experts. 7 3.2 re-encoding the data there are several goals for this phase: to eliminate text formatting and corresponding tags (html in our case) which do not bring any content, but which correspond to 90% of the file size to rebuild text strings which are split because of formatting to tag the texts again using ascii tags (in our case we use tags in a similar way to many digital libraries: ti for title, au for authors, etc.). such tags may exist in the original version. in this case they are translated from chinese to english. some tags are not visible on the internet browser, but occur in the texts; these should be kept to add new tags to the text by analysing the initial html tags to retain the information which is coded in latin characters or arabic numerals such as dates, numbers or western names (authors, technical formulas or elements). this re-encoding is based on a parser and some re-writing rules as illustrated in figure 3. 8 figure 1: cqvip.com interface the search engine is at the top of the figure. figure 2: cqvip.com interface – the results are displayed. figure 3: re-encoding cqvip data google translation followed up by information figure 4: a bibliographical reference that has been re-coded (tags in ascii and content in chinese unicode) and the corresponding metadata. 9 figure 4 illustrates the results. tags are written in ascii whereas text (content) is in unicode. for example, in the c2617138 reference from figure 4, the publication title, first author of the publication, the journal in which it has been published, and the publication date constitute the beginning of the document. these information elements are tagged using the following field tags: ti:, au:, jn:, dp. when analysing the document visually, we can see that it consists of 3 authors (3 chinese ideograms = 3 codes), only one organization, 8 keywords (here each keyword is composed of 2 to 5 ideograms), the journal and one date (2006). we see thereafter that the title and the abstract are analysed using a specific semantic process in order to detect repeated n-grams of ideograms that in fact do not correspond to any of the keywords. this adheres to a terminology that is not included in the initially provided indexes. metadata (at the bottom of figure 4) describe the new format of references: complete name for each field and its abbreviation, exact identifier of the field in the reference (ex: ti: for the field title). true means that this field will be used in the analysis, separators used to cut out text (character string, “\n” for carriage return, etc.). figure 5: google translation 3.3 translation problems authors’ names to understand unicode (and hence chinese), we list dictionaries that gather the correspondences between the names of authors in chinese and their translation into phonetics (pinyin) using the translator from google. but in so doing, two difficulties arise: google fails when translating some of the names and in this case keeps the unicode (see 7th author figure 5) several authors with different codes can be translated to give the same name. the ambiguity has to be corrected before any analysis takes place in order to avoid analysis mistakes. in this case there is a failure in the translation process. we chose to keep the codes, but where there was ambiguity we added a code that helped to differentiate the names (e.g. li1, li-2 and li-3 refer to different translations that led to li). keywords another translation problem can arise in relation to technical terminology (keywords, additional indexing, full text) because automatic translators struggle when the terms do not appear in their dictionaries (terms that are too technical or too recent), the context or the sentences are too complex or there is some ambiguity. most of the time this uncertainty is resolved during the analysis itself: term clusters, for example, help to understand a term because they occur with some terms that have been correctly translated. the problem is very similar for keywords associated with a particular publication. indeed, some keywords, which are different in unicode, are translated similarly by translation engines. this phenomenon is fortunately rather rare and hence does not fully compromise the interpretation of the analysis. of course, at the final stage, the views of an expert in the language are welcome. figure 6 presents the first phrases of the synonym dictionary based on the keyword field of the documents; it gives the correspondence between chinese terms in unicode and their google translation in english. the number of occurrences of the terms is then calculated for english, thus the occurrences of a term may correspond to the sum of the occurrences of different chinese terms. in the example of figure 6, the most frequent term is “aquaculture”; it combines the occurrences of several chinese forms. even if the fusion is less problematic than in the case of homonyms found in particular authors, there is a risk here of losing some of the differences between the terms. 10 figure 6: unicode and corresponding phrase translation and synonyms (left side), phrase occurrences (right side), extracted from keywords. figure 7: extract from the journal dictionary. other problems for journal names there are no real problems. however, for the names of organizations the problem is that several forms can exist in different documents. this is mainly due to the way addresses are written. we therefore constructed a dictionary that brings together the different versions of the name of any given organization. 4. analysing aquaculture in china 4.1 social networks as explained in the previous section, to begin with, authors’ names are translated into english; then we resolve the problem of english homonyms where chinese names have been translated. next we create a cross referencing table that cross references the authors’ names; in this cross referencing table we consider authors that have written at least two publications. indeed those who have published only one publication are not of any help when trying to extract relationships between authors. figure 8 presents the topology of the main teams. we can immediately see that there is very little co-authoring in the chinese scientific publications we analysed. a second observation is that the teams are generally directed by a main author who has control of 2, 3 or 4 distinct sub-teams. notice that in the figure some names are not translated, whereas others are translated word by word and mean something in english. this has no impact on the results of the analysis. • 古群红 ancient group of red • 金彩杏 apricot jincai • 吴早保 as early as paul wu • 孟和平 bangladesh peace • 蓝正升 blue is up 11 • 商德章 business ethics chapter • 商万成 business wancheng • 蔡秀丽 cai beautiful • 蔡建堤cai embankment • 陈国兔chan kwok-rabbit • 章秋虎 chapter autumn tiger • 陈权军 chen the right to military • 邓正营 deng zhenglai business • 瘐莉萍 die in a prison liping • 别文群 do not text-qun • 董在杰 dong in the kit • … 4.2 semantic networks in the same way it is meaningful to cross reference the keywords suggested in the documents and thus to extract a map of the terminology chosen by the editors or authors of the publication via the keyword field. of course, using the keyword field does not help much to extract weak signals or novel signals because usually the keywords are more common terms. conversely, strong signals and domain diversity are elements that we can extract. figure 9 displays the terms, which are circled in figure 10, belonging to one of the extracted term clusters. this figure displays the entire semantic network extracted from the analysed data. 4.3 analysing evolution evolution can be analysed and visualized in many ways. in the next sub-sections we first analyse evolution by taking into account the correlation that exists between journal names and dates. then we consider the evolution of social networks or relationships between authors over time. 4.4 correlation between time and journal names in this section we analyse the profile of how the journals in which authors published during the four years of the study, namely 2004 to 2007, evolve. correspondence analysis (mardia, kent and bibby 1979) (loubier and dousset 2007) applied to the cross referencing table in which the two dimensions are journals and dates (jn x dp) allows us to visualize the various profiles on a regular tetrahedron (one dimension for each year) presented three dimensionally in figure 11. in figure 11, top left corner, the sub-figure shows the years only and their corresponding direction with regard to the factorial axes. the same projection is applied to the journals in the rest of the figure, for example, in the top right corner the journals are those associated with 2007, meaning that they are associated with 2007 only, i.e. they are probably new journals or journals that have been recently integrated into cqvip. on the edge of the tetrahedron the journals appear in the data collection over a 2 year period (for example 2006 and 2007 are on the edge of the right hand side of figure 12). journals that appear over a 3 year period lie on one face of the tetrahedron. finally, those appearing over a 4 year period are displayed inside the tetrahedron and converge towards the year in which they appear most frequently. 4.5 evolution of author relationships a second method consists in using a three dimensional cross referencing table where two dimensions represent the authors (thus co-authoring is represented) and the third dimension corresponds to time. we can then visualize the evolution of the author network on a graph. this graph is developed in roux (2009). time is distributed chronologically on a circle like the hours on a clock. the nodes corresponding to authors are attracted by these artificial nodes and are positioned towards the centre of the graph if they occur within the four time periods. on the contrary, the author nodes tend to be positioned in the direction of the corresponding reference when the author appears only once. they tend to be in a central position if the author appears in several consecutive periods. figure 12 displays this network. at the bottom left corner, for example, the authors associated with 2006 are the only ones to appear. this space-time analogy is similar to the correspondence analysis presented in figure 11, to which graph drawing techniques can be added. we obtain a graph which shows the main teams (as in figure 8) with their respective evolutions. the colour histogram attached to each node indicates its quantitative evolution; the end time period is represented in green whereas the one that indicates the beginning is represented in red. the position with respect to its collaborative nodes indicates the time of the author’s involvement with the team. the node bonds specify with whom and how long the collaboration lasted. figure 12 brings together the evolution of the main chinese teams in the field of aquaculture. some specific collaboration continues whereas others can be seen as emergent. moreover there are collaborations that either finish for a period of time or stop altogether. it is easy to locate the leaders of the author groups; indeed the size of each histogram is proportional to the appearances of the author in the collection. it is also easy to extract the authors that appear in the end year only (green) or in the beginning year (red). finally figure 12 also shows the main authors who are responsible for the connections between teams, for example, when considering the team represented at the top of figure 12, the only leader who still publishes in the last period is chen changfu. he used to collaborate frequently with meng chang-ming until 2006. he headed two separate teams of collaborative authors in 2004, worked with shen ke ray in 2005 and with one team consisting of 2 authors in 2006. in contrast, the three teams on the left side of figure 12 have many emergent authors and long-standing leaders. other teams disappeared; the four on the right hand side in 2006. this analysis can be completed using a correspondence analysis based on the same three-dimensional cross referencing tables. this analysis shows the trajectories of the authors when they collaborate with other authors. in the data we analysed, no such mobility could be extracted. 12 figure 8: social network analysis extraction of the main teams by authorship. figure 9: terms belonging to one of the extracted term clusters. feed additives, nutrition, spirulina, nutritional value, immunity, garlicin, bait, toxic substances, photosynthetic bacteria, photosynthesis, nitrobacteria, water purification, feed utilization, bacilius, probiotic, industry self-regulation, mechanism, kind, water quality, etc. 13 figure 10: semantic network based on the keywords from cqvip. figure 11: visualising the results of a correspondence analysis on the first axes – journals x dates cross reference table. 14 4.6 semantic analysis of free text we use the dictionary of keywords we built and of which we present an extract in figure 6, including a stop-word list and a dictionary of synonyms (terms that are known to have similar meaning), to analyse the free text. free text from the title and the abstract field of the documents is first reduced to chunks of text using punctuation. the n-grams of ideograms corresponding to the known keywords (from the keyword field) are then extracted from the text and completed by new n-grams of ideograms extracted automatically according to their frequency. these new phrases of ideograms, that can include existing keywords, are translated into english in order to try to understand their meaning. if the translation we obtain using an automatic translator is meaningful with regard to the context but corresponds to a new term, then it is vital to have access to an expert in order to understand the context for this term and to confirm that it is an important term for the domain. these terms can correspond to important terms that are missing in the keyword field. alternatively, we can analyze whether these new n-grams form clusters or not. this can be carried out by analyzing their co-occurrences in the document set. in this findings is to cross reference the new term with the other extracted elements (authors, organizations, keywords, journals and dates) and consider those that are related. this will be explained in the next section. using this approach and without knowledge of a language it is thus possible to detect implicit information that occurs in the corpus and which is inaccessible from a simple reading. the detection of the weak signals is in fact much in demand by decision makers because it corresponds to the need to detect innovation in order to make the right decisions (new avenues to explore, new products to use, etc.). figure 13 presents a list of detected terms (new n-grams of ideograms) and an emergent semantic cluster. 4.7 detecting weak signals to detect weak signals, we first extract the keywords and the known terms from the title and abstract. then we detect the new sequences that exceed a number of occurrences. afterwards we cross reference these new n-grams with time and we keep only those that occur frequently during the end time period ( here 2007). finally these terms are crossreferenced (co-occurrence) and we sort the subsequent matrix to obtain diagonal blocks. each block represents an emergent concept identified by a new terminology which does not exist figure 12: networking and evolution of the main teams (co-authoring). 15 in the keyword field and which only occurs in some documents. weak signals can then be validated by cross referencing them with all the other fields and in particular the keywords. in figure 14, part a) we represent the cross referencing matrix; each plot indicates a non-nil value for the cross referencing. along the diagonal of the matrix, a certain number of clusters consist of new terms and correspond to a semantic group. each cluster is extracted in a square sub matrix and can be visualized in the form of a semantic graph (figure 14 b.). this information should then be submitted to an expert in the field for verification. 养殖塘 breeding pond 养殖可持续发 展 sustainable development of aquaculture 养殖持续健康 sustained and healthy development of 养殖河蟹 breeding crab 养殖船 culture vessel 养殖良种 breeding improved varieties 养殖大菱鲆 cultured turbot 养殖农户 aquaculture farmers 养殖病原体 breeding of pathogens 养殖工作座谈 work culture forum 养殖息 farming income 养殖高产高效 breeding high yield and high 养殖经济效益 economic benefits of aquaculture 养殖罗非鱼 tilapia culture 养殖螃蟹 breeding crabs 大水产养殖户 large aquaculture households 水产品消费 consumption of aquatic products 水产品出口 the export of aquatic products figure 13: new terms extracted from free text that do not occur in the keyword field. 16 figure 10: analysis of newly detected terms and their clusters 17 5. further analysis: arabic in this section we briefly present two other examples of resources on which an analysis can be carried out using the method we presented in the previous sections for chinese. unicode utf-8 can be extracted from the html source code. with regard to the first example, al jazeera, the originality is able to analyse the reactions of the blog users (see figure11) and with regard to the korean library we chose to analyse, we can see that the scale of the characters devoted to this language is different, but that the principle of analysis remains the same (see figure 12). no matter what the collection and the data are, the challenge is to detect tagging that enables us to extract elements of information and hence build the cross referencing tables (actors, semantics, dates, etc.). dictionaries of keywords and expressions are also very useful in the treatment of free text and in the detection of innovation therein. figure 11: aljazeera.net (document brief and associated blog) ideogram of a korean term and the corresponding utf-8 code figure 12: korean from www.ekoreanstudies.com 18 6. conclusion the cqvip library on which we carried out this analysis represents an example of the multiple sources that can be analysed using the method we present throughout this paper. any language can be treated in the same way. however, some issues have to be resolved in order to make this process fully usable and some additional work has to be undertaken: building dictionaries (terms, etc.) and translating them into english (and/or into another language) treating the named entities (for authors, organizations or journals): an automatic translation is sufficient, but there remain many ambiguities that have to be dealt with (importance of accents, pronunciation, context) the translated terms obtained by translating new detected terms or phrases with statistics will not be part of traditional dictionaries, either because they are too new or because other forms will be referenced. checking the validity is an issue if no expert is available to validate manually. in future work it will thus be necessary to contemplate collaboration between different domain experts in: text and data mining -natural language processing (semantics, morphosyntaxic, ontologies, etc.) languages (chinese, korean, japanese, arab, etc.), the fields to be analysed (scientific, technological, economic, geopolitical, etc.). this collaboration between different experts could be useful as part of a two staged approach: -pre-processing data: homogenization of the vocabulary, choice of the information granularity, translation, clarification, etc. interpreting results: very often it is useful to go back to those document sources consisting of free text, in which case it is important to understand both the language and the domain. references peters c. 2009. what happened in clef 2009 – introduction to the working notes. cross lingual evaluation forum. he d., wang j., oard d.w. and nossal m. 2003. user-assisted query translation for interactive clir. annual international acm sigir conference on research and development in information retrieval, 461-461. lu c., xu y., and shlomo, g. 2008. web-based query translation for english-chinese clir. computational linguistics and chinese language processing (clclp) 13(1): 61-90. li h., cao y. and li c. 2003. using bilingual web data to mine and rank translations. ieee intelligent systems, july/august: 54-59. gaolin f., hao y. and fumihito n. 2006. chinese-english term translation mining based on semantic prediction. proceedings of the coling/acl on main conference poster sessions, 199–206. leydesdorff l. 1995. the challenge of scientometrics: the development, measurement and self-organization of scientific communications. dswo press. leiden university, leiden. white h.d. and mccain k.w. 1998. visualizing a discipline: an author co-citation analysis of information science. jasis 1972-1995 49(4): 327-355. white h.d. 2003. pathfinder networks and author co-citation analysis: a remapping of paradigmatic information scientists. jasist 54(5): 423-434. zitt m. and bassecoulard e. 1994. development of a method for detection and trend analysis of research fronts built by lexical or co-citation analysis. scientometrics 30: 333-351. mothe j. and dkaki t. 1998. interactive multidimensional document visualization. international acm sigir conference on research and development in information retrieval, 363-364. chen c. 2002. visualization of knowledge structures. in handbook of software engineering and knowledge engineering. chang, s.k. (ed). world scientific pub co inc., singapore. geroimenko v. and chen c. (eds). 2002. visualizing the semantic web. xml-based internet and information visualization. springer, london. mothe j., chrisment c., dkaki t., dousset b. and karouach s. 2006. combining mining and visualization tools to discover the geographic structure of a domain, computers, environment and urban systems. geographic information retrieval (gir) 30(4): 460-484. dousset b. 2009. extraction de l’information implicite par analyse textuelle de sites web en unicode. veille stratégique scientifique et technologique (cd-rom). mardia k.v., kent j.t. and bibby j.m. 1979. multivariate analysis. academic press, london/new york. loubier e. and dousset b. 2007. visualization and analysis of relational data by considering temporal dimension. international conference on enterprise information systems, 550-553. insticc press. roux c. 2009. methods to extract weak signals. international journal of competitive intelligence, strategic, scientific and technology watch 2(1): 23-29. vol6no2paper3 ghasemi to cite this article: ghasemi b., and rowshan, a. (2016) early warning: the role of market on entrepreneurial alertness. journal of intelligence studies in business. 6 (2) 34-42. article url: https://ojs.hh.se/index.php/jisib/article/view/158 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index early warning: the role of market on entrepreneurial alertness bahare ghasemia and aligholi rowshana auniversity of sistan & baluchestan, department of management and economics, zahedan, iran; bahare_ghasemi1989@yahoo.com and salirowshan@yahoo.com journal of intelligence studies in business please scroll down for article early warning: the role of market on entrepreneurial alertness bahare ghasemia* and aligholi rowshana* a university of sistan & baluchestan, department of management and economics, zahedan, iran *corresponding authors: bahare_ghasemi1989@yahoo.com and salirowshan@yahoo.com received february 2016; accepted september 2016 abstract given the growth and role of entrepreneurship today, it is becoming increasingly important to understand how new entrepreneurial opportunities get developed. discussions of the emergence of new entrepreneurial opportunities often include “eureka” moments, but our understanding of how new opportunities get brought forward is limited. we attribute the difference to a loosely defined quality that kirzner called “entrepreneurial alertness”. other market actors do not have the responsibility to create innovative market opportunities although they do have an obligation to consider such opportunities once they are available in the marketplace. consequently, understanding the opportunity identification process represents one of the core intellectual questions for the domain of entrepreneurship. so question of this paper is how are market environments represented and interpreted in the mind of the entrepreneur such that opportunity identification occurs? and what factors impress on it? to achieve this goal we distribute questionnaires between 115 m.a. students from economics and management college of university of sistan & baluchestan for the years 2012 and 2013. analysis was done by correlation test. results showed that there is significant relationship between market disequilibrium, accuracy vs. timeliness, schema complexity, counterfactual thinking, frame-breaking and sensitivity to profit potential and student’s entrepreneurial alertness; but the relationship between ignorance of new resource and excessive optimism or pessimism about resource and student’s entrepreneurial alertness was not significant. keywords counterfactual thinking, early warning, entrepreneurial alertness, framebreaking, market disequilibrium, sensitivity to profit potential 1. introduction entrepreneurship research is dominated by the fundamental questions of why it is that only some people see new business opportunities and only some people take actions to exploit the opportunities they do see (shane and venkataraman, 2000; venkataraman, 1997). as pointed out by https://core.ac.uk/download/pdf/6836212.pdf “empirical observation suggests that individual people can differ widely in their ability to see new business opportunities within a given situation. some see nothing but constraint and status quo, while others see attractive new opportunities lurking everywhere. the social and economic impact of these differences is enormous, as the economic actions taken by entrepreneurs can have wideranging effects on the provision of valued products and services, on the creation and smooth operation of new markets, and on regional socio-economic development”. journal of intelligence studies in business vol. 6, no. 2 (2016) pp. 34-42 open access: freely available at: https://ojs.hh.se/ 35 once spotted, the opportunity may be recognized as essentially complete in itself or requiring additional development and creative acts by the entrepreneur to become an opportunity worth exploiting. much recent research has been devoted to better understand the diverse range of opportunity types and the corresponding entrepreneurial actions (e.g., eckhardt and shane, 2003; sarasvathy et al., 2005). but these are ex post distinctions that only arise once the entrepreneur has already perceived or enacted the initial market need or underutilized resources, recognized a fit between market need and underemployed resources, and created a new fit (ardichvili et al., 2003). in a reciew by gaglio & katz the authors explain: “shaver and scott (1991) pose the salient psychological questions: how are market environments represented and interpreted in the mind of the entrepreneur such that opportunity identification occurs? do these representations and interpretations differ from those of other market actors? if so, in what ways? “kirzner (1979) asserts that the mental representations and interpretations of entrepreneurs do indeed differ because they are driven by entrepreneurial alertness, a distinctive set of perceptual and cognitive processing skills that direct the opportunity identification process”. the key question of this paper is how market place represents and interprets in the mind of entrepreneur and what factors impress on it? 2. literature review 2.1 entrepreneurial alertness alertness has been central in the context of the recently developing area of “opportunity” in entrepreneurship research. some of this research argues that either opportunities are discovered or they are created (short et al., 2010). another approach parcels it into the three areas of opportunity recognition, opportunity discovery, and opportunity creation (sarasvathy et al., 2003). research on entrepreneurial alertness was initially developed by kirzner (1973, 1979), who characterized individuals who were more alert as having an “antenna” that permits recognition of gaps with limited clues. according to kirzner, entrepreneurial alertness refers to “the ability to notice without search opportunities that have hitherto been overlooked” (kirzner, 1979, p. 48), “a motivated propensity of man to formulate an image of the future” (kirzner, 1985, p.56), “an attitude of receptiveness to available, but hitherto overlooked, opportunities” (kirzner, 1997, p.72), or “a sense of what might be ‘around the corner’, i.e., the sense to notice that which has hitherto not been suspected of existing at all” (kirzner, 2008, p.12). building on kirzner's work, kaish and gilad (1991) saw alert individuals as having a “unique preparedness” in consistently scanning the environment ready to discover opportunities. later kirzner argued that alertness includes creative and imaginative action and may “impact the type of transactions that will be entered into future market periods” (1999, p.10). these various definitions, while intuitively illustrative, lack an explicit theoretical underpinning. clearly, though, entrepreneurial alertness is presented as conceptually distinct from the subsequent development of the opportunity, and from the activities undertaken to subsequently exploit the opportunity. and, while entrepreneurial alertness may work in conjunction with explicit environmental information search behaviors, it is more generally a state of mind that is open to opportunities at all times (busenitz, 1996, p.43). an entrepreneur must be highly sensitive to the key characteristics of schemas, so that he can quickly and accurately activate schemas in an ambiguous scenario to notice the emergence of opportunities. the alertness is reflected by the efforts spent to gather information, or the abstraction from such information of clues indicating commercial opportunities. it is also a kind of “sharp evaluation” that enables entrepreneurs to capture the flash of insight when facing opportunities to perceive the potential opportunities quickly. baron (2006) makes the case that this alertness to new opportunities is based on pattern recognition. he argues that what makes an entrepreneur alert is some cognitive capacity to support the recognition that one situation is similar to another in a meaningful way, that at some abstract level the two situations both resemble some common template or cognitive framework. from this recognition of a common pattern, the entrepreneur can make reasonable predictions of the future and can use these to plan new business moves. but baron's argument leaves open the questions of what these frameworks are and how they are developed and used. 36 entrepreneurial alertness is not solely the domain of the equilibrium-seeking arbitrageur entrepreneur ascribed to kirzner, but applies equally to the equilibrium-destroying creativedestruction entrepreneur of schumpeter (1942). both types of entrepreneur need to be alert to opportunities, whether in the conditions of the present or in the conditions of the hypothesized future (kirzner, 2008). 2.2 market 2.2.1 recognizing events of disequilibrium what would an alertness schema contain and how would it work if it were to lead to a more accurate or superior assessment of a market situation? kirzner (1979, 1985) posits that the alert individual is especially sensitive to signals of market disequilibrium, which can occur at the macroeconomic and microeconomic levels. macroeconomic disequilibrium is the most common form at the moment and in kirzner’s theory, the less considered form. in this situation, market disequilibrium arises from disruptive changes brought about because of new technology, knowledge, demographics, or social values that, as drucker (1985) observed, force industries to reinvent themselves through radical innovation. therefore, it seems logical to expect an alertness schema to include mental models of these kinds of changes and specifically extensive representations of the kinds of signals or cues that would indicate not just the presence of these disruptions but more importantly, to their potential presence. indeed, it is probable that an alertness schema directs attention and focus to search for anomalies, the unexpected or anything remotely new or different. non-alert individuals are not necessarily oblivious to major disruptions in the marketplace. when anyone encounters something different or unexpected that is signaled in a clear, unambiguous, strong and persistent way, he or she will attempt to accommodate the new information (fiske, 1993). weick (1995) notes that these kinds of disruptions trigger extensive “sensemaking” efforts within organizations; research suggests that the context or framework used for sensemaking may lead non-alert actors away from the conclusion that an entirely new assessment is needed. while disruptive macroeconomic market changes are forceful and generally more easy to discern, they are only one source of market disequilibrium. the other source is microeconomic – a less dramatic form but one that has the advantage of being ever present because it is inherent in the marketplace. ongoing microeconomic market disequilibrium arises from the everyday mistakes market actors make in their investment, production, and distribution decisions and actions. these mistakes create pockets of disequilibrium, which become evident as underpriced products, unused capacity, unmet needs, and so on. in more popular terms, these pockets represent market niches, the favored spawning ground of new business opportunities. once again, the key question is what would an alertness schema contain such that it facilitates the anticipation or detection of these mundane pockets of disequilibrium? it is entirely possible that alert entrepreneurs simply recognize the fact that misapprehension and bad judgment occur and they try to capitalize on it. we predict: h1: there is a significant relationship between recognizing events of disequilibrium and student’s entrepreneurial alertness. 2.2.2 changing schema vs. information schema theory assumes that people engage in a kind of pattern matching between environmental stimuli and the information stored in the activated schema (fiske and taylor, 1991; mitchell and beach, 1990). if the pattern match is good enough, attention turns to action and developing a response. if the pattern match is not good enough – that is, when the individual detects something unusual or unexpected, then additional cognitive processing is required. when actors are motivated to be accurate, they usually try to integrate the new information within their existing schema by creating new subcategories or new causal links that increase the differentiation and complexity of their schema (fiske and taylor, 1991; sherman et al., 1989). if the actor places a higher value on quick action or if he or she feels it is socially desirable to adhere to a schema, then the actor will either discount the new information or engage in elaborate reinterpretations that maintain the structure and dynamics of the existing schema (fiske, 1993; kiesler and sproull, 1982). given the nature of this cognitive dynamic, the theory of alertness would predict: 37 h2: there is a significant relationship between changing schema vs. information and student’s entrepreneurial alertness. 2.2.3 cognitive error control the failure to recognize and integrate information regarding market disequilibrium are not the only kinds of cognitive mistakes non-alert actors can make. kirzner (1985) identified several other assessment mistakes non alert individuals may make: (a) failure to recognize that assumptions were never or no longer are appropriate; (b) ignorance of new resource availability; (c) excessive optimism or pessimism about resource availability; (d) excessive optimism or pessimism regarding probable results of actions or decisions. the common thread in all these mistakes appears to be inaccuracy. the chain of inaccurate processing may begin with the non-alert individual simply following the human tendency to uncritically accept and use information only in its original form (the “concreteness principle,” slovic, 1972) or to unquestioningly accept the initial frame of reference (the “framing effect,” kahneman and tversky, 1986). if alert individuals are not making these kinds of cognitive processing mistakes, then it seems logical to conclude than an alertness schema includes a dynamic that induces skepticism about information perceived and that questions, if not challenges, the initial frame of reference. in fact, gunderson (1990) maintains that veridical perception simply means a willingness to challenge assumptions and perceptions, much like a good scientist. this leads to hypothesis 3: h3: there is a significant relationship between ignorance of new resource and excessive optimism or pessimism about resource and student’s entrepreneurial alertness. 2.2.4 accuracy vs. timeliness kirzner examines at considerable length the theoretical proposition that alert individuals have veridical (accurate) perception and interpretation. for example, the four forms of inaccuracy discussed above represent one type of threat to veridical perception. therefore, it would seem logical to conclude that accuracy is a major component of an alertness schema, perhaps even the driving force of the schema. from a psychological perspective, the issue of accuracy is somewhat problematic because accuracy can also be considered part of an individual’s motivation that triggers the activation of a particular schema. a central tenet of cognitive psychology is that people employ information processing tactics that best facilitate their goals (fiske, 1993; showers and cantor, 1985) and that one of the first decisions people must make, implicitly or explicitly, in any information processing episode is whether their goal is to be completely accurate or to act quickly. this stark choice minimizes a crucial and distinctive element of opportunity identification, that is its time limitedness. pockets of microeconomic disequilibrium can quickly change, be filled, or become exhausted. the window of opportunity when viewing macroeconomic changes is also limited and shrinks substantially as other actors see the opportunity and visibly exploit it. thus there is a need to balance perceptual accuracy with time-to-action or timeliness. even managers embedded in a corporate context recognize the time-limitedness of opportunities. weick (1979) argues that managers need to process information in ways that are just good enough to determine the course of action. he suggests that most managers stop their sensemaking activities when they have found the first plausible explanation or framework regardless of its accuracy (weick, 1995). isenberg’s (1986) detailed analysis of managerial decisionmaking appears to confirm weick’s supposition that managers feel more pressure to act than to be absolutely accurate in their analysis. in other words, what is proposed and observed in managerial decision-making is a simple application of march and simon’s (1958) satisficing concept where enough analysis is done to satisfy personal and peer expectations of adequate consideration and therefore, adequate accuracy. this leads to hypothesis 4: h4: there is a significant relationship between accuracy vs. timeliness and student’s entrepreneurial alertness. 2.2.5 schema complexity as noted earlier, an observable difference between experts and novices or between creative and non-creative individuals is the degree of schema elaboration, content complexity, and cross linkages with other schema. research into expert performance suggests that, beyond a certain level of preparation (which will vary by domain), experience and education do not inevitably lead to more elaborate and complex schema (bonner and pennington, 1991; camerer and johnson, 38 1991). what does lead to the increase in complexity necessary to achieve expert status are increasingly complex and hence veridical or realistic mental representations of causal patterns and interacting factors. the availability of these complex patterns as a single unit of information is the mechanism that produces comparatively more accurate, albeit very fast opportunity identification and problem solving in experts than in the novices (chase and simon, 1973; chi et al., 1982). therefore, we predict: h5: there is a significant relationship between schema complexity and student’s entrepreneurial alertness. 2.2.6 schema change – counterfactual thinking counterfactual thinking (e.g., what if; if only, etc.) is a fairly normal response to unexpected events (roese and olsen, 1995). however, we would expect alert and non-alert people to use counterfactual thinking in different ways. nonalert individuals most likely use the typical strategy for dealing with the unexpected which is to mentally undo the unusual circumstance that caused the unexpected outcome. mentally undoing the unusual highlights its abnormal quality but also shifts focus back to the usual, that is, towards normalcy. this kind of counterfactual thinking may be one of the cognitive mechanisms for discounting. on the other hand, if alert individuals increase the complexity of their schema and change their schema to accommodate novel events, we would expect alert individuals to mentally maintain the unusual circumstance and use counterfactual thinking to undo other elements in the causal sequence as he or she imagines how the unusual information will affect other elements or other schema. furthermore, it is possible that alert individuals undo several causal links, which would lead them to break the existing means-end framework. therefore, we would predict: h6: there is a significant relationship between schema change – counterfactual thinking and student’s entrepreneurial alertness. 2.2.7 schema change – framebreaking the alert individual’s extraordinary abilities in discernment that lead to a conclusion about changing times and events, while necessary, do not inevitably lead to the identification or creation of entrepreneurial opportunities. opportunity identification at this level (that is, breakthrough or innovative) depends on the alert individual using his or her insights about disequilibrium to recognize when it becomes necessary to radically reconfigure his or her understanding of the industry, or society, or the marketplace, or more probably, all three. kirzner (1985) refers to this as breaking the existing means-ends framework. he considers this step to represent the heart and soul of entrepreneurial alertness and to be the strongest point of difference between entrepreneurs and other market actors. nonentrepreneurial decision-makers focus on how to work effectively within the existing framework; that is, they attempt to make good decisions about how to allocate their scarce resources in order to maximize return. the belief that breaking the existing mean-ends framework is a necessary step for genuine innovation can also be found throughout the creativity empirical literature (amabile, 1983; csikszentmihalyi, 1996). given the central importance of framebreaking to the theory of entrepreneurial alertness, we would predict that alert individuals would be more likely to break the existing means-ends framework and indeed, there is some preliminary evidence that this is a crucial step in the identification of entrepreneurial opportunities (gaglio, 1997). h7: there is a significant relationship between schema change – frame-breaking and student’s entrepreneurial alertness. 2.2.8 sensitivity to profit potential finally, there is one more perceptual and cognitive component to an alertness schema based on kirzner’s theory of entrepreneurial alertness: the individual’s sensitivity to profit potential. this sensitivity can be reflected in the schema in at least two ways. first, the individual may direct his or her attention to find under-priced products, services, processes, and so on. secondly, the individual may include the question “how can i make money at this” as part of the assessment process itself. this situation is analogous to the differentiation in the innovation literature between invention and innovation. invention may involve the identification of a new idea or opportunity but it only becomes an innovation when the invention or idea is translated into a form that demonstrates its economic potential (kirzner, 1979; schumpeter, 1971; timmons, 1999). kaish and gilad (1991) tried to test this proposition in 39 their early study of alertness and found quite the contrary: founding entrepreneurs appeared to be more sensitive to downside risk while corporate managers were more attracted to the market potential. however, the data collection method used in their study (survey of past behaviors) relies on retrospection; this technique confounds the processes of opportunity identification and opportunity evaluation so, in fact, the question of sensitivity to profit potential still requires a definitive empirical test. it is entirely possible that alert individuals are more sensitive to commercial value of ideas and are able to quickly identify or create entrepreneurial opportunities but as they move on to implementation, they become more sensitive to the downside risks as it becomes more apparent that their careers are on the line with each new venture launch (ronen, 1983). mindful that theory development requires making important analytical distinctions such as that between opportunity identification and evaluation, we predict that at the identification state, alert individuals will be more sensitive to the commercial value or profit potential of facts and ideas. h8: there is a significant relationship between sensitivity to profit potential and student’s entrepreneurial alertness. 3. research method 3.1 sample and procedures the sample was composed of 115 m.a. students from the university of sistan & baluchestan for the years 2012 and 2013. to measure student’s attitudes towards these factors we use a questionnaire that contains four items in demographic information and 43 items in likert’s methods from 1 (very low) to 5 (very much). to ensure validity of the scale content, the components of the attitude area were determined. then, the researcher formulated for each section of the scale. these items were classified and arranged according to the content of each section of the attitude scale. before putting the scale in its final form, the researcher validated the scale by submitting it to a panel of experts in the area of research. the experts were requested to evaluate the items of the scale, and to suggest any changes they considered appropriate in terms of the objectives of the scale, item formulation, and their suitability to the level of the students. to estimate the reliability of the scale, the cronbach alpha test was used, being one of the most appropriate methods to measure the reliability of attitudinal scales. the result was 0.72, which is considered a high value for reliability. the analyses were conducted using spss 22. 3.2 analysis and results table 1 shows demographic information of these samples. table 1 demographic data of samples. type result gender male female 40.9 59.1 age 20-30 30-40 95.7 4.3 field management economic accounting entrepreneurship 43.5 20 13 23.5 year of entrance 2012 2013 37.4 62.6 3.3 hypothesis testing table 2 represents mean, variance accounted and the pearson's correlations among all variables. all tests done on a level under 1% (p<0.01). results show that alertness is significantly correlated with recognizing events of disequilibrium, changing schema vs. information, cognitive error control, accuracy vs. timeliness, schema complexity, schema change – counterfactual thinking, schema change – frame-breaking and sensitivity to profit potential. table 2 means, standard deviations and correlation among variables. variable mean s.d. pearson correlation sig. market disequilibrium 3.76 .91 .309 .001 ignorance of new resource 2.76 1.08 .016 .867 excessive optimism or pessimism about resource 2.88 1.09 .086 .381 accuracy vs. timeliness 3.95 .73 .412 .000 schema complexity 4.17 .75 .245 .008 counterfactual thinking 3.87 .93 .306 .001 frame-breaking 3.58 .99 .338 .000 sensitivity to profit potential 3.98 .84 .245 .006 according to the data collected and based on assessments, six factors which have the most 40 significant effect on the entrepreneurial alertness summarized in figure 1. 4. results and discussion hypothesis 1 predicts that recognizing events of disequilibrium is significantly related to student’s entrepreneurial alertness. as expected, the effect of recognizing events of disequilibrium on student’s entrepreneurial alertness was positive and significant (r=.309, p<0.01). the results corroborate the kirzner (1979, 1985) study that the alert individual is especially sensitive to signals of market disequilibrium, which can occur at the macroeconomic and microeconomic levels. hypothesis 2 indicates that changing schema vs. information is significantly related to student’s entrepreneurial alertness. as expected, the effect of changing schema vs. information on student’s entrepreneurial alertness was positive and significant (r=.412, p<0.01). fiske (1993), kiesler and sproull (1982) assert that if the actor places a higher value on quick action or if he or she feels it is socially desirable to adhere to a schema, then the actor will either discount the new information or engage in elaborate reinterpretations that maintain the structure and dynamics of the existing schema. hypothesis 3 predicts that ignorance of new resource and excessive optimism or pessimism about resource is significantly related to student’s entrepreneurial alertness. as expected, the effect of ignorance of new resource and excessive optimism or pessimism about resource on student’s entrepreneurial alertness was not positive and significant (r=.016, p<0.01; r= .086, p<0.01). the results corroborate kirzner (1985) study that identified several other assessment mistakes non alert individuals may make: (a) failure to recognize that assumptions were never or no longer are appropriate; (b) ignorance of new resource availability; (c) excessive optimism or pessimism about resource availability; (d) excessive optimism or pessimism regarding probable results of actions or decisions. hypothesis 4 predicts that accuracy vs. timeliness is significantly related to student’s entrepreneurial alertness. as expected, the effect of accuracy vs. timeliness on student’s entrepreneurial alertness was positive and significant (r=.412, p<0.01). a central tenet of cognitive psychology is that people employ information processing tactics that best facilitate their goals (fiske, 1993; showers and cantor, 1985) and that one of the first decisions people must make, implicitly or explicitly, in any information processing episode is whether their goal is to be completely accurate or to act quickly. hypothesis 5 predicts that schema complexity is significantly related to student’s entrepreneurial alertness. as expected, the effect of schema complexity on student’s entrepreneurial alertness was positive and significant (r=.245, p<0.01). the results corroborate chase and simon (1973) and chi et al. (1982) study that the availability of these complex patterns as a single unit of information is the mechanism that produces comparatively more figure 1 the role of market on entrepreneurial alertness 41 accurate, albeit very fast opportunity identification and problem solving in experts than in the novices. hypothesis 6 predicts that schema change – counterfactual thinking is significantly related to student’s entrepreneurial alertness. as expected, the effect of schema change – counterfactual thinking on student’s entrepreneurial alertness was positive and significant (r=.306, p<0.01). hypothesis 7 predicts that schema change – frame-breaking is significantly related to student’s entrepreneurial alertness. as expected, the effect of schema change – framebreaking on student’s entrepreneurial alertness was positive and significant (r=.338, p<0.01). kirzner (1985) and gaglio (1997) predicted that alert individuals would be more likely to break the existing means-ends framework and indeed, there is some preliminary evidence that this is a crucial step in the identification of entrepreneurial opportunities. hypothesis 8 predicts that sensitivity to profit potential is significantly related to student’s entrepreneurial alertness. as expected, the effect of sensitivity to profit potential on student’s entrepreneurial alertness was positive and significant (r=.245, p<0.01). kaish and gilad (1991) tried to test this proposition in their early study of alertness found that entrepreneurs appeared to be more sensitive to downside risk while corporate managers were more attracted to the market potential. as noted earlier, in the question of paper, anyone claiming an interest in the opportunity identification process among entrepreneurs would have to address the essential issues of how market environments are represented in the minds of entrepreneurs and whether these representations differed from those of other market actors in any substantial way. this article has detailed a conceptual model and research agenda designed to answer these questions based on a comprehensive and cognitive approach to the theory of entrepreneurial alertness. logic and expediency dictate that compelling answers to the first and last issues should be formed before pursuing the remaining questions. furthermore, the issue of motivation for both alert and non-alert actors will require more consideration than time and space permit here. it is our hope that this article prompts a fruitful line of research and debate that will lead to improvements in theories about alertness, opportunity identification, and entrepreneurship. ultimately results showed that there is significant relationship between market disequilibrium, accuracy vs. timeliness, schema complexity, counterfactual thinking, frame-breaking and sensitivity to profit potential and student’s entrepreneurial alertness; but the relationship between ignorance of new resource and excessive optimism or pessimism about resource and student’s entrepreneurial alertness was not significant. 5. references ardichvili, a., cardozo, r., ray, s., 2003. a theory of entrepreneurial opportunity identification and development. journal of business venturing, 18 (1), 105–123. bonner, s. e. and n. pennington, n., 1991 cognitive processes and knowledge as determinants of auditor expertise, journal of accounting literature, 10, 1–50. camerer, d. f. and e. j. johnson, 1991, the processperformance paradox in expert judgment: how can the experts know so much and predict so badly? in k. a. ericsson and j. smith (eds.), towards a general theory of expertise: prospects and limits, cambridge: cambridge university press, pp. 195–217. chase, w. g. and h. a. simon, 1973, the mind’s eye in chess, in w. g. chase (ed.), visual information processing, new york: academic press, 215–281. chi, m. t. h., r. glaser and e. rees, 1982, expertise in problem solving, in r. s. sternberg (ed.), advances in the psychology of human intelligence, 1, hillsdale, nj: erlbaum, 1–75. drucker, p. f., 1985, innovation and entrepreneurship, new york: harper and row. eckhardt, j.t., shane, s., 2003. opportunities and entrepreneurship. journal of management, 29 (3), 333–349. fiske, s. t. and s. e. taylor, 1991, social cognition, 2nd ed., new york: mcgraw hill. fiske, s. t., 1993, social cognition and social perception. annual review of psychology, 44, 155–194. gaglio, c. m., 1997a, opportunity identification; review, critique and suggested research directions, in j.a. katz (ed.), advances in entrepreneurship, firm emergence and growth, 3, 139–202, gaglio, c. m., 1997b, the entrepreneurial opportunity identification process, ph.d. thesis, university of chicago. gunderson, g., 1990, thinking about entrepreneurs: models, assumptions and evidence, in c. a. kent (ed.), entrepreneurship education, new york: quorum books, 41–52. isenberg, d. j., 1986, thinking and managing: a verbal protocol analysis of managerial problem solving, academy of management journal, 29(4), 775–778. kaish, s., gilad, b., 1991. characteristics of opportunities search of entrepreneurs versus executives: sources, interests, general alertness. journal of business venturing, 6, 45–61. 42 kahneman, d. and a. tversky, 1979, prospect theory: an analysis of decision under risk, econometrica, 47(2), 263–291. kiesler, s. and l. sproull, 1982, managerial response to changing environments: perspectives on problem sensing from social cognition, administrative science quarterly, 27, 548–570. kirzner, i.m., 1979. perception, opportunity, and profit. university of chicago press, chicago. kirzner, i.m., 1985. discovery and the capitalist process. university of chicago press, chicago. kirzner, i.m., 2008. the alert and creative entrepreneur. a clarification. research institute of industrial economics, stockholm se. march, j. g. and h. a. simon, 1958, organizations, new york: wiley. mitchell, t. r. and l. r. beach, 1990, toward an understanding of intuitive and automatic decision making, organizational behavior and human decision processes, 47, 1–20. ronen, j. (ed.), 1983, entrepreneurship, lexington, ma: lexington books. roese, n. j. and j. m. olson (eds.), 1995, what might have been: the social psychology of counterfactual thinking, mahwah, nj: lawrence erlbaum. sarasvathy, s., dew, n., velamuri, s.r., venkataraman, s., 2005. three views of entrepreneurial opportunity. in: acs, z., audretsch, d.b. (eds.), handbook of entrepreneurship research, 1(3), 141–160. shane, s., venkataraman, s., 2000. the promise of entrepreneurship as a field of research. academy of management review, 25, 217– 226. shaver, k. g. and l. r. scott, 1991, person, process, choice: the psychology of new venture creation, entrepreneurship theory and practice, 16(2), 23–45. sherman, s. j., c. m. judd and b. park, 1989, social cognition, annual review of psychology, 40, 218–326. short, j.c., ketchen, d.j., shook, c.l., ireland, r.d., 2010. the concept of “opportunity” in entrepreneurship research: past accomplishments and future challenges. journal of management, 36, 40–65. showers, c. and n. cantor, 1985, social cognition: a look at motivated strategies, annual review of psychology, 36, 275–305. slovic, p., 1972, from shakespeare to simon: speculations and some evidence about man’s ability to process information, oregon research institute bulletin, 12. timmons, j. a., 1999, new venture creation, boston, ma: irwin mcgraw-hill. venkataraman, s., 1997. the distinctive domain of entrepreneurship research. advances in entrepreneurship, firm emergence and growth, 119–138. weick, k. e., 1979, cognitive processes in organizations, in b. m. staw (ed.), research in organizational behavior 1, greenwich, ct: jai press, 41–74. weick, k. e., 1995, sensemaking in organizations, newbury park, ca: sage. vol8no3paper2ojinga to cite this article: ojinaga, e.r.p. (2018) exploratory study of competitive intelligence in mexico. journal of intelligence studies in business. 8 (3) 22-31. article url: https://ojs.hh.se/index.php/jisib/article/view/326 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index exploratory study of competitive intelligence in mexico eduardo rafael poblano ojinagaa* atecnológico nacional de méxico/instituto tecnológico de la laguna, mexico; *pooe_65@hotmail.com journal of intelligence studies in business please scroll down for article editor-in-chief: klaus solberg søilen included in this printed copy: mapping the structure and evolution of jisib: a biblipmetric analysis of articles published in the journal of intelligence studies in business between 2011 and 2017 exploratory study of competitive analysis in mexico eduardo rafael poblano ojinaga pp. 22-31 competitive and technology intelligence to reveal the most influential authors and inter-institutional collaborations on additive manufacturing for hand orthoses journal of intelligence studies in business v ol 8 , n o 3 , 2 0 1 8 j ou rn a l of in telligen ce s tu d ies in b u sin ess issn: 2001-015x vol. 8, no. 3 2018 leonardo a. garcia-garcia pp. 32-44 and marisela rodríguez characterizing business intelligence tasks, use and users in the workplace. leonardo a. garcia-garcia pp. 45-54 and marisela rodríguez josé ricardo lópez-robles, jose ramón pp. 9-21 otegi-olaso, rubén arcos, nadia karina gamboa-rosales, and hamurabi gamboa-rosales a competitive intelligence model based on information literacy: organizational competitiveness in the context of the 4th industrial revolution selma leticia capinzaiki ottonicar, pp. 55-65 marta lígia pomim valentim, and elaine mosconi exploratory study of competitive intelligence in mexico eduardo rafael poblano ojinagaa* a tecnológico nacional de méxico/instituto tecnológico de la laguna, mexico corresponding author (*): pooe_65@hotmail.com received 13 november 2018 accepted 24 december 2018 abstract in order to increase their competitiveness, companies need information for problem analysis, to develop strategies and for decisions making. one way to achieve this is through methodologies, among which competitive intelligence stands out. for pellissier & nenzhelele (2013) competitive intelligence is a process or practice that produces and disseminates actionable intelligence by planning, ethically and legally collecting, processing and analyzing information from and about the internal and external or competitive environment in order to help decision-makers in decision-making and to provide a competitive advantage to the enterprise. because of its importance this paper presents an investigation using a meta-analysis methodology of 72 papers published between 2000 and 2015 of applications of competitive intelligence in méxico. in recent years the practice of competitive intelligence has been increasing in méxico, though its use is not yet widespread. this is why it is important to disseminate and promote the growth of competitive intelligence theory. keywords ci practices in méxico, competitive intelligence, meta-analysis 1. introduction companies need useful information to develop strategies, make decisions and implement them through the organization in order to increase their competitiveness and market share. competitive intelligence (ci) is a designed methodology that stands out to improve decision making. for prescott & miller (2002) ci is any intelligence function that provides a competitive advantage. ci has become an important part of north american business due to the need for companies to keep abreast of technological changes, reduce associated risks, and invest in the acquisition of advanced technology (calof & smith, 2010). however, in mexico, its use is only beginning and there is an opportunity to determine where and how it is being applied. to identify the critical factors in mexican ci practices, a systematic review (sr) of literature was carried out using a meta-analysis (ma) (moher et al., 2009). for basu (2017), ma is essentially a systematic review, but the analysis also pools the results of the studies and provides conclusions. glass (1976) proposed ma as a method of analysis of disorganized knowledge for its integration and organization. it is a process based on statistical methods, or the statistical analysis of a knowledge body searching for valid synthesis. ma uses statistical techniques to integrate the results of the included studies. even though the methodologies developed for ma have been carried out mainly in the social, medical and psychological areas, some recent ma applications have been in the mexican manufacturing industries such as demand and kanban flow (valles et al., 2006); manufacturing (collins, 2007); cellular manufacturing (noriega et al., 2010); and project management (garcía, 2016). in mexico the majority of the theoretical and empirical publications on ci theory are focused journal of intelligence studies in business vol. 8, no. 3 (2018) pp. 22-31 open access: freely available at: https://ojs.hh.se/ 23 on describing the implementing process of ci. publications also cover different approaches where ci can be applied successfully. however, most of these articles do not identify or mention the contributors in which the success of ci practices reside. therefore, it is necessary to carry out a review of the published literature to thoroughly analyze each paper and identify critical factors in the success practices of ci in méxico. the present article carrys out a ma in order to identify the main contributors that impact or influence the success of the application and implementation of ci in méxico. 1.1 description of the problem in mexico, the majority of theoretical and empirical publications on ci theory are focused on describing the implementing process of ci. publications also cover different approaches where ci can be applied successfully. however, most of these articles do not identify or mention the contributors in which the success of ci practices reside. therefore, it is necessary to carry out a review of the published literature, thoroughly analyzing each paper/article and identifying critical factors in the success of ci practices in méxico. 2. literature review ci is defined as any processable intelligence that can provide a competitive advantage (porter and millar,1985). it is a systematic, goal-oriented, ethical and timely effort to compile, synthesize and analyze information of the external environments, such as competition and markets (fleisher, 2009). it also is considered a process of legally and ethically gathering and analyzing information about competitors and the industries in which they operate (scip, 2016). ideally, the use of such information in decision making process aims to adjust activities to improve performance (wright et al., 2009). corporate intelligence, business intelligence, market intelligence, and other similar terms are often used interchangeably, and more often than not, any difference between them is one of semantics more than substance (scip, 2016). the ci process consists of the following steps: monitoring business environment (external data, information and knowledge), gathering, analyzing, filtering and disseminating intelligence that will support decision making process in order to increase competitiveness and improve position of organization (nasri,2012). the cycle of intelligence provides a frame of reference for the management of ci research projects, in such way that projects can be continuously developed, systematically and adhoc (tena & comai, 2001). it is a fundamental basis of the strategic decision-making process (dishman & calof, 2008). in the literature, coincidence is identified in relation to the following processes of the competitive intelligence cycle (miller, 2001; rodriguez, 2005; bose, 2008; dishman and calof, 2008): planning and direction, collection of information, analysis of information, dissemination and feedback. the first phase (planning), focuses on the identification of the needs to gather the relevant information (second phase); then, in the third phase the information collected must be evaluated, determine its usefulness and objectivity, and with this information generate intelligence (third phase) and subsequently, communicate it appropriately to the interested table 1 description of three themes 24 parties (dissemination). the fourth phase requires adequate policies and procedures so that the ci can make a positive contribution to the organization. the importance of the ci cycle lies in its understanding of the stages and support for its application in organizations. in order to identify papers on ci practice in mexico, a search for publications from 2000 to 2015 was carried out. they were identified through the bivir database integrator (of the autonomous university of juarez-uacj), which has 30 databases (including annual review, ebsco, elsevier, emerald, sciencedirect, and wiley), and then perform a debugging of the papers found based on reading the introduction, summary and conclusions. after the phases of identification and selection of the sr, 43 articles out of 72 were considered. to facilitate the review, the articles were grouped into three types: 1) applications in industry, services and the environment; 2) applications in academia and 3) articles of disclosure / dissemination; as presented in table 1. 2.1. narrative summary of the literature by generic themes 2.1.1 applications in the industry, services and environment alcántar (2001) describes the development of the practice of ci in the oil industry in mexico; lozano (2003) proposes a pragmatic view about the advantages and disadvantages of patent analysis; huerta et al. (2003) identify basic design elements to create a ci unit; rodríguez (2003), presents a patent analysis of an advanced materials case; lechuga et al. (2007) apply cti in the search of information about several seawater desalination processes; esquivel et al. (2008) propose to perform information extraction tasks from corporate news published on the web to provide intelligence; saad (2009) uses ci to determine technological trends in biotechnologyphytoremediation; chávez et al. (2010) make use of ci in hotels and restaurants; vera (2011) proposes an intelligence strategy for mexican wine companies to increase their competitiveness; lópez & alcántara (2011) describe the implementation of a system of competitive and technological intelligence (cti) to sustain strategic decisions in wastewater treatment; rodríguez & tello (2012) present a methodology that integrates patent analysis in a study of cti applied in a plastics industrial sector. millán (n.a) identify the most used practices related to ci of export companies in sinaloa; rodríguez & salinas (2012) apply ci to investigate and identify drivers that support the decision making of a plastics company; rodríguez-borbón et al. (2013) present the design of a ci model for horticulturalists in southern sonora; montiel et al. (2014) use ci in the bond industry in mexico; rodríguez et al. (2014a) apply patent analysis as part of a cti methodology on open die forging, also develop a patent analysis on additive manufacturing (rodríguez at al., 2014b); ahumada & perusquia (2016) propose a set of factors for the development of the capacity to manage the knowledge applied for the expansion of business intelligence. regarding to the integration of ci with other approaches, some papers are about a qfd deployment of the quality function application (rodríguezsalvador et al., 2006), kansei engineering in the design of stoves (rodríguez and moreno, 2011), blue ocean strategy (rodríguez and bautista, 2011), and applications of total quality management with ci (rodríguez et al., 2007). 2.1.2 applications in academia rodríguez & gaitán (2002) propose a holistic model for teaching cti, integrating collaborative learning; the learning of cti for future strategic improvements (rodríguez & mora, 2000) and to improve the identification of opportunities (rodríguez et al.; fuentes et al.) present a methodology that incorporates cti with methodologies of design and product development for a learning environment of an engineering laboratory; gutierrez et al., analyze the degree of acceptance of high school students in the business intelligence and development program as a proposal for competitiveness in universities. for research and development centers, lopez & alcántara (2010) present the first results of a methodology proposed to implement a cti system; and lópez-martínez (2011) proposes the application of ci and data mining for the identification of patterns that reveal the structure of scientific research and applied research, as well as their concordance in the surroundings of a country; luna & solleiro (2007) explain intellectual property 25 management in centers of mexican research: the case of the institute mexican oil. 2.1.3 disclosure / dissemination articles rodríguez & valdez (2003) present a review centered on the importance of the cti systems for the detection of innovation opportunities and threats; mier (2003) emphasizes the importance of ci as a factor to build a technological tradition in organizations; rincón-a & ortiz (2005) present an overview on the analysis in technological intelligence; güemes and güemes & rodríguez (2007) clarify the situation of the innovation structure used by mexican companies and their relationship with ci practices; bertacchini et al. (2007) present a case studies in mexico & in gafsa university from territorial intelligence to ci & sustainable system; solliero et al. (2009) identify the state of the art and trends of the cti through the analysis of the literature; gonzález (2011) describes the link between two tools of technology management: the cti and the management of knowledge to achieve business competitiveness through technological innovations; gonzález (2012) proposes an electronic cluster for the competitive development of small & medium companies based on ci actions. vizcarra et al. (2012) offer information that highlights the usefulness of ci by analyzing concepts that describe the application of this development and entrepreurship; cantú et al., (2011) deepen the analysis of previous work concerning the building of national system of cti and suggest a theoretical systemic framework to constitute it; and sánchez-lópez (2012) presents the implementation of a ci and technological surveillance portal; perezvillarreal & valdez-zepeda (2014, 2015) propose a system based on ci as a fundamental factor to increase chances of electoral success in political campaigns. 3. methodology the flow of information of the phases (identification, screening, eligibility and included) of a sr/ma proposed by prisma statement (mohoer et al., 2009) is shown in figure 1. the eight steps of the ma methodology (noriega et al., 2010) were applied to generate statistical support and to obtain a high grade of confidence about the papers for the study. the steps of the ma methodology are described as follows: figure 1 four phases flow diagram of the meta-analysis. 26 1. problem definition. in this step the problem must be clearly and precisely defined. in this case, it was defined as the determination of ci factors that can be obtained in successful ci practices. 2. identification of the information sources and the studies to be analyzed. once the boundaries of the meta-analysis are determined, then, all the studies that fit within those bounds are to be determined. the purpose of this step is to list the sources of the literature. in this research the total number of studies considered was 72, among them are research papers and conference proceedings. 3. information discrimination. in this step, the information is classified according to the degree of scientific strictness, credibility and confidence. for this purpose, a set of inclusion and exclusion criteria is developed and it is applied to all the documents, excluding the papers that do not fulfill the criteria. this is one of two quality filters. in this step, it was reduced from 72 to 43 papers. 4. publications database. the purpose of this step is to generate a papers database with the aim of facilitating the management, localization and treatment of the information gathered. 5. evaluation of articles. the purpose of paper evaluation is to determine, based on the stated criteria, whether or not an article should be included in the ma. at this stage, a questionnaire of 13 items (adapted from garcía, 2016) was applied to all the table 2 data for all papers used in the meta-analysis. 27 documents. each document is judged and assigned a grade according to a likert scale from 1= not important to 4= most important. in this step, it was reduced from 43 to 18 papers. 6. classification and coding of information. in this process, the extraction of data from each study is based on a coding sheet that specifies what data to extract and a key that interprets the various aspects conducted. the coded information is summarized to identify moderating variables, to be used to group studies for conducting ma. 7. statistical analysis. in this step, the aim is to apply the statistical methods to the studies that were selected for inclusion in the ma. the selection of the appropriate ones depends on the specifications of the comparisons to be made. for this research, the statistical treatment began with the normality test applied to the final results, an anderson darling test was applied (for sample size, n<30). if the data shows a normal behavior, a difference in means test is to be used in the next step. the differences in means test was done to determine the relative contributions of the factors and to establish the most important factors. minitab was used for statistical analyses. 8. generation of conclusion. this is the last step of this methodology, which consists of interpretation of the results obtained and generates the conclusion for the defined problem. a ma result is simply evidence that may be used in the attempt to integrate results from multiple studies. also, the assumptions necessary for the ma should be evaluated for the adequacy of the study. 4. results in this section, the results obtained from the ma of ci practices literature are presented. the total number of studies considered was 72, including research and conference proceedings. in the identification phase, it was reduced to 62 papers. later, a first quality filter (screening phase) excluded 19 records, and then each document was judged and assigned a rating according to a likert scale (second quality filter). in this step, the records were reduced from 43 to 18 items (eligibility phase). table 2 shows the author, year and title of each paper. the next step was the determination of the success factors that are critical for ci practices (table 3). for this step the frequency of each factor was summarized. a total of nine critical factors (cf) were found in the documents reviewed. the cfs in order of decreasing importance are: analysis of information; decision making, opportunities and threats; information search and extraction, dissemination of information; generation of information/intelligence. once the total frequency was tallied, a normality test was required. the results are table 3 success factors identified figure 2 normality test for the nine success factors identified figure 3 analysis of means for the success factors identified. 28 shown in figure 2. the approximate p-value = 0.012, and the significance was above 0.01, so it is safe to assume that the data is normally distributed and it is adequate to perform a parametric test. the next step was the application of a poisson analysis of means (anom). the test determined that 3 of the 9 factors can be considered critical (with the exception of factor 7 having sufficient evidence). these were number 2 (information analysis); 8 (decision making), and 7 (identification of opportunities and threats), shown in figure 3. 5. final remarks this research shows, as a first approximation, the critical success factors (csf) identified for the practice of ci in mexico. this research takes over the interest of identifying the variables of competitive intelligence (güemes & rodríguez, 2007), and intends to present a new perspective for ci professionals and researchers in mexico. the findings show that at least 18 articles out of the 43 mentioned csf in different cases or approaches. therefore, research to find the most important csf in the practice of ci is a contribution to the field. regarding the application of ma in engineering areas, as well as the adaptation of ma procedures to the ci framework of research practices, this can be considered successful. in mexico, the main practice of ci is a variation with a strong emphasis on science and technology and its impact on research and development activities (dou & massari (2001) quoted by dou and manullang (2004)). in this study the term cti is understood as a type of ci. results supports the claim that in mexico ci is an emerging practice. although it is taking place in both the public and private sectors, it still has a long way to go in policies to improve its development, as well as in infrastructure and the creation of entities to support this activity (rodríguez, 2005). as shown in this review, some mexican companies conduct ci practices to anticipate future changes, innovations with a high impact on the market, and to enter new market niches and develop new products. the main limitation of the study is the sample size (43). although we consider several issues that may allow for the validity of this study, hunter and schmidt (2000) say that for sample sizes in the range of 25 to 1600, the type i error for random effects is 5% for fixed effects with homogeneous cases. however, this search was exhaustive. both ma and ci are relatively new theories in mexican academia and industry. close to 95 % of méxico´s businesses have less than 16 employees, so we figure the sample is close to representative of the population. these results pinpoint the critical success factors of ci practice in méxico and help to define the course for new studies of this sort. 6. references ahumada, e., & perusquia, a. (2016). inteligencia de negocios: estrategia para el desarrollo de competitividad en empresas de base tecnológica. contaduría y administración issn 0186-1042 universidad nacional autónoma de méxico. alcántar, j. (2001). prácticas de inteligencia competitiva en la industria petrolera. revista expansión, 1–9. basu, a. (2017). how to conduct meta-analysis: a basic tutorial. bertacchini, y., rodríguez-salvador, m., & souari, w. (2007). from territorial intelligence to competitive & sustainable system. case studies in mexico & in gafsa university. in in international conference of territorial intelligence, huelva 2007. (pp. p-106). bose r. (2008). competitive intelligence process and tools for intelligence analysis. industrial management & data systems, 108(4). calof, j., & smith, j. (2010). the integrative domain of foresight and competitive intelligence and its impact on r&d management. r and d management, 40(1), 31–39. cantú, a., lópez, r., rodríguez, m., & güemes, d. (2011). representación de los elementos de un sistema nacional de innovación mediante el modelo de sistema sustentable. revista de ciencia y tecnología, (16), 49-57. recuperado en 11 de mayo de 2017. chávez, j., guerrero, j. y olguín, j. (2010). inteligencia de negocios y competitividad en hoteles y restaurantes del sur de tamaulipas, 1–25. sinnco 2010. colín, e.n. (2007). factores organizacionales que impactan en la aplicación exitosa de células de manufactura. tesis de maestría. material no publicado. instituto tecnológico de cd. juárez. 29 dishman, p. l., & calof, j. l. (2008). competitive intelligence: a multiphasic precedent to marketing strategy. european journal of marketing, 42(7/8), 766-785. dou, h., & manullang, s. d. (2004). competitive intelligence and regional development within the framework of indonesian provincial autonomy. education for information, 19, 125. esquivel i., tórres c., lópez, m., y juárez, g. (2008). las noticias empresariales en la web , como fuente de inteligencia competitiva. simposium internacional en sistemas telemáticos y organizaciones inteligentes. universidad veracruzana. fleisher, c. s. (2009). examining differences in competitive intelligence practice: china, japan, and the west by, 3000, 249–261. h fuentes, l., rodríguez, m. & vega, j. (n.ab). competitive intelligenece proposal for supporting a mechatronic laboratory in provate academic institute. centro de calidad y manufactura. itesm, campus monterrey. fuentes, l., rodríguez, m., vega, j. & frion, p. (n.aa). design and development of didactic equipment based on competitive and technical intelligence résumé. centro de calidad y manufactura. itesm, campus monterrey & laboratory cerege, university of poitiers, france.4334. garcía. h. (2016). modelo estructural de factores críticos de éxito para la gestión de proyectos industriales. tesis doctoral. material publicado. jefatura de posgrado e investigación. instituto tecnológico de cd. juárez. glass v. gene. (1976). primary, secondary, and meta-analysis of research, p. 3 8. gonzález h. (2011). la inteligencia tecnológica (it) en convergencia con la gestión del conocimiento (km) para la innovación tecnológica. gonzález, h. (2012). cluster electrónico para el desarrollo competitivo de mipymes a partir de acciones de inteligencia competitiva. faedpyme international review, norteamérica, 1, nov. 2012. güemes, d., y rodríguez, m. (2007). la relación entre la inteligencia competitiva y la capacidad innovadora de las empresas mexicanas puzzle: revista hispana de la inteligencia competitiva, 6(26), 21–27. gutiérrez, l., zuñiga, j. y gonzalez j. (n.a.). inteligencia y desarrollo de negocios cómo estrategia de competitividad en las instituciones de educación superior. facultad de contaduría y administración unidad norte. universidad popular autónoma del estado de puebla. 583–601. huerta, h., lozano, i. y ortiz, g. (2003). la creación de unidades de inteligencia competitiva en organizaciones de investigación y desarrollo. x seminario latino-iberoamericano de gestión tecnológica altec 2003 “conocimiento, innovación y competitividad: los desafios de la globalización.” hunter, j. e., & schmidt, f. l. (2000). fixed effects vs. random effects meta-analysis models: implications for cumulative research knowledge. international journal of selection and assessment, 8(4), 275-292. lechuga, j., rodriguez, m. y lloveras, j. (2007). análisis de los procesos para desalinización de agua de mar aplicando la inteligencia competitiva y tecnológica. ingeniería: revista académica de la fi-uady, 11(1665–529 x), 5–14. lópez, e, & alcántara, t. (2010). sistema de inteligencia tecnológica como sustento para el proceso de planeación estratégica en un centro de investigación y desarrollo tecnológico. red internacional de investigadores en competitividad, 4(1). lópez, e. & alcántara, t. (2011). implantación de un sistema de inteligencia tecnológica aplicado al tema de tratamiento de aguas residuales. lópez-martínez, r. (2011). uso de herramientas de minería de datos y de inteligencia tecnológica para identificar patrones de publicación y patentamiento en entornos nacionales, así como sus concordancias. universidad nacional autónoma de mexico, (august). lozano, i. (2003). el análisis de patentes en el mundo de la inteligencia tecnológica competitiva. revista hispana de la inteligencia competitiva, 2(8), 10–13. luna, k., & solleiro, j. (2007). la gestión de la propiedad intelectual en centros de 30 investigación mexicanos: el caso del instituto mexicano del petróleo. journal of technology management & innovation, 2(2), 157-169. mier, m. (2003). inteligencia competitiva: un factor importante para construir una tradición tecnológica. memorias de altec, méxico, 273–278. millán, n. (n.a.). la inteligencia competitiva de las empresas exportadoras sinaloenses. revista ciencia y universidad,(29), 25–40. miller, b. s. h. (2001). competitive intelligence -an overview. competitive intelligence magazine, 1(11). 1– 14. moher, d., liberati, a., tetzlaff, j., & altman, d. g. (2010). preferred reporting items for systematic reviews and meta-analyses: the prisma statement. international journal of surgery, 8(5), 336-341. montiel, h., magos, a. & ruiseñor, m. (2014). a competitive intelligence model where strategic planning is not usual : surety sector in mexico. international business research, 7(1), 1–13. nasri, w. (2012). conceptual model of strategic benefits of competitive intelligence process. international journal of business and commerce, 1(6), 25-35. noriega, a., chávez, a., sánchez, j., subramanian, a., aldape, a., & chavez, e. c. (2010). critical success factors of cellular manufacturing production. international journal of industrial engineering, special issue – mexico conference, 400-408, 2010. issn 1072-4761 pellissier, r., & nenzhelele, t. e. (2013). towards a universal competitive intelligence process model. south african journal of information management, 15(2), 1-7. pérez-villarreal, h., & valdez-zepeda, a. (2014). inteligencia competitiva en campañas electorales. pérez-villarreal, h., & valdez-zepeda, a. (2015). modelo estratégico cimentado en la inteligencia competitiva para contiendas electorales. sociedad e historia tomo i la labor investigadora e innovadora en méxico. jorge orozco robles (eds.). porter, m. e., & millar, v. e. (1985). how information gives you competitive advantage. prescott, j. f., & miller, s. h. (2002). proven strategies in competitive intelligence: lessons from the trenches. john wiley & sons. rincon-a., l. y ortiz, v. (2005). análisis en inteligencia tecnológica ¿qué es y para que sirve? multiciencia, 1–14. rodríguez salvador, m, & tello bañuelos, m. a. (2012). applying patent analysis with competitive technical intelligence: the case of plastics. journal of intelligence studies in business, 2, 51-58. rodríguez salvador, m., & gaitán, y. (2002). modelo holistico para la enseñanza de la inteligencia competiiva: integracion del aprendizaje colaborativo. puzzle, 4–10. puzzle-año 3, edición no. 13, septiembreoctubre, issn 1696-8573. rodríguez, m. & bautista, m. (2011). methodology of integration for competitive technical intelligence with blue ocean strategy: application to an exotic fruit. journal of intelligence studies in business, 1(1), 29–39. rodríguez, m. (2003). análisis de patentes en la inteligencia competitiva y tecnológica: el caso de los materiales avanzados. rodríguez, m. (2005). sistema nacional de inteligencia competitiva y tecnológica: educación para un desarrollo innovador. puzzle revista hispana de la inteligencia competitiva, 4(16), 12-19. puzzle 2005, issn 1696-8573. rodríguez, m. y moreno, s. (2011). propuesta de integración de la inteligencia competitiva y tecnológica con el kansei engineering en el diseño de estufas de inducción, 6(73), 831–846. rodríguez, m., zamudio, p., avila, a., olivares, e. & arrellano, b. (2014b). strategic foresight: determining patent trends in additive manufacturing. journal of intelligence studies in business, 4(3). rodríguez, m., & mora roldán, v. (2000). aprendizaje de la inteligencia competitiva y tecnológica para la innovación estratégica. centro de calidad y manufactura instituto tecnológico y de estudios superiores de monterrey (itesm), 64849(52), 1–9. rodríguez, m., güemes, d. & mora, m. (2007). linking a total quality management approach with competitive technical 31 intelligence résumé. centro de calidad y manufactura. itesm, campus monterrey. rodríguez, m., palacios, a., & cortez, d. (2014a). technical intelligence approach: determining patent trends in open die forging. journal of intelligence studies in business, 4(1). rodríguez. m. & salinas, l. (2012). applying competitive intelligence: the case of thermoplastics elastomers. journal of intelligence studies in business, 2(3), 41–47. rodríguez-borbón, m., corral, z., y lópez, m. (2013). diseño de un sistema de inteligencia competitiva del mercado de calabaza para productores del sur de sonora, méxico. el buzón del pacioli, 83 16-29.instituto tecnológico de sonora. rodríguez-salvador, m., mora-roldán, m., güemes-castorena, d., & valls-pasola, j. (2006). an approach to integrate quality function deployment with competitive technical intelligence: application on a new food product. saad, i. (2009). fitorremediación : estudio de inteligencia tecnológica competitiva, 1–15. sinnco 2009. sánchez-lópez, r. (2012). implementación de un portal de inteligencia competitiva y vigilancia tecnológica (master's thesis, iteso). scip, (2016). what is the difference between corporate intelligence and business intelligence?. solleiro, j., castañom r. y castillo, j. (2009). el estado del arte de la inteligencia tecnológica competitiva: tendencias y perspectivas. universidad nacional autónoma de méxico, (5), 69. tena-millán, j., & comai, a. (2001). los propósitos de la inteligencia en la empresa: competidora, cooperativa, neutral e individual. el profesional de la información, 10(5), 4-10. valles, a., sanchez, j., aldape, a., & colín, e. (2010). critical organizational factors in the success of cellular manufacturing applications: a meta-analysis case study. in iie annual conference. proceedings (p. 1). institute of industrial engineers-publisher. vera, a. (2011). estrategia de inteligencia comercial competitiva para las empresas vinícolas mexicanas. vizcarra, n., lópez, v. y guerrero, d. (2012). la inteligencia competitiva en las empresas de la ciudad de tijuana b.c. riaf, 5(5), 121–129. wright, s., eid, e. r., & fleisher, c. s. (2009). competitive intelligence in practice: empirical evidence from the uk retail banking sector. journal of marketing management, 25(9-10), 941-964. vol9no1paper3 to cite this article: søilen, k.s. (2019) how managers stay informed about the surrounding world. journal of intelligence studies in business. 9 (1) 28-35. article url: https://ojs.hh.se/index.php/jisib/article/view/370 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index how managers stay informed about the surrounding world klaus solberg søilena* adepartment of engineering, natural sciences and economics, faculty of marketing, halmstad university, halmstad, sweden *klasol@hh.se journal of intelligence studies in business please scroll down for article editor-in-chief: klaus solberg søilen included in this printed copy: exploring new ways to utilise the market intelligence (mi) function in corporate decisions: case opinion mining of nuclear power enhancing competitive response to market challenges with a strategic intelligence maturity model gianita bleoju and alexandru capatina pp. 17-27 how managers stay informed about the surrounding world journal of intelligence studies in business v o l 9 , n o 1 , 2 0 1 9 j o u r n a l o f i n t e llig e n c e s t u d ie s in b u s in e s s issn: 2001-015x vol. 9, no. 1 2019 klaus solberg søilena pp. 28-35 kalle petteri nuortimo and pp. 5-16 janne härkönen how managers stay informed about the surrounding world klaus solberg søilena* adepartment of engineering, natural sciences and economics, faculty of marketing, halmstad university, halmstad, sweden *corresponding author: klasol@hh.se received 3 march 2019 accepted 20 may 2019 abstract in this paper we look at how managers and knowledge workers stay informed about the events in the outside world that affect their organizations. data was collected using a survey of 308 subjects from around the world. a model for how managers stay informed is presented. we introduce the idea of the proprietary cloud. the findings have implications for managers who want to compare their own sources of information and improve routines for information gathering. keywords business intelligence, intelligence studies, knowledge management, the proprietary cloud, workplace learning 1. introduction how do managers stay informed about the outside world on issues and events that affect their business? this is one of the basic questions not only in intelligence studies in business, but in management and business in general. it’s a question that should be revisited at certain intervals as sources of information change, especially with new technologies and services. research on what managers read is scarce, which is surprising. instead academics tend to focus on more general questions of knowledge management (km), as shown in the theory chapter below. non-academic literature sources tend to focus on what famous people read (or say they read/perception) or on what those who sell management literature and literature in general say managers should read. another part of the literature on what to read takes the form of self-help, which shows how to cope with information overload and suggests how to handle stress. this can be quite banal. holmes (2018): “if all else fails, take a small break”. popular sources also focus on the problems with the information industry online and the fact that we are exchanging information for our privacy. for example, news organizations subject readers to third-party tracking (libert and pickard, 2015). this topic has been revitalized with the cambridge analytica scandal and the introduction of gdpr. griswold and nisen (2014) describe what successful business leaders read: warren buffet tells cnbc he reads the wall street journal, the financial times, the new york times, usa today, the omaha world-herald, and the american banker, and that is only in the morning. bill gates reads the wall street journal, the new york times, and the economist cover-to-cover, according to an interview with fox business. the danish programmer david heinemeier hansson reads reddit, hacker news, engadget, the economist, boing boing, and twitter. jeffrey immelt, the ceo of ge reads the wall street journal “from the center section out". afterwards he goes to the financial times and scans the ftindex and the second section: “i'll read the new york times business page and journal of intelligence studies in business vol. 9, no. 1 (2019) pp. 28-35 open access: freely available at: https://ojs.hh.se/ 29 throw the rest away”. charlie munger is devoted to the economist. nate silver, the fivethirtyeight editor-in-chief, starts with twitter, memeorandum, and real clear politics. later in the day he reads blogs like the atlantic, marginal revolution, and andrew sullivan (griswold and nisen, 2014). elon musk sticks out in his answer: “i read books” (gautam, 2018). many famous leaders and managers say they do their reading very early in the morning. they also exercise in the morning and do a lot of work then, which makes one wonder when they go to bed or if these answers can always be trusted. according to a paper by mckinsey & company (2017), leaders of some of the world’s biggest organizations are all reading a series of three to six books at the time, fiction and nonfiction, with everything from yuval noah harari, to leonardo da vinci and j. m. keynes. newspapers ask a similar question: what people have on the bedside table. it would be embarrassing to say that there was nothing there or that the books were just lying there half-forgotten. what is missing from these sources is what managers in general read for their organizations to stay competitive, as we cannot assume that they follow the example of the persons mentioned above. there is, in other words, a research gap in how the welleducated, or the knowledge workers, keep informed about the world. this is an important question as it to a large extent has a direct effect on our actions, thus on the way companies are run. we would like to know where the managers get their information from and how they try to adapt to changes in the business environment. such answers would also show what they do not read, which may be equally revealing. 2. method the population for this study is defined as any professional knowledge worker. a knowledge worker is an employee whose main capital is knowledge or who can be said to “think for a living”. a professional here simply means someone who is employed. thus, a more complete title for this paper could have been “how knowledge workers stay informed about the outside world”, but for clarity and simplicity we chose the shorter version: what managers read. a sample size of 1050 subjects were selected on linkedin by personal invitation. a pre-test was run for a general invitation but this resulted in few responses. respondents were widely spread across the western world, with about 1/3 of answers from africa, asia and south america. 326 complete answers were collected, where about half could be defined as “managers” and the other half as “knowledge workers”, but with a substantial overlap. a manager is a person who controls a staff of employees. we should have added this as a control question. no questions were removed from the survey after an initial pre-test which included some 25 respondents. about 20% of the complete answers were taken out because they were not precise enough, giving answers like [i read] “good competitive intelligence”. at the end, 308 complete answers were used in the analysis. answers of the same kind were omitted from table 1, but the number of similar answers was counted. the research strategy is a survey. the purpose of the research is exploratory, concentrating on three research questions: rq1: how do you as a manager stay informed about what goes on in the outside world that affects your company? rq2: what kind of newspapers, reports and tv/video do you access to stay informed about what is happening that affects your company? rq3: in what other ways do you stay informed about what is happening in the outside world that affects your company? the reasoning behind the choice of questions were as follows: questions should be exhaustive, repeating questions in detail (q2), asking for deeper answers (q3). the coding process: the data presented in the table went through a process in three stages: 1. clarifying and condensing meaning, 2. classifying key terms/notions and groups based on answers given, 3. placing the data in the appropriate group, and 4. counting occurrences of answers and weighing these with meaning in other answers in the same category (q1) and with other categories (q2 and q3). the raw data are available upon request. the extent of researcher interference has been minimal. the author’s own opinions and experience as relates to the rqs is kept out of the analysis throughout the paper. the study setting is non-contrived, meaning the people were interviewed in their normal environment, in front of their personal computer, tablets or 30 phones. the unit of analysis is individuals. the data collection method is surveys using the service surveymonkey and the analysis is qualitative. the time horizon for the research can therefore be said to be longitudinal. 3. theory when searching in scientific databases on the question of how managers stay informed we found few, specialized and diverse answers. suggestions of how to stay informed varied from participating in public policy discussion (ellis, 2002) to tweeting (turner, 2016). searches on phrases such as “what people read” or “how people stay informed” gave very different results in web of science and scopus, such as an article about what people read in france “between 1920 and 1950” (chesneaux, 1996) or a quick survey done in a french cinema magazine (ciment, 2008), related to cinema viewers only. the single largest amount of articles found refered to how to read the bible, or are specialized contributions like “letters in interwar new zealand”, or “the boer war and the invention of masculine middlebrow literary culture”. there was nothing substantial related to management or business. i realized this may also be symptomatic for the complicated way in which we have learned to write titles and frame problems as we avoid simple titles and subjects, even when they are good questions. instead the social sciences often try to resemble the way that problems and specializations are framed and developed in natural sciences, with over-complicated titles and concepts which make finding the information more difficult. these issues put aside, the general question of what to read has traditionally been studied under workplace learning and knowledge management, but there is hardly any area are of study in the social sciences that does not touch on the topic in one way or another. there is a substantial literature on news consumption. schrøder, k. c. (2019) summarizes key findings in an online paper thus: people find those stories most relevant that affect their personal lives, which they can share with friends and on social media, which are amusing or weird. at the same time, we do want to stay informed on all levels, also internationally. it follows that we are not very good at achieving what we set out to do as rational beings, which is confirmed by much of the neural sciences during the past decade. we want good news, but often end up with entertainment because it is tempting and easily accessible. the shared notion that news is everywhere is making us believe that we are well-informed or that it’s enough to read headlines. news avoidance is also a real issue discussed in this literature as news is seen as negative and we do not want too much negativity in our lives. other studies are focused on certain industries or sectors. kay (2001) looks at how professionals in the hospitality industry read. she found that a significant number of lodging professionals tend to read hospitality industry and general business publications instead of academic research journals, but that academic journals were rated higher by managers regarding usefulness as a source for information on research, employee management, marketing, hospitality industry, and general business, as well as professional and personal development. other papers and papers in general are less optimistic about the value of scientific articles. the link to business intelligence is made, for example, by schroeder (2015): “the widespread availability and accessibility of information via the internet and other sources means that employees at all levels and areas of an organization are often able to directly retrieve and use data in their day-to-day work. new forms of data and analysis are rapidly emerging, particularly from the web 3.0 technologies generating massive amounts of unstructured data that firms need to understand and utilize in pursuit of their business goals. these developments are resulting in a more data-conscious and datadriven business environment overall. firms need to ensure that their employees are equipped with the right skills and expertise to exploit the opportunities offered by this while also managing the risks, such as misinterpretation or inconsistencies in data use.” schroeder (2015) concludes that workers need the right skills and expertise to identify, interpret and apply relevant data and knowledge, and the organization must provide an overall environment that is supportive of and promotes data-driven activity. a manager looking for practical advice may wonder what the specific skills are, but this has not been a focus in the scientific literature. liebowitz (2016), on strategic intelligence: 31 “if we make this assumption, then knowledge is at the root of this equation and thus, the ability to leverage knowledge electively internally and externally should be a core competency for the organization. all this points to the area of “knowledge management” for competitive advantage.” liebowitz, j. (2016) explain the difference between ci and km as follows: “with business intelligence, the use of analytics (davenport and harris, 2007) and advanced information technologies often applied to assist the decision maker. competitive intelligence (ci) deals with establishing a program for collecting, analyzing, and managing external intelligence (such as competitors, environmental scans, etc.) to improve organizational decision-making. knowledge management (km), as we discussed in the last chapter, looks at leveraging knowledge both internally and externally, but typically has an inward focus on maximizing human capital and other intellectual assets in the organization. together, the synergies among these three areas (bi, ci, and km) can result in what the author calls “strategic intelligence” (si).” mckenzie, et al. (2012) suggest that the best way to make employees inspired to learn about the world is by reducing hierarchies. this frees people to use their knowledge more responsively; geographical dispersion gives better access to specialist expertise wherever it exists. in the book “understanding the knowledgeable organisation: nurturing knowledge competence” mckenzie and van winkelen (2004) make similar observations. the notion of tacit knowledge was introduced by nonaka (2007). tacit knowledge consists partly of technical skills – the kind of informal, hard-to-pin-down skills captured in the term “know-how.” a master craftsman after years of experience develops a wealth of expertise “at his fingertips”: “these activities define the “knowledgecreating” company, whose sole business is continuous innovation. deeply ingrained in the traditions of western management, from frederick taylor to herbert simon, is a view of the organization as a machine for “information processing.” there is another way to think about knowledge and its role in business organizations. it is found most commonly at highly successful japanese competitors like honda, canon, matsushita, nec, sharp, and kao. “the centerpiece of the japanese approach is the recognition that creating new knowledge is not simply a matter of “processing” objective information. rather, it depends on tapping the tacit and often highly subjective insights, intuitions, and hunches of individual employees and making those insights available for testing and use by the company as a whole.” the idea that a company is not a machine, but a living organism, leads to the evolutionary approach. it’s not an accident that this comes from a japanese scholar. the evolutionary approach was well-developed in germany and japan and interest prolonged also after wwii. the narrative is often the same. social life on our planet is consistently changing. managers and professional must adapt to these changes to stay competitive. adapting to these changes first of all means getting new knowledge and skills. new knowledge and learning come predominantly through education and reading. what managers chose to read has a direct effect on how well the organizations that they are set to lead are able to compete in the market. the question then becomes what to read. the answer will to a large extent depend on the industry that we are in. cultural factors also play a role. the evolutionary approach is also supported in mckenzie, et al. (2012): “tension is essential to a healthy system: it triggers adaptation.” from the theory review it must be concluded that the question of what mangers should read has not been the object of scientific investigation, and thus represent a gap in the research. existing theory will be used to compare empirical findings and to conduct an analysis. 4. data and analysis the answer data from the three main questions from 308 subjects was exported into ms excel. comments about sources could be classified into general sources, humint related sources, specific sources, internet-based sources and tv and radio sources, as in table 1. when reading the different classes of data, we see that the separation between tv and internet is not that clear, even though it still make sense to keep this classification. nor is there a clear distinction between physical 32 papers and the internet as different sources, including radio, are digitalized and available over the internet. a subscription to, for example, the economist can give access to the physical journal and the web-based journal, as part of the same subscription. from the data we can draw a number of immediate conclusions: • no one said they read books • new media companies are dominating as providers of competitive information: google, youtube, linkedin, facebook, twitter • people watch tv news first of all, to the extent that the content is available on youtube • trade shows are a major source of information • radio is not a significant source of information anymore, with the exception of in places like the african continent and to a certain extent in france • humint is still considered highly relevant for information gathering, on all levels and across organizations. this includes “coworkers and colleagues”, but also gossip and “friends in the media”. • many managers say they get their best information through emails, from google and the act of googling. this makes google llc the single most important source for competitive intelligence. • a number of reports are widely popular, for example from oecd, imf, and the world bank, but those are also distributed by the major consulting companies. • most managers read a combination of their local and/or national news and international news. • the most popular sources offline are the economist, wsj, and ny times. there is a strong notion that “open source is mostly noise”. this implies that managers are willing to pay for good information because searching in open source is often found to be a waste of time. it may also mean that managers feel they are not able to search effectively in open source. table 1 sources of knowledge for managers and knowledge workers. general sources magazines, tech magazines, professional newsletters, financial column in newspaper, business report, online newspaper feeds, social media feed, regular gazettes, blogs, vlogs, scientific papers, regulatory bodies, significant movement or activities in the market, consultancy services and media monitoring services, internal financial data, operational activities, technological advancements, annual reports, events and congresses, focus on credibility of information, previously acquired, subscribing to specialists on macro-economics, reports from business consultancies from big 5, continuously update internet crawl targeting, corporate news of relevance that feeds into a news dissemination intranet system, press releases of companies, scientific community, industry whitepapers, internet forums, gossip humint engaging suppliers, channel partners, competitors. keep a keen eye on sectors, events and people, journalists covering the sector, rely on communication department, peers in other regions, personal network and relationships with top officials, media friends, discussing topics with co-workers and partners, competitor analysis, competitor’s employees, a friend circle with successful people, informal meetings with experts, events organized by embassies or trade associations, coworkers and colleagues specific sources economic times, financial times (ft), khaleej times, gulf news, (brazilian) national industry confederation reports, ghanaian times, daily guide, business and financial times and the dispatch, the economist, autonews, automobilwoche, manager magazine, focus, handelsblatt, il sole 24 ore, business insider, forbes, bbc, in sweden: dn, svd, di, hbr, nrc, handelsblad, le monde, le figaro, mit review, verge, techcrunch, mckinsey q, bcg, bain, deloitte, wef, goldman sachs, the guardian, el païs, ubs, exane, barclays, times higher education, qs world ranking, guardian league table, fortune internetbased linkedin, youtube, gmail alerts, google search, emails, thinkerview, diane, orbis, kompass, tedx, reuters, specialized tech content (gartner, idc), cb insights, infodesk, swedish tax organizations information, wikipedia, crunchbase, mapegy, clarivate, foresight, resumé, journalisten, dagens media, medievärlden, digiday mediaguardian, nieman lab, reddit, google news tvradio cnn, sky news, cnbc, bloomberg, gtv (ghana), france info, aljazeera, euronews, france culture, joy newstv (ghana) 33 humint plays a large role as a source of information, but no one mentions travelling by itself as a source of learning about the world, which is something westerns used to value highly (søilen, 2016). today it seems to be more asian which are “roughing it”, while western youth prefers “to party” and have fun. this may be symptomatic for the decline of the west, as julius caesar surely would have noted if he had lived today [he warned his own youth against the rise of the germans in the book the gallic wars]. from the answers, the managers’ information gathering can be divided into three parts or distinct activities: listening, reading and watching. these correspond to our most important senses for information gathering, hearing and seeing. based on these conclusions and on the existing theory presented above, a model was constructed to make sense of the different components, as shown in figure 1. in figure 1, the larger square box represents all the information available. inside that box most information is open source and most of this is considered ‘noise’, or at best nice-to-know information. the opposite of open source (which is free) is proprietary. proprietary information comes in many categories, as part of what we read, what we hear (as in consultancy), in what we watch and as part of the entertainment we consume. at the same time there are parts of the same four categories that are also open source. the smaller box is the proprietary cloud. i’s called a cloud because it is hanging over the available information we search for, often in the form of barriers, or information behind paywalls. what we read, see and listen to are the groups of categories where we actively seek to gain new information. these groups are placed in a funnel in the model, where the amount of information retained diminishes with time. what comes out of the funnel is the information that we use which is only a small part of all the information we take in from the beginning (to of funnel). the reason is that we forget parts of what we read even in the shorter term (memory loss) and that the situations we are confronted with in business life only demand that we use a very small part of what we read. thus, what comes out of the funnel is a function of memory retention and the use we have of information that was acquired. the information age means that information is in abundance, but this is a mixed blessing as most information is “useless, trivial and distracting”. thus ‘noise’ is a major problem in the process. the challenge with noise is not to put any of it in the funnel, meaning that we must disregard it from the very beginning once it has been identified. we can use ai and machine learning to help us sort out the noise, much like in spam filters figure 1 the manager’s model for staying informed. 34 so far, the model presented could make an ideal model in an ideal world, but theory suggests there are other components to be added. one part is that we mix intelligence with entertainment as we search. we are continuously being drawn to other tempting sorts of information that are distracting and stealing our time, but which at the same time we seek. humans are not machines. we do not spend all of our working time even gathering and analyzing intelligence. instead we have a need to take pauses, perform other tasks (out of necessity and to avoid monotonies), and we want to be entertained. entertainment has never been more accessible than now with the internet (not only cat and dog movies). thus, these three parts may be seen as a necessary part of the information gathering process for it to work, and must be included in our model to make it more realistic. a major question is how good the sources that are identified above in the survey are for the purpose of monitoring the world. this brings us to the second major question which is what alternative sources of information there are that are missed by the respondents in the survey. those included are overall mainstream. we see that those missing are non-western. a more detailed answer is that major external sources are missing like the tv stations cgtv (pro china) and rt (pro russia), often labeled as propaganda channels by westerners. then there are narrower western channels like democracy now! (tv) and the economic blogs zero hedge and naked capitalism. there are numerous university professors in business and economics who blog regularly, like michael hudson, steve keen and richard wolff, none of whom tend to appear on mainstream lists of economic bloggers. even main stream bloggers like robert reich, stephen stieglitz and paul krugman are missing from the survey. institutional blogs are also missing like imf, the mises institute and council on foreign relations, just to mention a few. another problem altogether is that many respondents say they use twitter, but we do not know who they are following which makes a whole world of difference. from the major papers we miss china daily and asahi news (japan). otherwise there are numerous newspapers in japan and pakistan with large circulation but their impact is more local. then there are the major magazines missing like der spiegel, newsweek, time magazine, foreign affairs, harpers, new statesman, the spectator, and focus (german). for france: l’express, le point, l’obs and jeune afrique. in italy: l’espresso and panorama. wikileaks was another major source of information missing even though many probably read or see the stories coming from there but printed in other media outlets. 5. conclusion, implications and future research there are two main conclusions to be drawn from the data. the first is what is in the data, which is what managers and professionals say they read. the other is what is implicit in the data that is what is missing, what respondents do not read. we see that managers mainly read mainstream and western sources. that is not a major problem for the companies as long as valuable information comes from these sources, which is not given. it is a risk that these sources present the same world view, especially as the western world is losing economic influence to asia and china in particular. western managers have a knowledge deficit when it comes to their major competitors and to asian cultures which can be seen through what they read, but more so, what they do not read. it’s noteworthy to see that managers do not read more books and scientific articles. radio is probably better than the attention it gets from managers as a source of valuable information. we also see that few respondents read news agencies directly except for reuters. they do not read smaller, narrower publications except for special trade magazines or for specific industries. the survey also suggests that managers and professionals read more heuristically, not necessarily what gives the most valuable information, and they do not read in an organized fashion. the competitive company is an intelligence driven organization. this is more true today than ever before in history. still it can be argued that managers and knowledge workers in general are not handling the question of what to read professionally. instead much is ad-hoc and based on habit. others know that they have to get good information to know what is happening in the world, but fail to access it. learning is not only a question of what the individual reads, but of spreading the message around repeatedly through frequent dialogue and communication. on this point, managers report that they do quite well. 35 6. future studies this and other studies focus primarily on what people say they read. more studies are needed on what managers actually read, what they recall from reading and what they actually use to make decision. there is another question almost equally important and that is how to read, from what platforms. this raises another question which is when to read what. as we have seen from popular sources, managers say they read early in the morning, but they also prefer to eat and exercising during this time and the morning is only so long. it would be interesting to know how much time we are using on each of the different categories of sources. we are changing back and forth between sources much more than before. this leads to news as a series of distractions which is deteriorating our concentration in general. the consequences of this on our understanding of what we read will have to be studies, but preferably then by psychologists and neuroscientists. 7. references chesneaux, j. (1996). popular literature-what the people read from 1920 to 1950. quinzaine litteraire, (698), 32-33. ciment, m. (2008). survey (survey of what people read). positif, (563), 108-111. davenport, t. h., harris, j. g., jones, g. l., lemon, k. n., norton, d., & mccallister, m. b. (2007). the dark side of customer analytics. harvard business review, 85(5), 37. ellis, b. (2002). stay informed: participate in public policy discussion. acm siggraph computer graphics, 36(2), 13-22. gautam, s. /2018, june 22). what the top, successful managers are reading…and you should too! [blog post]. retrieved from https://medium.com/flock-chat/what-topsuccessful-managers-are-readingba47e40bd99e (accessed 2019-06-04) griswold, a. nisen, m. (2014). what 16 successful people read in the morning. business insider, jan. 24, 2014. accessed 2019-06-03 holmes, l. (2018). how to stay updated on the news without losing your mind. huffington post. 2018-01-12. accessed 2019-06-03 libert, t., & pickard, v. (2015). think you’re reading the news for free? new research shows you’re likely paying with your privacy. the conversation, 6. accessed 2019-06-03 liebowitz, j. (2016). beyond knowledge management: what every leader should know. auerbach publications. kay, c. (2001). what do managers read? a survey of journals and periodicals used by lodging managers in the hospitality industry. journal of hospitality & tourism education, 13(3-4), 76-86. mckinsey&company (2017, july). what ceos are reading in 2017. [white paper]. retrieved 2019-06-04, from https://www.mckinsey.com/~/media/mckinsey /featured%20insights/leadership/what%20c eos%20are%20reading%20in%202017%20pa rt%20i/what-ceos-are-reading-in-2017part-1.ashx mckenzie, j., van winkelen, c., & aitken, p. (2012, september). developing effective change leadership to build the knowledgeable organisation: a paradoxical foundation. in european conference on knowledge management (p. 726). academic conferences international limited. mckenzie, j., & van winkelen, c. (2004). understanding the knowledgeable organization: nurturing knowledge competence. cengage learning emea. nonaka, i. (2007). the knowledge-creating company. harvard business review press. schroeder, h. m. (2015). knowledge, learning and development for success in the new business environment: an art and science approach. development and learning in organizations: an international journal, 29(5), 10-12. schrøder, k.c. (2019). what do news readers really want to read about? how relevance works for news audiences. digital news publications. accessed 2019-06-03 søilen, k.s. (2016). a research agenda for intelligence studies in business. journal of intelligence studies in business, 6(1). turner, p.l. (2016). stay connected and informed: start tweeting. bulletin of the american college of surgeons, 101(6), 25-26. vol6no1paper3 fourati-jamoussi and niamba to cite this article: fourati-jamoussi, f. and niamba, c.n. (2016) an evaluation of business intelligence tools: a cluster analysis of users’ perceptions. journal of intelligence studies in business. vol 6, no 1. pages 37-47. article url: https://ojs.hh.se/index.php/jisib/article/view/141 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index an evaluation of business intelligence tools: a cluster analysis of users’ perceptions fatma fourati-jamoussia and claude narcisse niambab institut polytechnique lasalle beauvais-esitpa, 19 rue pierre waguet, bp 30313f-60026 beauvais cedex, france; afatma.fourati@lasalle-beauvais.fr; bnarcisse.niamba@lasalle-beauvais.fr journal of intelligence studies in business please scroll down for article an evaluation of business intelligence tools: a cluster analysis of users’ perceptions fatma fourati-jamoussi* and claude narcisse niamba institut polytechnique lasalle beauvais-esitpa, 19 rue pierre waguet, bp 30313f-60026 beauvais cedex, france *corresponding author: fatma.fourati@lasalle-beauvais.fr received 11 february 2016; accepted 18 march 2016 abstract the purpose of this paper is to discuss and evaluate the use of business intelligence (bi) tools by professionals and students to help designers of these tools get the most efficiency out of a monitoring process. this paper explores the business and competitive intelligence literature. bi is considered to be a new area in information systems, so literature research was conducted in the area of management information systems (mis) with two evaluation models: task-technology fit and technology acceptance to evaluate bi tools. a questionnaire was sent to users of business intelligence tools addressed to french companies in different trades and engineering students and the most pertinent replies were examined. the responses were analyzed using the statistical software spad. results showed a typology from the various profiles of users of this technology using the method of classification. we note different perceptions between professional and student users (the clients). although this study remains focused on individual perspective, it requires more examination of the organizational impact of the use of bi tools. the identification of the different user profiles was done by using a cluster analysis. for the designers of bi tools these results highlight the importance of user perception, suggesting designers take into account the perception of all user types. as these tools develop, more and more companies will be looking for skills for monitoring and management of strategic information. keywords business intelligence, cluster analysis, tam model, ttf model, user perception 1. introduction in recent years, the emergence of information technology and knowledge has improved the completeness of data collecting in order to ensure a better ability to classify information and knowledge through the use of artificial intelligence. business intelligence (bi) now has better tools able to identify the interests of users and facilitate the analysis and dissemination of information and knowledge. bi is considered to be a separate and scientific discipline dominated by engineers and programmers (solberg soilen, 2015). adamala and cidrin (2011) attempted to analyze what the factors are that influence bi. sabanovic and solberg soilen (2012) defined bi as: “an analytic application, […], that enables a wide range of users to access, analyze and act on integrated information in the context of the business processes and tasks that they manage in a given domain…” these authors showed that there is a positive correlation between company size and usage of bi systems. they used and developed a purchase and employment layer (pet) model of bi implementation to identify companies’ understandings, expectations and needs in terms of bi systems. nyblom et al. (2012) journal of intelligence studies in business vol. 6, no. 1 (2016) pp. 37-47 open access: freely available at: https://ojs.hh.se/ 38 proposed a model for evaluating the performance of bi software systems by using five criteria: efficiency, user friendliness, satisfaction, price and adaptability. their results showed that the choice of system used is related to the individuals’ experience. amara et al. (2012) developed and tested a solberg søilen amara vriens (ssav) model for the evaluation of bi software to facilitate the user’s selection tool. by generating more relevant information, these tools seem likely to influence the process of decision making in the company. despite this important role of business intelligence, little research has addressed the interaction between the monitoring tools and their users. this article addresses the issue of the identification of business intelligence tools and the evaluation of professional and student perception by putting this technology in the business intelligence process. the management of information and knowledge poses three major challenges related to three basic needs: the analysis of structured and unstructured data, the measurement of the user perception on monitoring tools and the identification of user categories. from these three challenges, our approach seeks to answer two key research questions: 1. how can we make the choice between different monitoring tools to collect, to process and to disseminate information? 2. what are the characteristics of the use of monitoring tools? in the second section, we define the concepts of "competitive intelligence", "business intelligence", "strategic intelligence" and "bi or monitoring tools". in the third section, we propose the approach of our study and the research method. in the fourth section, we present our results on the monitoring tools developed within the higher education institution and the companies surveyed and classification of users of this technology in their perception. conclusions are drawn in the sixth section. 2. conceptual background historically, a business company is listening to its changing environment (customers, suppliers, competitors, government and web) to identify indicators that have an influence on its present and future activity. over time, some companies have integrated this process into their organization by seeking information about their environments. this process has become an autonomous research field. aguilar (1967) pioneered research on strategic intelligence and he defined this concept as the gathering of external information on events and trends of the environment. he showed support for the identification and understanding of the threats and opportunities of strategic processes. thus, during the last fifty years, researchers have in turn spoken of organizational intelligence (wilenski, 1967; choo, 1998), business intelligence (gilad and gilad, 1988) and intelligence of business (lesca and chokron, 2000) before the more recent appearance of the "competitive intelligence" and "business intelligence" concepts. competitive intelligence is regarded as a specialized branch of business intelligence. solberg soilen (2015) proposed the classification of intelligence studies to help us to place different forms of intelligence and to show how they related to each other. the first concept aims to collect and analyze data on specific and generic competitive environments, while the second focuses on the current competitors and can analyze areas such as potential acquisitions-mergers and evaluate specific country risks (lesca and caron fasan, 2006). in the case of competitive intelligence, herring (1998) defines this process as a number of separate activities; it is a continuous cycle which includes the following levels: level 1: human collaboration • planning and management: working with decision makers to discover and identify their needs in an intelligent way. level 2: content sharing • data collection: conducted in a legal and ethical manner (using general search agents, meta-search engines, personalized web crawlers). • data analysis: data interpretation and compilation of relevant data (text mining, platforms of monitoring). • dissemination of information: presentation to decision makers of what was analyzed (kahaner, 1998; ruach & santi, 2001). 39 • return: effectively taking into account the response of decision makers and their needs presented intelligently and continuously. level 3: platforms standby and software • the technological infrastructure for automating tasks. these tools increase the exhaustivity of the collection to ensure a better ability to rank and prioritize information (processing and analysis). the purpose of these applications is to provide everyone with the information enabling them to manage their business and thus achieve their objectives and optimize performance. besides the organizational revolution induced by the implementation of these tools, business intelligence has a considerable impact on the technological infrastructure of the company. first, the success of business intelligence is based on the ability to compile and analyze all available information. the volume of data to be processed can be considerable. for example, billions of lines published every day on supermarket receipts are valuable masses of information, but so are big data extracted and processed from operational systems. one specificity of business intelligence tools is their remoteness and independence from operational systems. these are tools that affect the strategic level of the organization. this separation is to avoid penalizing operational systems asking them to ensure heavy processing (sorting, extraction, computing). it also helps protect operational data by authorizing a posteriori analysis. it is therefore necessary to extract information from massive operational systems to inject into specific tools for "data warehousing" into multidimensional databases. the frequency of these extractions should be adapted to the analytical (daily, weekly, monthly) needs. finally, these extractions should allow the creation of a series of historical periods that can be shorter or longer as needed. these volumes should be protected not only because of their size but because of the sensitivity and confidentiality of any information they contain. since the end of 1990s, business intelligence has evolved in its definition according to the phases covered (lesca 2001; ruach and santi, 2001) and according to the tasks assigned. anticipative and collective strategic intelligence (vas-ic, or veille anticipative stratégiqueintelligence collective; lesca h, 2003) is the collective and proactive tool by which members of the organization perceive, process, choose and use relevant information about their external environment and the changes that occur therein. the use of vas-ic aims to help and create business opportunities, to innovate, to adapt to the changing environment, to increase responsiveness at the right time to avoid strategic surprises and to reduce risks and uncertainty. its main feature is to help the building of a proactive vision for decisions in the short, medium or long term. the objective is to act quickly at the right time and the lowest cost. the business intelligence process was to find, interpret and transform relevant information useful to the action of decisionmakers (blanco, 1998). ten researchers have contributed to the definition of strategic intelligence (including thietart, 1981; morin, 1985; marmuse, 1992; walls et al 1992; lesca, 2000,2001,2003). whatever the terminology used, all these notions express the fact that the strategic intelligence process is a voluntary process by which the company tracks, assimilates and disseminates information from the external environment for its use for action. it is also a process in which actors interact on a voluntary basis, according to objective, with information systems. thus, we move from process of information to its use and from use to the action. theoretically, monitoring tools are used and integrated into the business intelligence process. for a long time, business intelligence was confined in the upper echelons of business leaders. providing dashboards to some officials, the business intelligence tools were used to control and manage. democratization of these tools will facilitate common dissemination of information traditionally limited to the leaders to all levels of the company, making business intelligence an ideal tool for performance management (sakys and butleris, 2011; adamala and cidrin, 2011). the articles published in the journal of intelligence studies in business since 2011 focus on developing and testing models to evaluate bi systems and software. following these studies, new problems have emerged including differentiating bi vendors (solberg soilen and hasslinger, 2012) and classifying bi software based on their functionalities and performance (amara et al. 2012; nyblom et al. 2012; abzaltynova and williams, 2013). 40 3. methodology 3.1 data collection the study concentrated on a certain number of variables stemming from the literature in information systems, which join the problem of the evaluation of the bi tools used within the framework of the process of strategic intelligence. a questionnaire was built and tested by two specialists in the field of the conception of bi tools (lesca and caron-fasan, 2006; grublješič and jaklič, 2014). through this study, we tried to show the use of the watch tools and their applications. the survey was built with the aim of operationalizing the variables of the theoretical model as well as profiling the users who answer this survey. it was designed and diffused to 200 professionals. only 78 responses were usable for clustering of user’s monitoring tools (these respondents were from six sectors: 1) consulting/engineering; 2) commercial enterprises; 3) it; 4) electric and electronics; 5) financial enterprise; and 6) industry). this survey was also diffused by mail to 80 engineering students at lasalle beauvais institute (sector 7) of which 56 responded. 3.2 logic of the study to evaluate and compare the user profiles, the selected criteria were taken from the theoretical fusion of two models: technology / task fit (goodhue and thompson, 1995) and the technology acceptance (davis, 1989; venkatesh et al., 2003) as part of the literature on the evaluation of information systems: variable i: the dimension “task characteristics” was explained by: a. complexity of the task b. interdependence between the tasks variable ii: the dimension “technology characteristics” was measured by: a. bi tools used b. functionalities of bi tools: were the capacities of the system to help individuals or group determined by the type of system used (benbasat and nault, 1990; wierenga and van bruggen, 2000). the tasks presented in the questionnaire were: search information, store, process and extract a large quantity of information, resolve the semantic and syntactic problems. variable iii: the dimension “task/technology fit” aims to evaluate the user perception towards the used system. it is defined by the degree of correspondence between the functional needs relative to the task and the technical features offered by the information technology. it was explained by five criteria: a. data quality: measured the correspondence between needs and the available data, it also measured the exactness of these available data by using bi tools and the quality of data at a level of detail suitable for the tasks. b. localization of data: measured the ease of determining the availability and the exact sense of data (the existence in due course and under the deliberate size of public information). c. authorization of access: measured the accessibility of data (ease of connection and ease of extraction of public information). d. data compatibility: between the various sources of data. e. relevance of the system: making sure that bi tools did not raise unexpected problems or difficulty of use. variable iv: the dimension “intensity of bi tool use” was explained by: the intensity or frequency of use: it was a subjective appreciation of the increase or the decrease of the degree of use. the intensity depended on the integration of the bi system (grublješič and jaklič, 2014) and on the strategy adopted by the company. variable v: the dimension of the acceptance of bi technology: inspired by the “technology acceptance model” of davis (1989), this dimension was explained by: a. ease of use of the bi tools (davis, 1989): measured the degree of faith of a user in the effort to supply in order to use the system. to measure the ease of use, we referred to the measuring instrument of davis (1989) which consists of six items, 41 proven valid and reliable by doll and torkzadeh (1998). b. perceived utility of the bi tools: this element was not directly measurable. this notion came from microeconomic analysis: it was the measure of the use value of hardware or software for a user. it measured at the same time the impact of bi tools on productivity and quality. the perceived utility was defined by the degree of improvement of the performances expected from the use of the system (davis, 1989). c. satisfaction of the bi tools user: this was the degree of continuity of use by the individual. it was a positive faith of the individual perception which showed the value of bi tools. this variable was considered as a dimension of success of bi tools (sedden, 1997). it could influence the intention, but it was also a consequence of the use (delone and mclean, 2003) of the utility and the ease of use perceived. d. intention of bi tool’s use: the manager can accept a system but decides when he uses it or plans to use it in the process of decisionmaking. the intention of a user to use a system adopted by the organization as well as its satisfaction by this use depended on the utility and on the ease of use perceived from the system. 4. results and discussion descriptive statistics have been used in order to show population characteristics. we have used spss.19 to treat data. in total, 60.4% of respondents were male and 39.6% were female. furthermore, 17.2% of respondents were 23 years or less, 30.6% were between the ages of 23-26 years, 24.6% were between the ages of 27-35 years and 27.6% were 36 years or older. finally, our sample of users was composed of 58.2% students and 41.8% professionals (table 1). according to table 2, about 36% of respondents used general tools such as search engines and other free tools (such as google search, google alert and netvibes), while 45% used specialized tools like databases of patents or sector studies (such as espacenet, patenscope and xerfi), and a final 19.4% used platforms to monitor the competitive environment and social networks (such as cognos, business objects, sas, sindup and digimind). around 29% of respondents didn’t frequently use monitoring tools, 44.8% used them sometimes or often and 26.1% always used them. table 1 demographic profile of respondents (n = 134). char = characteristic. char. descriptor distribution (percentage) gender male 60.4 female 39.6 age < 23 years 17.2 23-26 years 30.6 27-35 years 24.6 > 36 years 27.6 occupation student 58.2 employed 41.8 table 2 tool usage and characteristics. char = characteristic. char. descriptor distribution (percentage) tool general tools 35.8 specialized tools 44.8 platforms 19.4 frequency of use never 8.2 rarely 20.9 sometimes 15.7 often 29.1 always 26.1 4.1 result 1: link between technology and tasks (appendix a. cluster analysis 1) a cluster analysis was applied to the data using the spad software. the aim was to classify the respondents in groups in order to know their characteristics. three main groups were identified: the first group contained 52 persons, the second one 35 persons and the third one 47 persons. the first group was composed of the persons who agreed with the fact that it is easy to find the location of data using key words. they also agreed with the link between the tasks and the work. according to the quality of the data, these people agreed that the data were up to date and facilitated their job. they disagreed 42 with the fact that they can’t obtain the data useful for their job. the technological tool (sindup) was very useful for their job and no problems were encountered with its use. these people were mostly from the sector of consulting and engineering (sector number1). the second group was composed of the persons who agreed with the fact that they were involved in tasks which deal with problems. they found it difficult to deal with the data sources. moreover, it was difficult to have the authorization to get the data, which were not always updated. for these people, it was not easy to find the location of the data through key words. in the third group, people also found that it was difficult to have the authorization to get the data but they didn’t agree that the tasks in which they were involved dealt with problems, particularly with data sources. these people were students of lasalle beauvais (sector number 7) 4.2 result 2: individual perception of tools (appendix b. cluster analysis 2) in this second phase of the analysis, two distinct groups: the first was composed of individuals from the it sector while those of the second group were mostly students. individuals in group 1, 83 in number, were satisfied or very satisfied with the sindup tool (information gathering, user interface, information processing) and more generally of monitoring tools. the functions of tools were generally well received (research and information extraction, processing and storage). individuals in group 2, numbering 51, were instead indifferent or even disagreed with the usefulness of monitoring tools including the sindup tool. they had a poorer perception of their duties and were unhappy. this was explained by the fact that this group of students used a new intelligence platform for the first time. user satisfaction was gained through experience and frequency of use. 5. conclusion the business intelligence process was to find, interpret and transform relevant information useful to the action of decision-makers. we presented the bi software systems that were studied by many authors that emphasized a different set of factors divided into three perspectives: organization, process and technology. we focused our article on the technology perspective and the evaluation of bi tools by proposing a cluster analysis of users’ perception and a classification of these tools used (general, specialized tools and platforms). technology-task fit and technology adoption models have been applicable to specific information systems, we adapted these models to bi tools, and this is a main theoretical finding. regarding the managerial implication, the first technology-task fit model showed three groups in those who used business intelligence tools, ranging from source identification to the dissemination of information. based on the innovation adoption model (rogers, 2003), we can see that the profile of the first group of users can be part of an advanced monitoring unit. the second and third groups of users were latecomers in adopting this technology. finding the monitoring tools not flexible, this implies the dissatisfaction with the quality of service offered by this technology may be due to limited use. two opposite groups were identified in the second technology adoption model, the first group is aware of the perceived usefulness of these monitoring tools and the second is not satisfied as completely as the first users of a platform (sindup) as part of a monitoring project. the difficulty lies in the appropriation of this tool by students and its adaptation to the selected bi project. regarding the users’ perceptions towards the bi tools, we suggested more attention from bi software vendors that should be integrated in their differentiation strategy with many key success factors. finally, we conclude that a bi tool implementation in a company is accompanied by organizational changes, which are sometimes cultural, where the financial impact (price) wasn’t negligible. this would explain, in part, why this technology is mostly used in large companies. for future research, we will adapt our survey to our student population to evaluate their perception of bi tools as part of their project, we will integrate a learning variable in our model that can play the crucial role in the success of a bi project. we will try to study the correlation relationships between the variables of the proposed model. 6. references abzaltynova, z. and williams, j. (2013) developments in business intelligence 43 software, journal of intelligence studies in business, no. 2: 40-54. adamala, s. and cidrin, l. (2011) key success factors in business intelligence. journal of intelligence studies in business, vol. 1, no. 1: 107-127. aguilar, f. j. (1967) scanning the business environment. macmillan, ny: macmillan. amara, y., solberg soilen, k., vriens, d., (2012) using the ssav model to evaluate business intelligence software, journal of intelligence studies in business, no. 3: 29-40. benbasat, i., nault, b.r., (1990) an evaluation of empirical research in managerial support systems, decision support systems, vol. 6. blanco, s. (1998) gestion de l'information et intelligence stratégique : cas de la sélection des signes d'alerte précoce de veille stratégique. th. doctorat sciences de gestion, grenoble 2 upmf, cerag. choo, c.w. (1998) information management for the intelligent organization: the art of the scanning the environment, medford, nj: information today inc. davis, f.d., (1989) perceived usefulness, perceived ease of use, and user acceptance of information technologies, mis quarterly, vol. 13, no. 3. delone, w.h. and mclean, e.r., (2003) the delone and mclean model of information success: a ten-year update, journal of management information systems, vol. 19, no. 4. doll, w. j. and torkzadeh, g., (1998) developing a multidimensional measure of system-use in an organizational context, information and management, vol. 33. giald, b., and giald, t. (1988) the business intelligence system, a new tool for competitive advantage, new york: amacom. goodhue, d. l. and thompson r. l., (1995) tasktechnology fit and individual performance, mis quarterly, vol. 19, no. 2. grublješič, t., and jaklič, j., (2014) customer oriented management practices leading to bis embeddedness, online journal of applied knowledge management, vol. 2, issue 1: 1127. herring, j. p., (1998) what is intelligence analysis?, competitive intelligence magazine, vol.1, no 2 http://www.scip.org/news/cimagazine_article. asp?id=196 (current september 1, 2003) kahaner, l. (1998) competitive intelligence: how to gather, analyze and use information to move your business to the top, touchstone. lesca, h., and chokron, m., (2000) intelligence d’entreprise : retours d’expériences, aim. lesca, h., (2001) veille stratégique pour le management stratégique. etat de la question et axes de recherche, in economies et sociétés, série sciences de gestion, sg no. 20. lesca, h., (2003) veille stratégique, la méthode lescanning. ems. lesca, n. and caron-fasan m-l (2006) veille anticipative, une autre approche de l’intelligence économique, lavoisier, paris. marmuse, c. (1992) politique générale: langage, intelligence, modèles et choix stratégiques, paris, economica. morin j. (1985) l’excellence technologique, publiunion, paris. nyblom, m., behrami, j., nikkilä, t., solberg soilen, k., (2012). an evaluation of business intelligence software systems in smes-a case study, journal of intelligence studies in business, no. 2: 51-57. rogers e., (2003) diffusion of innovations, the free press, new york, 5th edition. ruach, d. and santi, p., (2001) competitive intelligence adds value: five intelligence attitudes, european management journal, vol. 19, no. 5. sabanovic, a., (2012) customers’ expectations and need in the business intelligence software market, journal of intelligence studies in business, no. 2: 5-20. sakys, v. and butleris, r. (2011) business intelligence tools and technology for the analysis of university studies management. transformations in business and economics, vol. 10, no. 2: 125-136. seddon, p.b., (1997) a respecification and extension of the delone and mclean model of is success, information systems research, vol. 8. solberg soilen, k., (2015) a place for intelligence studies as a scientific discipline, journal of intelligence studies in business vol 5, no. 3: 34-46. solberg soilen, k., and hasslinger, a., (2012) factors shaping vendor differentiation in the business intelligence software industry, 44 journal of intelligence studies in business, no. 3: 48-54. thietart, r-a, vivas, r., (1981) strategic intelligence activity: the management of the sales forces as a source of strategic information, strategic management journal, vol. 2. venkatesh, v., morris, mg., davis, gb, davis, fd, (2003) user acceptance of information technology: toward a unified view. mis quarterly, vol. 27, no. 3: 425-478. walls, j.g., widmeyer, g.r., el sawy, o.a., (1992). building an information system design theory for vigilant eis, information system research, vol. 3, no. 1. wierenga, b., and van bruggen, g.h., (2000) marketing management support systems: principles, tools and implementation, international series in quantitative marketing. wilensky, h., (1967) organizational intelligence: knowledge and policy in government and industry, new york: basic books. 7. appendix 7.1 appendix a. link between technology and tasks characterization by continuous variables of partition classes. class 1/3 (weight = 52.00; size = 52) characteristic variables average in the class overall average standard deviation in the class general standard deviation test statistic’s value p-value ct2 5,404 4,619 1,114 1,578 4,566 0,000 ld1 4,731 4,007 1,456 1,591 4,176 0,000 qd3 5,019 4,433 1,263 1,341 4,017 0,000 ld2 4,750 4,194 1,207 1,352 3,776 0,000 ct4 5,673 5,142 1,051 1,311 3,722 0,000 ct3 5,423 4,910 1,276 1,453 3,240 0,001 ct1 5,038 4,493 1,427 1,554 3,227 0,001 qd2 5,154 4,701 1,406 1,506 2,758 0,003 qd4 3,462 4,007 1,365 1,427 -3,513 0,000 cs3 4,096 4,672 1,348 1,455 -3,633 0,000 qd1 2,769 3,440 1,325 1,586 -3,886 0,000 po1 3,500 4,201 1,563 1,629 -3,955 0,000 po2 2,923 3,866 1,439 1,549 -5,588 0,000 ad1 2,000 3,187 1,109 1,754 -6,212 0,000 ad2 2,327 3,590 1,383 1,821 -6,367 0,000 legend of variables : ct : characteristics of task ld: localization of data qd: quality of data cs : compatibility of data sources po : relevance of system ad : accessibility of data 45 class 2/3 (weight = 35.00; size = 35) characteristic variables average in the class overall average standard deviation in the class general standard deviation test statistic’s value p-value cs3 5,914 4,672 0,732 1,455 5,858 0,000 cs2 5,800 4,672 1,141 1,530 5,058 0,000 ad2 4,886 3,590 1,526 1,821 4,880 0,000 ad1 4,229 3,187 1,692 1,754 4,073 0,000 qd4 4,829 4,007 1,424 1,427 3,945 0,000 po1 5,086 4,201 1,273 1,629 3,722 0,000 po2 4,686 3,866 1,190 1,549 3,630 0,000 cs1 5,114 4,269 1,545 1,631 3,556 0,000 qd1 4,200 3,440 1,653 1,586 3,285 0,001 ct2 5,286 4,619 1,161 1,578 2,896 0,002 ct1 5,143 4,493 1,150 1,554 2,870 0,002 ct3 5,486 4,910 1,180 1,453 2,715 0,003 ct4 5,543 5,142 1,024 1,311 2,098 0,018 ld1 3,486 4,007 1,680 1,591 -2,249 0,012 qd2 4,114 4,701 1,563 1,506 -2,673 0,004 ld2 3,457 4,194 1,273 1,352 -3,737 0,000 class 3/3 (weight = 47.00; size = 47) characteristic variables average in the class overall average standard deviation in the class general standard deviation test statistic’s value p-value ad1 3,723 3,187 1,620 1,754 2,594 0,005 po2 4,298 3,866 1,351 1,549 2,365 0,009 ad2 4,021 3,590 1,550 1,821 2,009 0,022 ld1 3,596 4,007 1,347 1,591 -2,194 0,014 qd3 4,064 4,433 1,060 1,341 -2,333 0,010 cs1 3,702 4,269 1,398 1,631 -2,945 0,002 cs2 3,957 4,672 1,254 1,530 -3,958 0,000 ct4 4,255 5,142 1,296 1,311 -5,732 0,000 ct3 3,915 4,910 1,285 1,453 -5,808 0,000 ct1 3,404 4,493 1,347 1,554 -5,937 0,000 ct2 3,255 4,619 1,360 1,578 -7,328 0,000 46 7.2 appendix b. individual perception of tools characterization by continuous variables of partition classes. class 1/2 (weight = 83.00; size = 83) characteristic variables average in the class overall average standard deviation in the class general standard deviation test statistic’s value p-value sat3 5,265 4,567 0,958 1,330 7,722 0,000 eou6 5,301 4,590 0,954 1,383 7,569 0,000 up5 5,578 4,851 1,066 1,453 7,366 0,000 up1 5,747 5,045 0,890 1,424 7,255 0,000 sat5 5,566 4,955 0,839 1,286 6,989 0,000 up2 5,843 5,201 0,975 1,359 6,948 0,000 up6 5,855 5,164 1,054 1,467 6,932 0,000 up3 5,602 4,918 1,075 1,461 6,892 0,000 up4 5,639 5,022 1,025 1,368 6,624 0,000 sat1 5,482 4,836 1,123 1,452 6,548 0,000 eou5 5,229 4,627 1,112 1,359 6,520 0,000 eou2 4,988 4,381 1,047 1,381 6,470 0,000 eou3 5,518 4,948 0,923 1,301 6,452 0,000 eou4 5,651 5,090 0,911 1,318 6,261 0,000 sat2 5,060 4,493 1,206 1,342 6,222 0,000 sat4 5,699 5,149 1,179 1,438 5,623 0,000 eou1 5,458 4,978 1,112 1,390 5,083 0,000 fonc3 5,313 4,910 1,119 1,296 4,574 0,000 fonc2 5,651 5,216 1,265 1,498 4,264 0,000 fonc1 4,807 4,410 1,954 1,921 3,039 0,001 legend of variables : eou : ease of use fonc : functionalities of bi tools up : perceived utility sat : satisfaction of bi tools 47 class 2/2 (weight = 51.00; size = 51) characteristic variables average in the class overall average standard deviation in the class general standard deviation test statistic’s value p-value fonc1 3,765 4,410 1,676 1,921 -3,039 0,001 fonc2 4,510 5,216 1,576 1,498 -4,264 0,000 fonc3 4,255 4,910 1,296 1,296 -4,574 0,000 eou1 4,196 4,978 1,442 1,390 -5,083 0,000 sat4 4,255 5,149 1,370 1,438 -5,623 0,000 sat2 3,569 4,493 0,995 1,342 -6,222 0,000 eou4 4,176 5,090 1,368 1,318 -6,261 0,000 eou3 4,020 4,948 1,291 1,301 -6,452 0,000 eou2 3,392 4,381 1,285 1,381 -6,470 0,000 eou5 3,647 4,627 1,135 1,359 -6,519 0,000 sat1 3,784 4,836 1,303 1,452 -6,548 0,000 up4 4,020 5,022 1,260 1,368 -6,624 0,000 up3 3,804 4,918 1,314 1,461 -6,892 0,000 up6 4,039 5,164 1,343 1,467 -6,932 0,000 up2 4,157 5,201 1,243 1,359 -6,948 0,000 sat5 3,961 4,955 1,267 1,286 -6,989 0,000 up1 3,902 5,045 1,390 1,424 -7,255 0,000 up5 3,667 4,851 1,199 1,453 -7,365 0,000 eou6 3,431 4,590 1,176 1,383 -7,569 0,000 sat3 3,431 4,567 1,034 1,330 -7,722 0,000 vol8no3paper4svarre and gaardboe to cite this article: svarre, t and gaardboe, r. (2018) characterizing business intelligence tasks, use and users in the workplace. journal of intelligence studies in business. 8 (3) 45-54. article url: https://ojs.hh.se/index.php/jisib/article/view/328 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index characterizing business intelligence tasks, use and users in the workplace tanja svarrea* and rikke gaardboea aaalborg universitet, denmark; *tanjasj@hum.aau.dk journal of intelligence studies in business please scroll down for article characterizing business intelligence tasks, use and users in the workplace tanja svarrea* and rikke gaardboea a aalborg universitet, denmark corresponding author (*): tanjasj@hum.aau.dk received 14 june 2018 accepted 27 december 2018 abstract this paper investigates business intelligence (bi) tasks, use and users in a workplace setting. the study reports on a mixed methods study of users in three different types of organisations employing bi. 1052 respondents answered a survey and 15 individual and 3 group interviews were conducted to elaborate on the survey results. the study finds that the majority of public bi users are employees, and fewer managers and students, that are handling a variety of tasks. although they can experience challenges learning and using the bi system, they are still satisfied with it from different perspectives. keywords business intelligence, information system use, workplace studies 1. introduction in 2017, gartner performed a worldwide survey of it spending among 2500 chief information officers (cios). business intelligence (bi) was one of the top technology priorities they identified (“gartner survey of more than 2,500 cios charts the rise of the digital ecosystem,” n.d.). one of the reasons for this focus on bi can be attributed to the increasing importance of bi systems. bi can be defined as "a broad category of technologies, applications, and processes for gathering, storing, accessing, and analysing data to help its users make better decisions" (wixom & watson, 2010, p. 13). in recent years, bi technologies have received considerable attention from both industry and the public sector (chen et al. 2012). bi is an interesting technology because several studies have shown that there is a relationship between computerdriven decisions and organisational performance (brynjolfsson, hitt, & kim, 2011). however, achieving bi success depends on both organization and staff characteristics (worley et al. 2005; salmasi et al. 2016). salmasi et al. (2016) previously conducted a study of organisational level competences in achieving success with bi. however, garcía and pinzón (2017) found that amongst others, the human perspective along with learning and skills are highly important to success. therefore, we will focus on the individual perspective and focus on the users in this paper. at the same time as the development of government processes, organisations and technologies are expected to change government employees' tasks. before the emergence of e-government, governments’ information technology and data management tasks were largely related to employment (see kraemer & dedrick, 1997). today, changes in work tasks are an expected consequence of governments’ digitising efforts. in particular, e-government is expected to affect the composition of public employees' tasks (dörfler, 2003; snellen, 2002). jürgensen (2012) documented employees' expectations within the framework of administrative grants and found that specific, routine tasks had fallen from employees’ daily tasks while the proportion of challenging applications had journal of intelligence studies in business vol. 8, no. 3 (2018) pp. 45-54 open access: freely available at: https://ojs.hh.se/ 46 risen. others note similar findings regarding tax department employees. the present paper is concerned with characterising the tasks users solve with bi. thus, to achieve success with bi at the user level, there is a relationship between task characteristics and success (petter et al. 2013). furthermore, we examine bi systems’ ability to underpin the tasks their users solve with bi in a danish e-government setting. the use of bi in e-government has spread worldwide in the latest decade. by improving access to bi among employees, governments are aiming to improve their decision-making processes, resource use, increase quality of the services delivered or even reduce costs. the paper is structured as follows: in the following section, we review existing studies of task characteristics and present the theoretical framework for the data collection process. the next section is a presentation of the research methods applied in the study: a survey questionnaire, 12 semi-structured interviews and three group interviews. the subsequent section presents our findings with regard to the research question. the paper concludes with closing remarks and suggestions for further research. 2. theoretical background 2.1 the concept of a task a task is what individuals engage in to keep their work or life continuing (li & belkin, 2008), and the concept of ‘tasks’ is important in human–computer interaction. a task (whether workor leisure-related) may trigger information-oriented activities (byström katriina & hansen preben, 2005). on this basis, the task becomes a central element of any user’s context, as it arises from an incident external to the user that first triggers an information need, followed by a searching activity (ingwersen & järvelin, 2005). being external to the user, the task, as such, will be easier to observe and measure, from a research perspective, if compared to information needs that are inherent to the user. tasks have been analysed in human– computer interactions from many different perspectives. historically, the focus on tasks went from a technical (ergonomic) perspective, to a conceptual (information processing) perspective and then to work-process (contextual) models (crystal & ellington, 2004). different approaches can be followed to gain insight into tasks in specific contexts. hierarchical task analysis breaks generic tasks into smaller sub tasks with related sub goals. (stanton, 2006). the purpose is to become able to map goals, and sub goals in particular, with technologies or information systems to ensure successful solutions for the users’ tasks. a different way of perceiving tasks is to model them according to li and belkin’s (li & belkin, 2008) taxonomy of task characteristics. departing from a literature review, the taxonomy defines tasks on the basis of generic facets and common attributes, thus representing a top-down perspective on the task concept. the different approaches to understanding and operationalising tasks emphasises the importance of the concept in human–computer interaction. we have not identified any papers to date within the bi systems field that have attempted to identify and characterise the specific tasks users carry out. the purpose of the current paper is to address this gap in the research in a public organisation context. 2.2 delone & mclean: the is success model delone and mclean’s is success model (delone & mclean, 1992) is used to frame the study. the model represents a framework for understanding influential factors on information systems’ success. the identified variables in the model include system quality, information quality, use, user satisfaction, individual impact and organisational impact. we use the model to frame the quantitative data collection below, as it represents a consolidated theoretical model (eg. iivari, 2005), providing both an organisational and system-based perspective on the notion of tasks. 3. research design and method in this study, we used a multiphase ‘mixed methods’ research design. the research design consists of two main phases, namely a questionnaire and interviews. the mixed methods approach represents a form of triangulation; the quantitative approach provides a broader view, while the qualitative approach provides greater depth. together, the approaches yield results from which more accurate inferences can be made (seddon et al. 1999). 3.1 quantitative method we chose a questionnaire to research users' perceptions of different task characteristics. 47 data were collected via an online survey available for a specific period during the spring of 2017. all respondents were bi end-users who had access rights to their organisation’s bi system. the users accessed the bi web client through a browser, meaning that bi can be implemented across an entire organisation without having to install software on each machine. all bi users from three public organisations were invited to complete the survey. the three organisations were a municipality using business objects, a public healthcare organisation (among 12 hospitals) using tableau and a university using qlikview. initially, we conducted a pilot study before distributing the survey to all invitees. the survey was based on a literature review, and three researchers in the field evaluated the questions. afterwards, bi users with differing levels of bi experience evaluated the questionnaire using a think-aloud test (nielsen, 1994). minor refinements were made based on these results. the final part of the pilot study called for testing the survey on 24 bi users. after evaluating those results, the questionnaire was distributed by email to 4901 invitees. participants accessed the questionnaire via a personal invitation email with a unique link to the online survey. each respondent received an adapted questionnaire depending on whether he or she had previously used or never used the bi in question. participation in the survey was voluntary, and two reminders were sent. in total, 1741 people completed the survey, resulting in a response rate of 35.52%. among these, 1052 were used for the statistical analysis, as 689 respondents indicated that they did not use bi. all data were analysed in spss version 24.0. 3.2 qualitative method the next step in our research design was interviewing bi users. in addition to the questionnaire, we used interviews for three reasons: qualitative data can explain the complexity of the users’ tasks identified in the survey, data from interviews helps us to grasp the users’ contexts and interviews make it possible to check for potential additional elements of bi systems’ successes or failures (driscoll et al. 2007). we conducted 15 interviews as part of the qualitative study, and three group interviews with a total of seven participants were arranged for the three organisations. the results from the survey were presented to the groups, and the participants in the group interviews commented on the survey results. afterwards, we formulated a semi-structured interview. the semi-structured interviews had an average length of 45 minutes. all interviews were transcribed and analysed in nvivo version 11.0. we used a deductive method to categorise the different tasks’ descriptions. the different categories were adapted from earlier work. we will use the interviews to exemplify quantitative findings in the analysis. 4. results the results of the study are presented in three sections: end users’ characteristics, task characteristics and the users’ assessments of bi success. 4.1 end user characteristics in the survey, the respondents were asked about their gender, age (table 1), education, organisational role and experience. table 1 respondents' ages. age n % 20–29 years 66 4 30–39 years 225 22 40–49 years 345 33 50–59 years 325 31 60–69 years 91 9 total 1052 100 table 2 organizational roles. role n % employees 758 72 managers 223 22 students 65 6 missing 6 0 total 1052 100 most of the respondents were women (73%). as shown in table 1, the majority of respondents were 40–49 years old. their educational levels varied; most commonly, the respondents either held a master’s degree (35%) or a vocational degree (30%) (see figure 1). the respondents’ organisational roles were distributed among employees (72%), managers 48 (21%) and students (6%) (see table 2). for the sake of comparison, negash & gray (2008) found that bi is mainly used by managers and highly educated employees. finally, we can characterise the respondents in terms of their bi experience. the distribution appears in figure 2. the question asked the respondents to assess their bi experience on a scale from 1 to 5, where 1 is ‘little experience’ and 5 is ‘great experience’. more than three-fourths (76%) of the respondents rated their bi experience at 3 or below, indicating that they were not highly experienced users. here, it should be noted that two of the three organisations under investigation had used bi for a number of years, while one implemented bi about two years ago (in 2016). this difference of time spent with bi may explain some of the differences in experience assessments among the organisations. in related studies, technology experience has been found to be a critical factor for system success (dishaw & strong, 2003; marshall et al. 2000; thompson et al. 1994). corresponding explanations were found in the interviews. one interview participant explained: “…the more experience you get with the system, the more you think: ‘well, this is fine and really easy to understand’. but then when you get out and have to explain it – for instance at meetings in our controller group, if i have prepared something and ask ‘what do you think about this?’, then they are like, ‘we don’t understand that’, and i think, ‘well, that is easy to understand’. but you easily get into an understanding of what you think is easy to understandable” (2017). apart from confirming the importance of experience, the quote above also illustrates the difference between system users (users interacting with the system) and information users (employees using the information from bi). 4.2 characteristics of bi tasks we identified bi tasks from several different dimensions in the study. at an overall level, the respondents were asked what bi was primarily used for. the distribution of their answers is shown in figure 3. more than half (56%) reported their main use is for data extraction, 29.8% point to reporting and the last 14.2% mentioned ad-hoc analysis as their most frequent use of the system. the respondents were also asked what specific bi functionalities they use. the results appear in figure 4. as shown, the most-used function by far was data filtering, followed by compiling data in a table and visualisation. less common functionalities included drilling down, layout formatting, calculations (e.g., numeration) and merging (e.g., linking data together from different sources). figure 1 respondents’ educational levels. 0 50 100 150 200 250 300 350 1 2 3 4 5 figure 2 respondents’ assessments of their bi experience 14% 56% 30% ad hoc-analysis data extraction reporting figure 3 what is bi primarily used for? 49 figure 4 functionalities used in bi figure 5 the amount of work tasks in which bi is used figure 5 presents the share of tasks that bi represents among the total tasks handled by the respondents. as is evident from the figure, the majority use bi less than half of the time, or not at all. thus, bi use represents a minor part of the total number of tasks respondents handled. however, based on interview data, it appears that, despite these minor use patterns, users still consider bi to be an important tool in their everyday work practice. all statements in the survey were rated on a 5-point scale, with 1 being highly disagree and 5 being highly agree. as shown in table 3, the mean response rating is above 3, indicating that the respondents more or less agree with the statement. the statement with the lowest rating addresses the amount of data in the system and the relation with the respondents’ tasks. in the interviews, more participants claimed that they think the amount of data is appropriate. one comment may explain some of the lower rating of the statement. the participant states: “as regards the report module, i can create the things i would like to, but it is less appropriate in terms of publication and dissemination. it comes in short in terms of saying ’we would like to continue here, but we can’t with this tool, so we need new technology to move on’” (2017). table 3 univariate statistics on ‘task compatibility’ reply min max mean sd this information is useful for my work 1 5 3.86 0.974 this information is complete for my needs 1 5 3.28 0.976 this information is sufficiently up-to-date for my work 1 5 3.46 1.04 this information is relevant to our work 1 5 3.45 0.943 table 4 univariate statistics on ‘task significance’ statement min max mean sd the tasks i complete in bi are an important part of my tasks. 1 5 3.44 1.180 i make decisions on the basis of the tasks i complete in bi. 1 5 3.32 1.284 my tasks completed in bi are important to other employees in the organisation. 1 5 3.50 1.176 other people make decisions based on the tasks i complete in bi. 1 5 3.45 1.234 my tasks in bi are important for collaborators outside the organisation. 1 5 2.28 1.273 error! reference source not found. shows the distribution of responses as regards ‘task significance’. in all statements, except for the last one, the mean value is between 3 and 4. in general, the respondents consider their bi tasks to be important, and they or others make decisions on these tasks. the respondents do not consider the tasks to be important for collaboration outside of their organisation, so the bi is instead used as an internal tool. the following quotes from the interviews illustrate the significance of bi tasks: “the tasks are pivotal, because we need to touch upon the economy so much. we need to file reports very, very much” (2018). “i think it is quite important, at least in relation to many of the requests we get. we get a lot of requests that are used politically, or […] 773 434 308 181 170 126 100 57 0 100 200 300 400 500 600 700 800 900 fi lte r d ata me rg e d ata in a… vi su ali za tio n dr illdo wn no t u sin g t he … fo rm att ing la yo ut ma ke ca lcu lat ion s me rg e d ata fr om … 16% 70% 7%6%1% none below half part of the tasks half part of the tasks above half part of the tasks all tasks 50 so, if we didn’t have the option […]. usually, it is with a very short time frame, where a politician asks, ‘we need this for our…’ or it can be on the same day that you are in a meeting and they go, ‘we need this…’ and that would then be within an hour” (2017). the quotes illustrate why bi is important to the users. one thing is that they need to file reports within their organisations. the other is that several users receive requests from others regarding facts that are being drawn from the bi system. table 5 univariate statistics on ‘task interdependence’. statement min max mean sd if i do not complete my tasks in bi, one or more employees in the organisation cannot complete their tasks. 1 5 2.49 1.346 in bi, i can only do tasks if one or more employees have completed another task first. 1 5 2.61 1.378 i am independent of other employees to prepare tasks in bi. 1 5 2.94 1.339 task interdependence reflects the users’ dependencies in relation to the system; this can be in terms of a user’s dependence on something, or another’s dependence on the user. these assessments are presented in table 5. here, we can see that, across all three organisations, the users do not depend on anything to use bi themselves. it is assumed that the bi system is available, updated and so on. further, the respondents disagree that their tasks depend on colleagues’ completion of other tasks first. although the ratings for task interdependence are low, the interviews revealed dependencies, typically in the participants’ ability to deliver information to other employees, such as managers. to illustrate: “well, the closest managers” (2017). “the department management, and then our doctors. they are the ones using me for this” (2017). “that would typically be our political committees or the management of our administration” (2017). a partial explanation for the dependencies reported of the respondents may be found in this quote from the interviews: “everyone can go in and get data. it is just not everyone [who] know[s] how to use it. the benefit of asking me is that i know data better than most people, and by that i also know how to use data and how to do this. that’s how it works” (2017). in sum, one of the barriers to employees’ access to the bi system is a lack of knowledge of the underlying data models. the respondents were also asked about the difficulty of the tasks solved by the bi system. the assessments appear in error! reference source not found.. table 6 univariate statistics on ‘task difficulty’. statement min max mean sd bi makes it possible to complete complicated tasks. 1 5 3.12 0.984 the tasks i complete in bi require specialised knowledge. 1 5 3.05 1.127 the tasks i solve in bi are ones i have never faced before. 1 5 2.55 1.207 the assessments of the two first statements in table 6 signal a neutral attitude. the latter statement, concerning the novelty of the tasks, demonstrates that the users, to some extent, consider bi tasks to be routine. despite their ratings of the statements, the interviews reveal nuances of task difficulty. thus, the interviews demonstrate examples of both routine and more complex tasks. to illustrate routine tasks, consider: “well, if i have to do a monthly follow-up, then i need to define and follow up on every cost centre and see the transactions, if they are okay. that is like a routine task” (2017). “that is when i make a list of the patients we had for the last five years with a specific diagnosis. super easy task, because the template was developed for that purpose. some bi people have been thinking big thoughts, and there are very good headings for what you should go and look for in the system, so it is just a matter of going in and typing your filters” (2017). 51 however, the interviews also reveal examples of more complex tasks. for instance: “we had some where we should combine the kind of medicine they got, which is a standard extract in bi, with how long they were hospitalised. so, they should have had both a certain kind of medicine and be hospitalised for more than five days, for instance” (2017). here, the complexity consists of combining different data types. another kind of complexity is when the underlying data models are complex. for example: “yes, you need to know your data and which… you could believe that you have the right data and then there is really something you didn’t take into account. i think i have tried that quite often, at least in the first couple of years i was working with this. that you think that you had everything under consideration and then there is some kind of twist of it” (2017). the last cluster of statements, regarding the users’ tasks, concerns the specificity of these tasks. the assessments appear in table 7. the respondents’ assessments are average when rating to what extent the tasks are defined before they start solving them. there is a general agreement that the tasks can be solved in different ways. again, the table indicates some extent of the routine tasks in the low rating of the repeatability of the tasks in the last statement. table 7 univariate statistics on ‘task specificity’. statement min max mean sd my tasks are always defined before i complete them in bi. 1 5 3.03 1.061 the tasks i complete in bi can be done in more than one way. 1 5 3.29 0.935 normally, i do not complete the same kinds of tasks in bi. 1 5 2.03 1.117 4.3 users’ assessments of bi success in addition to the respondents’ background characteristics and the characteristics of their bi tasks, the survey also considered system and information quality as independent variables that influence the success of the bi system. the assessments of system quality appear in table 8. in that table, all statements have mean ratings below 3, meaning that the users find the system difficult to learn, use and understand. the challenges are expressed in the interviews: “it requires quite a lot to learn how to use bi” (2017). “i would say that, about using the front end part of it, if you haven’t used it a lot, then it can be quite difficult to find out how to present it” (2017). table 8 univariate statistics on ‘system quality’ statement min max mean sd bi is easy to learn. 1 5 2.62 1.098 bi is easy to use. 1 5 2.74 1.094 the information in bi is easy to understand. 1 5 2.89 1.009 when the users have difficulties using the bi system, they report two strategies for the appropriation of the technology (dourish, 2003). one is asking a colleague for help, which is considered an example of the employee aiming to adopt the technology. the other exemplifies adaptation. here, the users import the data into excel: “at times, i import it into excel. i might as well admit it: i love excel, including the graphical part. i like working with that” (2017). table 9 univariate statistics on ‘information quality’. statement min max mean sd data are displayed in a consistent format in bi. 1 5 3.11 0.948 the data in bi have high validity. 1 5 3.20 0.955 other employees in the organisation also think the data in bi have a high degree of validity. 1 5 3.04 0.871 information quality is another aspect that influences the users’ assessment of bi success. three statements are included in the construct. the assessments appear in table 9. overall, the users have a neutral assessment of the three statements with a mean slightly above 3. 52 thus, the users believe the consistency of the data to be reasonable. the data validity is rated slightly higher, while the users’ impressions of other employees’ impressions receive the lowest, but also most neutral, assessment. regarding users’ satisfaction with the bi system (see table 10), they do not think that the system’s functions and capabilities are as expected (rated at a mean of 2.82). however, they would still recommend the system to colleagues (rated at a mean of 3.21). the overall rating of satisfaction has a mean of 3.07. table 10 univariate statistics on ‘user satisfaction’. statement min max mean sd bi has all the functions and capabilities i expect it to have. 1 5 2.82 1.067 if a colleague asked, i would recommend bi. 1 5 3.21 1.161 overall, how satisfied are you with bi? 1 5 3.07 1.014 the interviews revealed some of the issues the users experience with the system. in some cases, the users prefer to report in excel. for instance: “it is not like it is working in the same way as a spread sheet with formulas and the like. it is a little more complicated and heavy to work with” (2017). the users’ individual impact is lower, when asked if they can make reports in bi effectively (mean of 2.98) and quickly (mean of 2.73). completing the reports in bi is rated higher (mean of 3.04), suggesting that, although it may not be effective or fast, the users do finish their reports in the system (see table 11). table 11 univariate statistics on ‘individual impact’. statement min max mean sd i can effectively make my reports using bi. 1 5 2.98 1.105 i can complete my reports quickly using bi. 1 5 2.73 1.240 i can complete my reports using bi. 1 5 3.04 1.111 5. discussion the data analysis has shown that the majority of respondents and active users of bi are employees, and not managers as found in other studies. to most respondents, bi was not playing a dominant role in their work life, which may also explain their assessment of their own experience as being limited. however, the users handle routine tasks and more difficult tasks in the system. the most important task handled in the bi system was data extraction and more specifically filtering data and merging them into tables. the most important use of bi is internally in the organisations. the users do not think it is very easy to learn how to use the system, but they do experience consistency and validity of the data in the system, and they would recommend it to colleagues. the results of the study can be used to indicate how implementation can be approached to take into account the strengths and challenges users experience in using bi as a part of their work practice. the results demonstrate that the users still can experience challenges in using the system, although the system has been implemented for some time in all three case organisations. this paper used delone & mclean (1992) for guiding the data collection. that enables comparison across diverse organisations for a general picture of bi use and users in the public domain. however, if the aim is a more detailed understanding of the bi tasks and related use in subdomains within this domain, more task-oriented theories as presented in the theory section could generate a more detailed understanding of task characteristics and the system use generated on that basis. 6. conclusion this paper has provided a picture of the characteristics of bi users and their tasks carried out by means of a bi system in different parts of the public sector. the analysis has not investigated differences between domains, but merely presents a cross sector perspective. future research should aim to investigate further the differences between sub domains, the types of tasks generated, and the system success found as a consequence. this could provide useful inputs for the implementation of bi systems in the public sector. 53 7. references brynjolfsson, e., hitt, l. m., & kim, h. h. (2011). strength in numbers: how does data-driven decisionmaking affect firm performance? ssrn electronic journal. https://doi.org/10.2139/ssrn.1819486 byström katriina, & hansen preben. (2005). conceptual framework for tasks in information studies. journal of the american society for information science and technology, 56(10), 1050–1061. https://doi.org/10.1002/asi.20197 chen, h., chiang, r. h., & storey, v. c. (2012). business intelligence and analytics: from big data to big impact. mis quarterly, 36(4), 1165–1188. choudrie, j. (2005). investigating the research approaches for examining technology adoption issues. journal of research practice, 1(1), d1. crystal, a., & ellington, b. (2004). task analysis and human-computer interaction: approaches, techniques, and levels of analysis. amcis 2004 proceedings, 391. delone, w. h., & mclean, e. r. (1992). information systems success: the quest for the dependent variable. information systems research, 3(1), 60–95. https://doi.org/10.1287/isre.3.1.60 dishaw, m. t., & strong, d. m. (2003). the effect of task and tool experience on maintenance case tool usage. information resources management journal; hershey, 16(3), 1–16. dörfler, a. (2003). business process modelling and help systems as part of km in egovernment (pp. 297–303). presented at the ifip international working conference on knowledge management in electronic government, springer. dourish, p. (2003). the appropriation of interactive technologies: some lessons from placeless documents. computer supported cooperative work: the journal of collaborative computing, 12(4), 465–490. driscoll, d. l., appiah-yeboah, a., salib, p., & rupert, d. j. (2007). merging qualitative and quantitative data in mixed methods research: how to and why not. ecological and environmental anthropology (university of georgia), 18. garcía, j. m. v., & pinzón, b. h. d. (2017). key success factors to business intelligence solution implementation. journal of intelligence studies in business, 7(1). retrieved from https://ojs.hh.se/index.php/jisib/article/view/ 215 gartner survey of more than 2,500 cios charts the rise of the digital ecosystem. (n.d.). retrieved march 27, 2017, from http://www.gartner.com/newsroom/id/348111 7 iivari, j. (2005). an empirical test of the delone-mclean model of information system success. sigmis database, 36(2), 8–27. https://doi.org/10.1145/1066149.1066152 ingwersen, p., & järvelin, k. (2005). the turn: integration of information seeking and retrieval in context. springer netherlands. retrieved from //www.springer.com/la/book/9781402038501 jürgensen, j. (2012). the effects of digitalization of su on the work of su workers. cbs, copenhagen. kraemer, k. l., & dedrick, j. (1997). computing and public organizations. journal of public administration research and theory, 7(1), 89–112. li, y., & belkin, n. j. (2008). a faceted approach to conceptualizing tasks in information seeking. information processing & management, 44(6), 1822–1837. https://doi.org/10.1016/j.ipm.2008.07.005 marshall, t. e., byrd, t. a., gardiner, l. r., & rainer, r. k. (2000). technology acceptance and performance: an investigation into requisite knowledge. information resources management journal, 13(3), 33–45. negash, s., & gray, p. (2008). business intelligence. in business intelligence: handbook on decision support systems 2. berlin: springer. retrieved from https://doiorg.zorac.aub.aau.dk/10.1007/978-3-54048716-6_9 nielsen, j. (1994). estimating the number of subjects needed for a thinking aloud test. international journal of human-computer studies, 41(3), 385–387. petter, s., delone, w., & mclean, e. r. (2013). information systems success: the quest for the independent variables. journal of management information systems, 29(4), 7– 62. https://doi.org/10.2753/mis07421222290401 54 rai, a., lang, s. s., & welker, r. b. (2002). assessing the validity of is success models: an empirical test and theoretical analysis. information systems research, 13(1), 50–69. removed, a. (n.d.). article removed. salmasi, m. k., talebpour, a., & homayounvala, e. (2016). identification and classification of organizational level competencies for bi success. journal of intelligence studies in business, 6(2), 17–33. seddon, p. b., staples, s., patnayakuni, r., & bowtell, m. (1999). dimensions of information systems success. communications of the ais, 2(3es), 5. snellen, i. (2002). electronic governance: implications for citizens, politicians and public servants. international review of administrative sciences, 68(2), 183–198. stanton, n. a. (2006). hierarchical task analysis: developments, applications, and extensions. applied ergonomics, 37(1), 55–79. https://doi.org/10.1016/j.apergo.2005.06.003 thompson, r. l., higgins, c. a., & howell, j. m. (1994). influence of experience on personal computer utilization: testing a conceptual model. journal of management information systems, 11(1), 167–187. https://doi.org/10.1080/07421222.1994.115180 35 wixom, b., & watson, h. (2010). the bi-based organization: international journal of business intelligence research, 1(1), 13–28. https://doi.org/10.4018/jbir.2010071702 worley, j. h., chatha, k. a., weston, r. h., aguirre, o., & grabot, b. (2005). implementation and optimisation of erp systems: a better integration of processes, roles, knowledge and user competencies. computers in industry, 56(6), 620–638. https://doi.org/10.1016/j.compind.2005.03.006 a discourse analysis methodology based on semantic principles an application to brands, journalists and consumers discourses luc grivel* and olivier bousquet** *index-paragraphe, université de paris 8, 2, rue de la liberte saint denis, france, université de paris 1, (panthéon-sorbonne), paris, france **index-paragraphe, université de paris 8, 2 rue de la liberte saint denis, france harris interactive, paris, france luc.grivel@univ-paris1.fr, olivier.obousquet@gmail.com received 20 july 2011; received in revised form 10 september 2011; accepted 29 december 2011 abstract: this is a r&d paper. it describes an analysis coming from a research project about opinion measurement and monitoring on the internet. this research is realized within "paragraphe" laboratory, in partnership with the market research institute harris interactive (cifre grant beginning july 2010). the purpose of the study was to define crm possibilities. the targets of the study were self-employed workers and very small businesses. the discourses analysis is linked to a qualitative study. it turns around three types of discourses: brands, journalists and clients’ discourses. in the brand discourses analysis we benchmarked brand websites belonging to several businesses. in this first step, we tried to identify the most used words and promises by brands to the target we were studying. for that benchmark, we downloaded "professionals" sections of the websites. clients’ discourses analysis is based on opened answers coming from satisfaction questionnaires. the questions we are studying have been asked after a call to a hot line or after a technician intervention. journalists’ discourses analysis is based on articles, published on information websites specialized in harris interactive's client sector. these websites were chosen because we considered them to be representative of information sources, which the target could consult. keywords: discourse analysis, brand management, market research 1. introduction regarding the deep change in our relation to communication, university paris 8’s paragraphe laboratory and the market research institute harris interactive started a common project in 2010, aiming at developing a methodology to monitor and measure opinions on the internet. to define our research area, we first analyzed various opinion and market research processes (master 1 essay). then available for free online at https://ojs.hh.se/ journal of intelligence studies in business 1 (2011) 76-86 https://ojs.hh.se/ 77 we did discourses analysis with computer tools assistance (master 2 essay) for answering the question: what are the contributions and challenges of a computer assisted semantic analysis, within the analysis of web-coming discourses? this article describes that experiment. the tool that has been chosen for this discourse analysis is tropes. first, we will justify this choice and describe how the tool works, our approach of the mission and then present the results of the study. finally, we will discuss economical, scientific and methodological contributions of an opinion analysis method based on semantic analysis, and identify the technical and methodological limits of this method. 1.1. a semantic experiment in a crm context the experiment takes place as part of a harris interactive mission for a client. the goal of that mission was to improve the brand’s performances in terms of relations with specific clients: very small firms. these ones are particular targets and it can be difficult for a great brand to define the way to communicate with them. the research was aimed to identify the levers that could be pulled to improve the brand’s performances. 2. methodology the research is divided in three phases: a qualitative phase (individual interviews of professionals), a quantitative one (validation and establishment of a decision model based on ideas defined in the first phase) and a phase of discourse analysis. this step is the one which we are focusing on in this article. the qualitative phase is an exploration phase. its goal is to explore every possible dimensions of very small firms’ engagement to a brand, specifically in the brand’s sector. we also needed to understand the expectations of the targets and the way they are satisfied or dissatisfied, and to identify experiences that can make clients leave the brand for another one. the discourses analysis is linked to the qualitative phase. it is about three types of discourses: brand discourses: this analysis is based on a benchmark of twenty websites of brands belonging to varied business sectors. we searched the “professionals” sections of the websites. this discourse analysis enabled us to identify words, expressions and different types of discourses that these brands use when they are communicating to professionals. journalistic discourses: this is based on analysis of articles. these articles are taken from mass specialized website, chosen because they represent the type of sources that are used by the targets. consumer discourses: this analysis is based on answers to open ended questions in satisfaction surveys. the one that we used is a survey that had been sent after a call to a hotline or after an intervention by a technician. 2.1 tool choice a main criterion that led to the choice of the tool is that it should be based on semantic-pragmatic principles. that means that the tool had to allow an analysis, taking into account a specific conception of meaning: the meaning of a discourse can't be understood without a reference to the enunciation context. a second criterion that has been important for the choice is ease of use: it should be as easy as possible since all research executives should be able to use it the third criterion was linked to market research structures. the experiment research was an adhoc research and it was not certain that it would be followed by other similar studies. thus the tool had to be adapted to this specific logic. for instance, a global monitoring solution, that most often implies a yearly subscription or additional software development, was not adapted. following these three fundamental criteria, the chosen tool has been tropes. this software is based on the work of ghiglione (1998), a psychological linguist. inspired by goffman and hintikka, ghiglione (1998) worked on automated content analysis, and more particularly on cognitive and discursive analysis. his idea is that communication issues are defined by the fact that every speaker takes place in a communication system: he never speaks alone. his speech is the expression of a "possible world", that is personal to the speaker, but which is in dispute with other people, who have their own "possible worlds". communication is like a permanent clash between subjectivities, and it has to be based on argumentation. in that context, syntactical operators play a fundamental role; they are weapons used in the fight, the discourses elements that impose the speaker’s personality. they are central elements in ghiglione's theory. thus, this study distinguishes between three types of words: references that "name the objects of the world", verbs that place rn in the proposed universe, and the other categories of words, negatively defined as all words that are neither a reference nor a verb. these words are, among others, adjectives, modalities, connectors, all words that show the speaker through the discourse and adjust the meaning of what is said. therefore, meaning is built by the articulation of these three categories of words, inside phrases, considered as the smallest meaning unity. tropes is 78 based on propositional analysis principles: discourses are cut in propositions (simple phrases), considered as micro-universes concentrating a simple and self-sufficient meaning. the analysis is based on the text cutting in propositions, based on a punctuation and syntax analysis (conjunctions, syntactic links and so on). a proposition is at least made of an “actant” (from french, which acts), an “acted” (that is subjected to the action) and a verb (that makes the action). this minimalistic model can be extended, adding complements. in each proposition, we can find referent nucleus linked by verbs, defined by adjectives and integrated to argumentation thanks to modalities, connectors and pronouns. the software allows a first step of meaning analysis through an organization of the references. this organization is based on an internal dictionary, like a generalist thesaurus of french language. when a text contains a word that is missing in the dictionary, this is individually underlined. this means that the word is not integrated in the following diagram. this thesaurus is the foundation of tropes' work, in what the developers call a "linguistic analyze engine". thus, tropes allows a semantic-pragmatic approach. as well as proposing a generalist thesaurus of french language, it enables the analyst to build his own thesauruses. as every analyzes is inscribed in a specific context, the building of a particular dictionary allows the analyst to give a specific and unique meaning to every word, linked to the context. 2.2. tool configuration in this article, we have developed a specific thesaurus, suitable for the research context. the role of the thesaurus is to enable comparison between the discourses of firms from varied economic sectors, but also to compare the discourses of these firms with the client's. their common point is the relation built between brand and consumer. thus, marketing has developed an angle of analysis for that relation: the marketing mix, or the 4p’s (product, price, place, promotion). we use an adaptation of that tool and we have defined five common entries for all studied discourses: "material": notions linked to material aspects of the firm offer (infrastructures and terminals) "relations and services": vocabulary linked to the services offered by the firm, and client relationship "pricing policy": vocabulary linked to prices, pricing offers, sales and so on "brand": quotes of brands and sub-brands "client or professional": shows the consistency of the vocabulary naming the clients, particularly professional clients. the five entries are the base in the analysis of the crm themes quoted by the firms and the clients. these are common to all sectors and they enable comparison. in a context of topic-centered analysis, this choice seems to be problematic. as written by pang and lee (2008) comparing topic-centered analysis to sentiment-centered analysis templates in “traditional information extraction can differ greatly from one domain to another”. this is why each entry’s content was specific to each sector. in thesauruses, words have a unique meaning, linked to the context in which they are used, called pragmatic-semantic. these five entries are themselves switched in several branches. they underline five ways a firm can showcase its offer with five brand profiles (different but not exclusive). the entries are large enough to be operative for all sectors. thus, the five entries are always the same, but the notions that compose them are specific to each sector. this resulted in creating a specific thesaurus for each sector (without changing the five entries). for example, in the telecommunication sector, we classified the notion "internet" in the "material entry” because we considered that it is an infrastructure (and not a service itself). for energy or bank/insurance sectors, “internet” is classified as "relations and services" because it becomes a communication device, a tool linked to client relations. building a thesaurus is quite time consuming. it took two days to build the first thesaurus. the following ones, which are just adaptations of that first one, have been built in half a day each. this work has been made possible by notions extraction. before the discourses analysis, websites have been analyzed with tropes to extract the vocabulary and notions that should be organized. in such a framework, this method appears as the safest to build an efficient thesaurus, which means a thesaurus that is exhaustive but without unnecessary notions and words. geyken (2008) 79 states that if an expression is part of the language, it must appear in the corpus, and conversely the frequency of an expression in the corpus is the image of its frequency in language. the software shows the words in their context, which allows the analyst to define the meaning of words in the specific context of the text, and to classify them correctly. in the end, we notice that the thesaurus, on the contrary to what it may seem, do not only make a lexical analysis. even if that method is focused on the vocabulary used in the text, tropes does not only count occurrences of lexical forms. (by lexical form this article refers to a series of characters between two spaces or punctuation signs). the software has previously created a word based on recognition and categorization of words (nouns, adjectives, verbs and so on) and the fact that the analyst classifies these forms in a thesaurus is a first step in pragmatic-semantic. words included in the thesaurus have a unique meaning, linked to the usage context. therefore the thesaurus appears both as the central tool of computerassisted discourses analysis and as a way to compare the various websites of the benchmark, as well as the element that links the three steps of analysis. 3. data, analyze and implications through tropes, we obtained various analyses quite different from the ones we usually obtain in market research. in this part, we are presenting some possible analysis on different data: documentary data and open-ended questions. 3.1 analyzing secondary data: websites benchmark and journalistic articles analysis the website benchmark and the journalistic articles analysis are two examples of secondary data analysis. when it comes to websites, each one is synthesized in a personal identity card. this is described in figure 2 and it is divided in two parts: on the left side, basic information about the website: general statistics (number of pages, words, used notions), top ten most used notions (what we call "notions" is actually the "equivalent classes", but translated into a more accessible word here), frequently used pronouns, discourses concentration and the distribution (in percents) of the five entries of the thesaurus. the right part is dedicated to analysis and commentaries about the website. figure 3 represents the detailed distribution of equivalent classes defined in the thesaurus. it is fundamental to understand brand discourse. it describes the semantic organization of all the vocabulary on the website and that organization is partly determinate by the objectives of the study. in this example, the discourse brand underlines the material dimension of its offer, particularly concerning infrastructures. the discourse brand also insists on relations and services. we notice the importance of the word "solution", which appears as a central word in a client’s relation to that brand. more than half of the brand discourse is contained in the two entries material, relations and services. we also notice that brand quotations are more than one notion out of five, which is more than the pricing policy. this brand seems to be selfcentered, when it comes to highlighting its brand. concerning the client, a firm belonging to a mobile fleet, is not a small firm. in the case we are describing here, another type of secondary data has been studied: journalistic articles. a double approach has been necessary: thematic and semantic. the thematic approach defines the importance of brands in articles (principal or secondary place) and the tonality of the articles. semantic analysis has been more precise and complete than the one on websites. we used tropes' "actant chart". this chart represents relations between words. it is based on syntactic structure of sentences. on the horizontal axe, references are defined as "actant" (acts on the verb), or “acted” (object of the action): the further to the right a notion is, the more passive it is in the text. vertically, this chart represents concentration of relations between notions. the higher a notion is, the wider is its usage context. thus, websites are often less redacted, with lots of non-verbal phrases (at least in commercial websites). the analysis presented in figure 4 describes the central place of telecommunication companies in journalists’ discourses. 80 figure 2: identity card of a brand figure 3: the distribution of equivalent classes defines in the thesaurus 81 figure 4: chart of repartition for actor and acted references figure 5: map of the notion concerning the intervention of a technician on site 82 all companies are quoted in agent position, while the user is more often an object. we notice that the user seldom is a professional, which shows that generalist websites are not adjusted for professionals. "user" and "consumer" are submitted to companies, they have no real choice. they are used in varied contexts, in other words their relation are less concentrated. in general, all notions that matter to the material basis of the offer are on the right side of the chart (passive position), whereas words that refer to price policy and services tend to be in the middle of the chart. we notice that the words "tribunal" and "appeal" take place in an agent position, with weakly concentrated relations: this is explained by articles concerning orange's issues with french justice. relations are concentrated because the contexts are always similar. this analysis has a low interest, particularly because the corpus has not been defined precisely enough. most of the interesting information comes from thematic analysis. this remark shows the pertinence of semantic analysis in that precise case. it also introduces questions regarding corpus definition. 3.2 clients discourses analysis the last step of the study concerned clients’ discourses. the source we used was different: data had been collected in a quantitative questionnaire. this example can be seen as a new way to analyze open-ended questions. we have studied data in a double way. firstly, we used a notions map, based on the actant/acted analysis, and then we used a linguistic analysis (linking lexical and syntactical analysis). the map of notions enables us to analyze the answers in a double way, both thematic and discursive. figure 5 is representing the map of the different notions taken into account, regarding a technician intervention. the chart in figure 5 gives several information types. firstly, we notice that terms which are in an agent position designate the clients’ expectations regarding technical interventions. it also appears that all these notions are in the lower side of the chart: they are used in more concentrated contexts. these expectations are the starting point of most answers: several sentences begin with these words, which are obvious and central for the respondents. notions placed in object position allow us to understand a different type of discourse logic. in the beginning of the questionnaire people seem to have a problem: main notions ("waiting", "time"), are always associated. the perception of technical answers belongs to a more diversified context: there is a variety of issues, answers and perceptions. this is even more obvious concerning the commercial relation (appointment making, contact with a consultant). finally, conclusions of the intervention (thanks or waiting for a continuation) take place in varied contexts. this analysis, completed by syntactical and semantic analysis, allows an understanding of the way respondents are implied in their answer. thus, we notice that adjectives ("competent", "fast", pleasant", "good", "efficient", "professional", "clear" and so on) and verbs ("fix", "solve", answer", "satisfy" and so on) that are used show strong expectations towards technical support, but these expectations are often deceived. this is highlighted by the use of opposition connectors (contrasting judgment: "but", "in spite of", "however") and of intensity and negation modalities (60 percent of modalities). injunction verbs ("must", “improve”, “can”, “have to" and so on) are associated with adjectives and verbs that underline the fact that clients expect a change from a firm that do not satisfy their needs. through the linguistic operators, we can see a personal involvement (showed by modalities, but also by adjectives and connectors) of the clients in their relation with the firm. these linguistic clues also show the clients’ feeling that their dissatisfaction is not taken into account (injunctions to change). thus, the technical relation with the brand seems to be the place of a personal, or even emotional, involvement with clients. that is why technical support is a sensitive part of the client relation. this type of analysis can be a supplement of a more traditional opened-ended questions' coding, that determines generic themes, but does not highlight linguistic stakes. for that matter, semantic analysis can be used for coding. on the one hand, it allows gaining time; on the other hand, it enables building more precise and exhaustive coding patterns (taken the entire corpus into account, not only an extract of verbatim). 4. conclusion and further research the method used in the article has allowed us to analyze the discourses of twenty brands belonging to varied sectors and to compare possibilities of client relations, on a deeper level. finally, it enabled us to better understand our clients’ discourses. clients’ discourses analysis has permitted us to compare brands discourses to the clients’ feelings in their contact experiences with the firm. openended questions have been analyzed on a deeper level, since brands discourses were more appropriate to this type of analysis. on websites, language is generally poor: for example, sentences are often non-verbal, which is a problem for a syntactic analysis or to determine the agents and objects. answers to open-ended questions are different. they look most often like correct sentences, built according to a precise grammar. that is why it is possible to analyze them on a 83 deeper level. therefore, this data has been studied according to a double approach: building a notions map (chart of agents/objects notions) and semantic analysis linking lexical and syntactical aspects. the double approach has given us an understanding of the heart of clients discourses, to analyze the way they are implied in the discourses about (or to) the brand. as well as finding the expectations of the clients we have understood the way these expectations are expressed, and above all the way people handle issues and find resolutions. a graphical approach enabled us to understand the general process of discourses, whereas the analysis of syntactical forms (specific verbs, adjectives, connectors and so on) permitted us to understand how clients are personally implied in their discourses. 4.1 automated semantic contribution to opinion and discourses understanding from a scientific and methodological point of view, automated semantic analysis enables us to gain more detailed and deeper understanding. the previous example concerning open-ended questions, with semantic analysis tools can build coding pattern taking into account all responses, and not only a sample of answers. thus, the coding pattern is more precise because it is based on a more exhaustive view on information. automated semantic allows approaching discourses in a different way than traditional content analysis. this enables it to become enveloped in the message sender. semantic analysis exceeds in a way content analysis and it takes the content of the discourses ("dictum") and its form (how it is said) into account. semantic analysis gives a more complete view on discourses because it takes into account syntactical constructions, modalities and usage of adjectives, as well as all other words that enables discovery of the speaker’s personality and the discourse enunciation context. this highlights the way the speaker is implied in his or her own discourse, in an emotional or argumentative way. it allows placing discourses and speakers in wider groups. barthes (1984) states that: "every speech belongs inevitably to a dialect." (barthes 1984, 439). this means that discourses are never the speech of just one individual: each individual shares a part of its individuality with other people and with other people of its group(s). this is called inter-subjectivity (larsson, 2008). semantic-pragmatic analysis should enable us to reach this discourse inter-subjectivity, which means taking into account the way the speaker keeps to a context, with interactions, and history. this should enable extract specificities of groups, defined before analysis (according to "objective" criteria like gender or age) or defined by analysis (by recognition of regularities and disruptions of discourse). this approach, that places context in the middle of the analysis, is not only linked to the semantic approach. it is a global approach for information and intelligence studies. this can be summarized in floridi’s (2007) “subjectivist interpretation of relevant information”, which implies that information relevance can be understood only when it comes to an exchange. semantic analysis permits a qualitative approach of wider samples. hitherto, qualitative research is limited to questions with relatively small samples. this limit is practical: the qualitative questioning of a large amount of people is costly, in term of fieldworks but also when it comes to analysis and interpretation time. computer tools (particularly in automated semantic analysis) enable us to analyze answers for wider qualitative samples. as a result, we can plan to hit the experience saturation threshold, regarding the moment when all experiences on a subject can be considered. 4.2 technical limits from a technical point of view, the main limit of semantic analysis is the difficulty to adapt it to spontaneous discourses language. for example, an online forum is a discourse place. on a forum dedicated to a firm, the firm’s name is obvious and the participants do not name it often. instead they use the third person ("it" or equivalent). this raises some questions: how can we automatically spot the posts that speak about the firm? we cannot determinate that every "it" refers to the brand. how can we take the speaking moments into account? discussions are defined by interruptions, people speaking when they may not. finally, how can we manage interruptions in debates? speeches are not put together in a logical way, but in a chronological way. it is not always the logic of the debates that determines the apparition order of speeches; it is more often the writing time of the contribution. a contribution do not necessarily make reference to a previous post, it can answer to a question that has been asked a few messages before. in simple sentences, anaphora management is a problem. on a discussion forum, the anaphora referent is not even in the previous clause. in the "style" point of view, authors tend to "write as they speak", they use abbreviations, forget capital letters, punctuation signs and make orthographic, grammatical or syntactical mistakes. it is difficult for software that has been developed on formal language models to analyze informal or incomplete formulations, as we can find on forums like twitter and facebook. this is why it appears essential to include abbreviations in terminological dictionaries. it is not possible to include all incorrect orthographic 84 forms in dictionaries. the introduction of automatic orthographic correctors, or at least of a tool that tries to compare unknown forms to lemmatized form, seems to be a solution. to analyze such texts in natural language, it is necessary to begin by editing the text, which can be time consuming work. in this time consuming aspect, editing the texts can be compared to another step of analysis: corpus constitution. when analyzing great quantities of texts semantically and with computer assistance, we adopt a corpus linguistic logic. in this field, sources determination is essential. the grouping of texts in a corpus is a first semantic approach. when we choose the elements of the corpus, we propose a first step of interpretation, linked to our context. the sources must be coherent, and have a representative dimension. for example, if we chose to analyze a brand image through what is said on forums, it is a first choice. this involves considering if the chosen forums are representative for what is said on forums in general, or even on the internet, not to say that it is representative of what all consumers of the brands think. this interpretation depends on the scope that is adopted. that is why the corpus must be determined, often by an exchange between the analyst and the client. in a context of business, this need can be a limit to introduction of automated semantic since it involve stakeholders spending time on determining the corpus. other technical limits appear when we decide to analyze information coming from the internet. an efficient way to analyze web pages is to investigate and save them in order to analyze them a second time. this can be made difficult by limits linked to websites structure and to the way they are created. on a web page, how can we identify relevant information? heuristics exist and in addition to useful information, a web page often contains a navigation menu, advertisements, hypertext links to others articles, legal information and so on. for example, the navigation menu contains several html links, advertisement in links and pictures, and legal information can be found on all pages. the message is rich in meaning and poor in hyperlinks. automation of websites investigation raises the question of information hierarchy. during the analysis, it is difficult to know the audience of a page and to organize all pages in a hierarchy. thus, we can ask if information on a page that is often visited (for example a home page) has the same value as information placed on a page with few visitors. 4.3 renewal and methodological uncertainties automated semantic introduces challenges in some practices. the first of these challenges regards the gap between qualitative and quantitative fields. this approach can be compared to two types of methodologies. it can be considered as a qualitative methodology since its object is an unformed discourse. automated semantic manages with quantitative processing matter and in order to process language through a computer, it must be transformed into computer data, which means mathematically managed. automated analysis tools for language supply quantitative data; linguistic forms occurrences are represented as statistics, charts, tables and so on, which are quantitative representations. this is true when it comes to opinion mining, in which information is often envisaged as rating inferences, rankings and so on. automated semantic analysis often has a qualitative part; it is possible and necessary, to come back to plain text. this qualitative comeback is a way to set highlighted linguistic forms back in their production context. this return to context is necessary to understand texts. without it, the risk of misinterpretation is high. quantification is not enough. methodologies and tools of automated semantics are double-edge: qualitative material (discourse) is analyzed with a statistics and probabilistic logic, and allows results that are between the two areas. the analyst using such tools has to master the two areas of the methodology. we exceed areas of market research (where we experimented) and of social sciences. this is likely to meet strong reticence (in each of these sectors). the reluctance can be analyzed in two areas. the first one, which is the most obvious, regards the reliability and pertinence of the results. the trust and value of information coming from these types of tools can be questioned. the second reluctance is the fear of being compared with a computer, the fear that human intelligence could be belittled by the use of a computer tool. these two reluctances are linked. it seems necessary to understand that a tool cannot do anything without human intelligence, without human interpretation aptitude. a tool is only assistance for the analyst, who keeps his legitimacy as a decider and controller. to understand the analyst role in a research process using automated semantics, a distinction exposed by rastier (1994) can be used. as authors of this article we have adapted this distinction to our subject. rastier (1994) analyzes understanding systems and distinguishes three steps: analysis, interpretation and understanding. he defines an understanding system as "every system that tries to pass from a syntactical tree to a semantic network and to make inferences inside this network." (rastier 1994, 240). for him, there are three steps in the progression and at each step we can distinguish the role of the computer and of humans. 85 the first step, the syntactical tree, equates to analysis. it can be compared to morphological and syntactical analyses, which are the first parts of automated text analysis. this analysis is entirely done by software, which recognizes words and defines their relations. the second step, semantic network, corresponds to interpretation and is performed by computer and human. the goal is to define a "signification", in the meaning adopted by rastier (1994): "meaning became impoverished of context." (rastier 1994, 240). some software automates this step, like is the case with tropes. this software uses two methods to determinate signification. firstly, it extracts syntactical marks, modalities and so on, which organize the utterance and show interlocutors presence in discourses. it also classifies and organizes notions into a hierarchy based on its french language thesaurus. thus, the software offers significance to each word, defining synonymy, hyperonymy or hyponymy links. for example, terms as "firm", enterprise" or "society" have a similar meaning: they belong to the equivalence class "firm". this signification is abstract and polysemy risks are high because interpretation does not take context into account. the last step, the understanding system, is comprehension. this step is completely mental, which means that it can only be human. it enables us to pass from "signification" to "meaning", to "create inferences inside the semantic network." the analyst uses all the elements extracted by the computer, the analyst makes comparisons and links them, in order to define the final meaning of the text. thus, the building of a personalized thesaurus allows giving each word and each notion a specific meaning, relative to analysis context. the real value-added of the analysis appears at this level. analysis is here fueled by the analyst’s knowledge because analysts’ own external data, external knowledge, memory and critical thoughts permit them to extract useful information from the text. the usage of understanding systems, underline that computer and human intelligence are complementary. software maintains assistance tools for analysts who remain the centre of analysis, since they are able to detect strategic information. the other thing that automated semantic transforms is the way speakers are considered by analysts, particularly in market research. by putting discourses in the middle of interests, it highlights the exchange between the person who questions and the one who answers. in internet discourses, there is an exchange, at least implicit, between a speaker and a receiver. this point of view allows placing people in the group(s) where they belong. in traditional analysis, particularities of targets are highlighted: these targets are defined by objective criteria like age, gender or product consumption. in our new point of view, we consider publics that belong to diverse social groups, have a history, and live in a specific context. we put the knowledge of the discourse sender in the middle of our questions, which implies other questions, particularly in relation with the collection of consumer discourses on the internet. we often ignore people who are speaking on the web and who they could represent. it could be interesting to question the identity of those internet users, and the criteria that should be chosen to define this identity. should these criteria be the same as in "real" life, or should they be different ones? being an internet user speaking on websites, is it not the beginning of an identity? this question about validity of an analysis concerning people we know nothing about can be seen as a limit of that method. setting up an automated semantic analysis solution is costly. that must not be ignored. this is an investment of research and development. buying a tool, taking time to discover software and train employees is an investment and setting up an automated semantic analysis solution is at least a middle-term investment. this can be complicated in a sector such as market research since visibility often does not go above a few months. these remarks added to previously quoted technical limits, also underline that the tool choice may not have been as relevant as previously thought. today, powerful solutions exist, which manage efficient technical limits. for future analysis, it would be efficient to develop a partnership with a firm that develops software. in that case, market research institute could concentrate on its core work, on its value-added; analysis; and entrust software firms with technical issues. regarding these limits, automated semantic for opinion analysis must stay a complementary methodology, which can help existing methodologies. it assists these methodologies in two ways. first, it allows a faster and easier processing for specific steps (open-ended questions, qualitative numerations and so on). it also permits a new point of view on problems processed, in addition to traditional content analysis methodologies. references barthes r. 1984. le bruissement de la langue. essais critiques iv, seuil, points essais, 439 p. beaudoin j. 2005. l’opinion, c’est combien? pour une économie de l’opinion, village mondial, 237 p. bourdieu p. 1984. « l’opinion publique n’existe pas », in questions de sociologie, les editions de minuit, reprise, pp. 222 235 cardie c. 1997. “empirical methods in information extraction”, ai magazine, vol 18, 86 condamines, a. 2007. « l’interprétation sémantique de corpus : le cas de la structuration de terminologies », in revue française de linguistique appliquée, xii-1, juin, pp. 39 52 demaziere, d. (ed). 2006. analyses textuelles en sociologie – logiciels, méthodes, usages, pur, méthodes, 219 p. floridi, l. 2007. a subjectivist interpretation of relevant information », in pichler, a. and hrachovec, h., wittgenstein and the philosophy of information, proceedings of the 30. ludwig wittgenstein symposium, vol. 1 fuchs, c. (ed). 1993. linguistique et traitement automatique des langues, hachette-classiques, hu linguistique, 303 p. geyken, a. 2008. « quelques problèmes observés dans l’élaboration de dictionnaires à partir de corpus », in langages, 171, septembre ghiglione, r. (ed). 1998. l’analyse automatique des contenus, dunod, psycho sup, 168 p. jenny, j. 2004. « quali / quanti – distinction artificielle, fallacieuse et stérile ! », 1er congrès de l’afs, groupe rtf 20, session n°4, 25 février, consultable à l’adresse http://testconso.typepad.com/files/jenny-quantiquali.pdf (le 8 novembre 2010) larsson, b. 2008. « le sens commun ou la sémantique comme science de l’intersubjectivité humaine », in langages, 170, juin, pp. 28 40 marc, x, tchernia, j. (ed). 2007. etudier l’opinion, pug, 260 p. martin, r. 2001. sémantique et automate, puf, ecritures électroniques, 190 p. pang, b. and lee, l. 2008. opinion mining and sentiment analysis, foundations and trends in information retrieval, 2 (1-2), rastier f., cavazza m., abeille a. 1994. sémantique pour l’analyse. de la linguistique à l’informatique, masson, 240 p. tamba i. 2005. la sémantique, puf, que saisje?, 128 p. vol8no1paper4_barnea to cite this article: barnea, a. (2018) israeli start-ups – especially in cyber security: can a new model enhance their survival rate? journal of intelligence studies in business. 8 (1) 37-45. article url: https://ojs.hh.se/index.php/jisib/article/view/285 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index israeli start-ups – especially in cyber security: can a n e w mo d e l e n h a n c e t h e i r s u r vi va l r a t e ? avner barneaa* anetanya academic college, netanya, israel; *avnerpro@netvision.net.il journal of intelligence studies in business please scroll down for article israeli start-ups – especially in cyber security: can a new model enhance their survival rate? avner barneaa* a netanya academic college, netanya, israel corresponding author (*): avnerpro@netvision.net.il accepted 21 march 2018 abstract start-up companies are the fastest growing business in israel. however, half of them do not last through their fourth year. this paper looks into the issue of the power of israeli start-ups to survive and to become successful companies. the challenge is to seek new directions, which will help this sector to change this disappointing course. the start-up sector has a significant contribution to the strength of the israeli economy which leans on its intellectual resources. based on my continuing consulting in implementing competitive intelligence to local israeli start-ups and further research that i have done by following closely the added value of developing capabilities, which enable better understanding of the external environment, i have found that one of the main causes of the high percentage of failures of israeli start-ups is the difficulties in comprehending the competitive landscape, which has a significant contribution to making them less competitive. by using a new model, the competitive review model, which considers the special attributes of start-ups, especially in cyber security, this kind of small company can be better prepared for intense competition. this is in addition to the lean start-up model, which is not executed in this segment in israel and faces serious resistance based mainly on opposition to unfamiliar input. based on combining the new competitive review model with existing analytical models, a few local start-ups' executives have already matured by awareness about the value of sensing the external environment, which have the potential to change the course of at least some of the israeli start-ups and increase the success rate for this sector. keywords adaptability, competition, competitive review model, competitive intelligence, four corners model, israel, lean start-up, strategic planning, start-ups 1. introduction the growth of the israeli economy is dependent much on its export, mainly high-technology industries and the ability to develop new technologies and applications that would be attractive in the global markets (central bureau of statistics, 2014). many firms are aware that one of the keys to success is intimate knowledge of the global markets (bulley, baku and allan, 2014) by ongoing monitoring of the changes and it is not enough to offer advanced technological solutions (prescott, 1999) and to prevent business failures as a result of intelligence downfalls in business (tsitoura & stephens, 2012). many corporations already understand that competitive intelligence (blenkhorn, & fleisher, 2005) can be of great help in reaching a competitive advantage and sustaining it (global intelligence alliance, 2009, 2011). it is evident that companies with poor information about competitive landscapes were stuck being reactive (le bon, 2014). the use of competitive intelligence can be referred to also as journal of intelligence studies in business vol. 8, no. 1 (2018) pp. 37-45 open access: freely available at: https://ojs.hh.se/ 38 integrated intelligence capabilities, which occur in many larger corporations (bulger, 2016) and more professionals in corporations are using intelligence for their daily missions (mcgonagle and misner-elias, 2016). it looks as though corporations that have ci practices do not use half of the information they collect for various reasons (gilad and fuld, 2016). the challenge is to adjust between the needs of executives and how their corporations collect and process intelligence. there are also those who believe (hoppe, 2015) that in most organizations, intelligence is constructed informally. i do not share this view. large and medium-size israeli companies are moving forward slowly and recent studies conducted indicate this direction (barnea, 2006, barnea, 2009). it seems that competitive intelligence as a discipline in israel that is underdeveloped (barnea, 2016) and it is focused more on fulfilling the immediate needs of the corporate decision-makers rather than on working closely with marketing and strategic planning. in a study titled "why start-up companies failed to adopt competitive intelligence" (barnea, 2006) the key conclusion was that the absence of competitive intelligence awareness was one of the main reasons why israeli start-up companies failed in the global markets during the 1990s. the author has offered different ways to change the situation; one of the primary suggestions was to appoint a senior executive to take care of this issue, as monitoring the international markets was a critical factor for such companies. the author has recommended also to the investment ventures to encourage these ideas and to act to implement them. most of these lessons have never been fulfilled. another study that has looked at ci in israel, mainly from the aspects of using expert tools (barnea, 2009), has revealed that "local firms were not prepared to invest in new ci tools that would enable ci professionals to perform better. as a result, most ci professionals have to continue using generic tools such as office (microsoft), which offers unsatisfactory solutions to their ci program needs". and also that "the high level ci solutions have not reached its potential target market due to a lack of support by senior executives." in 2015, research on the use of open source intelligence (osint) by israeli firms (markovich, 2015) showed that there is intense use of these sources, but the added value to the corporate decision-making process was little. it overlooked the entire picture of ci in the israeli business scene. 2. methodology throughout my consulting in ci among israeli start-ups, i have noticed that their sense of the competitive landscape is very low. the next step was to hold discussions with executives in these start-ups regarding the reasons behind this phenomenon and also watch the start-ups' business performance, mainly in their rate of success to their efforts to penetrate into the markets after their products were completed. as a result, i have proposed the competitive review model with support from other tools as will be described later. after the implementation of the new model in these start-ups, i interviewed the relevant executives in these start-ups to receive feedback. so far, based on a small number of start-ups, it looks as if the decision-making process has been improved and makes these new business entities more competitive. i plan to expand this model to more israeli start-ups and hope that in two years there will be more information regarding the added value of this model. in building the methodology for this model, i used the grounded theory (glazer & strauss, 1967), which guides the scholar on matters of data collection and details rigorous procedures for data analysis. it is based on a systematic watch of certain activities and based upon these views, to build a theory which will improve the quality of these acts. 2.1 limits of the research this research is based on a few start-ups that have agreed to implement the model which will be presented later. it is obviously a limitation, but it looks that in the coming year, more startups will participate and this will enable further analysis to reach a better understanding of how much this new model is really helping startups to become more competitive. 2.2 the startup industry in israel over the last 15 years, israel has built a strong reputation as one of the leading countries in the segment of startups. dan senor and saul singer's book "start-up nation: the story of israel's economic miracle" (senor and singer, 2009), has been translated into more than 30 languages, has strengthened the success story of israela state that produces more start-up companies than large, peaceful, and stable 39 nations such as japan, china, india, korea, canada, and the united kingdom. the success of israel's high-tech sector has attracted attention from larger corporations and each year around 1015 israeli startups are acquired by global corporations for billions of dollars in total. a substantial number of foreign investors are investing directly in israel's technology market through foreign venture capital funds (vcs), corporate vcs or as individuals ("angels"), as a result of the tremendous success of the growing israeli technology market. contrary to the public perception, the israeli start-up success report 1999-2014 (ivc, 2016) uncovers that about 47% of israeli start-ups stop operating (3985 start-ups out of 8489) within 3.5 years on average since their foundation. we do not see an intense theoretical effort dedicated to change that direction from the business studies point of view. in the last three years, israel has seen a very significant growth in the segment of new start-ups in cyber security. it looks as if these start-ups are facing the same illness as regular start-ups – lack of profound understanding of the competitive landscape, both competitors and customers. perhaps adaptive start-up companies that are capable of change fast have better chances to last. in 2016, the israeli start-ups industry raised an all-time high of $4.8 billion, up to 11% from the $4.4 billion raised in 2015 (solomon, 2017). the year 2015 was the most successful for israeli high-tech capital raising activity – 708 deals accounted for an exceptional investment of $4.43 billion. the amount reflected a 30 percent increase from the previous record in 2014, when 690 deals attracted $3.42 billion. the average deal peaked with $6.3 million in 2015, compared with the previous year's $5 million average and a $4 million average deal in the past 10 years (ivc and kmpg, 2016). however, a closer look at the start-up industry in israel shows that the picture is not so pink. although the israeli start-up industry is very attractive for investors, the israeli startup success report 1999-2014 (ivc, 2016) shows that about 46% of the israeli start-ups stop operating within 3.5 years on average since their foundation and 41% of venturebacked start-ups are shut down or are sold at a loss. another study published in israel shows similar rates of failure: the number of start-up companies which were terminated is high and in recent years (2005-2014), there are about 300 (on average) a year when about 700 new start-up companies have been initiated (orpaz, 2017). following the length of life of start-ups operating in israel in 2005-2014 clarifies that there was no change from 10 years ago and 46% of companies lasted between 1 3 years, while 76% of these companies did not last more than six years (orpaz, 2017). similar findings have been reported already regarding the dot com era in israel (barnea, 2006). the amount of money lost in these failures in israel is huge, reaching approximately $ 1 billion a year. it is relevant to mention that the tendency in israel is often to hold companies alive as long as possible, relative to the u.s. or europe and thus to give them more time to bleed. it is a component of the israeli business culture not to give up, and to try again, but it succeeds only in some cases. shutting off failed start-ups is usually hidden and is not reported through the business media, while great success stories like selling waze, the world's largest communitybased traffic and navigation application, to google for $ 1 billion, was in the israeli headlines for a long period. another recent great success is selling the israeli mobileye, operating in development of vision technology for advanced driver assistance systems (adas) and autonomous driving, to intel for $15 billion. the difficulties of start-ups survival are known also in other countries: shekhar ghosh, a senior lecturer at harvard business school wrote, "three out of four start-ups venture capital-backed start-ups do not return capital to investors" (blank, 2013). the figures in the us are quite similarabout 60% of start-ups survived until the third year, and less than 35% matured and survived the sixth year (barnea, 2014). other sources of information indicate that 90% of start-ups fail (patel, 2015). 2.3 lessons from start-up companies according to cb insights research (griffith, 2014), which follows worldwide tech markets, including start-ups, the main reason for failures of start-ups was a low demand for their products: almost 50% of start-ups did not survive for that reason. the second reason for failures was ending of the funds, and the third reason for closing the doors was losing the battle against competitors. however, it would be more refined to put together reasons 1 and 3, as they are interconnected, enable one to see that almost 60% of start-ups have lost the 40 battle to survive for poor understanding of the essence of markets and competitors. looking at many start-up companies worldwide for a long-time shows the following (blank, 2013): 1. usually successful start-ups grow differently than ordinary companies, and they are quickly adjusting themselves to changes and to inputs from customers until they reach to their targets (if they get there!). 2. only seldom, business plans survived as is after the first feedback from customers. 3. most business plans of start-ups are not practical and preparing them in the conventional way can be a waste of time. 4. too often, start-ups lack the knowledge and the experience acquired from monitoring competitors and the marketplace, so they are incline to repeat similar mistakes or ignore important lessons. contrary to existing companies, which are busy implementing business plans, successful start-ups tend to look for the right business plans. this great difference has an incredible impact on their chances to succeed (blank, 2013). blank proposed (blank, 2013), that startups will fulfill the approach of "lean start-up" that is taught in more than 30 business schools in universities in the us. the "lean start-up" methodology is based upon three principles: 1. entrepreneurs have to drop a conventional business plan and offer a set of assumptions or wild guesses that can clarify how start-ups can bring value to customers. 2. to test their assumptions, start-ups have to go out to the field and to ask customers and potential partners about the new product, including characteristics, pricing, distribution and strategies how to reach to customers and based on this information to update their assumptions regarding the new product. 3. further, "lean startup" has to cut the length of the product development cycle by adjusting fast to the information gathered. through this process it will enable creating a product that stands in the most advanced requirements. this new model by blank assumes that contrary to start-ups that launched in the dot com era, working in "silent motion" to avoid potential competitors learning about their plans and to find they are not relevant to the customers eventually led to their collapse. as blank proposes, it is desirable to act differently to increase success rates by exposing beta products at an early stage. feedback gathered from customers and sometimes from competitors, is more significant than secrecy and therefore, delivers better results. lowering failure rates of startups have major economic implications. as a result of the fierce competition in many industries, countless jobs are lost and successful start-ups have a great potential to increase the employment rates and so to compensate for the jobs that are lost in existing industries. so far, israeli start-ups are not aware of the "lean start-up" approach. one of the weaknesses of the "lean start up" model is that it does not include the fundamental need to systematically monitor the external environment, especially competitors, and to learn continuously about potential threats and opportunities. largescale enterprises and leading business schools in north america, europe and parts of asia recognize that competitive intelligence has increasingly come of age as it steadily expands “into mainstream business practices" (hawley & marden, 2006). it happens also in israeli business schools. there is a need within the start-up industry to adopt the competitive intelligence discipline and to implement it suitably with its specific needs. 2.4 the challenge of cyber security start-ups in israel in the last three years, israel has seen a very significant growth in the segment of new startups in cyber security in israel. two years ago there were around 200 israeli cyber start-ups, and we are seeing now around 450. this is very fast growth, especially as the support by the governmental funds is quite minimal. we already see first indicators that in 2017, launching new israeli start-ups in cyber seem 41 to be slowing. most of the funds for these ventures as well as most start-ups in israel are coming from outside israel. in the last year, we are facing also a huge increase in chinese interest funding and acquiring new israeli technologies. the israeli cyber security start-ups’ solutions are covering almost every relevant business segment including automotive, health, infrastructure, information systems, mobile applications, and enterprises. cyber security expenses will keep on growing across all industries. stricter regulation is brought in, while the threats and the concerns are increasing. according to the grant thornton report, (grant thornton, 2015) the leading accountancy and advisory organization, cyberattacks cost global business about $315 billion over the past 12 months. a doubt has been raised regarding the future of these start-ups in cyber (orpaz, 2017). is it possible to forecast who will survive and who will disappear? it is already known that the rate of israeli start-ups that do not survive is quite high – around 50% after their fourth year. it is not known yet how the figures will look within the cyber segment of start-ups, as most of them are quite new. looking into the start-up industry in israel uncovered that about 90% of these start-ups do not monitor systematically the external business landscape. it appears that start-ups in cyber in israel are focused more on the quality and the innovation of the products they offer to their clients. considerably less effort is put into the analytical issues such as what exactly their competitors are offering or intend to offer, what the clients are looking for and analyzing the gaps between "our" solutions vs. the competitors, possibly by applying the methodology of gap analysis (businessdictionary, 2017). israeli outsourcing information suppliers are providing their start-up clients with intelligence on their competitors. they are pretending to give insights; however, these information specialists are unable to give added value and quality intelligence as this needs intimate knowledge of each segment in such a level that only those who are doing this internally on a daily basis, can really deliver. the conclusion is that especially in the start-up industry, outsourcing inputs are incapable of providing proper intelligence and are caught in information rather than in intelligence. the second point is that while considering the small size of most of the start-ups, they need to build up their own capability of intelligence and understand the competitive arena with adaption to their special characteristics. unfortunately, an effort to build a small dedicated intelligence internal capability too often comes across with internal opposition claiming that the resources for such a move are limited. 3. competitive review model: the theory a new model, the competitive review model, has been introduced lately in israel, in order to challenge and support start-ups to become more competitive, that probably increase their survival success rate. so far, this model which i have developed and tested in the last year was implemented in a few start-ups in israel. it is still in its first stage of implementation. it was also presented a few months ago in the quarterly meeting of the israeli ci forum (fimat) and received a warm welcome. 3.1 basic assumptions 1. start-ups are in critical need for dynamic monitoring of the competitive environment. doing this must be an internal business procedure supported by the senior management. 2. each start-up needs to designate a "ci care taker" (a partial job). the goal of this function is to make sure that the firm will be aware of external changes and new directions in its specific segment and to evaluate their possible impact on the firm. 3. intelligence reports have to be prepared internally (osint, supported by outsourcing gathering) implementing the rule of sharing of information internally to avoid unnecessary silos. the outcome is completive review reports. 3.2 competitive review model: the process 3.2.1 aim to present the senior management of the start-up with periodic assessments of the competitive environment to help decisionmakers to better understand threats and opportunities and to consider formulating these insights into business strategy. 3.2.2 when assessments will be presented each quarter. an annual intelligence report will be presented towards at the end of the year. the annual 42 report will outline the current year and will present also trends and potential moves for the next year. only occurring of highly significant events will need an immediate special report. 3.2.3 the outline of the competitive review intelligence report the outline of the concise competitive review report is as following: a. executive summary – what are the major changes in the last period that may effect "our" performance and business plan? b. analysis of the competitive environment – description of important changes that occurred during the period reviewed: notable successes and failures of competitors, new players, new technologies, important changes in regulation, significant mergers and acquisitions in your segment, vital innovation moves and major market trends and clients' expectations. c. analysis of key players: related to key competitors and strategic suppliers separately: key movements, current status of products / capabilities and plans for the future. this stage can be supported by competitive analysis template which divides the analysis into four categories: company highlights, market information, product information and swot information. d. summary and conclusions how “our” start-up stands relative to the competitors / strategic customers and against the trends in the competition environment. it will include also defining what the opportunities are for “us”. 3.2.4 competitive review model: further recommendations based on the experience acquired already in israel, there are further recommendations. a. with regard to the examination of each key competitor and its future strategic moves, it is highly recommended to strengthen the analytical capability by using porter's four corners model (porter, 1980; gilead, 2009) as a complementary tool, which will provide with remarkable insights the future moves and the strategy of key competitors. b. it is also suggested that competitive review intelligence reports are shared with the senior executives of the start-up and with key investors and further used as an agenda for strategic discussions. c. start-ups have also to implement rules for gathering information at exhibitions and professional conferences attended by their employees (calof and fox, 2003). unfortunately, when this is not done systematically it causes losses of meaningful insights. figure 1 four corners model. 43 the competitive review model, actually forced start-ups which use it to review systematically the competitive landscape. its outcome is important not only to executives but also to the investors to be able to understand better the capabilities of start-ups to compete successfully and to be more knowledgeable in their discussions with the senior executive of "their" startups. 3.3 adaptability and start-ups: adjusting organizational culture throughout the process of developing and executing the competitive review model i have noticed that the success of this model depends not only on its own merits but also on the ability of these companies to change. a major challenge of implementing this model in start-ups is also to learn how best to adopt new plans and to establish decisions that may improve their potential to succeed. the meaning is that they need to act on signals of change from the external environment and to be able to move forward rapidly. to do so, start-ups have to behave as "adaptive companies" (reeves and deimler, 2011) in order to gain competitive advantage. adaptability as a new competitive capability in response to uncertainty (garcia-salmones and yin, 2014) can be also a result of experimenting with customers in the early stage as already mentioned by blank (blank, 2013). adaptability is the organization´s capacity to change internally in response to external conditions (denison and mishra, 1995) which can change the classical strategic thinking, and force start-ups to operate as "adaptive companies" while they create more fluid structures, which can make the decision-making process faster and better. 4. conclusions unfortunately, a high number of israeli start-ups will not survive, and many of them will disappear within the first three to four years after their establishment as happens also in the start-up industry in other nations. regarding the cyber start-ups, it is fairly reasonable to foresee a process of fast consolidation, which has already begun. contrary to what most founders and vc officials think and expect, i believe that those who will survive will be those who have the best understanding of the markets and the competition i.e. identify early indicators of opportunities and threats, and not those who just have better products. so, start-ups have to be superior "adaptive companies" and move fast to improve their dynamic monitoring and especially their intelligence of the markets and the competitive arena to support building a winning strategy. thinking more about the future and the next move by competitors supported by systematic use of the competitive review model is essential. in two years, it will be possible to look at the success rates of start-ups that have implemented the new competitive review model and to compare it with those who continue with their "traditional" direction. 5. a short case study the managing director of the israeli start-up (hola, http://hola.org/), ofer vilenski, has admitted recently (vilenski, 2017) that: "for four years, since 2013, we have developed a technology that will connect users to accelerate the internet. however, when we went out with the product on the market, we discovered that it did not interest anyone. as a result, the start-up has created an organizational culture of quick attempts that focus on a particular direction only if two conditions were met: the basic assumptions of the product can be examined within two weeks and there is business potential in a direction that justifies the experiment. otherwise, you have to kill the idea or change the focus. the start-up raised about $30 million, but most of the money was spent without any real progress." following this experience, the company started teaching its employees that it is okay to fail and to move on. vilenski emphasized that: "most people are not used to changing direction at 90 degrees. it took a long time to convince them that an approach of rapid change is the way to achieve success, that they have to move quickly to change direction, to adapt to what is happening on the ground, and not to treat the ego." today hola's employees prefer to find out why a certain product will not work, instead of getting stuck after three years of working on a 44 product that is not required. vilenski is confident that: "you cannot tell if something is good or bad, and you have to know how to accept it (even outside the world of work). therefore, a management culture must be developed to ensure that product development is a rapid evolutionary process." the hola start-up reported (2017) a significant milestone: 117 million installations have so far been recorded for the company's product. the company's main product is a vpn service that allows you to bypass geographic or government restrictions for surfing the internet. the success story of the hola start-up can be summarized by the following key success factors: ability to become an adoptive company, receiving early feedback from the customers about the new product, and to develop greater awareness of the activity by the competitors to observe how it is possible to create a competitive advantage. 6. references barnea, a. (2006). "why start-up companies fail to adopt ci", competitive intelligence magazine, vol. 9, no. 1, january/february. barnea, a. (2009). "intelligence solutions through the use of expert tools". competitive intelligence magazine, vol. 12, no. 3, may – june, 2009. barnea, a. (2014). "looking outward: the startup industry: a view from israel", competitive intelligence magazine, vol. 17, no. 2 april /june. barnea, a. (2016). "study on competitive intelligence in israel: 2016 update", journal of intelligence studies in business, 6, (2) 5-16. blank, s. (2013). "why lean startup changes everything, harvard business review, may. blenkhorn, d. l., & fleisher, c. s. (2005). competitive intelligence and global business. westport, ct: praeger. business dictionary, 2017, definition of gap analysis, http://www.businessdictionary.com/definition/ gap-analysis.html bulger, n. (2016). "the evolving role of intelligence: migrating from traditional competitive intelligence to integrated intelligence", the international journal of intelligence, security and public affairs, 18:1, 57-84. bulley, c., baku, k. and allan, m. (2014). "competitive intelligence information: a key business success factor", journal of management and sustainability; vol. 4, no. 2. calof, j., & fox, b. (2003). "trade show intelligence", competitive intelligence magazine, vol 6, no. 6, november december. central bureau of statistics, state of israel (2014). http://www.cbs.gov.il/www/hodaot2014n/16_1 4_170e.pdf denison, d. r., & mishra, a. k. (1995). "toward a theory of organizational culture and effectiveness". organization science, 6 (2). gilad, b. and fuld, l. (2016). "only half of companies actually use the competitive intelligence they collect", harvard business review, jan. 26, https://hbr.org/2016/01/onlyhalf-of-companies-actually-use-thecompetitive-intelligence-they-collect gilad, benjamin (2009). business war games. nj, career press. global intelligence alliance (2009). "competitive intelligence: a global study on large companies", http://www.globalintelligence.com/insightsanalysis/white-papers/best-practices/ global intelligence alliance (2011). "market intelligence in global organizations: survey findings in 2011", https://www.mbrain.com/wpcontent/uploads/2015/04/10852.pdf grant thornton, (2015). "cyber attacks cost global business $300bn+", at https://www.grantthornton.global/en/insights/ articles/cyber-attacks-cost-global-businessover-$300bn-a-year/ garcia-salmones, l., & yin, j. (2014). "developing adaptability for new competitive advantage", asian journal of management and innovation, june-december. griffith, e. (2014) "why startups fail, according to their founders", fortune, sep 25, at http://fortune.com/2014/09/25/why-startupsfail-according-to-their-founders/ hawley, m., & marden, b. (2006). “fim: a business information system for intelligence”, international journal of intelligence and counterintelligence, vol. 19, no. 3. 45 hoppe, m. (2015). "intelligence as a discipline not just a practice", journal of intelligence studies in business, vol. 5, no. 3, pp. 47-56. ivc research center. (2016)."israel startup success report 1999-2014", at http://www.ivconline.com/research-center/ivcpublications/ivc-surveys/startup-report ivc research center & kpmg. (2013). "summary of israeli high-tech company capital raising 2012, ivc and kpmg report", at http://www.ivconline.com/portals/0/rc/survey/ivc_q412_survey_pr-eng-final.pdf le bon, j. (2014). "use your sales force's competitive intelligence wisely", from data to action, harvard business publishing, hbr. org. insight center. markovich, a. (2015). "the impact of perceived quality of web information sources on the use of competitive information by decisionmakers and on firm's performance", ma dissertation, the university of haifa, school of management, the department of information and knowledge management. mcgonagle, j. and misner-elias, m. (2016). "the changing landscape of competitive intelligence: the critical issues investigated", salus journal, issue 4 no. 1. orpaz, e. (2013), "the brutal survival laws of the start – up industry", the marker (hebrew), july 1st, at http://www.themarker.com/technation/1.2059 828 orpaz, e. (2017), "come on – this is a start-up", the marker (hebrew), may 30, at https://www.themarker.com/technation/start up/1.4137625 patel, n. (2015). "90% of startups fail: here's what you need to know about the 10%", forbes, jan. 16, https://www.forbes.com/sites/neilpatel/2015/0 1/16/90-of-startups-will-fail-heres-what-youneed-to-know-about-the-10/#21d37bd66792 porter, m. e. (1980). competitive strategy. new york: free press. prescott, j. (1999). "the evolution of competitive intelligence, designing a process for action", apmp, spring. reeves, m., & deimler, m. (2011). "adaptability: the new competitive advantage", harvard business review, july-august. senor, d., & singer, s. (2009). start-up nation: the story of israel's economic miracle, twelve, hachette book group, ny. solomon, s. (2017). "israel tech raised record $4.8b in 2016, up 11% from last year – report", times of israel, january 10, at http://www.timesofisrael.com/israel-techraised-record-4-8b-in-2016-up-11-from-lastyear-report/ tsitoura, n. & stephens, d. (2012). "development and evaluation of a framework to explain causes of competitive intelligence failures" information research, 17 (2), paper 521. vilenski, o. (2017). "we invested four years in a product that did not interest anyone", themarker (in hebrew), may 30, at http://www.themarker.com/technation/startu p/1.4137788 opinion section 79 evaluating the impact and value of competitive intelligence from the users perspective the case of the national research council’s technical intelligence unit jonathan calof 1 1 telfer, canada email: calof@telfer.uottawa.ca received december 20, accepted december 25 2014 abstract: understanding and being able to measure and prove the impact and value of intelligence is of significant importance. the objective of this study was to develop an evaluation instrument that the users of intelligence could fill in that could be used to assess both the impact and value of the intelligence they received. starting with an evaluation instrument based on lists of benefits identified in the competitive intelligence literature, measures of these benefits and client satisfaction/service quality metrics, the study researchers interviewed clients of one large government competitive technical intelligence organization asking them to articulate the benefits they obtained from the intelligence they received and methods for evaluating these benefits. all users of intelligence identified benefits they had received from the intelligence received. additional benefits beyond those that are in the current literature were identified by those interviewed. in terms of measurement of these benefits, intelligence users (the clients) understood why hard financial type measures for example roi or dollar impact on performance was important (especially in their organization) they felt that assessing these for the intelligence they received would be difficult but that softer, more subjective measurement such as extent to which the user agrees that the intelligence provided the intended benefit could be used. additional perceptual based indicators of service quality and customer satisfaction measures were also suggested by intelligence clients. based on available for free online at https://ojs.hh.se/ journal of intelligence studies in business vol 4, no 2 (2014) 79-90 mailto:calof@telfer.uottawa.ca https://ojs.hh.se/ opinion section 80 the results of the literature review and interviews, an intelligence evaluation instrument was developed that asks the clients to assess the extent to which they have realized one or more of 27 impacts identified in this study as well as assessing 10 elements of service quality. keywords: evaluating intelligence, intelligence impact, cti, technical intelligence, cti impact, case study 1.0 introduction the need to understand the impact of intelligence evaluating the impact and value of competitive intelligence has been identified as an important intelligence research issue for many years (blenkhorn and fleisher 2007; global intelligence alliance 2004; herring, 2007; davison, 2001; kilmetz and bridge 1999; lonnqvist and pirttimaki 2006; viva business intelligence 2000). fehringer et al. (1996) wrote that “the ability to measure and demonstrate the value of ci has consistently been among the top items on many practitioners wish lists and previous surveys have reflected their desire to be able to demonstrate ci’s contribution to their organization” (fehringer et al. 1996, 99). kahaner (1997) warned ci professionals on “the need of showing the added-value of their services to ensure the commitment of top management to support” and almost 20 years later it still remains an important issue as highlighted by global intelligence alliance“ mi professionals have been struggling to answer questions related to the expected value and impact of the mi investment for just about as long as the profession has existed “ (gia 2014, 4). given this stream of literature and the weaknesses identified, the objective of the study and the article is to develop an instrument that can be used to measure the impact and value of intelligence for its users. 2.0 measuring and proving the impact of intelligence – literature review given the importance of showing the impact of intelligence, it is not surprising that many ci practitioners and researchers have proposed (but not tested) frameworks and approaches for doing so. herring (1996) was among the first authors who tried to identify relevant criteria for ci measurement. he proposed four types of metrics: revenue increase, cost avoidance, and cost and time savings. the concept behind this approach was that the best way to evaluate impact was to identify what impacts intelligence were supposed to bring to those that tasked the intelligence function (the end users/clients) and then find out if these impacts arose. the key contribution of the herring paper was the identification of the core benefits that intelligence could bring to its users – increase in the company’s revenues, avoiding costly mistakes, saving time and identifying cost savings. for the development of the instrument for this study, therefore, the literature review and instrument must identify the specific benefits that are supposed to arise from the intelligence produced and develop a way of measuring it. ten years later, fehringer et al. (2006) expanded this list of impacts and identified 7 values or impacts of ci financial goals met, new products or services developed, new or increased revenue, cost savings or avoidance, time savings, profit increases, and actions taken. similar to the herring approach this related to the direct impact that the intelligence was to lead to, the reason it had been requested. fehringer et al. (2006) also defined another measurement category they called assessing ci effectiveness which had six factors (return on investment, competitive intelligence productivity or output, customer satisfaction, decisions made or supported, new products or services, strategies enhanced). this latter category contained both direct impacts (decisions made or supported, new products or services, strategies enhanced) which in a sense results in 10 direct impacts and an indirect measurement of the benefit of the intelligence – customer satisfaction. this measure has its roots in the service marketing literature which posits that a subjective measure (customer satisfaction) is a good proxy for the quality of the service provided. if the customer was not satisfied with the service received (in this case the intelligence) then it would not have much impact (anderson et al., 2008; patterson et al. 1996; wirtz and lee 2003). finally, the study also provided direct hard measures in terms of roi and productivity. opinion section 81 the fehringer et al. study (2006) made three very important contributions to the development of the intelligence impact instrument. 1. it added additional direct impact factors which intelligence products were designed to create. 2. it added a measurement concept of implying benefit based on satisfaction with the service/product itself, a soft measure. 3. it suggested a direct impact measure such as roi and productivity. hard and quantifiable numbers. this concept of using a mix of hard (quantifiable) measures and soft (subjective) measures is not unusual in the ci evaluation literature. for example, in 1998 simon proposed an evaluation framework that included 21 hard measures and 29 soft measures. these are provided in table 1. a similar approach was taken by mcgonagle and vella (2002 – see table 2). as the impact literature developed, additional direct impact factors and measurements were proposed. for example in 2014, global intelligence alliance, in writing about evaluating intelligence listed 3 broad indicators with several factors that could be measured underlying each. decision making related indicators: decision-makers’ perception of the availability of information when it’s needed; mi’s involvement and contribution to different types of business decisions in the company; financial indicators : calculated financial worth of caseor project-specific mi efforts; cost savings through coordinated purchases of information and the elimination of redundancies; demonstrated time savings through systematically organized market monitoring ; and, indicators of a qualitative nature : the status of the company’s mi program as measured against the gia world class mi roadmap; the number of active users of the company’s mi software tool and/or participants in internal events that mi organizes; the size of the internal network of people that are involved in mi activities on a regular basis; the number of requests to the mi team; the number of deliverables (regular and ad hoc) that the mi team produces; the development of the internal nps score of the mi program; number of new business ideas generated as a result of mi efforts). there have been many other studies that have looked at evaluating intelligence impact that provided valuable input for the development of a research instrument. davidson (2001) proposed a formula to calculate the return on ci investment (rocii) for individual projects. he proposed that ci outputs (or the effects of ci plus decision maker satisfaction) less the monetary value of ci inputs (or costs associated with) are divided by ci inputs to derive the rocii. this measure of impact combined both hard numbers (the monetary impact of ci) with subjective or soft measures (decision maker satisfaction. pirttimäki et al. (2006) conducted a case study of a finnish company they examined how intelligence activities were measured. they identified four categories of measurement: financial (e.g. inputs and outputs ratios), process (e.g. inputs and outputs), learning and growth (e.g. organizational learning, decision making) and customer (e.g. usage of intelligence, satisfaction, resources/time). in all, they identified five objects of measurement and specific indicators for each: intelligence output (number of fulfilled assignments), intelligence input (working hours, total costs of information sources, total costs of using services), satisfaction of information users (surveys, feedback), intelligence usage (intelligence portal usage, number of intelligence requests) and intelligence costs (billing, and reports). table 1. hard and soft measures of ci success (simon, 1998) hard measures soft measures costs – ci contribution to the bottom line (input) 1. cost of doing the research 2. cost benefit of ci research 3. financial gain from ideas quantitative measures (output) customer usability 1. work habits 2. user friendly reports 3. participation on teams 4. contributions to teams 5. communication skills 6. contact follow-ups opinion section 82 1. clients serviced 2. projects completed 3. suggestions submitted 4. suggestions implemented 5. projects assisted 6. number of bi/ci staff 7. staff productivity 8. participants in the ci process (direct and indirect) quality measures 1. intelligence product measures 2. accuracy of information (validity and reliability) 3. immediate usability of results (no rework) time measures 1. ability to produce timely info. 2. efficiency 3. time saved by ci 4. on-time delivery ci practitioner performance measures 1. effective use of resources (resourceful and creative) 2. knowledge of ci methods 3. resourcefulness 7. customer satisfaction ratings 8. understanding acceptance and alliance measures 1. work climate 2. number of requests for service 3. number of repeated requests for service 4. requests for participation in team meetings 5. referrals from customers 6. further integration of ci projects unit and personnel effectiveness measures 1. feeling/attitude 2. solicitation for services 3. attitude changes – clients taking you in to confidence or consulting with you 4. customer loyalty rating 5. perception of ci contributions 6. relationship building (sharing of personal information) 7. problem solver perception personnel development/advancement rewards 1. job effectiveness 2. attendance at ci orientation and training programs (participant or teaching) 3. promotion 4. pay increases 5. work accomplishment acknowledgments ci practitioner performance measures initiative 1. implementation of new ideas 2. degree of supervision required 3. ability to set goals and objectives total: 21 criteria total: 29 criteria table 2. ci measurement according to mcgonagle and vella (2002) assignments and projects 1. meeting objectives 2. number completed 3. number completed on time 4. number requested 5. number requested—increase by end users 6. number of follow-up assignments 7. number of projects assisted 8. number of suggestions submitted budget 1. comparative cost savings—compared with cost of outsider 2. comparative cost savings—compared with cost of untrained 3. meeting project and function budget constraints efficiency 1. accuracy of analysis 2. data quality opinion section 83 3. first time results (no reworking) 4. meeting project time line 5. time for research versus time for response end users 1. creating compelling reasons to use ci 2. effectiveness of implementation of findings 3. meeting needs 4. number of referrals 5. number served feedback 1. [feedback]—written 2. [feedback]—oral financial 1. cost avoidance 2. cost savings 3. [financial] goals met 4. linking ci to specific investments 5. linking ci to investments enhancement 6. linking ci to specific savings from unneeded investments 7. revenue enhancement 8. value creation internal relationships 1. building strong with end-users 2. formulating relevant strategy and tactics 3. quality of relationship with end-users 4. quality of participation on cross-functional teams new products and services 1. number developed due to use of ci 2. cost savings/avoidance in development from use of ci performance 1. growth profitable for the unit or firm 2. impact on strategic direction of unit or firm 3. market share gains for unit or firm report and presentations 1. number 2. number of follow-ups 3. production of actionable ci sales effectiveness customer satisfaction 1. linking to specific customer wins 2. number of customers retained 3. number of leads generated 4. repeat business 5. improvement in win-loss ratio surveys 1. [surveys]—written 2. [surveys]—oral time 1. gained by ci input 2. projects delivered on time 3. saved by input to summarize, in examining the literature around evaluating intelligence impacts four concepts are identified that impacted this studies evaluation instrument: opinion section 84 the concept of an intelligence having a direct impact on an action or decision: the literature has identified many of these direct impacts starting with herrings (led to revenue increase, led to cost avoidance, led to cost and time savings). in measuring the impact and value of intelligence any instrument designed would need to recognize the actual objective of the intelligence provided. the concept of measurement of impact and value using hard indicators: most studies reviewed for this paper proposed or identified efficiency and effectiveness measures such as return on investment in the specific project (or unit), amount of revenue arising from the intelligence report and so forth. the concept of measurement of impact and value using soft or perceptual based measure: decision makers perception of availability of information when it was needed, extent to which they agree that a value was received were found in many studies as well as other soft and perceptual measures. the concept of implied impact based on client satisfaction with the service: questions such as to what extent where you satisfied with the service?, would you recommend it to someone else? despite all these concepts and several papers that propose evaluation frameworks and measures, few have tested these measures within an organization. it is this gap as well as the weaknesses identified in the 2014 in the global intelligence paper and other articles reviewed that this study sought to address. 3.0 methodology 3.1 case study design given the areas of importance and weakness in the ci performance evaluation literature described in 2.0, the objective of the study was to develop an instrument that could be used to measure the benefit’s clients received from the intelligence they received and the value of these benefits. in developing the study methodology access was needed to an organization that had conducted a significant number of intelligence studies and had a broad client base. the higher the number of intelligence products (unit of analysis) the larger the base to draw upon to get client feedback on how the intelligence benefited them and how this benefit could be measured. the author was given access to the competitive intelligence unit of the national research council (canadian government organization), to their intelligence personnel, past intelligence products and clients. the organization refers to the unit as competitive technical intelligence unit as the unit is producing intelligence within a technical environment. note that performance being an issue of importance has also been extensively written about in the competitive technical intelligence (cti) literature as well (rosenkrans, 1998; norling et al. 2000; dollatabady et al. 2011). however, the training the staff received and the projects themselves cover far more than just technical intelligence techniques. in reviewing the intelligence products produced by the unit, the researchers noted that the nrc’s cti unit produced a broad range of intelligence assessments and products. studies took anywhere from a day to produce (simple patent scans, market analysis or literature reviews) to multiple months in the case of scenarios and expert panels used for policy development. clients for the cti were very broad including canadian companies, departmental technical officers making investment recommendations (whether the government should provide funding to the venture), research recommendations for government scientists, policy advice and so forth. the following approach was used to develop the instrument for measuring the benefits of intelligence to the end user (client) and their satisfaction with the intelligence. a document was developed (which would be shown to intelligence clients) that identified the benefits of intelligence found in the literature review. the document then had suggestions from the literature regarding how to measure these benefits, providing the participant with both soft and hard measures and finally the document contained a listing of the quality of service/customer satisfaction measures seen in the intelligence literature. a sample of the organizations cti clients was drawn (sampling methodology is mentioned in the next section), who would be interviewed for their opinions on benefits they received from intelligence and how these benefits could be measured. the research team did not want to be seen as biasing the study towards a priori benefits identified in the literature review but wanted to ensure that as comprehensive a list of benefits and measures from the perspective of the user could be developed. as such, rather than present opinion section 85 the document with all the benefits identified in the intelligence literature and measures all of those interviewed were asked to list the benefits that they could recall from the cti project they had commissioned/received. after describing all benefits, the clients were then shown the intelligence reports that they had received from the nrc’s cti unit and asked if they could recollect any other benefits. after the respondents had exhausted their recollection of benefits, the researchers then showed the respondent the intelligence benefits portion of the document (appended with any new impacts that the respondent had stated in the interview) and asked again to look at the list and to also indicate the extent to which any of the benefits had been received. the interview would then end with a discussion on how each of the benefits on the list could be accurately measured and the quality of service/customer satisfaction measures. after each interview, the study document was modified with the addition of benefits previously not included in the document and the addition of other measures based on interview results. any additions to the document were based on two researchers independent review of interview notes. in other words, additions arose only if both researchers reached the same conclusions based on the interview notes. to develop the final survey instrument, those benefits receiving at least one mention in the interviews would be included in the final evaluation instrument and those items which respondents did not list as benefits was removed. in some cases some of the items removed not only did not get a single “vote” but were frequently mentioned as benefits which those interviewed did not feel were an appropriately important benefits of intelligence. while the intelligence literature has identified many direct and indirect benefits of intelligence, in assessing impact and value from the user (clients) perspective, the researchers felt that it was important that the benefits measured be those of importance to the clients themselves. 3.2 sample frame in all, clients representing over 50% of the organizations intelligence projects were interviewed for this research. to identify who to interview a two-step process was followed. in the first step which offices to focus on was identified and in the second step selection of clients to interview. the organization has intelligence offices across canada. some of these are small offices (one or two intelligence staff) and some are large offices. five offices were chosen for the study. the offices chosen represented those that produced the highest volume of cti reports and had been involved in producing cti the longest. given that the intent of this study was to develop a comprehensive instrument for measurement of benefits it was felt that offices with higher experience levels and greater number of projects would be appropriate. second, within each office, the researchers sought to identify the clients that they wanted to interview for the study. similar to the office selection, experience was used as a basis for the selection of the clients selected for interviews. clients were chosen based on two factors: volume of cti products requested: how many products were requested? who were the most frequent users of cti? scope of cti products requested: the organization has three levels of cti products, information reports, cti brief/insight and cti assessment. the intent was to interview clients who had requested most if not all of these products. as an example of this selection methodology, one of the offices (call it office 1) was selected as it was one of the oldest offices as of the time of the interviews with one of the largest number of cti projects completed. the office had 21 clients (people that had requested intelligence reports). in reviewing the type and number of projects ordered by these 21 clients, it was noted that five clients accounted for over half the projects in general and almost all the analysis reports. accordingly, interviews were scheduled with all 5 clients who collectively represented 60% of all projects done in this office. sampling in this manner resulted in similar project coverage rates. for office #2, 71% of their projects were covered in the interviews, 77% in office #3 and 100% in office 4. 4.0 results and discussion based on the methodology described in section 3, 27 decision impact items and 10 service items were included in the final evaluation questionnaire (appendix a). based on interviews with the clients, only perceptual measures were used in the final evaluation questionnaire and in particular, a likert evaluation scale of perceptual impact was found to be the best method for measuring impact. opinion section 86 impact factors: support for many of the impact factors cited in literature reviews arose in the interviews and in fact, all clients interviewed articulated that they had received significant benefits from the cti products and process. saving time, saving money, making better recommendations, quicker recommendations, etc., all respondents were easily ably to identify benefits from the intelligence they had received. |additional impacts were cited that the researchers did not note in the current literature. service quality/client satisfaction: in all interviews, respondents talked about service quality elements when they talked about the benefits. while the initial study design was to have this brought up by the researcher in the interview when discussing measurement, in all cases the interviewees themselves (the clients) talked about their experience with the intelligence staff before being asked about it . service quality and satisfaction were evident in statements such as professionalism of the cti officer, how pleasant they were to deal with, their (the clients) desire to use the service again and how they were recommending cti services to others. these are all measures that have been examined in the management consulting literature as ways to evaluate the professionalism and effectiveness of consultants and consulting units (see the earlier literature review). these statements provided confirmation on the earlier framework that recommended evaluating the intelligence impacts using service quality and client satisfaction metrics. measurements, soft versus hard. clients interviewed stated that use of hard measures such as return on investment, impact on decision, etc. would be difficult, if not impossible to do. the participants felt that the only measures that should be used would be a perceptual measure (subjective questions) about whether they felt they had received the benefit. although all interview participants told stories about the benefits they received and were insistent that these benefits had been received, when asked if they could quantify the benefit the answer was consistently no. respondents were aware that harder measures such as return on investment, cost/benefits were critical for their organization but cautioned against it for competitive intelligence. however while they could not quantify the benefit they could provide an indication as to the extent to which they had received the benefit using a likert scale of 1 (strongly disagree) to 5 (strongly agree). when asked why harder measures could not be used, respondents answers fell into five broad categories: complexity of the clients decisions making process. while the cti report was clearly used to help make the decision/policy, their decision making was more complex than reading the cti report and implementing the report recommendations. no respondent was prepared to say how much of the decision was influenced by the report, only that it was an important element in making decisions and developing policies. here is one example of this difficulty. in one of the intelligence projects, the client stated that the cti they received was used to provide an investment recommendation (whether the government should provide funding to the canadian company that had requested technology funding assistance). the client of the intelligence product (the government officer making the recommendation) talked about how their final decision was based on many factors including the cti report which provided the market assessment, a technical report provided by technical advisor which assessed the underlying technology, and a business analyst report discussing the strength of the organization that would receive the investment. the cti report contributed but so did the other reports as well as the officers own experience. additional value added by the clients to the intelligence: this is a slight extension of the complexity of decision making process. several respondents stated very strongly that in the end they made the decisions/recommendations based on discussing it with others, doing additional research, etc. call this client value added activities with the intelligence. complexity of factors beside the intelligence responsible for success and impact: this was mentioned more when the type of intelligence received was designed to help develop new products/services, reduce costs, make sales, almost dealing with growth. in implementing the intelligence recommendations for example designing policy, strategy, r&d programs there are a lot of other factors that need to line up for success to occur. thus, directly linking the cti report in a quantifiable way to the success of the technology investment would not be possible. further, in trying to quantify costs saved, opinion section 87 program benefits arising from the decision itself, or policy benefits (when the cti report clearly impacted the decision), participants pointed out that policy impacts were too complex to be assessed in this way. in one case program impacts were mediated by government elections wherein the recommended policy was scrapped by a subsequent government. in this case the intelligence had no impact due to change of organization. in another case, the intelligence was not fully implemented – the client decided to adopt some of the intelligence reports recommendations but not all. temporal orientation of the intelligence: while some intelligence was designed to impact decisions that would get results in a short time frame (under a year) other intelligence projects had a longer time frame. one for example was an intelligence report done for seed research for which whether the benefit is received (market share and sales) will not be known for 40 years. therefore to link the intelligence with the subsequent research success or commercial success in this case would require waiting 40 years. organizational politics: many respondents indicated that politically in their organization it would be unwise to credit too much of a decisions success to anything besides their own skills/expertise. talk of complexity in measurement of benefits was evident in most interviews with those interviewed providing specific examples to the researchers and challenging them to develop a method that would involve hard measures on direct benefits. for example, one of the clients provided a cti example and challenged the researcher on how it would be evaluated from a financial/roi perspective. the cti developed was a market study which told the officer that a government investment in a technology was sound but that the company was focusing on the wrong market. the report identified other markets. the client then discussed this cti report with the intended recipient of the government technology investment funds. the investment was approved as the cti report proved that the technology was sound and the technology was built as per the objectives of the cti. however, the cti provided to the company caused them to change their marketing approach. the client challenged the research to identify how the roi of the cti would be calculated. was it the value to me (the client) of a good decision or was it the value to the company that was provided with the money? is the roi on this one the money saved by not going to the wrong market? money gained by going into the correct one? value of not investing in the wrong company? another client challenged the researcher on what could be best termed an indirect cti report benefit. the client had commissioned a cti report to assist with policy development. while the cti did land up being used as the basis for policy development (verbatim elements of the cti report were included in the policy), the government client stated that elements of the cti report were integrated in a speech the officer made to an industry association and an interview conducted with a national news network. the information was then used by many companies in the industry. again, the client was clear on the benefits he received from the cti report but stated that there were additional benefits beyond that intended by the report. in a corporate environment this would be similar to intelligence reports being shared by different divisions or people within the same division and impacting their decisions – whose roi would you measure? clients were indicating that the value of cti was greater than just impact on the policy or decision and while they could subjectively state that they got high value from the intelligence product, they could not quantify it. to conclude this section, based on an extensive literature review and a multi-step methodology that involved extensive interviews with cti users, a cti impact evaluation instrument was developed. this instrument identified specific benefits of intelligences and then measures the extent of the benefit were received by asking the client to assess the extent to which the benefit was realized using a five point likert scale. as well, consistent with the consulting and management services literature client satisfaction and other service quality measures were put into the evaluation instrument which was also measured based on client perceptions. this instrument can be used after the cti project has been done to assess the benefits to the client of the intelligence received. 5.0 conclusions the intelligence literature notes the importance of proving value and impact of intelligence on the intended user of the intelligence. this study opinion section 88 sought to develop an instrument that could be used to measure this impact. consistent with consulting and intelligence literature, it was found that client perceptions of benefit needs to be used as a primary method of evaluation. client’s themselves indicated that it would be difficult to use non perception based methods of evaluation. 5.1 study limitations and areas for future research the results of this study are based on intelligence as conducted in one organization and may not be generalizable to other organizations. in fact, as the unit is a technical intelligence unit, it is uncertain whether the evaluation instrument developed out of the study could be used in a non-technical intelligence organization. generalizability is further restricted as the list of benefits were driven by the users of intelligence in this organization and perhaps other intelligence organizations have a different focus. while most of the benefits identified in this study are consistent with past research, nevertheless there appears to be organizational nuances to intelligence benefits that may need to be looked at in future studies. further, even though the literature used in the development of the initial evaluation instrument was global, the evaluation instrument may not be generalizable outside of canada or even outside this one organization. accordingly, future studies should attempt to test the instrument developed here. another area for future study is instrument reliability and validity testing. the instrument should be tested on a broader group with appropriate statistical tests of reliability and validity. without factor analysis and cronbach’s alpha it is not possible to state definitively that the instrument is both reliable and valid. while face validity has been established by use of client testing and fit with the existing literature, nevertheless statistical testing is required before the evaluation instrument should be considered acceptable for use. 5.2 implications for cti practitioners, policy and other stakeholders notwithstanding the limitation noted above, the results of this study have significant implications for cti practitioners as well as policy and other stakeholders. cti can be assessed without having to wait for the final impacts of the cti recommendations to arise. for all involved in cti, it is clear from the results of this study that user perceptual measures should be used. asking clients to assess on a likert scale for example the extent to which the cti provided saved them time in making the decision or helped them gain funds (research funds) is a good way to evaluate cti impact. not only is this consistent with the literature but based on the client interviews may be the only method they are prepared to accept. it is undeniable that the evaluation of cti is a complex task owing to the complexity of both the cti process and the ensuing client decision making/policy development process. nevertheless, this study has demonstrated that evaluation can be done, albeit using perceptual measures. 6.0 acknowledgements funding for this research was provided by the national research council of canada. the author acknowledges the research support provided by france bouthillier, mcgill university on this research project. her research skills and insight helped in the development of the study and associated instruments. the author further thanks the reviewers for this paper. the comments provided served to improve and focus the paper. 7.0 references anderson, shannon, lisa klein pearo, and sally k widener. (2008). drivers of service satisfaction linking customer satisfaction to the service concept and customer characteristics. journal of service research 10, 4, 365-381. blenkhorn, david, and craig fleisher. (2007). performance assessment in competitive intelligence: an exploration, synthesis, and research agenda. journal of competitive intelligence and management 4, 2, 4-22. davison, leigh. (2001). measuring competitive intelligence effectiveness: insights from the advertising industry. competitive intelligence review 12, 4, 25--38. dollatabady, rezaie, farzaneh ghandehari, and farham amiri. (2011). analyzing the impact of competitive intelligence on innovation at scientific research centers in isfahan opinion section 89 science and technology town. interdisciplinary journal of contemporary research in business 3, 5, 939-947. fehringer, d., b. hohhof, and t. johnson. (2006) state of the art competitive intelligence. 1st ed. virginia: competitive intelligence foundation. global intelligence alliance. (2014). demonstrating the impact of market intelligence. gia white paper, gia. global intelligence alliance. (2004). measuring the benefits of competitive intelligence. gia white paper series. gia. herring, jan p. (2007). how much is your competitive intelligence worth? competitive intelligence magazine 10, 2: 23. herring, jan p. (1996). measuring the effectiveness of competitive intelligence. 1st ed. alexandria, va: society of competitive intelligence professionals. kahaner, larry. (1997). competitive intelligence. 1st ed. new york: simon & schuster. kilmetz, s, and r bridge. (1999). gauging the return on investment in competitive intelligence: a three-step analysis for executive decision makers. competitive intelligence review 10, 1,4-11. lönnqvist, antti, and virpi pirttimäki. (2006). the measurement of business intelligence. information systems management 23, 1, 32. mcgonagle, john j, and carolyn m vella. (2002). bottom line competitive intelligence. 1st ed. westport, conn.: quorum books. norling, parry m, jan p herring, wayne a rosenkrans, marcia stellpflug, and stephen b kaufman. (2000). putting competitive technology intelligence to work. researchtechnology management 43, 5, 23-28. patterson, paul g, lester w johnson, and richard a spreng. (1996). modeling the determinants of customer satisfaction for business-to-business professional services. journal of the academy of marketing science 25, 1, 4-17. patterson, p. (2000). a contingency approach to modeling satisfaction with management consulting services. journal of service research, 3, 2, 138-153. pirttimäki, virpi, antti lönnqvist, and antti karjaluoto. (2006). measurement of business intelligence in a finnish telecommunications company. the electronic journal of knowledge management 4, 1, 83-90. rosenkrans, wayne a. (1998). past, present, and future directions for technical intelligence. competitive intelligence review 9, 2, 34-39. simon, neil. (1998). determining measures of success. competitive intelligence magazine 1, 2, 45-48. viva business intelligence inc. (2000). measuring the benefits of business intelligence. pro-how papers. wirtz, jochen, and meng chung lee. (2003). an examination of the quality and contextspecific applicability of commonly used customer satisfaction measures. journal of service research 5, 4,345-355. opinion section 90 appendix a final cti questionnaire please note the extent of the benefit using the following scale: 1 2 3 4 5 strongly disagree strongly agree item: benefit to you benefits impact on savings 1. it helped to save time 2. it helped to save money 3. it helped to save resources impact on gains 4. it helped me to gain more money 5. it helped me to gain more staff impact on decision making/recommendation 6. i made my recommendation more rapidly (timeliness) 7. i made a better recommendation (appropriateness) 8. my recommendation was validated (reassurance) 9. it helped to reduce bias(es) in decision making/recommendation 10. it helped to reduce the possibility of errors in my recommendation 11. it helped to pursue opportunities 12. it helped to develop partnerships/collaboration 13. it helped to develop better strategies impact on knowledge (cognitive dimension) 14. i became aware of important issues that i was not aware of before 15. i could go further in my thinking 16. it gave me information that i was able to use in future projects 17. it broadened my knowledge 18. it had given me the information required to improve my proposal/project 19. it had given me the information i needed to provide my client with good advice 20. it helped me to identify new markets 21. it helped me to identify new ideas impact on perception (affective dimension) 22. it made me more confident on my recommendation 23. it helped to reduce perceived uncertainty 24. it has enabled me to do my job better 25. it helped to reduce risk 26. i could act differently impact on service towards clients 27. it has helped improve service to my clients appreciation of service quality 1. the reports were easy to read/ consult 2. staff showed good knowledge of my area/industry 3. staff understood my problem/issue 4. staff was flexible in adapting themselves to my requests 5. staff paid attention to my needs 6. cti reports were reliable 7. cti reports were accurate 8. i felt that my needs were dealt with in a timely manner 9. i will recommend the unit to others 42 strategic foresight: determining patent trends in additive manufacturing marisela rodríguez salvador *, paola cruz zamudio * , andrés santiago avila carrasco*, elías olivares benítez ** , beatriz arellano bautista ** * tecnológico de monterrey, campus monterrey, méxico marisrod@itesm.mx, paopcz4@gmail.com, andresavilca@hotmail.com ** universidad popular autónoma del estado de puebla, méxico elias.olivares@upaep.mx, beatriz.arellano@upaep.edu.mx in memory of jonas rundquist, halmstad university received november 5, accepted december 26 2014 abstract: additive manufacturing is an emerging technology that brings several opportunities to the manufacturing industry. therefore, research in this arena on current and future developments is required to make strategic decisions. under this context, the goal of this research is to develop a patent analysis on additive manufacturing. keyword-patent analysis is performed to identify the most important organizations, countries, inventors, and technology areas through international patent classifications (ipcs) of the additive manufacturing industry. results show that there is an increase on additive manufacturing research, particularly in 2013 and 2014. the main areas of research are focused on shaping of plastics and after-treatment of shaped products and working metallic powder and manufacture articles from this material. moreover, the analysis indicates that leading countries on additive manufacturing research are united states, great britain and available for free online at https://ojs.hh.se/ journal of intelligence studies in business vol 4, no 3 (2014) 42-62 mailto:elias.olivares@upaep.mx mailto:beatriz.arellano@upaep.edu.mx https://ojs.hh.se/ 43 switzerland. additionally, top three companies on this area are: stratasys inc. (usa), united technologies corp. (usa) and alstom technology ltd (switzerland). its recent research inventions were identified in this study. the main contribution of this research is to offer a template for analysis in other industries, but it also brings valuable insights to decision makers interested in recent patent efforts developed for the advancement of additive manufacturing. keywords: strategic foresight, foresight, patent analysis, additive manufacturing 1.0 introduction manufacturing is an important sector for the worldwide economy. in 2009, this sector employed 31 million persons in the european union, generated eur 5,812 billion of turnover and eur 1,400 billion of value added (european factories of the future research association, 2013). with such economic impact, it is mandatory that entities involved in this sector keep abreast of the competitive environment including technological advances to support strategic decisions on research & development + innovation (r&d+i). due to current movements in market forces it is expected that not far away from 2020 manufacturers will be confronted by strong challenges for developing more customized products with better performance and less cost. to accomplish this, organizations involved should be more innovative and creative. a proper identification and use of relevant knowledge in decision making acquires a key role to gain new competitive advantages (youtie et al., 2007). a promising technology that has emerged recently is additive manufacturing (am). am produces products layer by layer, contrary to the traditional way of subtracting material from larger pieces. with am, assembly lines and supply chains may be decreased or removed for many products. products can be printed on demand and thus, inventories may be reduced. furthermore, carbon emissions to the environment may be decreased. finally, more customized products can be developed as production is brought closer to the consumer (campbell et al., 2011). am is a new technology that brings several opportunities to the manufacturing industry so research to identify technical advances, and key players is required. as literature has showed since many years ago patent analysis represents a key tool to determine and analyze industry trends. it provides a way to envisage technology trajectories and to identify on-going developments of organizations (companies, government agencies, centers, universities, etc.) so it is an important tool to support strategic planning in terms of r&d as well as innovation (hsieh, 2013). in this research, a patent analysis is developed to determine trends in am. main countries, organizations, inventors and technology areas through international patent classifications (ipcs) were identified as well as the last inventions of top players. the purpose of this study is to offer valuable knowledge to decision makers interested in knowing patent activity including technological advances and key players of am. more important, the results of the procedures can be incorporated for a broader strategic foresight analysis. strategic foresight comprises the activities and processes that assist decision makers in the task of defining the company's future course of action (vecchiato, 2012). strategic foresight provides business executives and government policy makers with interesting methods to envision the future. it also helps them to understand the implications of alternative technological or societal paths (rohrbeck and schwarz, 2013). the paper is organized as follows. sections 2, 3 and 4 provide a literature review of foresight, am technology and patent analysis 44 respectively. a description of the methodology followed is detailed in section 5. section 6 presents the main findings of the research and section 7 presents conclusions. 2.0 foresight in organizations foresight is a set of systematic attempts to look at the long-term future of science, technology, economy and society, in order to identify emerging issues that are likely to generate the higher social and economic benefit (balbi, 2001). moreover, popper (2008a) defines foresight as a process which involves intense iterative periods of open reflection, networking, consultation and discussion, leading to a joint refining of future visions and a common ownership of strategies. the first multinational company that formally employed a foresight tool may have been royal shell. this oil organization was able to identify and anticipate the scene of the oil crisis that took place in 1973 (ortega, 2004). since the 80’s the studies related to foresight have been strongly increased (da costa et al., 2003). roadmapping is one of the most common techniques of foresight (ortega, 2004). this tool is applied to predict a possible future and results obtained allow delineating or changing strategies (da costa et al., 2003). since long time ago there is a growing interest in developing roadmap analysis particularly in the departments of r&d of hightech companies (willyard and mcclee, 1987). due to a growing intensive competition, organizations have the challenge of adapting them to a fast and changing environment based on a new era of knowledge (marsh, mcallum and dominique, 2002). the authors argue that organizations need to change their traditional planning methods and be able to anticipate competitive environment movements. nowadays, companies should not plan under a unique vision centered on the present. they should conceive strategies and contingency plans based on possible future scenarios (ortega, 2004). under this perspective, foresight emerges as an important methodology. according to popper (2008 a,b) foresight analysis typically includes five steps: 1) pre-foresight, 2) recruitment, 3) generation, 4) action, and 5) renewal. during the pre-foresight step, the goal and activities of the foresight analysis are established. a literature review, scanning, bibliometric or patent analysis from academics or research institutes should be performed to identify the project goals. the recruitment step consists on organizing key actors and resources. in the generation step knowledge is obtained through exploration, analysis and anticipation of possible future scenarios and new policies and decisions are produced. action stage comprises the implementation of results previously determined. finally, renewal phase includes evaluation and changes. popper (2008 b) classifies foresight methods as qualitative (e.g. brainstorming, environmental scanning, expert panels and swot analysis), quantitative (e.g. bibliometrics, modeling/simulation, trend exploration/megatrends), semi-quantitative (e.g. cross-impact/structural analysis, delphi, stakeholder mapping and technology roadmapping) and other methods (e.g. benchmarking and patent analysis). during this research a patent analysis is developed. the aim is to obtain valuable knowledge that could support organizations' decisions in terms of their r&d+i activities. lin et al. (2013), consider that foresight has evolved from being an explorative and tactical tool to become a strategic planning tool. this is not an instrument used to forecast or predict, instead, it is used to define alternative futures and create paths for potential developments. there is a difference between foresight and strategic foresight concepts. while the first one has been used to describe an inherent human activity, i.e. the act of looking forward daily by individuals throughout society; the second one determines future research activities of organizations (rohrbeck and schwarz, 2013). in this paper, the term strategic foresight is applied considering that this research aims to support 45 organizations that are interested on planning for the future. strategic foresight analysis provides decision makers new ways to delineate future that could affect competitive position of the organization. 2.1 strategic foresight and competitive intelligence foresight and competitive intelligence (ci) disciplines have similar goals. both practices systematically monitor the organization environment to provide valuable insights about possible future events (lin et al., 2013). as sarpong et al. (2013) establish that ci is one of the practices that organizations have to define the future; other techniques are: scenario planning, counterfactual analysis, peripheral visioning and scenario thinking. calof and smith (2010) deepen this relation. they consider that competitive technical intelligence (cti) and strategic technological foresight (stf) are fields with similar objectives and techniques. while the authors define cti as a practice that provides business sensitive information on external scientific or technological treats, opportunities or developments that have the potential to affect a company’s competitive position. stf according to them is a collaborative tool that draws upon the talents of many individuals (not only from the technology domain) and is an important source for technical and business intelligence. cti and stf have strong similarities and complementarities. both practices guide r&d+i process, use similar techniques for examining and understanding the environment and both are designed to support key decisions. 3.0 additive manufacturing (am) the origins of additive manufacturing (am) can be traced back to the end of the 80’s. in 1987 the first commercialization of a stereolithography (3d printing machine) was performed. since then, the industry has grown in an accelerated pace and as a consequence the number of patents has strongly increased. this industry has a strong interest on developing new technologies (beer, 2013) to compete more efficiently. additive manufacturing comprises a group of emerging technologies that produce objects through the addition of materials layer by layer (campbell et al., 2011). these technologies are: binder jetting, directed energy deposition, material extrusion, material jetting, powder bed fusion, sheet lamination and vat photopolymerization (basiliere and shandler, 2014). 3d printing is a concept commonly used in the industry when referring to am (beer, 2013). three main advantages arise when using am in manufacturing processes. first, the possibility of building complex objects. a diversity of industries are benefited (manufacturing, health, education, etc.). second, am does not require assemblage of parts. both production time and costs decrease. finally, am reduces waste and offer the opportunity to use recycled materials (campbell et al., 2011). the general process of am starts with the creation of a 3d model. for this task computer-aided design (cad) tool or the scan of an existing object is applied, information generated is sent to a specialized equipment that produces the 3d object through the addition layer by layer of material (campbell et al., 2011). nowadays, am is used to produce a variety of products from automobile and aircraft components, custom orthodontics and hearing aids (campbell et al., 2011), surgical or medical models, to architectural models and teaching aids (beer, 2013). particularly use of am has a strong interest from the manufacturing industry. this technique could be used to produce a final or intermediate product. additionally, it could be used to print tools, dies and molds needed for production. adoption of this technology accelerate commercialization of products, push production to the customer and give other advantages to compete in a more innovative way (basiliere and shandler, 2014). for this reason, manufacturers of several 46 industrialized economies are increasingly using am technologies. a recent study was developed to reveal how 504 us manufacturers from the georgia state (usa) with 10 or more employees, deploy information, execute quality management and perform production technologies (youtie et al., 2014). the results showed that 70% of respondents use at least one advanced technology like additive manufacturing. 3.1 the future of additive manufacturing the future of am is promising. during the next decade, it is expected that this technology will have a predominant role in different industries. in particular, two applications are gaining interest among the current and potential users of am (campbell et al., 2011). the first one is centered on metal components. through am engineers are now able to develop components using titanium and steel alloys. the second one is the desktopscale 3d printers. the cost of these products is decreasing. in the future, more persons will be able to adopt this technology. furthermore, advances in metals, development of new design tools, expiration of related patents and other related changes are expected to come, as consequence new business will emerge (beer, 2013). basiliere and shandler (2014) consider that, within two to five years, it is expected a higher adoption of 3d printing technologies in organizations. the authors also estimate that 3d printing of medical devices such as prosthetics and implants will increase. basiliere (2014) estimates that from 2014 to 2018, the total number of 3d printer units shipped per year will grow to 2,319,494 worldwide. this represents a cagr (compound annual growth) rate of 106.6%. the author considers that by 2018 the sales of these technologies will exceed us$ 13.4 billion. such forecast is based on the fact that consumers and organizations will rapidly adopt 3d printers for home and corporative use. the european factories of the future research association (2013) reports that in 2030, factories will be green and sustainable. to achieve this goal, efforts should focus on reduce energy consumption, close loops for products or production and scarce resources; finally, sustainability in terms of materials and production processes will be required. all the above efforts can be achieved through the use of am technologies. 4.0 patent analysis patents are the most accessible and reliable sources of information for assess of a technology (hsieh, 2013). they are considered one of the most valuable output indicators of the technological innovation process (hidalgo et al. 2009), (rodríguez and tello, 2012). moreover, from all the available technological information, 90% can be found in patent publications (blackman, 1995). the strategic planning of an organization can be improved if technology is evaluated through patent analysis. there are several patent classification systems: the international patent classification (ipc), the united states patent classification system (uspcs) and the cooperative patent classification (cpc). this research focuses its analysis on the ipc. the world intellectual property organization (2015) defines ipc as a “hierarchical system of language independent symbols for the classification of patents and utility models according to the different areas of technology to which they pertain”. ipc divides patents into classes, sub-classes, groups and subgroups. 4.1 keyword-based analysis keyword-based patent analysis represents an important tool used to determine technology trends, discover technological opportunities and predict new technological advances. this tool is based on patent keyword frequencies and cooccurrences between them (choi et al. 2012). it provides decision makers with valuable 47 knowledge to compare the strategic positioning of an industry or organization in different countries. analysts can determine who the leaders are in different technological areas or which of these areas are emerging. similarly, researchers can analyze the profiles of inventors/organizations to identify density of technological domains through their corresponding classifications. besides, hidden relations between organizations can be determined (trappey et al. 2011). a patent map uses patent information to create specific graphs and charts that provide simple and intuitive ways to address complex technical information (zha and chen, 2010). for this purpose, patent information, such as assignees, inventors, countries and ipcs is considered. 5.0 methodology to develop this research, matheo patent software was utilized. this is a french software that collects, analyzes and deploys patent information. it offers solutions for decision making, analysis of strategic information and technology scanning. matheo patent retrieves information from uspto and espacenet databases. while in the first case it is possible to retrieve whether issued patents or applications; in espacenet there is not such distinction, analysis through the software comprises both types into the same research. its results provide with an accurate perception of the latest advances in any given research topic. this software allows searching patents through keywords contained on title, abstract, inventor, applicant, patent number and classification codes. (matheo patent, 2015). the results of this research were obtained in three steps. these are explained below. 5.1 planning during this phase, the goals and scope of the project were established. the goal of this research was to develop a patent analysis on am as a first step to conduct a further strategic foresight analysis. main countries, organizations, inventors and technology areas through international patent classifications (ipcs) were identified. this research is focused on am patents issued and submitted between 2011 and january 28th, 2015. matheo software, the tool applied on this research, extracts information from patent families; hence some results may have a period of years longer than the one previously defined. data was retrieved through espacenet database. its search engine offers free access to more than 90 million patent documents worldwide and contains information about inventions and technical developments from 1836 to present (espacenet, 2015). 5.2 selection and gathering of information a search was performed using the exact phrase "additive manufacturing" in “title and abstract”. when using the general terms additive manufacturing, relevance of the information gathered could be not adequate. in fact it was tested and more than one hundred thousand patents were obtained where a high rate of patents didn’t correspond to the field of the study. 48 figure 1. patents per year. data from espacenet using matheo patent. 5.3 data cleaning this task consisted on combining similar terms and removing repeated information from “applicants”, “inventors” and “country” fields on the patents obtained. 6.0 results and discussion 6.1 patent density a total of 735 patents, 336 family patents and 629 inventors were obtained on am between 2011 and january 28th, 2015. in figure 1, the number of patents per year is presented. as it can be seen, there is a significant increase in patent publications on am, particularly from 2013 (209 patents) to 2014 when they increased to almost the double (420 patents). regarding family patents, 129 families were detected in 2013 while in 2014 this amount raised to 247 family patents. figure 2 shows results according to family patents during the period defined of 2011jan 28 2015; it is important to notice that families can be repeated and a patent could have a family before this period, so as it can be seen in the next figure results of patent families comprises 2008 to 2015 counting 434 in total. 49 figure 2. family patents per year. data from espacenet using matheo patent. in the next section a patent density and main focus of research is presented. 6.2 patent activity and main trends 6.2.1 top ipc four digits code top 3 ipc four digit codes are shown in figure 3. it can be seen that am research efforts are focusing on ipcs: b29c, b22f, and b23k. according to wipo (2015) they corresponds to: b29c: shaping or joining of plastics; shaping of substances in a plastic state, in general; after-treatment of the shaped products, e.g. repairing. b22f: working metallic powder; manufacture of articles from metallic powder; making metallic powder. b23k: soldering without fusion or unsoldering; soldering; coating or plated for soldering; cutting by localized heating, e.g. flame cutting, work by lasers. 6.2.2 top applicants and inventors countries from the applicant country point of view a strong patent activity was detected primarily from usa (360 patents), followed by great britain (137 patents) and switzerland (59 patents). these results are shown in figure 4. regarding inventor country, the highest patent activity was from usa (369 patents), followed by great britain (139 patents) and germany (51 patents). results are shown in figure 5. figure 3. top 3 ipc four digit codes. data from espacenet using matheo patent. 50 figure 4. patents per applicant country. data from espacenet using matheo patent. results show a similar trend for usa and great britain. however, the rest of the countries have a different behavior. figure 5. patent per inventor country. data from espacenet using matheo patent. 51 6.2.3 top organizations organizations with the highest number of patents (issued and submitted) were identified coming from: usa and switzerland as figure 6 shows. top 3 organizations in descending order are the followings: figure 6. top organizations. data from espacenet using matheo patent. stratasys inc. (usa): 87 patents united technologies corp. (usa): 41 patents alstom technology ltd (switzerland): 29 patents organizations with the highest number of family patents were also identified. results are shown in figure 7. the top 3 organizations in descending order are the followings: stratasys inc. (usa): 36 family patents. united technologies corp. (usa): 29 family patents. renishaw plc (great britain): 21 family patents. when both indicators: global patents (issued and submitted) and family patents are considered, there are similarities in only the first two positions. stratasys inc from usa leads the patent application activity with 87 patents and 36 family patents, followed by united technologies corp from usa with 41 patents and 29 family patents. but the third position is different, alstom technology from switzerland has the third position considering their 29 patents and renishaw from great britain has the third position taking into account their 21 family patents. in the following sections a more detailed analysis of the top companies will be developed considering number of patents issued and submitted. 52 figure 7. top organizations by family patents. data from espacenet using matheo patent 6.2.3.1 stratasys inc. (usa) considering that stratasys inc. from usa is the patent leader in am field, this research proceeds to know more about its patent activity during last years. based on the same period previously established, figure 8 shows their patent activity from 2011 to 2014 (they did not have results for 2015 when this study was concluded). it is important to remark the growing effort of this company on the advancement of this technology, particularly during 2014 when its patent efforts were of almost 50% more with respect to 2013. figure 8. stratasys inc. patents per year. data from espacenet using matheo patent 53 figure 9. stratasys inc. main ipcs four digit codes. data from espacenet using matheo patent top ipcs (four digits) from stratasys inc. were also identified. the main results are shown in figure 9. this company focuses its research on ipc code b29c. as mentioned before, this ipc comprises shaping or joining of plastics; shaping of substances in a plastic state and after-treatment of the shaped products. while the rest of the codes corresponds according to wipo (2015) to: b65h: handling thin or filamentary material, e.g. sheets, webs, cables. b05d: processes for applying liquids or other fluent materials to surfaces, in general g03g: apparatus for electrographic processes using a charge pattern. b32b: layered products, products builtup of strata of flat or non-flat, cellular or honeycomb. figure 10.united technologies corp. patents per year. data from espacenet using matheo patent. 6.2.3.2 united technologies corp. (usa) after stratasys inc., united technologies corp. is the organization with the highest number of 54 patents according to the figure 10. it is important to notice that, in 2014, the company increased its patent rate in an unexpected rate. top ipcs from united technologies corp were also identified. results are shown in figure 11. the company is focusing mainly in research related to ipc code b22f (working metallic powder, manufacture of articles from metallic powder and making metallic powder) followed by code f01d (non-positive displacement machines or engines, e.g. steam turbines). while the rest of the ipc are as follows: f02c: gas-turbine plants; air intakes for jet-propulsion plants; controlling fuel supply in air-breathing jet-propulsion plants. b23k: soldering or unsoldering; welding; cladding or plating by soldering or welding; cutting by applying heat locally, flame cutting; working by laser beam. b29c: shaping or joining of plastics; shaping of substances in a plastic state, in general; after-treatment of the shaped products, e.g. repairing. figure 11. united technologies corp main ipcs four digits. data from espacenet using matheo patent. 55 figure 12. alstom technology ltd patents per year. data from espacenet using matheo patent. 6.2.3.3 alstom technology ltd (switzerland) alstom technology ltd is the third organization with the highest number of patents. as the previous cases, this company presents a big jump from 2013 to 2014 according to figure 12, in the rest of the years analyzed they do not have patents. top ipcs of this company were also identified. results are shown in figure 13. as can be seen, the focus of the company´s research is related to ipc code b22f, similarly to united technologies corp, this code is associated to working metallic powder, manufacture of articles from metallic powder and making metallic powder. figure 13. alstom technology ltd main ipcs four digits. data from espacenet using matheo patent 6.2.4. recent patents of top organizations in this section, top three companies and their most recent patents are presented. 56 6.2.4.1 stratasys inc. the three most recent patents of stratasys inc. are shown in table 1. patent number us2014358273a1 consists on a method for printing a three-dimensional part with an additive manufacturing system. it comprises the generation and printing a planarizing part having a substantially-planar top surface relative to a build plane, and a bottom surface that substantially mirrors a topography of a platen surface, and printing the three-dimensional part over the substantially-planar top surface of the printed planarizing part. patent number us2014265040a1 consist on an additive manufacturing system that retains a print head for printing a three-dimensional part in a layer-by-layer manner using an additive manufacturing technique, where the retained print head is configured to receive a consumable material, melt the consumable material, and extrude the molten material. the system also includes a velocimetry assembly configured to determine flow rates of the molten material, and a controller assembly configured to manage the extrusion of the molten material from the print head, and to receive signals from the velocimetry assembly relating to the determined flow rates. patent number us2014252684a1 consist on a method for printing a three-dimensional part with an additive manufacturing system, the method including printing layers of the three-dimensional part and of a support structure for the threedimensional part from multiple print heads or deposition lines, and switching the print heads or deposition line between stand-by modes and operating modes in-between the printing of the layers of the three-dimensional part and the support structure. the method also includes performing a purge operation for each print head or deposition line switched to the operating mode, where the purge operation includes printing a layer of at least one purge tower from the print head or deposition line switched to the operating mode. patent number tittle publication date us2014358273a1 platen planarizing process for additive manufacturing system 12/04/2014 us2014265040a1 additive manufacturing system and method for printing three-dimensional parts using velocimetry 09/18/2014 us2014252684a1 additive manufacturing method for printing three-dimensional parts with purge towers 09/11/2014 table 1. stratasys inc. recent patents. 6.2.4.2 united technologies corp. the three most recent patents of united technologies corp. are shown in table 2. patent number wo2014210338a1 consists on an additive manufacturing method which segments a computer aided design (cad) file of a component along a build interface to define at least a first component segment and a second component segment each of the first component segment and the second component segment sized to fit within an additive manufacturing build chamber; manufacturing additively the first 57 component segment and the second component segment within the build chamber; and bonding the first component segment and the second component segment to form the component. in patent number wo2014193505a1 a machine for fabricating a fiber-reinforced component by additive manufacturing is disclosed. the machine may have a surface, a matrix feed configured to deposit a plurality of matrix layers on the surface, and a fiber feed configured to deposit a fiber layer on at least one of the plurality of matrix layers. the deposition of the plurality of matrix layers and the fiber layer may be controlled by a computer. patent number wo2014179679a1 presents a method for operating an additive manufacturing apparatus; the method comprises directing a first energy beam along a surface contour vector in a build plane. a second energy beam is directed along a plurality of substantially parallel hatch vectors disposed in the build plane inward of the surface contour vector. a sum of the surface contour vector and the plurality of hatch vectors define a processed powder region in the build plane. a third energy beam is directed along an offset contour vector in the build plane. the offset contour vector includes a plurality of unprocessed powder regions in the build plane between the surface contour vector and the plurality of hatch vectors. patent number tittle publication date wo2014210338a1 additive manufacturing system and method of manufacture 12/31/2014 wo2014193505a1 continuous fiber-reinforced component fabrication 12/04/2014 wo2014179679a1 method of eliminating sub-surface porosity 11/06/2014 table 2. united technologies corp. recent patents 6.2.4.3 alstom technology ltd the three most recent patents of alstom technology ltd are shown in table 3. patent number ep2772329a1 refers to a method for manufacturing a hybrid component comprising the steps of a) manufacturing a preform as a first part of the hybrid component, then b) successively building up on that preform a second part of the component from a metallic powder material by means of an additive manufacturing process by scanning with an energy beam, thereby establishing a controlled grain orientation in primary and in secondary direction of at least a part of the second part of the component, d) wherein the controlled secondary grain orientation is realized by applying a specific scanning pattern of the energy beam, which is aligned to the cross section profile of said component or to the local load conditions for said component. previous patent is also published as patent number us2014242400a1 (the second patent on the table 1) as well as us2014242400a1, kr20140109814a, jp2014 169500a, cn104014799a, ca2843450a1. patent number us2014154088a1 refers to a method for manufacturing a three-dimensional metallic article/component entirely or partly. the method includes a) successively building up said article/component from a metallic base material by means of an additive manufacturing process by scanning with an energy beam, thereby b) establishing a controlled grain orientation in primary and in secondary direction of the article/component, c) wherein the secondary grain 58 orientation is realized by applying a specific scanning pattern of the energy beam, which is aligned to the cross section profile of said article/component, or with characteristic load conditions of the article/component. patent number tittle publication date ep2772329a1 method for producing a hybrid component 09/03/2014 us2014242400a1 method for manufacturing a hybrid component 08/28/2014 us2014154088a1 method for manufacturing a metallic component by additive laser manufacturing 06/05/2014 table 3. alstom technology ltd recent patents as it can be seen from the previous information, stratasys inc. (top 1) is patenting methods for developing three dimensional objects with additive manufacturing systems. specific components (e.g. heads, velocimetry) for manufacturing processes are invented. these components are incorporated to improve the quality of the resulting objects. moreover, united technologies (top 2) is focusing its research efforts on equipment for printing 3d objects. the company has patented a method for operating a 3d printing device and a machine for fabricating fiberreinforced objects. finally, alstom technology (top 3) is patenting methods for developing hybrid components with metallic powder materials. 6.2.5 top inventors top inventors on am were also identified. as shown in figure 14, swanson williams j. from usa is the inventor with the highest number of patents (in total 32). secondly, etter thomas from switzerland (28), and thirdly scott simon peter from great britain (26). regarding family patents, the top 3 inventors in descending order are: swanson william j. from usa (17) who presents the highest technology diversification in terms of patent families, renishaw plc from great britain (15) and mannella dominic f. from usa (11). these results are shown in figure 15. 59 figure 14. top 3 inventors per patents. data from espacenet using matheo patent. figure 15. top 3 inventors per family patents. data from espacenet using matheo patent. 6.3 technology mapping relationship between top patent organizations and top ipc four digits are presented on figure 16. top organizations are focusing its research efforts on subjects related to ipc codes b29c and b22f, shaping of plastics and after-treatment of shaped products and working metallic powder and manufacture articles from this material. stratasys inc. is the organization that has the highest number of family patents related to ipc code b29c (31 family patents). moreover, united technologies corp. is the firm that has the highest number of family patents related to ipc code b22f (16 family patents). 60 figure 16. top organizations vs. top ipc four digit codes. data from espacenet using matheo patent. 7.0 conclusions for the development of this research a patent analysis tool was applied to identify key players and trends in the am industry. main countries, organizations, inventors and technology areas through international patent classifications (ipcs) were identified as well as the last inventions of firms with the highest patent activity. a total of 735 patents, 336 family patents and 629 inventors were analyzed in a period of time comprising 2011 to january 28th, 2015. results indicate that research on am has had a significant increase in the last years, particularly in 2013 and 2014. the trend is similar when considering family patents, a significant increased could be observed for both years. the main areas of research are focused on shaping of plastics and after-treatment of shaped products and working metallic powder and manufacture articles from this material. methods for soldering are also considered in research efforts. from the applicant and inventor country points of view a strong patent activity was detected primarily from usa followed by great britain. an analysis of the top patent companies and their recent research efforts was performed. top three companies are stratasys inc. (usa), united technologies corp. (usa) and alstom technology ltd (switzerland). the first company is patenting methods for developing three dimensional objects with am systems. the second one is focused on the development of equipment for printing 3d objects. the third one is patenting methods for developing hybrid components with metallic powder materials. a technology map was also developed to identify the most important research lines of the top organizations. insights obtained show that they are devoting efforts on shaping plastics and on aftertreatment of shaped products, as well as working metallic powder and manufacturing articles from this material. results obtained aim to offer valuable knowledge to decision makers interested in knowing the technological advances and key players of am. moreover the findings serve as model for how to perform similar analysis. 7.1 limitations and future research 61 this research on additive manufacturing represents a first approach for developing a broader analysis on strategic foresight. a patent analysis was developed considering the exact phrase: additive manufacturing. a complimentary analysis should be developed adding terms such as 3d printing or rapid prototyping. additionally, it is important to extend information collection from primary and secondary resources. expert participation from industry and academy is fundamental. inclusion of scientific literacy and industry reports is also needed. a future research can also develop technological trends analysis. 7.2 acknowledgment we would like to thank marcela hernández, research assistant of the competitive and technological intelligence area of tecnológico de monterrey, campus mty for her valuable support during the development of the final version of this paper. we also thank the anonymous referees for their valuable comments. 8.0 references balbi, e. (2001). prospectiva, una herramienta de acción. revista científica de uces, 5(1), 1218. retrived from: http://dspace.uces.edu.ar:8180/dspace/bitstrea m/handle/123456789/360/prospectiva_una_he rramienta_de_acci%f3n.pdf?sequence=1 basiliere, p. (2014). market guide for 3d printing. gartner. basiliere, p., & shandler, m. (2014). hype cycle for 3d printing, 2014. gartner. beer, n. (2013). additive manufacturing. turning mind into matter. sierra college center for applied competitive technologies (cact). blackman, m. (1995). provision of patent information: a national patent office perspective. world pat. inf, 17(2), pp. 115– 123. calof, j., & smith, j. (2010). the integrative domain of foresight and competitive intelligence and its impact on r&d management. r&d management, 40(1), 3139. doi:10.1111/j.1467-9310.2009.00579.x campbell, t., williams, c., ivanova, o. & garrett, b. (2011). could 3d printing change the world? technologies, potential, and implications of additive manufacturing. atlantic council. choi, s., park, h., kang, d., lee, j. & kim, k. (2012). a sao-based text mining approach to building a technology tree for technology planning, expert systems with applications, 39, 11443–11455. da costa, o., boden, m. & friedewald, m. (2003). retrived rom http://forera.jrc.ec.europa.eu/documents/micro softworddacostastrmlessonspraguepaper2.pdf espacenet (2015). retrieved on february 2, 2015 from: http://www.epo.org/searching/free/espacenet.h tml european factories of the future researh association (2013). factories of the future. multi-annual roadmap for the contractual ppp under horizon 2020. hidalgo-nuchera, a., iglesias-pradas, s., & hernández-garcía, a. (2009). utilización de las bases de datos de patentes como instrumento de vigilancia tecnológica. profesional de la informacion, 18(5), 511520. doi:10.3145/epi.2009.sep.04 hsieh, c. (2013). patent value assessment and commercialization strategy. technological forecasting and social change, 80(2), 307319. doi:10.1016/j.techfore.2012.09.01 lin, h., chan, t., & ien, c. (2013). mapping of future technology themes in sustainable energy. foresight, 15(1), 54-73. doi:10.1108/14636681311310141 marsh, n., mcallum, m., & dominique, p. (2002). strategic foresight. the power of standing in the future. australia: crown content. matheo patent (2015). retrieved on january 29, 2015 from: http://www.matheosoftware.com/es/) ortega, f. (2004). la prospectiva: herramienta indispensable del planeamiento en una era de cambios. retrived from organización de estados iberoamericanos: http://dspace.uces.edu.ar:8180/dspace/bitstream/handle/123456789/360/prospectiva_una_herramienta_de_acci%f3n.pdf?sequence=1 http://dspace.uces.edu.ar:8180/dspace/bitstream/handle/123456789/360/prospectiva_una_herramienta_de_acci%f3n.pdf?sequence=1 http://dspace.uces.edu.ar:8180/dspace/bitstream/handle/123456789/360/prospectiva_una_herramienta_de_acci%f3n.pdf?sequence=1 http://forera.jrc.ec.europa.eu/documents/microsoftword-dacostastrmlessonspraguepaper2.pdf http://forera.jrc.ec.europa.eu/documents/microsoftword-dacostastrmlessonspraguepaper2.pdf http://forera.jrc.ec.europa.eu/documents/microsoftword-dacostastrmlessonspraguepaper2.pdf http://www.epo.org/searching/free/espacenet.html http://www.epo.org/searching/free/espacenet.html http://www.matheo-software.com/es/ http://www.matheo-software.com/es/ 62 http://www.oei.es/salactsi/prospectiva2.p df popper, r. (2008 a). foresight methodology. en l. georghiou, j. cassingena harper, m. keenan, i. miles & r. popper (eds.). the handbook of technology foresight. concepts and practice (pp. 44-48). cheltenham glos gl50 1ua, uk. popper, r. (2008 b). how are foresight methods selected? foresight, 10(6), 62-89 rodríguez, m. & tello, m. (2012). applying patent analysis with competitive technical intelligence: the case of plastics. journal of intelligence studies in business, 2, 51-58. rohrbeck, r., schwarz, j. (2013). the value contribution of strategic foresight: insights from an empirical study of large european companies. technological forecasting & social change. sarpong, d., maclean, m., & davies, c. (2013). a matter of foresight: how practices enable (or impede) organizational foresightfulness. european management journal, 31613-625. doi:10.1016/j.emj.2013.03.004 trappey, c, wu, h., taghaboni-dutta, f. & trappey, a. (2011). using patent data for technology forecasting: china rfid patent analysis. advanced engineering informatics, 25, 53–64. willyard, c.h. & mcclees, c.w. (1987), ‘motorola’s technology roadmap process’, research management, sept.-oct., pp. 13-19 wipo – international patent classification (2015). retrieved on january 30, 2015 from http://www.wipo.int/classifications/ipc/en/pref ace.html youtie, j., shapira, p., dodonova, d. & beckerman, a. (2014). the georgia manufacturing survey. making it in the global economy. youtie, j., shapira, p., urmanbetova, a. & wang, j. a (2007). a brief history of the future of manufacturing: us manufacturing technology forecasts in retrospective, 1950-present. international journal of foresight and innovation policy 3.3: 311-331. available at: http://works.bepress.com/jan_youtie/54. vecchiato, r. (2012). strategic foresight and environmental uncertainty: a research agenda. foresight, 14(5), 387-400. zha, x. & chen, m. (2010). study on early warning of competitive technical intelligence based on the patent map. journal of computers, 5(2), 274–281. http://www.oei.es/salactsi/prospectiva2.pdf http://www.oei.es/salactsi/prospectiva2.pdf http://works.bepress.com/jan_youtie/54 vol9no1paper1 to cite this article: nuortimo, k.p. & härkönen, j. (2019) exploring new ways to utilise the market intelligence (mi) function in corporate decisions: case opinion mining of nuclear power. journal of intelligence studies in business. 9 (1) 5-16. article url: https://ojs.hh.se/index.php/jisib/article/view/368 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index exploring new ways to utilise the market intelligence (mi) function in corporate decisions: case opinion mining of nuclear power kalle petteri nuortimoa*, janne härkönena auniversity of oulu, finland; industrial engineering and management *kale.nuortimo@shi-g.com journal of intelligence studies in business please scroll down for article editor-in-chief: klaus solberg søilen included in this printed copy: exploring new ways to utilise the market intelligence (mi) function in corporate decisions: case opinion mining of nuclear power enhancing competitive response to market challenges with a strategic intelligence maturity model gianita bleoju and alexandru capatina pp. 17-27 how managers stay informed about the surrounding world journal of intelligence studies in business v o l 9 , n o 1 , 2 0 1 9 j o u r n a l o f i n t e llig e n c e s t u d ie s in b u s in e s s issn: 2001-015x vol. 9, no. 1 2019 klaus solberg søilena pp. 28-35 kalle petteri nuortimo and pp. 5-16 janne härkönen exploring new ways to utilise the market intelligence (mi) function in corporate decisions: case opinion mining of nuclear power kalle petteri nuortimoa*, janne härkönena aindustrial engineering and management, university of oulu, finland corresponding author (*): kale.nuortimo@shi-g.com received 12 december 2018 accepted 2 april 2019 abstract the challenge in today’s corporations is that even though the technology portfolio of a company plays a crucial role in delivering revenue—falling as a topic mainly under the area of technology management—technology may have a negative image due to observed risks or failing the sustainability criteria. it may influence the company’s image and brand image, possibly also influencing decisions at corporate level. the monitoring of technology sentiments is therefore emphasized, benefiting from the advanced methods for business environment scanning, namely market and competitor intelligence functions. this paper utilizes a new big data based method, mostly utilized in market(mi)/competitor intelligence(ci) functions of the company, opinion mining, to analyse the global media sentiment of nuclear power and projects deploying the technology. with this approach, it is easier to understand the linkage to corporate images of companies deploying the technology and also related corporate decisions, mainly done in the areas of technology market deployment, marketing and strategic planning. the results indicate how the media sentiment towards nuclear power has been mostly negative globally, particularly in social media. in addition, results from similar analyses from a single company’s images for the companies currently deploying the technology are seemingly less negative, indicating the influence of company’s communication and branding activities. this paper has implications showing that a technology’s media sentiment can influence a company’s brand image, marketing communications and the need for actions when technology is deployed. in conclusion, there seems to be a need for better co-operation between different corporate functions, namely technology management, mi, marketing and strategic planning, in order to indicate technology image impacts and also counteract firestorms from social media. keywords company media analysis, editorial media, learning machine, market intelligence, media-analysis, nuclear power, opinion mining, social media, web intelligence 1. introduction new applications based on web intelligence, digitalization and social media analytics are currently being studied in different research branches. competitive and technological intelligence (cti) tools are used in companies and research organizations to get the best efficiency out of a market monitoring process, and when these tools develop, more and more companies will be looking for monitoring and management of strategic information (fouratijamoussi, f et al., 2018). in recent years, social media has increased in importance for social networking and content sharing, and services such as twitter can be used for various analyses. for example to forecast box-office revenues for movies, based on sentiment and quantity, it can now outperform purely marketjournal of intelligence studies in business vol. 9, no. 1 (2019) pp. 5-16 open access: freely available at: https://ojs.hh.se/ 6 based predictors (asur, s. & huberman, b, 2010). in a study by søilen et al., 2017, twitter was seen as a source of analysis, what information is being tweeted and not tweeted, thus professional users are aware that tweets are being manipulated by communication departments. twitter has also been considered as a source for detecting disruptive events (alsaedi et al., 2017). furthermore, many companies utilize social media data for analyses, such as likes, comments, and sentiment by using lexicon-based classification to categorize the sentiment of users’ comments (yulianto, m. et al., 2018), like it was in this study. for a company-wide view, individuals and organisations are now adopting public opinions presented across the media to their corporate decision making (liu et al., 2012). by adopting these faster than before, almost in real time, feedback from media sentiment to a change of a company’s product can influence decisionmaking processes of the company. media activities generated by consumers that are neither paid or induced by brand owners are seen to have a potentially game-changing impact on communication and brand building (corstjens, m. & umblijs, a. 2012). what if the large quantity of negative information about a company’s product would flow suddenly by word of mouth (wom) from social media (some)? in reaction to any questionable statement or activity, social media users can create large waves of outrage rapidly, and these online firestorms pose new challenges also for marketing communications (pfeffer et al, 2014). social media monitoring can be efficiently dealt with via a company’s market intelligence (mi) function. to highlight case-specific features of this paper, when nuclear power generation technologies are concerned in the combat against climate change, nuclear power can be considered to be one possible mitigation strategy, due to the extremely low carbon dioxide emissions during the energy resource’s life-cycle (dones et al., 2003). if carbon emissions are reduced also in developing economies, alternative energy sources in the form of green technologies should be deployed as substitutes for coal and petroleum (ganda, 2018). the public perception of nuclear power is however an essential factor influencing whether the technology is used for producing electricity (goodfellow et al., 2011). by relying on nuclear power, a country could be virtually independent from foreign energy sources, and thus gain energy supply security. for example, should fossil fuel reserves become insufficient, other cheap energy sources would be needed to fill the gap (roth et al., 2009). hence, the supporters of nuclear power currently apply two main arguments, firstly nuclear power can secure the fulfilment of our energy demands, and secondly, it is co2 neutral, and would therefore be an effective mitigation strategy against climate change (bang, 2010). nuclear energy falls short on sustainability criteria and its public acceptance can be an issue (verbruggen, 2008). nuclear technologies, despite their enhanced safety, reduced costs and minimised waste, still include the burden of the weapons proliferation, safety, waste handling and high costs. furthermore, concerns have not been reduced due to the recent fukushima accident (karakosta et al., 2013). several countries are currently facing the question of whether or not to rebuild their nuclear power stations in the next few decades, while policy makers are consulting the public regarding its opinion of nuclear power (visschers et al., 2011). based on literature, the technology itself seems to have a negative image, which is an issue to solve for companies developing nuclear projects. there is an increasing need for studies to better understand the dynamics of the media sentiment, including also some, which can be used for analysing public attitudes with the help of opinion mining, based on artificial learning machine media monitoring systems, by a company’s mi function. compared to traditional news media, which can shape public opinion regarding an issue by emphasising some elements of the broader controversy over others (shah, watts, domke & fan, 2002), some presents more direct opinions, often including emotional content (stieglitz and dang-xuan, 2013). this study analyses the global media sentiment of nuclear power from both editorial and social media by using the madaptive tool for media monitoring, thus comparing the differences at company level. this research aims to fill the gap related to technology sentiment impact at a strategic level of the company with related research method development, namely based on big data utilization with computational linguistics and machine learning, to discover the sentiments from large data sets. 2. literature review the general public is a stakeholder, although this can be overlooked in stakeholder 7 management (mitchell et al., 1997). although nuclear power and renewable power are considered to be the main existing technology options for near zero emission power production, their main difference is sustainability and acceptability. renewable power is considered to be sustainable, nuclear is not, and the public acceptance of nuclear power is also rather low (verbruggen., 2008). there are indications that people’s acceptance of nuclear power may be influenced by the available alternatives, and previous nuclear accidents have increased the public’s opposition towards nuclear power (siegrist et al., 2013). when comparing people’s perception of nuclear power to climate change, it shows that if people are presented with the benefit of nuclear power to mitigate climate change and are asked to choose between nuclear power stations or climate change, cautious preference or ‘‘reluctant acceptance’’ to nuclear power stations and related waste may arise over the consequences of climate change (pidgeon et al., 2008). however, the increase in adoption of renewable power systems can be considered as a decreasing factor for this when providing alternatives. there have been studies examining the willingness to take actions against or in favor of nuclear power stations, with logical implication that the perception of nuclear risks seems to reduce the public’s acceptance or their preference for nuclear power (tanaka, 2004). this has also increased people’s willingness for opposition (de groot and steg, 2010), whereas more perceived benefits increased the acceptance of nuclear power (tanaka, 2004). the recent fukushima daiichi nuclear power plant accident in japan on march 11, 2011 influenced the acceptance of nuclear power globally (siegrist et al., 2013). research about the chernobyl accident in the eighties shows that such accidents may influence the formation of more negative attitudes towards nuclear power (eiser et al., 1990; verplanken, 1989). for example, in germany, attempts to locate a permanent nuclear waste repository and ‘‘the resistance of the german people towards nuclear weapons and atomic energy’’ provoked an aggressive anti-nuclear movement. the movement’s influence particularly heightened after the chernobyl accident, especially in southern germany and bavaria which were affected by the fallout (sovacool et al., 2012). the more recent fukushima accident also had a clearly negative impact on the acceptance of nuclear power, however the mean change was considered moderate and was strongly influenced by participants’ pre-fukushima attitudes (siegrist et al., 2013). in general, media reporting about nuclear accidents does not increase knowledge and understanding of radiation risks, but rather increases negative feelings and risk perception (perko et al., 2012). according to keller et al. (2012), particularly affective images seem to affect people’s acceptance of nuclear power. therefore, people who earlier may have opposed the replacement of nuclear power plants may change their opinion when associating nuclear power with images such as radioactivity, nuclear accidents, risks and negative consequences for health and the environment, or even nuclear war (siegrist et al., 2013). there are studies showing that those people who trust authoritative institutions such as the government are usually more supportive for nuclear technologies. it is shown that renewable technologies may not be as liked as nuclear technologies are disliked (sovacool, et al., 2012). the concepts of risk and dread can be more often expressed reasonably by people who are opposing the replacement of nuclear power plants than by those who are in favour (siegrist et al., 2013). different content analysis methods can be considered to study a technology image, such as media framing (teräväinen et al., 2011). however, these were not applied in this study. previously, media frames were used together with cluster analysis and automated sentiment classification by bursher et al, 2015. also, few studies compare people’s acceptance of nuclear power to that of other energy sources (ansolabehere and konisky, 2009). from this, it seems that people who supported the replacement of nuclear power often associated nuclear power plants with neutral and positive concepts such as energy, and to a smaller extent, with necessity (siegrist et al., 2013). furthermore, many discursive strategies can be considered when communicating nuclear power technologies, such as necessitation, naturalisation, scientification and rationalisation (teräväinen et al., 2011). this study introduces a new method for both editorial and some analysis: an opinion mining approach based on a machine leaning mediaanalysis to provide a wider view. 8 3. research methods the research methodology in this paper is based on a literature study accompanied by opinion mining based on media sentiment analysis including a vast number of editorial and social media sources, with a lexicon-based approach. thus, the basic research principles have been formerly used in different fields of studies, for example in competitor and market intelligence studies. in this study, however, the application of framing and cluster analysis was considered to be non-applicable, in addition to statistical methods. this is due to a comparison of editorial content with some, and to the fact that media frame comparability between two different types of communication is challenging. furthermore, it was also challenging to find suitable statistical method for data-series analysis. the main reasons for choosing this method was applicability to large global datasets, both from editorial content and some, fast data processing and reduced risk of bias caused by human perceptions and interpretations (matthes & kohring, 2008). the data for this study is taken for one year, included in the period was a major international climate conference, paris cop21. the users of the social web have a new role as data providers, as it seems to provide an excellent platform for analysing public attitudes (penalver-martinez et al., 2014). by adopting this type of approach and a particular tool, the amount of analysed datapoints is drastically increased compared to questionnaires and interviews, or traditional media-analyses. despite the ipr-protected algorithm, which is not visible, the method is not entirely a black box, it is rather a grey box. for this reason, software was tested in a master’s thesis (nuortimo, 2015) comparing it to traditional media analysis methods and the logic of how the sentiment is calculated is known, as sentiment is mathematically calculated as a sum from local document sentiments. futher, software is learned by humans for better accuracy. in computational linguistics, due to the complexity of the algorithms, they are usually evaluated on the basis of testing and comparison, as was done by chen, 2018. the data was analyzed to obtain a clear view of nuclear power technology sentiment and to discuss further implications to companies. hence, the research setting in this article is the media-sentiment analysis, where media sentiment is analysed to discover possible implications to public acceptance. as a result, we attempt to clarify the link to technology market deployment and corporate decisions. this method is based on commercial software in order to discover the sentiment relating to nuclear power, similar to the method applied by burscher et al, 2015. opinion mining is a research field, which consists of natural language processing, computational linguistics and text analysis technologies, in order to get various informational and added-value elements from users’ opinions (penalver-martinez et al., 2014). the approach used in this paper, where an algorithm calculates the global document sentiment based on the quantity of local sentiments, seems to be a valid approach despite known errors (app. 20% of classifications). furthermore, human analysis of text information is subject to considerable biases, such as emphasising the importance of opinions matching with their own preferences (liu et al., 2012). in this paper, the media sentiment of nuclear power both in editorial and some is studied. the m-adaptive software is used, which includes 3 million some platforms and 100,000 news outlets. the sentiment is analysed as a combination of computational linguistics and human aided machine learning (m-brain). the method is a more quantitative type of analysis compared to traditional qualitative methods such as surveys. in the software, the keywords “nuclear power” were used as input. the analysis was made over one year 2.7.2015-2.7-2016, and included a total of 41,591 data points from both editorial publications (14,482) and some sources (27,109). the study can be replicated by typing the same search words into the m-adaptive software. the sentiment expressions in the text are recognised and then classified automatically by type:positive, negative, neutral, mixed or unknown. m-brain has made some internal tests, which indicate app. 80 % accuracy in sentiment classification. the error occurs in case of any given individual document, due to inherent ambiguity in natural language. it is also known that humans do not agree 100% in similar cases. as a limitation, the system does not recognise humour or sarcasm. however, in large data sets, the overall model matches human judgement on the same data qualitatively. 9 4. media sentiment of nuclear power technology in the machine-based analysis, the large amount of data points gained from media hits provides a good basis for analysing the media sentiment, especially in terms of regular people on some. in figure 1, the sentiments towards nuclear power are described both from editorial publications, and some. the results indicate that nuclear power is linked to negative hits both in editorial publications (8,976) and some (11,458). there were 3,737 positive hits in the editorial content and 5,183 in some, which is fairly low compared to the total hits. the neutral hits accounted for 726 in the editorial content and 9,899 in some. mixed hits accounted for 1,043 hits in the editorial content and 569 hits in some. this seems to indicate that the press has adopted a negative tone towards nuclear power during the time period in question. figure 2 describes the 62% of negative hits in editorial content. only 26% of hits in editorial publications were positive, indicating a relatively low technology acceptance among journalists, and also an absence of the journalistic type of discussion and rhetoric which would include multiple views. the amount of mixed (7%) and neutral (5%) hits is quite small. figure 3 describes the public sentiment towards nuclear power in some as negative (42%). this was somewhat different compared to editorial publications, with a slightly less negative share. figure 3 indicates that public sentiment toward nuclear power in some is also more neutral (37%) with a 32% difference compared to editorial publications. this can be seen as an indication that the press has adopted more negative discourse than individuals on some. figure 4 indicates that twitter provided the most some data, with almost eighteen thousand hits. these were mostly neutral (9,231) or negative (5,425), with fewer positive (3,185) and mixed (44) hits. this can be observed as a negative data concentration. blogs had 4,288 negative hits, 1,253 positive, 411 mixed and 226 neutral. in comparison with tumblr (238), google plus (1,345), facebook (471) youtube (404), vkontakte (45), instagram (109) and forums (434), twitter (17,885) was the most influential some source. figure 5 shows that media sentiment has followed roughly new nuclear building in the selected countries. finland is building the olkiluoto 3 unit and also the hanhikivi plant by fennovoima (subject to building permits), and the country clearly has less negative sentiments both in editorial content and in some. japan, after the fukushima accident, experienced more negative attitudes. france, china and russia are all major countries with nuclear capacities. they fall in the middle of the spectrum. britain, now with hinkley point considerations, interestingly has a more negative tone compared to germany, which has a significant nuclear decommissioning program and large renewables capacity. it may be an indication that the supply security issue might rise in importance. india has the largest difference between opinions from editorial content and some, where sentiment in some is interestingly 23% less negative. figure 6 illustrates the effect of the global paris cop climate negotiations on the nuclear power media image in editorial publications figure 1 sentiment analysis of nuclear power in some vs. editorial publication. figure 2 sentiment analysis of nuclear power in editorial publications. figure 3 sentiment about nuclear power in social media. 10 and in some. the preliminary conclusion that can be drawn from this entails that nuclear power technology is not seen as a solution that is considered for addressing climate change, and thus media-attention towards nuclear power technologies is mostly negative. from the general data analysis it is visible that public sentiment towards nuclear power in both some and editorial publications was mostly negative, similar to the results of the literature review. however, when moving from a global level to country level, there exists some variations in media sentiment, depending on each country’s political situation and also new nuclear building in the country. two countries with ongoing nuclear developments, namely finland and uk, were selected. on a country level, finland clearly had the lowest negative editorial media sentiment of the selected countries, and also the second lowest percentage in some after germany. this figure 4 deviation of social media sentiment analysed by media type. 46% 27% 17% 40% 58% 63% 73% 39% 66% 17% 20% 43% 50% 40% 57% 50% 60% 0% 10% 20% 30% 40% 50% 60% 70% 80% china germany finland france great britain india japan russia usa media sentiment in selected countries editorial % negative some % negative figure 5 media sentiment on nuclear power in selected countries. 11 indicates a more positive tone towards nuclear power in finland. project media sentiment over a half year (1.12.2016-25.5.2017) was observed in the case of two projects, namely fennovoima in finland and hinkley point c in the uk, both of which are in early construction phases of development. figure 7 illustrates the sentiments towards fennovoima, a project company established to build a hanhikivi nuclear reactor in finland. from figure 8 it is visible that fennovoima has attracted mostly neutral and also positive attention both in editorial content and in some. this indicates the general positive attitude in finland, visible in the country analysis, and may indicate also the presence of pr-activities by the company. when looking more closely to the media source in the case of fennovoima it can be observed that the mostly positive editorial media attention has had some response from twitter, which is more negative, possibly indicating the presence of local opposition groups. compared to the editorial media, which is clearly more positive, this indicates figure 7 media emphasis on nuclear power during the global paris cop climate negotiations. figure 6 media sentiment towards fennovoima. figure 8 media sentiment towards fennovoima/by source. 12 that some channels can be used as means for communicating local opposition in the case of large onshore projects. the media attention for the hinkley point c project in the uk (figure 9) seems to follow the general consensus of the country with its more negative attitude. however opinion towards nuclear power is still mainly positive in the editorial media, but mostly negative in some with app. ten times less hits than in editorial media. figure 9 describes the sentiment towards hinkley point c according to editorial media and some, with an clear indication that the editorial media emphasized both positive and negative communication. the general sentiment is positive. however, the percentage of negative sentiments is slightly higher in some (figure 10). when summarizing the media sentiment of nuclear power (figure 11), it can be observed that although globally the sentiment in the editorial media (62%) and in some (42%) is negative, there are differences on a country level. for example, countries with less negative sentiments compared to the global average, such as finland and the uk, also have active nuclear projects in the country, and those projects also have a less negative media image than nuclear power does on the country level. there is slightly higher percentage share of negative some sentiment for a single project. however, on a project level, the media attention is less negative both in the editorial media and in some than at the global and country level, possibly indicating that with positive project investment decision, there is supporting communication from the project company. for these countries with nuclear figure 9 media sentiment in hinkley point c. figure 9 the comparison of nuclear power negative sentiments at global, country and project levels. figure 10 media sentiment towards hinkley point c, editorial/some. 13 capacity, it is not comparable to country sentiment. figure 11 shows that globally the sentiment about nuclear power in the editorial media (62%) and in some(42%) is clearly negative, there exist differences on country and project level. finland and the uk have less negative sentiments compared to the global average, and nuclear projects also have a less negative media image than nuclear power on the country level. thus there is slightly larger percentage share of negative some sentiment for single projects (finland/fennovoima (2%) and uk/hinkley point c (7%)). on a nuclear project level, the attention is less negative both in editorial media and in some than at the global and country level. 5. discussion the global media-analysis was conducted by utilising a key-word based search and madaptive media monitoring software. the analysis was made over one year, 2.7.2015-2.72016, and included a total of 41,591 data points from both editorial publications (14,482) and social media sources (27,109). media sentiment of nuclear power was neutral and negative in editorial content and in some, where some sources included more neutral attitudes. active discussions concerning nuclear power have taken place for example on twitter, with almost eighteen thousand mostly neutral and negative hits, emphasising the importance of short communication via social media. the analysis points out that the general publics’ opinion can be an important factor for technology acceptance and a company’s brand image. good examples of this correlation include finland’s positive attitudes and new building projects, and japan’s negative media sentiment as a response to the recent nuclear accident and nuclear decommissioning program. when considering the effect of relevant international events such as the paris cop 21, the media attention is increased during the event. in this case the attitude shift towards nuclear power was mostly negative. the main benefits of the results lie in figuring out global trends and technology development directions by using a larger data set than previous studies, and fast analysis of possible changes influencing decisions on a corporate level. the role of some is continuously increasing and it presents a challenge for technology developers and corporate strategists. it seems that a negative link between media sentiment of technology to technology market deployment exists in the case of nuclear power, needing actions on the company and project levels, such as communication, branding and pr. the main contribution of this study lies in incorporating a method of competitor/market intelligence functions to study the media sentiment of nuclear power, therefore bringing a new angle to corporate decisions. this is a new type of approach compared to earlier questionnaire, or interview-based studies with moderate datasets of hundreds of data points that are used in most similar studies, e.g heras-saizarbitoria et al., (2011). this method has positives and negatives when compared to qualitative studies. however, in the future this type of method could be used as a basis for both longitudinal data-series analyses, and also for some firestorm detection. the ability of the software does set some limitations on the extent of possible time periods to be analysed, yet still allows for 62% 17% 10% 58% 32% 42% 20% 12% 50% 39% 0% 10% 20% 30% 40% 50% 60% 70% global finland fennovoima great britain hinkley point c nuclear power media sentiment comparison editorial % negative some % negative figure 11 the comparison of nuclear power negative sentiments at global, country and project levels. 14 analysis of extensive data sets. the sentiment analysis indicates that large emotional bursts relate to some firestorms, thus sentiment is calculated and the number of negative bursts is clearly visible in the data-series trend analysis. this study agrees with stieglitz and dang-xua’s (2013) view, that emotionally charged social media messages are repeated more often and quickly than neutral ones. this view could be used as a basis for an automated social media firestorm detector, in which the application would give signals if there are signs of large negative sentiment rising in some together with escalation in speed estimates and a corporate action plan. managers can benefit from the possibility of analysing global attitudes and their changes, for example for their companies or projects, highlighting the needs for public engagement and the urgency of some participation. in this study, there are the following limitations: 1) the results are dependent on the keywords used. 2) content analysis methods, such as framing and cluster analysis, were not applied. 3) statistical methods were not applied. although statistical techniques are applied by communication scholars in order to identify news frames, it is not possible to do this in a conceptually valid manner (carragee & roefs, 2004). this also brings challenge for further research. 4) no detailed content analysis was possible due to a very large dataset, leaving the classification errors depending mostly on accuracy provided by the software supplier. 6. conclusions this study shows how a company’s mi function can be utilized in defining product technology sentiment, which in the case of nuclear power technology has a neutral and negative public sentiment. this is further emphasised during large national climate congresses such as the paris cop21. companies deploying nuclear power projects suffer from a negative media sentiment, which is clearly visible via social media. this is in contrast to renewable power technologies (nuortimo, 2018). factors that favour nuclear power market deployment include its availability and co2-emissions. the media-analysis indicates that on a global level sentiment towards nuclear power is negative, but in the case of individual projects there is a more positive sentiment, probably due to the project company’s communications and branding efforts. some especially has a role in influencing nuclear power technology’s media sentiment, which can be considered when planning marketing and pr for a single company. thus, when facing negative sentiment towards the company’s main technology, there seems to be constant need for a positive brand messaging. this paper also indicates the need for cooperation between a company’s mi function and marketing, in order to detect and counteract possible firestorms arising from some. the link from technology’s media sentiment at the corporate level exists in the case of nuclear power, with implications to managerial decisions. how can a company monitor media efficiently and distribute this information between different functions? what is the result, does the general public like the technology, and if not, what can be done with this information? a company could divest the technology or increase pr-activities, among other actions. the implications for company strategy also include the emphasis on product portfolio management and co-operation between different functions, including mi, technology management and marketing/pr. this view includes taking advantage of digitalization to refine the product portfolio of the company and better link to the mi function, thus the company’s product strategy is refined to better account for changes in the external market environment, and to highlight the need for supporting pr, communications and public engagement activities. our main finding is that the technology related sentiment of a company’s products may impact corporations on a strategic level, and media monitoring systems from a company’s market intelligence function based on big data utilization with computational linquistics and machine learning can be utilized to detect this. further research for deeper data-analysis could have interesting results. company-wide implications and co-operation between functions, such as strategic planning, market intelligence, communications and marketing, could be an extensive area for further research. finally, algorithms cannot entirely replace human intelligence yet, however, they do provide significant advantages in quantity and objectivity to aid in various tasks. 15 7. references alsaedi, n., burnap, p., & rana, o. (2017). can we predict a riot? disruptive event detection using twitter. acm transactions on internet technology (toit), 17(2), 18 ansolabehere, s., & konisky, d. m. (2009). public attitudes toward construction of new power plants. public opinion quarterly, , nfp041. asur, s. & huberman, b., predicting the future with social media. 2010. wi-iat '10 proceedings of the 2010 ieee/wic/acm international conference on web intelligence and intelligent agent technology. 01, 492499. bang, g. (2010). energy security and climate change concerns: triggers for energy policy change in the united states? energy policy, 38(4), 1645-1653. burscher, b., , vliegenthart, r., de vreese, c.(2015) frames beyond words: applying cluster and sentiment analysis to news coverage of the nuclear power issue. social science computer review 1-16 carragee, k. m., & roefs, w. (2004). the neglect of power in recent framing research. journal of communication, 54, 214–233. chen, l., multilingual semantics applied to competitive and market intelligence. ici 2018 international conference on competitive & market intelligence, june 5-8 bad neuheim, germany. corstjens, m. & umblijs, a. the power of evil, journal of advertising research 52(4), 433— 449 dones, r., heck, t., & hirschberg, s. (2003). greenhouse gas emissions from energy systems: comparison and overview. energy, 100(89-110), 2300. eiser, j. r., hannover, b., mann, l., morin, m., van der pligt, j., & webley, p. (1990). nuclear attitudes after chernobyl: a cross-national study. journal of environmental psychology, 10(2), 101-110. fourati-jamoussia, f., niambaa, c-n, and julien duquennoy (2018). an evaluation of competitive and technological intelligence tools: a cluster analysis of users’ perceptions. journal of intelligence studies in business 8, 1, pp. 5-15 ganda, f., international journal of sustainable economy, 2018 vol.10 no.3, pp.226 – 248. doi: 10.1504/ijse.2018.092860 goodfellow, m. j., williams, h. r., & azapagic, a. (2011). nuclear renaissance, public perception and design criteria: an exploratory review. energy policy, 39(10), 6199-6210. de groot, j. i., & steg, l. (2010). morality and nuclear energy: perceptions of risks and benefits, personal norms, and willingness to take action related to nuclear energy. risk analysis, 30(9), 1363-1373 heras-saizarbitoria, i., cilleruelo, e., & zamanillo, i. (2011). public acceptance of renewables and the media: an analysis of the spanish pv solar experience. renewable and sustainable energy reviews, 15(9), 46854696. karakosta, c., pappas, c., marinakis, v., & psarras, j. (2013). renewable energy and nuclear power towards sustainable development: characteristics and prospects. renewable and sustainable energy reviews, 22, 187-197. keller, c., visschers, v., & siegrist, m. (2012). affective imagery and acceptance of replacing nuclear power plants. risk analysis, 32(3), 464-477 liu, b., & zhang, l. (2012). a survey of opinion mining and sentiment analysis. mining text data (pp. 415-463) springer. matthes, j., & kohring, m. (2008). the content analysis of media frames: toward improving reliability and validity. journal of communication, 58, 258–279. mitchell, r. k., agle, b. r., & wood, d. j. (1997). toward a theory of stakeholder identification and salience: defining the principle of who and what really counts. academy of management review, 22(4), 853-886. nuortimo, k. (2015). ccs(hiilidioksidin talteenotto ja varastointi -tekniikoiden tiedeviestinnän piirteitä globaaleissa tieteellisissä, teknisissä ja kaupallisissa julkaisuissa sekä sosiaalisessa mediassa 2012-2015. ma-thesis. university of oulu. peñalver-martinez, i., garcia-sanchez, f., valencia-garcia, r., rodríguez-garcía, m. á., moreno, v., fraga, a., & sánchez-cervantes, j. l. (2014). feature-based opinion mining through ontologies. expert systems with applications, 41(13), 5995-6008. doi:10.1016/j.eswa.2014.03.022 perko, t., turcanu, c., & geenen, d. (2012). media reporting and changes in public opinion 16 after fukushima nuclear accident: belgium as case study. international journal of nuclear governance, economy and ecology, 3(4), 291307. pfeffer, j., zorbach, t., & carley, k. m. (2014). understanding online firestorms: negative word-of-mouth dynamics in social media networks. journal of marketing communications, 20(1-2), 117-128. pidgeon, n. f., lorenzoni, i., & poortinga, w. (2008). climate change or nuclear power—no thanks! a quantitative study of public perceptions and risk framing in britain. global environmental change, 18(1), 69-85. roth, s., hirschberg, s., bauer, c., burgherr, p., dones, r., heck, t., et al. (2009). sustainability of electricity supply technology portfolio. annals of nuclear energy, 36(3), 409-416. shah, d. v., watts, m. d., domke, d., & fan, d. p. (2002). news framing and cueing of issue regimes: explaining clinton’s public approval in spite of scandal. public opinion quarterly, 66, 339–370. siegrist, m., & visschers, v. h. (2013). acceptance of nuclear power: the fukushima effect. energy policy, 59, 112-119. søilen, k.s., tontini, g. and aagerup, u. (2017) the perception of useful information derived from twitter: a survey of professionals. journal of intelligence studies in business. 7 (3) 50-61. sovacool, b., ratan, p.l., 2012. conceptualizing the accptance of wind and solar electricity. renewable and sustainable energy reviews 16 (7), 5268–5279. stieglitz, s. and dang xuan, l. (2013). emotions and information diffusion in social media— sentiment of microblogs and sharing behavior. journal of management information systems, 29:4, 217-248 tanaka, y. (2004). major psychological factors determining public acceptance of the siting of nuclear facilities. journal of applied social psychology, 34(6), 1147-1165 teräväinen, t., lehtonen, m., & martiskainen, m. (2011). climate change, energy security, and risk—debating nuclear new build in finland, france and the uk. energy policy, 39(6), 3434-3442. verbruggen, a. (2008). renewable and nuclear power: a common future? energy policy, 36(11), 4036-4047. verplanken, b. (1989). beliefs, attitudes, and intentions toward nuclear energy before and after chernobyl in a longitudinal withinsubjects design. environment and behavior, 21(4), 371-392. visschers, v. h., keller, c., & siegrist, m. (2011). climate change benefits and energy supply benefits as determinants of acceptance of nuclear power stations: investigating an explanatory model. energy policy, 39(6), 36213629. yulianto, m., girsang, a.s. and rumagit, r.y. (2018) business intelligence for social media interaction in the travel industry. journal of intelligence studies in business. 8 (2) 77-84. vol7no3paper5 calof et al to cite this article: calof, j., richards, g. and santilli, p. (2017) insight through open intelligence. journal of intelligence studies in business. 7 (3) 62-73. article url: https://ojs.hh.se/index.php/jisib/article/view/245 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index opinion insight through open intelligence jonathan calofa,b, greg richardsa and paul santillic atelfer school of management university of ottawa, canada; bnorth-west university, south africa; chewlett packard enterprise; calof@telfer.uottawa.ca journal of intelligence studies in business please scroll down for article opinion integration of business intelligence with corporate strategic management jonathan calofa,b,*, greg richardsa and paul santillic atelfer school of management university of ottawa, canada; bnorth-west university, south africa; chewlett packard enterprise corresponding author: calof@telfer.uottawa.ca received 10 october 2017; accepted 27 october 2017 abstract the traditional model of competitive intelligence and its operationalization in most organizations appears to be inadequate to address the intelligence challenges arising from the speed of change in the environment, increasing data complexity, and growth of international activities. to address this challenge, this article borrows concepts from open innovation, applying them to all ci activities. we are suggesting going beyond the traditional model of an in-house ci unit with activities largely conducted by the units personnel and moving towards a cross pollination approach whereby others in the firm contribute to all ci activities including, for example, the selection of key intelligence topics and being involved in analysis and eventually towards a full open intelligence model in which key stakeholders and external experts also assist the organization in all aspects of competitive intelligence activity. in proposing a more open approach for intelligence, the authors recognize the concern that ci professionals will have regarding sharing intelligence and intelligence activities outside the ci unit and outside the organization. however, as pointed out in this article, organizations around the world have been moving quickly towards an open innovation model generally concluding that the benefits associated with opening up all elements of the innovation process, including r&d, outweigh the risks of intellectual property loss. keywords analytics, big data, competitive intelligence, open innovation 1. introduction with over 60 years of combined experience in competitive intelligence practice, research, consulting, teaching and writing (and areas related to intelligence) the authors of this article propose a reconceptualization of competitive intelligence. weaknesses in the current definition and practice of competitive intelligence lead us to broaden out those involved in helping organizations’ intelligence programs by incorporating several concepts from open innovation. we propose the integration of principles from analytics as well. we are calling this new intelligence concept “open intelligence”. we feel that the current practice of competitive intelligence does not address challenges arising from the speed of change, the growth of international activities (not just selling internationally but sourcing) and increasing data complexity, but that by incorporating ideas from open innovation and analytics that these challenges can be met by tomorrow’s competitive intelligence practitioners. journal of intelligence studies in business vol. 7, no. 3 (2017) pp. 62-73 open access: freely available at: https://ojs.hh.se/ 63 2. objective of the article the journal of intelligence studies in business has served for several years as the primary outlet for the exchange of intelligence ideas. the journal has had articles that attempt to define competitive intelligence. for example, du toit (2015) looked at academic scholarship in ci from 1994 to 2014, looking for a common definition and parameters for the field. soilen (2016) through a survey of ci experts and an examination of articles in scopus that contained the words competitive intelligence, attempted to develop a definition of ci and establish and a research agenda for the field. while these and other authors of papers in the journal have tried to define competitive intelligence, others have proposed the need to extend the domain of competitive intelligence. nienaber and sewdass (2016) proposed to expand the domain of ci to include workforce related competitive intelligence. vriens and soilen (2014) proposed extending the domain of ci to include disruptive intelligence. the idea of adding like this to the domain of intelligence generally represents an acceptance of the definition of competitive intelligence, but an expansion of its role or, put another way, a broadening of the key intelligence topics, to use jan herring’s terminology. still others have sought to broaden the domain of intelligence, pushing into or absorbing other similar or related areas. for example, rostami (2014) wrote about integrating knowledge management with business intelligence. calof, richards and smith (2015) suggested extending foresight to include both foresight and analytics and, in fact, many articles in the journal of intelligence studies in business have focused on business intelligence, for example alnoukari and hanano (2017) and gauzelin and bentz (2017). in short, the journal of intelligence studies in business has served not only as one of the primary journals for publishing scholarship about ci (soilen 2016) but it is also a journal that has sought to define competitive intelligence including what it is, its scope and research agenda. in fact, the journal, in defining its publication topics, notes that it “publishes articles on topics including marketing intelligence, marketing intelligence, strategic intelligence, business intelligence, competitive intelligence, collective intelligence and scientific and technical intelligence”. with this article, the authors seek to add to this theme within the journal. we propose a reconceptualization of competitive intelligence with the incorporation of concepts from open innovation and contributions from analytics. we write this article to the ci community and in doing so invite feedback from those who read it. a version of this article has been published in competitive intelligence magazine (summer 2017) but this is geared more towards an academic audience. it is our collective view that how we look at and practice competitive intelligence has to change in light of several changes in the environment that will be described in this article. we draw upon many concepts in open innovation as we seek to push the boundaries of competitive intelligence and expand the role played by both those within organizations and outside of it in driving the organizations’ intelligence initiatives. we seek to be part of a growing dialog within the pages of the journal of intelligence studies in business about how competitive intelligence should evolve in the future, and invite those who read this article to lets us know what they think. 3. the challenge while there have been many changes in the business environment that competitive intelligence has had to address, there are three that the authors of this article seek to highlight, that we feel are amongst the most important changes and also those for which we feel traditional views of intelligence have had difficulty addressing, at least according to our experiences and discussions we have had with leading practitioners and researchers in competitive intelligence: 1. speed of change, 2. increasing data complexity 3. growth of international activities (not just selling internationally but sourcing) these challenges are explained in greater detail in this section. 3.1 speed of change in 2011, harvard business school professor and noted management thinker john kotter wrote: “anyone in the business world – even casual observers of it – knows that it’s currently experiencing a rapid rate of change. new companies spring up seemingly overnight. products and services that were revolutionary two years ago are rendered obsolete if they don’t adapt to market 64 changes fast enough. the rate of change in the world today is going up. it's going up fast, and it's affecting organizations in a huge way. the evidence of this can be seen almost everywhere—life-cycle of products, number of patents filed in the us patent office, amount of cell phone activity across national boundaries—on and on and on. and what's particularly important is that it's not just going up. it's increasingly going up not just in a linear slant, but almost exponentially.” what does this mean for competitive intelligence? many intelligence projects will need to be done on a frequent, almost daily basis to reflect the rate of change in these areas. looking for both the emergence of threats and opportunities needs to be done in time so that managers can act in a timely manner, but the rate of change is also greatly compressing the amount of time available to gather, analyze and make sense of the information. 3.2 increasing data complexity at the scip conference in atlanta (may 2017), a dominant theme among many of the keynotes was increasing data complexity and the need to develop approaches to deal with and in fact take advantage of big data. steven hughes opened the conference with a talk “big data is our future” and day two had major general neeraj bali present a case study from the indian army in which big data figured prominently. among the numbers quoted in the presentations: 31.25 million messages sent every minute, 30 billion pieces of shared content on facebook every month, 2.77 million videos viewed every minute, google users perform 40,000 searches per second, more than 196,000 databases published annually by the u.s government, and by 2019 one million minutes of video will be uploaded every second. it would take five million years to watch all the videos posted each month. the internet of things (iot) with increased machine to machine communications, data gathering sensors, and more, was also mentioned as both an opportunity and challenge for competitive intelligence. social media, twitter, and blogs also generate data that can be used in intelligence programs. it’s not that the traditional primary sources from interviews are not important for intelligence, but the growth and availability of these online videos, discussions, and materials does provide great opportunities on the collection side of intelligence. the problem, however, is coming up with a way to cope with all this data. ibm, in their big data and analytics hub, wrote about the four vs of big data (ibm, 2017) which we are collectively terming “data complexity”: 1. volume or scale of data. for example, most companies in the us have 100 terabytes of data stored, six billion people have cell phones; 2. velocity/analysis of streaming data. for example, 1 terabyte of trade information captured by the new york stock exchange each day, 18.9 billion network connections – 2.5 per each person on earth; 3. variety or different forms of data. for example, 400 million tweets sent per day, 4 billion hours of video watched on youtube each month, 30 billion pieces of content shared on facebook each month; 4. veracity or uncertainty of data: notably, 1 in 3 business leaders don’t trust the data they use to make decisions, poor data quality is estimated to cost the us economy alone $3.1 trillion per year. 3.3 growth of international for many organizations, tomorrow or even today’s competitor can come from outside their country. customers may also come from countries from outside the organization’s country. technology and other changes can come from anywhere in the world. managing in this environment requires the development of intelligence programs that gather information from many different countries, knowing what the best sources of information are in foreign environments and in some cases dealing with the fact that the best information for their intelligence program may not be in english. the challenge for ci is how to integrate the opportunity provided by this volume of data along with our more traditional information sources while addressing the problems related to data volume, variety, velocity, veracity and internationalisation. the combination of the rate of change, international factors and the big data challenge means that ci teams will need to come up with a way to increase the frequency of their intelligence project updates while integrating a broader array of data. doing this 65 in the traditional one or two-person intelligence team is going to be difficult. the following lays out how we are proposing to add to the concepts of competitive intelligence to address these challenges. it is a reconceptualization of the phases of intelligence and the addition of concepts from open innovation to intelligence. 4. new ideas within the wheel of intelligence traditional ci approaches revolve around some version of the wheel of intelligence approaches we have seen on leading organizations’ use terms, such as: 1. issue identification 2. plan generation 3. data acquisition 4. data analysis 5. recommendation there are many variations of this approach based on corporate management structure and decision-making authority, size of the organization, and the type of issue to be resolved. but these five steps are really the crux of any “generic” ci effort in an organization. the du toit (2015) article explores these ideas in great detail and serves as a useful review of the ci literature. the problem with this traditional approach is that the time for all of this to happen can exceed weeks or months before actionable insight can be developed. the sequential nature of the wheel of intelligence has been challenged in many past studies, but it is clear that in fast changing environments time can be a challenge for doing all these steps. add to that the time for the organization to actually act on the insight and we are talking additional months added to the overall ci lifecycle. given the time frames involved, the impact of the 4 vs associated with big data can make this traditional approach grossly inadequate and subsequently useless. business disruptors and industry changes occur in the blink of an eye and through the globalization of the digitized world we live in, can affect regions and potentially world economics in a fraction of the time it took only 10 years ago. data and insights that are months out of sync with reality cannot provide a competitive advantage to any organization, rather, an approach must be developed that takes into consideration the volume of information, the sources, the ability to manage the content, and the organizational flexibility to not only adapt, but to flawlessly execute on a regular basis, will be needed. there are several strategies that can be employed to help navigate the challenges stemming from this environment during this important data collection and analysis phase. 4.1 data generation first, in terms of data generation, the sources and volume of data overall are exploding. as mentioned earlier, this growth is expected to continue at an exponential rate. there is essentially no such thing as a suitable environment for “batch” processing – anything not done as close to real time as possible will become useless. so, it is critical to know that the longer from the time the data is generated to analysis, the more misleading and outdated the data becomes – and all downstream activities of analytics, processing, insights and execution eventually snowball into an extremely high-risk business strategy. that is not to say that one should just hang up the proverbial ci hat and chalk this environment as a no-win scenario. rather, there are techniques available for moving closer to the “real-time” environment that will provide valuable insights and ultimately a competitive advantage for organisations. there are many techniques (albeit some more advanced than others) that have shown great promise in a) getting better data, b) getting it quickly, and c) expanding the breadth of data collection to include more value-rich content. these techniques include: 1. concurrent analyses methodologies – simultaneously collecting, analyzing and sharing the data with stakeholders in a reiterative parallel process, rather than serially collecting and vetting the data with stakeholders, which can take magnitudes longer in time and resources 2. organizational efficiencies – built-in hierarchical structures that encourage quick data sharing and communication without long lag times to decision making and execution 3. real-time data collection methods – ability to harvest content from thousands of sources to effectively pull valuable “golden nuggets” from the vast amount of overall data. 66 4.2 tools for data generation and analysis secondly, the use of specific data-management tools becomes a necessity in this data-rich environment. public domain search engines fall woefully short in providing the content in a format that is user-friendly, and throwing lowcost physical resources at the problem only leads to more confusion and frustration in coordination and results in a reduction in speed to insights. knowledge management tools or related automation mechanisms are crucial in order to navigate the volume of data coming from the web. this includes not only public domain source content, but social media, customer feedback, and paid sources. the key determinant in the appropriateness of the result will often depend on the robustness of the input content. identifying and managing the resources that provide data into the automation tools is a critical area of development. letting the tool do the “heavylifting” of analytics with source content that routinely numbers in the thousands or tens of thousands or more of sources and will ultimately provide a much better outcome over time. from a practitioner’s perspective, the value of the tool cannot be overstated. it has allowed organizations to be far more efficient and, overall, more effective in improving the analytics and arriving at actionable insights far faster than without the tool. an example of such a tool is one by which a comprehensive database repository can capture data and categorize it into several areas: 1. content repository – funneling hundreds or thousands of data sources into a central location 2. content search – performing boolean, phrase, truncation or other searching mechanisms 3. communication / sharing – ability to cross-functionally share this information readily 4. knowledge visualization – transforming the data analysis into a useable, easily understood visualization for fast deciphering and application 5. actionable insights decisions – arriving at the quickest time possible, the actionable insights to make organizational decisions 4.3 analysis / taxonomy first off, it is important to know what is meant by “taxonomy” – this is the ability to categorize content in the classifications best suited to achieve the intelligence initiative. think about the objective – if it is about a product launch or about how a competitor is performing, there is a set of criteria that needs to be established that acts as a catalyst to achieving the objective. what initial segments of the industry? geographical areas? specific products or general applications? how defined do you want to get into the details of what you are trying to determine? therefore, the ability to analyze this data with the desired taxonomy is important, but one is not looking for a simple listing of relevant sources for a business need. rather, the key output element is to appropriately analyze the data that allows the user to identify and derive key content that can be immediately adjusted to include in the insights for recommendations. many tools have dashboards that are customizable for the user’s preferences and can be adjusted based on the parameters that the user requires. this is something used extensively by many successful organizations and is key to being able to get the data in the right format so that it is easily ported to a recommendations output. additionally, people-engagement is key here – ensuring that the content driven from the automation is relevant, timely, and actionable. you still have to utilize individual perspectives to make sure the dashboard outputs are in line with the company objectives and requirements for the need being investigated. 4.4 organizationstructure and culture it’s not just the process of competitive intelligence that needs to be modified in light of the new environment, but the organization itself will need to be looked at. there are two elements of this, one is the structure itself in that if the information is to be acted on quickly then mechanisms need to be in place to get intelligence into the hands of decision makers quickly. the idea, for example, of the pinnacle of ci being that it is included in the weekly or monthly senior management meetings needs to give way to real time, possibly daily intelligence updates. there is also the cultural element of organization. far too many times senior management will be aware of the 67 content of the intelligence, but will either chose not to act upon it (due to internal feelings outside of the data results), or simply ignore it as a “nice to know” sort of factoid. obviously, both are potential catastrophic behaviors that will only improve the competitor’s chances of getting an advantage in the marketplace, especially given the speed of change mentioned earlier. therefore, company structures have to be shallow and decision making has to be quick. “analysis-paralysis” has to be avoided at all costs. this can only be achieved where you have a “sponsor” at the executive levels of the organization who values the ci contributing efforts and can therefore prioritize and include the results in the strategic direction of the company. 5. opening up the intelligence process: open intelligence with the above ideas implemented in organizations, it becomes more likely that organizations will have the ability to handle the four vs of data and the corresponding international and speed components of insight generation. however, there are concerns that with most intelligence units being one or two people, it will be difficult for the user to actually cope with frequent intelligence projects integrating massive amounts of data, dealing with fast changing environment and incorporating international elements into the model. not only will it be difficult as will be pointed out in the next part of this article, but it might even be undesirable. perhaps a better approach will be to open up the intelligence process. in the next section, we look at a very popular topic – open innovation, the opening up of organizations’ innovation activities including research and development to people outside the organization – even competitors – and applying the concepts of open innovation to competitive intelligence. 6. open innovation our notion of open intelligence is based on open innovation concepts which were pioneered by henry chesbrough. in 2003, chesbrough wrote “open innovation is fundamentally about operating in a world of abundant knowledge, where not all the smart people work for you so you’d better go find them, connect to them, and build upon what they can do”. he went on to explain that: “open innovation is a paradigm that assumes that firms can and should use external ideas as well as internal ideas, and internal and external paths to market, as the firms look to advance their technology. open innovation combines internal and external ideas into architectures and systems whose requirements are defined by a business model”. up to this time, innovation was seen as an exclusively internal organization function: r&d inside the organization came up with the ideas and then the organization determined (again internally) which ones to pursue to development and commercialization. open innovation implies opening up the entire innovation process to “smart people” outside the organization. elaine watson in 2012 wrote about coca cola’s open innovation program. coca cola’s chief procurement officer, ron lewis, summed up open innovation and its importance to coca cola when he said: “…our goal is to be the best at innovation in the industry and the way we’re doing that is via an open network. and there is a good chance that the source of such innovation may well come from outside coke’s r&d department. we want to be the best at connecting the dots.” finding ideas outside the organization and connecting the dots are certainly the objectives in open innovation and definitely areas where ci has a role to play. in a 2008 harvard business review article by huston and sakkab on procter & gamble’s (p&g) open innovation initiative, it was noted that as of the 2006, 35% of their new products had elements of open innovation with 45% of the initiatives in the product development portfolio having elements that were discovered externally, with a goal for 50% of innovation to come from outside the company. p&g even established a policy of licensing new products/technology to competitors if p&g had not commercialized it within three years of development. in opening up the innovation process, open innovation researchers do note that part of this opening up is also to parts of the organization that traditionally had not been consulted/included in innovation efforts. for example, volkswagen, in looking at car engine design, allowed individuals from outside the engine group to bring ideas forward and 68 become involved in the selection of which ideas would go forward into design. hansen and birkinshaw linked open innovation to each element of the innovation value chain. in their harvard business review article “the innovation value chain,” they looked at key questions to ask and performance indicators to identify how “open” the innovation process was (table 1). the typical company has virtually all idea generation done in-house. to open up the r&d process to other “bright” people, they talk about crosspollination with other units across the organization providing input to r&d, and external input from people outside the organization who contribute to the r&d idea generation process. we have seen examples of this in many industries. we mentioned earlier about volkswagen opening up engine r&d to people outside the r&d department. bed, bath and beyond, in working with “edison nation,” put a call out for inventors from around the world to provide ideas that could result in new products sold in bed, bath and beyond. this goes beyond idea generation to using an open approach for both idea generation and conversion with bed, bath and beyond doing the diffusion. after 14 years of research and writing on open innovation (14 years after chesbrough introduced the topic) there have been enough case studies and papers written that it is safe to say that there are examples of each element of the innovation value chain, idea generation, conversion and diffusion being done through open innovation. 7. from open innovation to open intelligence innovation was opened up because despite the risks (e.g. loss of intellectual property) the benefits associated with allowing people external to the r&d unit both inside and outside the company to assist with all aspects of the innovation process were too great. organizations have found that with the speed of change and the need for faster and better innovation, it was beneficial to allow other people to have a role in generating ideas, evaluating them and even helping with commercialization. given the complexity and volume around data and intelligence, it is clear that similar to open innovation, it is time to for ci to consider opening up all phases of the intelligence process to deal with similar challenges: the need for quicker intelligence, the need to cope with frequent environmental change, and the need to deal with the complexity posed by big data. the following discussion explores how this would work by going through some of the elements of the traditional intelligence wheel. in looking at open intelligence, some of the language of open innovation from hansen and birkinshaw can be related to ci: • in-house: this will refer to the traditional model of intelligence where most aspects of the intelligence process are done within the ci unit; • crosspollination: this will refer to supplementing the in-house ci unit with input from others and other units table 1 hansen and birkinshaw innovation value chain. 69 of the organization to assist in all aspects of intelligence development; • external: this will refer to supplementing both in-house and crosspollination with people outside the organization such as key customers, suppliers, experts, and other stakeholders to assist with intelligence development. 8. intelligence planning there are many aspects of intelligence planning that could be discussed that could benefit from open intelligence but for the purposes of a basic exploration of the concept we will look at one: intelligence topic generation. intelligence topics are traditionally developed by the person responsible for intelligence based either on their understanding of management needs or through direct consultation with management. we call this the traditional in-house approach to topic development. in ci, we talk about it in terms of “what is keeping the ceo up at night”, “what key decisions are being made”. crosspollination (opening up the process to units outside intelligence) would involve allowing others in the organization to contribute to the intelligence topic generation process. personnel in r&d, for example, understand the technical environment well and might have some interesting perspectives on what topics need to be investigated. those in maintenance or service may have ideas based on the complaints and problems that customers are having. taking an external perspective (fully open), imagine if customers, suppliers, and other stakeholders—possibly even including competitors—provide input on the intelligence topic selection process. nan bulger, in a 2015 article, wrote about integrated intelligence and said that the purpose of intelligence is to “help your customers’ compete in the market and help your customers make money”. if the purpose is to make customers more competitive (a business to business objective – b2b) or simply to satisfy customers (both b2b and more traditional consumer markets), then would it not make sense to ask them what topics are most relevant to them? or perhaps show customers suggested intelligence topics and ask them which one would result in intelligence that would help them better position themselves with their customers? it’s not just idea generation of topics that could be done in an open intelligence approach, topic selection could also be done this way. we can envision a delphi approach where people from outside the ci function rank the intelligence topics, thereby helping the intelligence team determine which ones are more relevant to other units of the organization and to key stakeholders. 9. collection open intelligence applied to collection is something that on the surface ci already does very well. the profession understands the importance of gathering information from broad sources both within and outside the organization. they get the need for diverse sources of information but there are a few aspects of collection that we want to bring up in the context of open intelligence. to what extent is information being entered into the intelligence system from other units of the organization (cross-pollination)? from outside the organization (external)? this is not about where information comes from but who is providing it. in an open intelligence environment, information is being directly entered into the system by stakeholders and by people in other parts of the organization. open intelligence also requires that ci practitioners extend collection sources to recognize data variety – to what extent (where relevant) is online video, social media, and so forth being integrated into intelligence efforts? how is the internet of things figuring into collection plans? imagine what could happen if organizations addressed variety, velocity and volume. this no doubt will require the use of technology but given rates of change and increased data (and data complexity) this will be needed. one thing to consider is that, in the big data world, 80% of what is available is unstructured or semistructured (text, images, and sound). therefore, some form of unstructured data technology will become important. 10. analysis the traditional view of analysis has the person responsible for intelligence applying any one of several dozen formal analytical techniques to information that has been gathered. this is a straightforward and logical process that fits with the in-house view of intelligence. we have added to this in the earlier section in mentioning some online/technological analytical tools but it’s still conceptually about the ci unit engaging in the analysis and then sending the results with recommendations off to the decision makers. a few things that we 70 have seen over the past several years have caused us to question whether this should be changed to incorporate the open intelligence approach. the first was a presentation by johan van zyl, ceo of toyota europe nv/south africa on the toyota south africa intelligence system. during the presentation, he talked about how the client for the intelligence joins with the intelligence team during the analysis phase. this provides the intelligence team with client insights and perspectives on the data. we have also seen various foresight initiatives where experts from around the world were invited to provide analytical input either as part of expert panels or in delphi approaches to help organizations make sense of complex environments. volkswagen provides a very interesting open innovation example in this respect. they set up a virtual exchange where participants from throughout the company received play money that they could “bet” on what they thought were the better ideas. whichever idea attracted the most “virtual money” on the exchange was the one selected. there are two aspects then to think about in applying an open intelligence approach to analysis. the first is who do you open the analysis process up to (i.e., who is invited in)? and the second is the kind of analytical techniques you use to integrate broader involvement. an in-house approach (like in open innovation – so call this closed) involves only having the intelligence unit doing the analysis. cross-pollination would involve allowing others inside the organization to participate in the analysis process and external would require inviting in outside experts, stakeholders and others. for cross-pollination and external initiatives, traditional analytical techniques would be combined with techniques such as delphi and expert group approaches. the foresight field has a lot of techniques that should be used that integrate broad groups in the analysis function. a final aspect of analysis that ties in with the concept of rapidity of change is the frequency of analysis. as mentioned in the collection section, organizations will need to refresh and reanalyze their data on a frequent basis. automated analytical approaches (software and other online tools) will become more important in addressing the need for more frequent data refresh rates, broader data types, and the need for more frequent analysis. 11. communication traditionally, intelligence is given to the client after being developed by the intelligence unit. there are variations in this approach with some suggesting providing the analysis but not the recommendations (the true intelligence) to other managers in the organization and in some cases making the non-sensitive information gathered for intelligence available more broadly throughout the organization. but, generally, it’s about targeted intelligence being developed and given its sensitivity being provided to those with the authority and requirement to receive it “a need to know basis only”. the open innovation groups have discussed at great length the sensitivity and concerns with sharing intellectual property more broadly than just in-house (in the r&d unit) but have generally concluded that despite the risk the potential benefits are big. similarly, for intelligence, there will have to be discussions around how broadly intelligence should be communicated. under the crosspollination approach, intelligence results could be shared with others in the organization (besides the client) but perhaps only those who have appropriate security clearance levels. under an external approach (full open intelligence) the intelligence would be shared with trusted stakeholders outside the organization. this certainly is done within the government intelligence environment (within the five eyes community for example – australia, canada, new zealand, the united kingdom and the united states) and it might make sense to share intelligence findings with key customers or suppliers to get their perspective on the intelligence. again, this fits with the integrated intelligence concept but more importantly provides an additional level of validation on intelligence results and helps provide unique perspectives on it as well. 12. ideas from analytics and it to enhance this new approach to a certain extent, the analytics field has proposed it-related solutions to address some of the problems described in this article. it systems enable organizations to expand geographies, shift time zones, and build linkages among people (e.g., collaborative groupware) that enable the rapid transfer of knowledge across boundaries (dodgson et al., 2006). while an it system enables co-creation through information flows, the data are only useful to the extent that managers can 71 generate insights that help their businesses. in a co-creation environment, different stakeholders might interpret the same data in different ways. analytic tools, such as machine learning, can help to enable consistent interpretation of data across the co-creation ecosystem the use of analytics in innovation however, is not well-understood (george & lin, 2017) and we are certainly proposing an innovative approach to competitive intelligence. nevertheless, many companies are starting to learn how best to leverage the power of these advanced technologies in generating and in implementing new ideas. george & lin (2017) provide a framework for considering the different ways in which analytics could be integrated into innovation. the aspect most relevant to open intelligence is the role of analytics as a driver of organizational transformation. as such, analytics could influence both product and process innovation by capturing and translating data more effectively to better inform transformation decisions. in terms of open innovation, its defining feature (relative to closed innovation) is the gathering and processing of data from external stakeholders. he and wang (2016) argue that social media can be used for improving interaction with a wide variety of these stakeholders. in addition, it can be employed in co-creation efforts during product development. in an analysis of it strategies and open innovation, cui et al. (2015) suggest that outbound, inbound and coupled processes involved in open innovation can be leveraged in different ways through it. whereas inbound and outbound innovation tend to involve oneway flows of information, coupled processes embrace the co-creation concept in which partners and other stakeholders are involved throughout the innovation initiative. in summary, companies can enhance the chance of open intelligence success by expanding the breadth and depth of information processing (ciu et al, 2015). information technologies can help to enable breadth in that these systems can gather and process information from a wide variety of sources. analytics, however, can help with depth, leading to insights that might not have been previously considered. 13. conclusions speed of change, needing to address international dimensions of business and information and increasing complexity of data (volume, variety, velocity and veracity) will require a rethink and possibly reconceptualization of how we develop intelligence. open intelligence, our concept which is inspired by the popular and growing field of open innovation, provides an approach for addressing this challenge. however, it will require that the competitive intelligence function opens up to others inside the organization (cross-pollination) and at the most open, from others outside the organization (the external approach). table 2 provides examples of this within planning, analysis and communication. this may make some intelligence practitioners nervous due to the potential for the intelligence to be seen by some that they do not wish to see it, but this is no worse than the potential loss of intellectual property that can arise in open innovation. yet, many of the world’s largest companies have adopted aggressive open innovation targets and established open innovation programs. it is only by harnessing the information from broader networks (open intelligence), involving a broader array of experts in analysing information (open intelligence) and sharing the intelligence with appropriate stakeholders (open intelligence) that organizations will be able to deal with the speed of change and increasing complexity of data described in this article. even planning (including intelligence topic selection) can benefit from an open intelligence approach. future competitive intelligence scholarship should look at the open intelligence concept. ci researchers should look for examples in which intelligence was developed using external networks. in this article, we have provided a few examples of where open intelligence concepts were observed (e.g., toyota south africa) but more examples should be sought out. the concept of open intelligence appears to address the challenges we have described in this article but further development and testing of the concepts is required. to paraphrase henry chesbrough, the ci unit does not have all the smart people in the world working for it, but it could. the idea in open intelligence is to get the “best minds” working for the organization’s ci program as a means for addressing today’s challenges but also to maximize the ability to identify and take advantage of opportunities. table 2 open intelligence – examples within the wheel of intelligence. traditional model – in house (ci unit) cross pollination – across the firm external planning: where the topics come from senior management driven: “what’s keeping them up at night” ci practitioner driven: “we know what’s needed” other parts bring forward and help to select the intelligence topics – they know what key issues are from their unit’s perspective key stakeholders have a unique perspective on the environment. what’s important to them? what do they need to be competitive? analysis: techniques and methods our unit knows how to make sense of the information. craig fleisher and babette bensoussan have shown us the techniques. we still need craig and babette but let’s have others from the organization help us make sense of the information. we will need group analysis approaches exchanges, delphi who are our five eyes for intelligence? let’s harness the power and insight from key customers, suppliers, other allies, experts etc. we will need group analysis approaches such as exchanges and delphi communication the intelligence is provided to the client – need to know basis the intelligence is shared with those in the organization that could provide perspective on it and are cleared to see it. the intelligence is shared with key people outside the organization that can provide perspective and we trust to see it 14. references alnoukari, m and hanano a. (2017). integration of business intelligence with corporate strategic management. journal of competitive intelligence and management, 7:2 bali, m. (2017). case study from the indian army. in: strategic and competitive intelligence annual conference. bulger, n. (2015). basics of integrated intelligence, putting the pieces together. [online] community.kinaxis.com. available at: https://community.kinaxis.com/people/dustin mattison1974/blog/2015/02/16/basics-ofintegrated-intelligence-putting-the-piecestogether [accessed 28 sep. 2017]. bulger, n. (2016). the evolving role of intelligence: migrating from traditional competitive intelligence to integrated intelligence. the international journal of intelligence, security, and public affairs, 1(18), pp.57-84. calof, j., mirabeau, l. and richards, g. (2015). towards an environmental awareness model integrating formal and informal mechanisms – lessons learned from the demise of nortel. journal of intelligence studies in business, 5(1), pp.57-69. calof, j., richards, g. and smith, j. (2015). foresight, competitive intelligence and business analytics — tools for making industrial programmes more efficient. foresight-russia, 9(1), pp.68-81. capatina, a., bleoju, g., yamazaki, k. and nistor, r. (2016). cross-cultural strategic intelligence solutions for leveraging open innovation opportunities. journal of intelligence studies in business, 6(3), pp.2738. chesbrough, h. (2003). open innovation: the new imperative for creating and profiting from technology. harvard business review. chesbrough, h., vanhaverbeke, w. and west, j. (2006). open innovation. oxford: oxford university press. cui, t., ye, h., teo, h. and li, j. (2015). information technology and open innovation: a strategic alignment perspective. information & management, 52(3), pp.348358. dodgson, m., gann, d. and salter, a. (2006). the role of technology in the shift towards open innovation: the case of procter & gamble. r and d management, 36(3), pp.333-346. du toit, a. (2015). competitive intelligence research: an investigation of trends in the literature. journal of intelligence studies in business, 5(2), pp.14-21. garcia, j. and pinzon, b. (2017). key success factors to business intelligence solution 73 implementation. journal of intelligence studies in business, 7(1), pp.48-69. gauzelin, s and bentz, h. (2017). an examination of business intelligence systems on organizational decision making and performance: the case of france. journal of intelligence studies in business, 7-2. george, g. and lin, y. (2016). analytics, innovation, and organizational adaptation. innovation, 19(1), pp.16-22. hansen, m. and birkinshaw, j. (2007). the innovation value chain. harvard business review, june. he, w. and wang, f. (2015). a process-based framework of using social media to support innovation process. information technology and management, 17(3), pp.263-277. hoppe, m. (2015). intelligence as a discipline, not just a practice. journal of intelligence studies in business, 5(3), pp.47-56. hughes, s. (2017). big data is our future. in: strategic and competitive intelligence professionals. huston, l. and sakkab, n. (2006). connect and develop: inside procter & gambles new model for innovation. harvard business review, march. ibm (2017). the four vs of big data. [online] ibm big data & analytics hub. available at: http://www.ibmbigdatahub.com/infographic/fo ur-vs-big-data [accessed 28 sep. 2017]. keeley, l. (2013). ten types of innovation: the discipline of building breakthroughs. wiley. kottler, p. (2011). can you handle an exponential rate of change?. [online] forbes.com. available at: https://www.forbes.com/sites/johnkotter/2011/ 07/19/can-you-handle-an-exponential-rate-ofchange/#6b2e23dd4eb0. [accessed 28 sep. 2017]. nienaber, h. and sewdass, n. (2016). a reflection and integration of workforce conceptualisations and measurements for competitive advantage. journal of intelligence studies in business, 6(1), pp.5-20. prweb (2017). trade show expands corporate access to open innovation. [online] prweb. available at: http://www.prweb.com/releases/inpex/inven thelp/prweb905814.htm [accessed 28 sep. 2017]. rostami, n. (2014). integration of business intelligence and knowledge management –a literature review. journal of intelligence studies in business, 4(2), pp.30-40. salvador, m., zamudio, p., benitez, e. and bautista, b. (2014). strategic foresight: determining patent trends in additive manufacturing. journal of intelligence studies in business, 4(3), pp.42-62. soilen, k. (2015). a place for intelligence studies as a scientific discipline. journal of intelligence studies in business, 5(3), pp.4756. soilen, k. (2016). a research agenda for intelligence studies in business. journal of intelligence studies in business, 6(1), pp.2136. soilen, k. (2016). what role does technology play for intelligence studies at the start of the 21st century?. journal of intelligence studies in business, 6(3), p.4. vriens, d. and soilen, k. (2014). disruptive intelligence how to gather information to deal with disruptive innovations. journal of intelligence studies in business, 4(3), pp.6378. watson, e. (2012). coca-cola on thinking like a start-up, open innovation and avoiding ‘kodak moments’. [online] foodnavigator-usa.com. available at: http://www.foodnavigatorusa.com/manufacturers/coca-cola-onthinking-like-a-start-up-open-innovation-andavoiding-kodak-moments [accessed 28 sep. 2017]. 40 the definition of competitive intelligence needs through a synthesis model vincent grèzes 1 1 university of applied sciences and arts of western switzerland, switzerland email: vincent.grezes@hevs.ch received march 12, accepted april 5 2015 abstract: based on an exhaustive literature review, this paper presents an overview of the evolution of different methods useful for defining competitive intelligence needs, where the information helps the firm to justify its strategic decisions, the analysis of the early warning topics and the elements of the competitors' environment and the actors influencing the organization or its value system, and their categorization. these findings are part of a doctoral study aiming at identifying the usefulness of data coming from open intelligence. the researcher presents, on one hand, a categorization of competitive intelligence needs, and on the other hand, a synthesis model that assists managers in defining competitive intelligence needs. it also aims to show how to foster innovation. keywords: competitive intelligence, needs definition, decision support, innovation 1. introduction competitive intelligence (ci) is about information gathering and use, looking for opportunities and threats; driven by the expression of the managers’ needs and expectations, focused on finding the information «believed to be wanted», which they «would like to have» (nicholas, d., 2000). according to larivet, s. (2009), the oldest definition of competitive intelligence (ci) is found in a publication of hans peter luhn, in 1958, where he refers to the use of information gathered through a communication system, emphasizing the «intelligence» character of the process because of its «ability to apprehend the interrelationships of presented facts in such a way as to guide action towards a desired goal» (luhn, h.p., 1958, 314). nowadays, choo, c. (1999) classifies the various information gathering activities based on four complementary definitions: available for free online at https://ojs.hh.se/ journal of intelligence studies in business vol 5, no 1 (2015) 40-56 mailto:vincent.grezes@hevs.ch https://ojs.hh.se/ 41 competitor intelligence, defined by porter, m.e. (1982), as the activity aiming at developing «a profile of the nature and success of the likely strategy changes each competitor might make, each competitor’s probable response to the range of feasible strategic moves other firms could initiate and each competitor’s probable reaction to the array of industry changes and broader environmental shifts that might occur»; competitive intelligence, proposed by the strategic and competitive intelligence professionals (scip) as the «process of monitoring the competitive environment»; business intelligence, described by gilad and tamar (1988), as the « activity of monitoring the environment external to the firm for information that is relevant for the decisionmaking process in the company»; environmental scanning, outlined by choo, c. (1999) as follows: «environmental scanning is the acquisition and use of information about events, trends and relationships in an organization’s external environment, the knowledge of which would assist management in planning the organization’s future course of action», and «environmental scanning casts an even wider net and analyzes information about every sector of the external environment that can help management to plan for the organization's future. scanning covers not only competitors, suppliers and customers, but also includes technology, economic conditions, political and regulatory environment, and social and demographic trends». according to prescott (1999, 45-46), who refers to a 1997 study by the american productivity and quality center, ci efforts mainly focus on (1) early warnings, with the aim of identifying «the opportunities and threats in the competitive landscape», (2) «strategic decision making», (3) «tactical decision making», (4) «competitive monitoring and assessment», and (5) «assistance with the strategic planning process of the organization». therefore a central question concerns the choice of the focus, and «the types of intelligence that are most critical, both currently and in the future ». competitive intelligence concerns amongst others the identification of opportunities and threats, and then is at the starting step of a creativity and innovation process (debois et al., 2011, 44). hence, we can identify two phases during which environmental scanning takes place, namely during the project development phase, and during the conduct of the project. the need for environmental scanning is indeed recognized «at the business model elaboration stage, environmental scanning provides a precognition of the environment of the project necessary to the elaboration of strong and competitive business models (osterwalder and pigneur (2010, 14). when the business model is confronted to the market, the involvement of scanning takes on another dimension: it is the insurance of the business model’s continuity by its redesign according to the environmental changes (lequeux and saadoun, 2008)» (grèzes et al., 2012). the monitoring process, or intelligence cycle, can take different forms depending on the different authors. the environment scanning activity is based on a formalized process, which is iterative and adaptable and is called «intelligence cycle», «information cycle» or «monitoring cycle». the aim of this process is to manage the quality of the procedure by systematizing it, and to adapt it to each situation. the successive steps of this process are described by the french agency for standardization (afnor, 1998) as follows: 1) to identify and map the users of information; 2) to assess information needs; 3) to identify and evaluate sources of information; 4) to provide access to information for each user; 5) to convert the raw information into useful knowledge; 6) to capitalize knowledge. in his commented presentation of the standardization document afnor x 50-185, sutter, e. (2005, §8.2) states that «the analysis of the collected information should identify threats and opportunities for the business’ activities or market changes» (free translation). although critically discussed, this process illustrates the logic of the sequence of the environmental scanning process. even if it is, for some authors (bulinge, f., 2006), not directly transferable to the organization, this model has the advantage of providing a tool for rapid and effective understanding. a process that is able to detect the opportunities for a sustainable business model is proposed by bonazzi and grèzes (2013). this process follows the steps shown in fig. 1, and can be adapted to the general monitoring process in the following manner: (1) employees answer a series of questions concerning to the ci needs of the organization; (2) managers confirm the relevance of the questions by checking their accordance with strategic priorities; 42 (3) employees or the associated system collect the variables in open databases, perform data analysis, gather trends, and present them to the managers; (4) managers and experts gather information about trends and design new scenarios based on the detection of opportunities or threats; (5) new scenarios are tested. fig. 1: weak signal detection process, source: bonazzi and grèzes (2013) in order to define the ci needs, several methods are regrouped and compared by vuori (2006), such as questionnaires, interviews, observations, critical success factors (csfs), which are defined as «the few key areas of activity in which favorable results are absolutely necessary for a particular manager to reach his goals» (bullen, c. v., rockart, j. f., 1981), and key intelligence topics (kits), which allow the manager to focus on the strategic actions and decision of the firm, the early warning topics (competitor’s initiatives, technologic and governemental issues), and the key competitors profiles (competitors, customers, suppliers, potential partners) (herring, j. p., 1999). vuori’s findings show that questionnaires, interviews and observations are mainly affected by the skills of the researcher, wheras csfs and kits, structured to elicit critical and specific information needs, are more affected by the manager’s skills. hence, the manager’s skills are crucial in the ci needs definition process. butcher, h. (1998) identified that the major problem concerning the ci needs definition are the ignorance of the information’s availability, and the misunderstanding of its obtaining and use. moreover madinier, h. (2007) and belin et al. (2008) show that environmental scanning processes encounter implementation problems due to a lack of managers’ ability to define objectives and strategies, in order to elicit scanning axes. regarding the managers’ attitudes towards the definition of ci needs, herring (1999) recognized three types: (1) the reticent manager who has some problems expressing his needs, (2) the one who wants to know everything, but who is not able to describe his needs and believes that he will recognize the pertinent information, (3) «the manager who asks the business intelligence unit what he needs to know». regarding the needs, marti, y. v. (1996) considers three categories: (1) «information that is wanted but that is not really needed», (2) «information that lacks and that is recognized to be needed», and (3) «information that is needed but not known to be needed, nor wanted, nor asked for». this distinction is important in that it allows to distinguish between the «wanted information» as «nice-to-know» information, and the required information. one of the main problems concerning the ci process in a firm is that managers do not know what to ask their ci manager, because they sometimes seem to ignore the vectors of opportunity, threats and innovation. hence it is of utmost importance to look for methods that help managers to know about it. therefore our research question is the following: how to support the managers in the definition of their competitive intelligence needs? it is the aim of our research to propose a model that supports managers in defining their ci needs. the remainder of this article is organized as follows: the second section exposes the methodology used; after the state of the art, results are analyzed in the fourth section; a discussion on limits and further research concludes this paper. 2. methodology this research consists of a literature review and analysis based on scientific and professional literature in the fields of competitive intelligence 43 and strategic management, related to the definition of the ci needs. we synthesized the results from the literature review and produced a ci needs design model, based on a typology of the ci needs, that facilitates the identification of their types. on this basis we also deduct a ci alert matrix, or strategic matrix, which allows to link information from the outside to the inside of the firm and in order to identify opportunities and threats for an organization. the typology allows one to describe the potential collectable knowledge in a given geographical area and provides an analysis of the factors that determine the structure of production of that knowledge (doty et al., 1994). the approach we adopted to infer the theory from the analysis of the data is called «grounded theory» (strauss and corbin, 1994). 3. state of the art there are only a few studies in the existent literature that concern our research question, amongst them are müller (2004), vuori (2006) and herring (1999, 2006) which propose a method to elicit the ci needs based on questionnaires, or on a comparison of several methods. in order to enlarge our analysis of the literature on ci needs, we searched and consulted the following references in the field of competitive intelligence and strategic management: porter, m. e. (1982, 1986), ghoshal and westney (1990), bloch, a. (1999), herring, j. p. (1999), prescott, j. e. (1999), bieger, t. 2002, besson and laloum (2003), conseil régional de lorraine (2003) fleischer and bensoussan (2003), müller, m.-l. (2004), vibert, c. (2004), fleischer and bensoussan (2008), abels and klein (2008), icomtec (2010), and scip (2013). finally, the state of the art confirms the need of our research question. 4. analysis, typology and model creation the research steps were threefold: (a) analysis of the evolution of different methods useful to define ci needs based on competitive intelligence and strategic management literature, (b) analysis of the ci needs and typology, and (c) creation of a model which is a synthesis of the existing models and which serves as a support for managers to define their ci needs. a) evolution of different methods useful to define the ci needs the literature offers several approaches in order to define the ci needs of an organization. they can be defined as the categories of information, or themes, on which the company or organization must focus its environmental monitoring efforts. in the early 1980s, porter emphasized the need to establish, within the company, a competitor intelligence system. according to him «the competitive analysis aims at revealing the nature and the degree of success of strategic changes that, in all likelihood, each competitor could undertake, and the possible reactions of other firms, and their likely responses to all the industrial changes and, broader, to all the transformations in the environment that may arise» (porter, m. e. 1982, 52 – free translation). following these developments, martinet and ribault (1989) systematized the ci needs based on the model of the 5 forces of porter, me (1979, 1982), including customers, suppliers, substitute products or services, new entrants, as well as intraindustry competition (public authorities are not mentioned in the first model of porter). 44 fig. 2: the ci needs source: martinet and ribault (1989), based on the 5 forces of porter, m.e. (1979) the model proposed by martinet and ribault (1989), followed by bloch, a. (1999), has the advantage to offer a simplified view on external issues in terms of external pressure forces related to the organization. according to fleischer and bensoussan (2003, 60), this approach allows to identify opportunities and threats in the industry, by studying its participants and its characteristics. fleischer and bensoussan (2003) propose the following model by developing porter’s (1982) model of the 5 forces of porter: fig. 3: standard process of sector analysis. source: fleischer and bensoussan (2003, 67) the authors, referring to m. porter, propose to collect information on each element of the competitive environment successively: competitors, suppliers, potential entrants, substitutes, customers, consumers. bloch, a. (1999) recalls the principles proposed by porter, me (1982), which advocates, achieving a monitoring on the competitors’ value chain, in addition to the ci needs model including the 5 forces approach as presented by martinet and ribault (1989) first, then by fleischer and bensoussan (2003). 45 fig. 4: michael porter’s value chain. source: bloch, a. (1999, 21) according to porter, me (1986) the advantage of this approach based on the value chain model, is its ability to simplify the main activities (internal and external logistics, production, marketing and sales, service), and the support activities (infrastructure, human resources, technological developments, supplies) for a company or organization. this approach also allows to analyze the companies’ functioning, by employing a competitive intelligence approach, and additionally to analyze the microeconomic environment of the company. the most recent developments in modeling the business components have taken the form of business models designs. this approach, formalized by the business model canvas proposed by osterwalder and pigneur (2010) is complementary in terms of mapping and simplifying a complex reality. indeed, the authors define a business model as describing « the rationale of how an organization creates, delivers, and captures value. » the proposed framework therefore aims at helping to « describe and analyze the economic model [a] company [a] competitor or any other organization. » based on the results of a doctoral research (osterwalder, a. 2004) and tested with many companies, this framework is composed by 9 interrelated blocks: the value proposition, key activities, key resources, key partnerships, distribution channels, customer relationships, customer segments, cost structure and revenue streams 46 fig. 5: the business model canvas source: strategyzer.com based on osterwalder and pigneur (2010) moreover, and according to seddon and lewis (2003), the design of one or several business models takes part of the strategy of the organisation as an abstract tool that can be multiplied according to the different value propositions of the firm (fig. 6). fig. 6: the relationship between « business model » and « strategy » source: seddon and lewis (2003) assuming this position, synergies can be found between the business model design and the environmental scanning in order to benefit from their complementarities, as 47 much in the definition phase of the strategy of the company as during its activities. one major limitation of these approaches which aim at defining ci needs relies on the fact that they only take into account the internal factors of the company and those of its direct microeconomic environment. hence, they should be complemented with the observation of the elements emerging from the company's macro-economic environment. according to andrews, k. (1971, 59-60), «the determination of a suitable strategy for a company begins in identifying the opportunities and risks in its environment». the author states that «the environmental influences relevant to strategic decision operate in a company’s industry, the total business community, its city, its country, and the world. they are technological, economic, social, and political [...] ». in addition, andrews emphasizes the continuous nature of the monitoring, without which it «become[s] inappropriate or even obsolete». the synthesis of the microeconomic and the macroeconomic approaches has been achieved by combining the 5 forces of porter’s approach and the analysis of the environment as initiated by andrews, k. (1971). this particular model is formalized by the analysis of the 9 sector strengths proposed by fleischer and bensoussan (2008) (fig. 7). fig. 71: the 9 sector strengths. source: fleischer and bensoussan (2008) the model proposed by fleischer and bensoussan (2008) has the advantage of linking internal and microeconomic ci needs with the environment of the firm, based on a logical evolution of the model of porter, me (1979), supplemented with elements from the pestel analysis. this approach has a holistic and schematic nature, which can address part of the theoretical ci needs of the business. moreover, this model allows to consider all the elements required in the analysis of the environment proposed by the french ministry of economy, industry and employment (2009) in his guide of best practice in competitive intelligence, as well as osterwalder and pigneur (2010), which present a systematic approach to the analysis of the environment in order to support leaders in their strategic thinking. however, porter, me (1986) states that «to gain and maintain a competitive advantage, we must not only understand the value chain of the firm, but also how the company fits into the overall value system». (free translation). this value system is shown below (fig. 8). this position is also shared by andrews, k. (1971), for whom the observation of the evolution of the corporate sector and crosssector developments having an indirect link with the structure is necessary. 48 fig. 8: the value system. source: porter, m.e. (1986, 51) this system can be schematized, as in the example of porter, me (1986), by a series of activities that add new value to the same good or service. hence, this is called a chain for industrial activities. this broader flow of activities is the clustering of different value chains of suppliers and customers in an economic relationship. for example, the construction industry includes activities such as material extraction and processing, transport, several building activities, promotion, sales and management. thus, the observation of the structural changes (diversification and integration of activities) of the analyzed sectors composing the value system is likely to provide information about the potential development of the other sectors of the chain, and the chain as a whole. other value system approaches are presented, particularly in the field of tourism industry, where different types of tourist services are divided into sectors connected by a functional link through geographic and temporal elements. (leiper, n., 1979) (fig. 9) fig. 9: tourism services chain. source: adapted from bieger, t. 2002 the various activities in the chain have no direct commercial relation as in the model of porter, me (1986); however, according to leiper, n. (1979) and bieger, t. (2002), this succession of services can deliver the value expected by the tourist in a tourist destination. a change in the structure of the various activities of the value system is therefore also likely to affect other system activities. b) types of ci needs and categorization the definitions of the identified types of ci needs are summarized below. these types of ci needs cover the various strategic information needs aiming at providing the company a pertinent knowledge about the opportunities and the threats from its environment. the ci needs are distinguished according to the level of connection 49 with the organization: (a) microeconomic level ci needs, (b) macroeconomic level ci needs. 1) ci needs at the microeconomic level the ci needs at the microeconomic level concern the elements which are directly related to the organization. these are the competitive ci needs (1), the marketing ci needs (2), the partnerships ci needs, (3) the substitutes and new entrants ci needs (4), and technologic ci needs (5). these types of ci needs are particularly relevant for risk management and benchmarking, as well as in the conquest of new markets and skills acquisition. according to aguilar, m. (1992), based on a study conducted by the french government on 845 sme, information about competitors (71%) was the third largest ci need after the technology sector (75%) and the markets (82%). this study confirms the results of aguilar, fj (1967, cited by andrews, k., 1971), which stated that the information about the market, including competitive field information, dominates other categories of information search (including technological). more recently, digimind’s study (2012) revealed that 89.6% of the respondents announced that the competitive ci need is one of the key areas of business intelligence, while two thirds agree that the acquisition of talent is a less prominent concern. it should be noted that some authors include, in the competitive ci needs, all activities involving the observation of customers and suppliers (besson and laloum, 2003, rouach, d. 2005). indeed, relations with suppliers of the company, as well as with its customers, are represented by a chain of contractual relations. however, we have chosen to distinguish these different interests by basing us on the type of relationship, such as participation in the company's business (partners) or end consumers (marketing), rather than on the legal artifact used. a) ci needs about competitors competitor ci needs means the monitoring of the economic agents using simultaneously the same resources (natural, human, intellectual, etc.) and acting simultaneously on the same market. this type of intelligence focuses on all direct or indirect competitors of a project, company or organization (bourcier-desjardins et al., 1990). bloch, a. (1999) states, that this monitoring should cover the entire competitors’ value chain. these information requirements are intended to identify the advantages and disadvantages of competitors (osterwalder and pigneur, 2010) i.e. the observation of competitors' business model as a whole: competitors‘ value proposition (pricing strategies, quality, services), markets, distribution channels and key activities, key resources, physical, intellectual, human and financial resources (osterwalder and pigneur, 2010, besson and laloum, 2003), technological partnerships and their cost structure (marcon and moinet, 2011, besson and laloum, 2003). some authors emphasize that this monitoring should focus on the management choices (besson and possin, 1996, porter, me, 1982 calori and atamer, 1988) which should allow to highlight the competitors’ strategies, and thus to have a vision of the market’s direction. b) ci needs about marketing marketing ci needs focus on the observation of the opportunities and threats that may have an impact on the promotion and distribution channels, the targeted places, and the pricing strategy (besson and laloum, 2003, rouach, d. 2005). some authors insist particularly on the importance of data from the market (jakobiak, 1992), as well as customers’ follow-up, new prospects’ detection, and image among customers (marcon and moinet, 2011). according to the business model of the organization, elements relating to customer relationships and distribution channels, as well as customer segments and revenue streams, might be relevant. quantitative methods (business intelligence, investigation, etc.) and qualitative customer analysis (focus group, survey, etc.), will be advantageously coupled with sociological approach, in order to assess the acceptance of products and distribution channels by the public. risk management associated with current partners, with marketing related activity, is analyzed in terms of partnership ci needs. in the marketing field, it is important for the organization to detect trends in distribution, commercial methods, expression of new needs (marcon and moinet, 2011) and new pricing strategies. c) ci needs about partnership the partners are strategically important due to their involvement in the production of the company's value proposition, this way providing a key activity or a complementary key resource to the company. partners can also participate in the delivery of the product or service to customers, or in maintaining relationships with customers. therefore, the partnership ci needs particularly focus on suppliers, business partners, and contractors or distributors of the organization (besson and possin, 1996, bourcier-desjardins, et al., 1990, besson and laloum. 2003, rouach, d. 2005, marcon and moinet, 2011). according to 50 osterwalder and pigneur (2010) the four types of partnerships are: strategic alliances between noncompetitors, strategic partnerships among competitors, joint ventures to develop new activities, and buyer-supplier relationships. for its part, wanner, r. (2011) distinguishes partnerships depending on their purpose as pre-production, on an alliance related to a specific demand, on distribution or on marketing. the partnership ci needs have two facets. the first is based on the management of risks in relationships with existing partners (a), the second is to identify opportunities and threats related to the emergence of actors or alerts in the field of current business partners (b). a) the partnership ci needs are particularly related to limiting risks associated with agencies’ relations and information asymmetries between the partners. the bigger the value added by the partner is, the more its potential failure is likely to have important consequences for the organization. this monitoring focuses first of all on the review of the capacity of partners to fulfill their obligations to ensure their non-failure (besson and possin, 1996, besson and laloum, 2003). consequently, the ci needs also focus on actors and partners’ strategic positions and moves. for example, the vertical integration of a partner in order to strengthen his market power, or the strategic alliances with some competitors, could limit access to resources or customers (osterwalder and pigneur, 2010, porter, me, 1982, calori and atamer, 1988). b) the partnership ci needs focus also on monitoring and identifying new potential partners to optimize the processes, looking for costs reduction through the acquisition of new resources and activities, or to expand or gain a customer segment. (marcon and moinet, 2011, wanner, r. 2011) d) ci needs about new entrants and substitutes ci needs concerning potential entrants and substitutes could have potential effects at different levels of the organization. observation of new entrants and substitutes must cover the identification of actors in the different areas which are partners, marketing, technological developments and competition (porter, me, 1982, rouach, d., 2005 osterwalder and pigneur, 2010). different authors insist on substitute’s detection (rouach, d., 2005) and potential new entrants (marcon and moinet, 2011). according to porter, m. e. (1982), ci needs concerning substitutes and potential entrants are on the boundary of competitive and technological intelligence. the ci needs concerning potential entrants and substitutes focus on the identification of actors acting simultaneously on the same customer markets, offering the same products or services, meeting the same needs, or acting with the same resources as the organization. this ci needs seek to identify potential threats that arise from the emergence of new competitors or new replacement offers. the identification of new players could have an impact on the product or service, markets, distribution channels, customer relations, or on the pricing strategy. it also focuses on the opportunities associated with the implementation of new collaborations for the resources management and the achievement of key activities, as well as threats to current collaborations. it may include the identification of good practices among peers, and consider benchmarking. e) ci needs about technology technology ci needs are a special type of ci needs that has many facets: it concentrates on developments in the near and distant technological environment of the company (bourcier-desjardins et al., 1990). in terms of close technological environment, it refers to the changes in technological fields related to key activities, key resources, and the company's value proposition, but also in its distribution activities and customers’ relationship. according to rouach (2005), technology ci needs cover fundamental and applied research activities, processes and machining processes, as well as patents and standards (besson and possin, 1996). this field deals with monitoring of brands, seminars and expert publications on innovation in the sector of activity (besson and laloum, 2003). it is also necessary to focus on all relevant scientific information (scientific articles and books), technological data, research programs and development projects (jokobiak, f. 1992 marcon and moinet, 2011). 2) ci needs at the macroeconomic level the ci needs at the macroeconomic level concern the indirect environment: technology (1), policy (2), law (3), economy (4) and social issues (5). this field is of particular interest to the public service and its definition of policies and strategies, concerning the development of tools and organizational and working methods in the 51 government and the administration, in order to increase the economic performance of a nation, of a state. a) ci needs about technology according to andrews, k. (1971, 60), technological developments are the elements of the environment of the organization that may have the fastest deployment, and are likely to have the largest impact on the creation or limitation of opportunities. indirect technological environment of the company refers to the detection of technological developments which lead to a change in the general environment of the company, in his value system. referring to the work of bright, jr (1963), andrews, k. (1971, 61) identified seven major areas where progress is apparent. these are (1) the increase in transport capacity, opening new horizons in reducing costs or necessary transportation time, (2) increasing energy efficiency, changing the intensities and amounts of available energy, (3) increasing the capacity to expand and control life and associated services, such as life extension of perishable goods, control of growth of biological materials, etc. (4 ) increasing capacity to alter the characteristics of materials, providing new properties or new materials, (5) the extension of human sensory, (6) the growth of physical activities’ mechanization, in terms of production, distribution, communication and control, even for industries such as mineral extraction, (7) the growing mechanization of intellectual processes such as problem solving, processing information and process’ extension by the use of machines. b) ci needs about politics the ci needs concerning politics refer to the government stability, which is likely to affect the security and public tranquility, the fiscal policy of the country of residence or activity and the social protection measures, corruption, risk of theft by states or parallel organizations (hassid, o. 2005), legislation on intellectual property and protection of private and confidential information, measures of attracting foreign expertise and the rules of foreign trade in force in the relevant state, conditioning border flows of goods and services. (rouach, d., 2005) (andrews, k. 1971 marcon and moinet, 2011) the objective of those ci needs is to anticipate any changes in the political, legal, economic and social environment, which may influence the activity of the organization. indeed, changes in political conditions are likely to have an impact at all levels of the business model of the organization, on one or more activities of the component, and on its value system. it is related to the observation of the discussions and debates which are likely to have an effect, related to the creation of legislative rules, economic or social framing, of the activity. it is therefore an upstream monitoring, sometimes legal, sometimes economic, and sometimes social. it includes monitoring of proposed laws, parliamentary debates, and employer proposals. these elements are upstream because they do not yet constitute positive law. c) ci needs about law ci needs concerning law issues focus on the legal environment of the organization, allowing it to exert in accordance with the laws that govern its business. its purpose is also to anticipate any legislative changes that could affect the activity, including the regional and the european level e.g. that are crucial for all sectors (besson and laloum, 2003). this type of ci needs includes all legal and normative acts that affect the business, such as new legislation, laws and decrees, and the case law which has links with the organization’s activity or with an activity in the value system of the organization (besson and possin, 1996, rouach, d. 2005). it also focuses on the evolution of labor law and collective agreements governing the sector's activities, and the value system in the country or in countries where the activity is carried out, as well as subcontractors. by observing the rules governing social movements in the industry will include information on how the employees could make claims (besson and possin, 1996). d) ci needs concerning economic issues ci needs related to economics concerns information about economic and sector specific issues (rouach, d., 2005, jakobiak, f., 1992). it focuses on the observation of key players in the value system, prices and trends in the raw materials’ prices and resources of the organization, as well as the level of infrastructures such as transport, education, access to suppliers and consumers in a market. some authors include the general perception of the market, the unemployment rate and the country risk studies for countries in which the organization is active (besson and possin, 1996). andrews, k. (1971, 64) specifies that this type of ci needs must also take into account national and international trends, including the extension of the industrial revolution phenomenon to less developed countries, which are sensitive to quick changes in living standards. the author also stresses the importance of the economic policies of different states, especially in the field of customs barriers. at a more basic level, it concerns the following of the reappraisal of minimum income. 52 e) ci needs concerning social issues the ci needs concerning social issues include different factors: demographic trends in the relevant regions, changes in cultural and societal modes, as well as those related to consumer trends. social factors are indeed likely to affect directly the organization's human resources and consumer segments (rouach, d. 2005). the effects of social factors can be felt at every step of the organization's value chain likely to involve human resources, both at the organization’s level as well as at that of partners and other entities in its value system. the monitoring of sociological and environmental changes includes film critics, studies and press articles on consumer tastes, articles on fashion, leisure, and gastronomy (besson and possin, 1996), expenditure patterns (housing, health, leisure), habitat (urban, etc.) (osterwalder and pigneur, 2010). it also includes the impact of the activity on the environment, and the management of natural and technological risks, which is, according to besson and laloum (2003), more relevant in an industrial context. andrews, k. (1971) outlines five major trends in social change: (1) work mode changes and leisure, (2) minority groups looking for the recall of old grievances or for inequality, (3) change of values moving from self-interest to the good for society, (4) consideration of the environment at the expense of efficiency, (5) growing interest in education. c) a synthesized model that supports managers to define their ci needs in order to synthesize those different and complementary approaches on a microeconomic respectively a macroeconomic level, we designed the following model (fig. 10). we also take into account different sectors and industries. fig.10: model of definition of ci needs. source: author contribution the advantage of this model is to bring together internal and external elements of the organization: its business model and its value chain, microeconomic forces that can exert pressure on its business, able to support an analysis of its industry and its value system, as well as macroeconomic factors derived from the approach of andrews, k. (1971). moreover, such as andrews, k. (1971), clerc, p. (1995; cited by carayon, b., 2003), and fleischer and bensoussan (2003) recommend, monitoring activities should identify opportunities and threats by scanning the current and the potential external factors as well as the opportunities and threats related to internal components. hence, the specificity of the ci needs lies in a dual approach combining monitoring threats or risks related to the existing, and detection of opportunities and threats related to the discovery of new elements likely to influence the company or the organization. to represent this dual position of the ci needs, we designed the following matrix in order to estimate the impact of each ci need. (fig. 21) 53 fig. 11: alert matrix, or strategic matrix of ci needs. source: author contribution this matrix can be used to connect each element of the model of definition of ci needs (fig. 10), including all internal and external elements of the company or organization. with this approach, managers have the ability to estimate the impact of information related to external elements, resulting from the use of different types of ci needs, on the internal elements of the business. this strategic matrix of ci needs supports strategic thinking within the business intelligence processes in the company or organization, attributes quality to the information (opportunity or threat) and analyzes it in terms of current or potential impacts on the business model of the company or organization. to detect weak signals depending on ci needs, the following matrix (fig. 12) allows eliciting key issues, to point out the relevant topics. fig. 12: alert matrix, or strategic matrix of ci needs (extended version). source: author contribution external elements of the strategic matrix of ci needs are numbered according to the amount of identified relevant elements. this matrix is complementary to the model of definition of the ci needs (fig. 10), in order to deepen the thinking on ci needs. the use of the model of definition of the ci needs is illustrated in the following figures (fig.13-18), as a support for the presentation of the different types of ci needs. opportunité menace facteur actuel facteur potentiel axe de veille détail des éléments à surveiller o p p o rt u n it é m e n a c e o p p o rt u n it é m e n a c e o p p o rt u n it é m e n a c e o p p o rt u n it é m e n a c e fact eur act uel fact eur pot ent iel fact eur act uel fact eur pot ent iel fact eur act uel fact eur pot ent iel partenaire 1 autres facteurs externes… proposition de valeur ressources clés autres éléments internes… matrice d'alerte stratégique de veille entreprise de référence 1 concurrent 1 54 fig. 33: ci needs about competitors fig. 44: ci needs about marketing fig. 55: ci needs about partnerships fig. 16: ci needs about new entrants and substitutes fig. 17: ci needs about technology fig.18: macroeconomic ci needs fig. 13-18: source (author’s contribution) 5. conclusion based on our literature review and analysis of proposed methods able to define the ci needs, we categorized the ci needs, identified several types of ci needs at the microeconomic and at the macroeconomic levels, and synthesized a model able to support managers in the definition of their ci needs. we postulate that this approach could accompany and help managers in the definition of their ci needs. furthermore it can help them to identify opportunities and threats, as well as to foster creativity and innovation. as we were not able to test this model with a sufficient panel of managers during our current research, this will be part of our further researches. it would also be very interesting to test it with several types of organizations. 6. references abels, e. g., klein, d. p. (2008) business information, needs and strategies, eds emerald afnor (1998) prestations de veille et prestations de mise en place d'un système de veille, norme xp x 50-053, afnor editions aguilar, f. j. (1967) scanning the business environment. new york, ny: macmillan co. aguilar, m. (1992) veille, éveil ou vigilance technologique active ? in veille technologique, 55 l'information scientifique, technique et industrielle, dunod andrews, k. (1971) the concept of corporate strategy, dow jones-irwin inc. begin, l., deschamps, j., madinier, h. (2008) competitive intelligence in smess of french switzerland: lessons from a research-action approach, geneva school of business administration paper research, geneva, switzerland besson, b., possin, j.-c. (1996) du renseignement à l'intelligence économique, détecter les menaces et les opportunités pour l'entreprise, eds dunod besson, m., laloum, y. (2003) tout savoir sur vos partenaires, le guide du renseignement commercial, eds d'organisation bieger, t. (2002) management von destinationen, lejrund handbücher zu tourismus, verkehr, und freizeit, 5. auflage, oldenbourg, münchen bloch, a. (1999) intelligence economique, eds economica : benchmarking, chaîne de valeur bonazzi, r., grèzes, v. (2013) when is the right time to switch to a green business model ? an early warning system for small and medium enterprises, in proc. of siggreen2013 bourcier-desjardins, mayère, a., muet, f., salaün, j.-m. (1990) veille technologique, revue de littérature et étude de terrain, cersi bright, j.r. (1963) opportunity and threat in technological change, harvard business review, november-december, pp. 76-86 bulinge, f. (2006) le cycle du renseignement : analyse critique d‘un modèle empirique, market management, 2(3) : 36-52 bullen, c. v., rockart, j. f. (1981) a primer on critical success factors, mit, in: http://dspace.mit.edu butcher, h. (1998) meeting manager’s information needs, a managing information report, london: aslib, the association for information management calori, r., atamer, t. (1988) dynamique des marchés et veille stratégique, revue d'économie industrielle. vol. 46. 4e trimestre 1988. pp. 5572 carayon, b. (2003) intelligence économique, compétitivité et cohésion sociale, report to the prime minister choo, c. (1999) the art of scanning the environment, bulletin of the american society for information science clerc, p., (1995) encyclopaedia universalis, p. 195 conseil régional de lorraine (2003) intelligence économique. un guide pour débutants et praticiens, programme cetisme, conseil régional de lorraine debois, f., groff, a., chenevier, e. (2011) la boîte à outils de la créativité, eds dunod digimind (2012) baromètre des pratiques de veille 2012 (monde), eds électronique digimind fleischer, c., bensoussan, b. (2003) strategic and competitive analysis, methods and techniques for analysing business competition fleischer, c., bensoussan, b. (2008) business and competitive analysis, effective application of new and classic methods, financial times press ghoshal, s., westney, e. (1990) organizing competitor analysis systems, eds insead, n°90/63/sm, france gilad, b., tamar g. (1988) the business intelligence system: a new tool for competitive advandage. new york, ny: amacon hassid, o. (2005) la gestion des risques, eds dunod icomtec (2010) livre blanc ii: méthodes d'analyses appliquées à l'intelligence économique/ intelligence analysis jakobiak, f. (1992) exemples commentés de veille technologique, paris : eds d’organisation grèzes, v., liu, z., crettol, o., perruchoud, a. (2012) from business model design to environmental scanning: the way to a new semantic tool to support smes' strategy, in proc. of echallenges e-2012, lisbon, portugal, iimc international information management corporation ltd herring, j. p. (1999) key intelligence topics: a process to identify and define intelligence needs, competitive intelligence review, vol. 10, n°2, pp.4-14 herring, j. p. (2006) identifying your company’s real intelligence needs, scip 2006, volume 9, n°4, july-august 2006, pp. 32-33 larivet, s. (2009) intelligence économique, enquête dans 100 pme françaises, eds l’harmattan leiper, n. (1979) the framework of tourism, towards a definition of tourism, tourist, and the tourist industry, annals of tourism research, vol. vi, n°4 lequeux, j.l., saadoun, m. (2008) quel business model pour mon entreprise. paris : editions d’organisation, groupes eyrolles luhn, h.p. (1958) a business intelligence system, ibm journal of research and development, vol. 2, n.4, pp. 314-319 madinier, h. (2007) quelle veille stratégique pour les pme de suisse romande ?, documentalistesciences de l’information, vol. 44, n° 4-5, eds a.d.b.s., pp. 300-310 marcon, c., moinet, n. (2011) l’intelligence économique, col. les topos, eds dunod marti, y. v. (1996) a typology of information needs, in: vuori, v. (2006) methods of defining business information needs, frontiers in ebusiness research http://dspace.mit.edu/ 56 martinet, b., ribault j.-m. (1989), la veille technologique, concurrentielle, commerciale, paris : ed d'organisation ministère de l'économie de l'industrie et de l'emploi, et le ministère du budget des comptes publics et de la fonction publique (2009) guide des bonnes pratiques en matière d'intelligence économique müller, (2004) key intelligence needs. roadmap of your ci capability and activities, sa journal of information management, vol.6(1) nicholas, d. (2000) assessing information needs: tools, techniques and concepts for the internet age, second edition, aslib osterwalder, a. (2004) the business model ontology, a proposition in a design science approach, thèse de doctorat, ecole des hautes etudes commerciales de l'université de lausanne osterwalder, a., pigneur, y. (2010) business model generation: a handbook for visionaries, game changers, and challengers, second edition, canada, self-publication porter, m.e. (1979) how competitive forces shape strategy, harvard business review, march/april porter, m. e. (1982) choix stratégiques et concurrence, techniques d’analyse des secteurs et de la concurrence dans l’industrie, ed. economica porter, m.e. (1986) l'avantage concurrentiel, comment devancer ses concurrents et maintenir son avance, intereditions, paris prescott, j. e. (1999) the evolution of competitive intelligence, proposal management, apmp , spring pp.37-52 rouach, d. (2005) la veille technologique et l’intelligence économique, eds puf scip (2013) competitor profile, toolkit for members, august 2013, vol.1 edition 1 seddon, p. b., lewis, g.p. (2003) strategy and business models: what’s the difference? in proceedings of the 7th pacific asia conference on information systems, adelaide, south australia, p.11 strauss, a., corbin, j. (1994). grounded theory methodology: an overview. in n. denzin & y. lincoln (eds.), the handbook of qualitative research. thousand oaks, ca: sage sutter, e. (2005) le management de l’information, présentation commentée du document de normalisation x 50-185, adbs eds vibert, c. (2004) introduction to online competitive intelligence research, eds thomson texere vuori, v. (2006) methods of defining business information needs, frontiers in e-business research wanner, r. (2011) les avantages de faire des partenariats entre entreprises, le monde economique vol6no2paper5 qoros to cite this article: ahmadinia, h. and karim, m. (2016) competitive intelligence: a case study on qoros automotive manufacturing. journal of intelligence studies in business. 6 (2) 52-65. article url: https://ojs.hh.se/index.php/jisib/article/view/160 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index competitive intelligence: a case study on qoros automotive manufacturing hamed ahmadiniaa and muhaimin karima aåbo akademi university, school of business and economics, turku,finland; hamed.ahmadinia@abo.fi and m.karim@abo.fi journal of intelligence studies in business please scroll down for article competitive intelligence: a case study on qoros automotive manufacturing hamed ahmadiniaa* and muhaimin karima* aåbo akademi university, school of business and economics, turku, finland *corresponding authors: hamed.ahmadinia@abo.fi and m.karim@abo.fi received 7 june 2015; accepted 8 july 2016 abstract in this paper, qoros automotive manufacturing company, which is aiming at expanding their market in europe, will be analyzed. in this case, the challenges that the aforementioned company has faced will be explained and some recommendations regarding marketing, strategy, production methods and other related issues based on competitive intelligence models like swot, porter's five forces analysis, adl matrix, and other related theories will be provided. keywords qoros automotive, competitive intelligence, market analysis 1. introduction qoros auto co., ltd. established in 2007 as a chinese automotive manufacturing company headquartered in shanghai, china. the company design and produce different cars, which specialize in international quality, design, safety, and other remarkable connected services. the company aims at hiring the most talented personnel either in the field of engineering or business to gain competitive advantages in terms of having the most creative and talented people in their production and marketing teams. (bloomberg, 2015) they are trying to offer the best products for the current markets by having such a creative team. the company has two main offices in germany and china, with their operational hub in shanghai. the company has several international partners such as bosch, microsoft, harman, and neusoftalpine. the main idea behind this is that the company is trying to have world-leading technology and use the best service companies to keep their competitive advantages in a close 1 http://www.qorosauto.com/en/company and long-term partnership with their key collaborative partners. these partnerships play a vital role for the company to be a creative, innovative and internationally recognized car factory that provides the highest quality cars and services for their customers1. in order to have a better analysis of the case, we provide more information related to the company structure in the following parts of this report. 2. brand the company sold their cars under four main brand names: chery, karry, rely, and riich2. the company embedded in their brand a changed driver progressive production method by which they try to drive the changes within an upward and progressive trend in the car industry. in the company, they share values such as that the technology that they are using in their production process must make life simpler and better for their customers. they are trying to implement the aforementioned spirit to be the first premium chinese car brand that provides the highest 2 "chery's "outstanding 4+1" pattern exhibits the "chinese power"". chery inc. 2010-04-23. journal of intelligence studies in business vol. 6, no. 2 (2016) pp. 52-65 open access: freely available at: https://ojs.hh.se/ 53 possible quality cars to make their customers feel that they are “living in a modern metropolitan lifestyle with a customer experience that goes beyond driving”3. 3. products the main products of the company could be categorized into small box-shaped passenger vans, passenger cars, and high-performance four-wheel drive cars built on a truck chassis. these cars sell under either the chery or karry brands (xing, 2002). the most significant progress in these cars, compared with other chic cars, is that the qoros 3 sedan has become the first chinese-developed car with a five-star safety rating by euro ncap, which plays a role as a key competitive advantage for the company4. moreover, the company is considered to be the largest chinese passenger car exporter and the tenth-largest chinese car manufacture, since 2003 and 2012, respectively (the global times, 2012). the assembly of the cars and their component manufacturing facilities are mainly in china and approximately fifteen other countries all around the world. moreover, the main company location has two local r & d research centers and the company allocate about 7% of their total income to the process of product development (dyer, 2006). as a significant development in their products, the company also designed and developed some hybrid and electric vehicles5. 4. technology the company uses state of the art technology introduced by microsoft to offer new stylish, safe, international quality standard cars to the global market. the company, with this collaborative production, introduced a new idea into the car manufacturing industry: the “connected car”. this term refers to using internet technology via various means such as mobile phones and tablet, so that the user has the opportunity to access different driving services6. apart from this technology they also offer a new electronic bike, known as “ebiqe”. it is an electric bike that offers several electronic facilities and applications to its 3 http://www.qorosauto.com/en/aboutqoros/brand 4 http://www.caradvice.com.au/253375/qoros-3sedan-first-five-star-euro-ncap-rated-chinesedeveloped-car/ 5 "china's fuel subsidy costs the world". reuters. 2008-06-04. rider. these facilities are available via a permanent 3g internet connection and a five inch touchscreen monitor7. the main idea behind these bikes is more than having an electronic engine; the new concept mainly targets new technologies to offer a modern navigation system and to be ready to ride in any off-road situations as well8. 5. price and sales the company considers several developments in expanding their markets in various parts of europe, to cope with the company vision and long term target of the company to be recognized as a successful brand in the car manufacturing industry. in this case, the executive director of sales, marketing and product strategy at qoros automotive co mentioned that “the value is not a matter of price, but mostly the combination of product and services in line with customer requirements” (pietro, 2014). he also argued that this value is estimated by the level of satisfaction that the company’s cars will offer to the buyers. for example, the price of their cars ranges from 22,470 to 28,900 usd for the qoros 3 city suv, and 19,000 to 27,000 usd for the qoros 3 hatch9. 6. fuel recently, most car manufacturing companies are trying to offer new cars with alternative fuel powered engines. in this case, we consider them to fall into seven engine groups: diesel, gasoline, bi-fuel-cng, bi-fuel – lpg, hybrid – gasoline, battery electric vehicles (bev) – owned batter, and bev – leased battery (valeri, and danielis, 2015). qoros auto co., like other car manufacturers, offer cars with petroleum fuel engines; however, they recently allocated considerable fund to their r & d department to develop modern hybrid and fullelectric cars. in this case a new technology called the “start-stop system or stop-start system” is used in the recent products of the company to reduce fuel consumption and emissions from gas as a new step toward the expanding process of green marketing in the company. therefore, the car automatically 6 http://blogs.microsoft.com/businessmatters/2015/03/04/automakers-innovate-connectedcars-withmicrosofts-tech/ 7 https://www.electricbike.com/qoros-ebiqe/ 8 http://www.qorosauto.com/en/newscenter/news/ article41 9 http://www.carnewschina.com/tag/qoros/ 54 shuts down and restarts the internal combustion engine, and the amount of time the engine needs to spend ready will be decreased and consequently less fuel will be consumed in general10. 7. marketing the company has different marketing strategies in different parts of the world. on one hand, the executive director of sales, marketing and product strategy at the company expressed that for european markets they promote the qoros 3 sedan, hatchback, cross and now also the suburban utility vehicle and the station wagon. furthermore, the company has a gradual marketing plans to introduce the euro 6 tgdi and diesel engines onto the market. on the other hand, the company has a special marketing plan for china. in this case, they are targeting the starting development in metropolitan areas by having special partnerships with recognized expert dealers. through this collaboration the company can provide technical support and it platforms for the management of the information from both technical and customer points of view (montagna, 2014). 8. strategy the recent marketing strategy of the company announced at the 2015 geneva international motor show indicated that “the company has a plan to export some selected models to central europe and the middle east within 12-18 months” (gedalyahu, 2015). furthermore, the company representative argued that they are going to expand their markets through a stepby-step plan. however, their current target is to expand their market thorough their sales network in china. not to be left behind, the chief executive of the company mentioned that another significant change in the long-term strategy of the company is hiring more chinese staff as local employees rather than having many costly international expert personnel who are working as catalysts to market the company’s cars (murphy, 2015). 9. after sales the company has three main after-sales support methods for their customers, as follows: 10 "chery wins three awards including "influential ev manufacturer of the year"". chery inc. 2011-12-31. archived from the original on 2 april 2012. 1. one touch system as an innovative sales services for the customers, by which they can be in touch with the car service department of the company, register for an appointment with a chosen company service center, and have all the relevant information about the car’s current situation on-screen. this system has several merits, such as time saving for servicing the car with less effort from the customer, which brings a new service experience to them. 2. the product is covered by a 36 month or 100,000 km warranty for all terms. 3. finally, the company implemented special facilities to support their customers, such as “roadside assistance,” which is available via a special phone number, 24 hours per day year-round11. 10. sustainable business model the company has an especially environmentally and user friendly business model for its productions. the main idea of the company is not only to produce a brand new car for the market, but the company also aims at producing a different one. for this, the company implemented a new approach, which should be more user-friendly for the drivers and should bring a better driving experience to them. therefore, the company developed a new digital eco-system business model for their value chain. the business model has the following benefits to the customers: 1. provides interactive information in the car without any stress for the driver. 2. expresses any relevant information to the driver through universal gestures for all critical actions that don't require looking t the screen. 3. easy access to any of the key areas in the software such as navigation and entertainment. 4. simple and contextual information (villanti, 2013). in this part of the report we discuss the european automotive market, its size, key players and current trends. it is undoubtedly 11 http://www.qorosauto.com/en/aftersalesservice/overview 55 important for qoros management to analyze the european automotive market before planning to penetrate it. this analysis will help the company to understand the industry size, key players, opportunities and the current trends in product design and customer preferences. having a proper analysis of the industry and the pocket market of slovakia will help them understand their own position. the management can then assess their strengths, weaknesses, opportunities and threats. a proper analysis of the industry and selfassessment has a better chance of producing a more appropriate business plan. 11. the european automobile market the european automobile market is the largest automobile manufacturing market in the world. the european union is the largest automobile market with an annual passenger car registration of approximately 13 million per year by its manufacturers; close to one quarter of all cars in the world are manufactured in europe. it is needless to say that the industry also experiences fierce competition in terms of sales volume, market share and profitability. the major companies also compete in terms of design, technology, co2 emissions and safety. in order to analyze this industry from qoros’s perspective we will focus on the passenger car segment and exclude commercial vehicles. the objective of this phase of the report is to have a clear understanding how promising or otherwise the market is for qoros. the european automobile industry is large and sophisticated. they boast about their cleanliness, safety and speed. the turnover generated by the automotive sector represents 6.9% of eu gdp. hence it has ripple effects throughout the economy, supporting a vast supply chain and generating an array of business services. automobile manufacturers operate some 290 vehicle assembly and production plants in 25 countries across europe. in total, 16% of worldwide passenger car registration is done in europe. however, there exists a big challenge in this particular region. unlike the us market, there has been a decline in the sales figures for a prolonged period of time. russia experienced a sales drop of 25% and the whole of the region is emerging 12 http://www.strategyand.pwc.com/perspectives/ 2015-auto-trends 13 http://drmsriram.blogspot.com/2015/02/businessspecial-2015-auto-industry.html fitfully from a six-year sales period with noticeable deterioration in performance and quality. however, on the contrary, some business analysts argue that the european automobile market still holds the potential for 6% annual growth in the passenger car segment (campestrini, & mock, 2011). however, it is evident that the market and the consumers are changing. three powerful forces driving the change are shifts in consumer demand, expanded regulatory requirement for safety and fuel economy, and expansion of the availability of data and information12. 12. shifts in consumer demand the consumers have recently shifted from being extremely loyal to the brands and have started considering them to be a transportation machine; so they are looking for more comfort, safety and sophistication in a competitive price. this might not directly affect the sales but it has an effect on the consumers’ willingness to pay. this basically indicates that the customers have become more demanding. customers are becoming more “value for money” centric, where they want additional value for the additional expenses13. 13. expanded regulatory requirements regulators are mandating the most safetyrelated facilities. for example, features in the cars, such as backup cameras are recognized as standard equipment on new models, adding further to costs. globally, the regulatory bodies have started being more concerned and are giving substantial importance to the safety and security of citizens. as a result, they are also implementing stricter road and traffic laws and they require the vehicle manufacturers to comply by producing vehicles that have technology and designs that provide enough safety. moreover, they are concentrating on co2 emissions and imposing laws that force car manufacturers to produce more environmental friendly vehicles14. 14. increasing availability of data and information availability of information is creating a big change in consumer behavior. these days, 14 http://www.chinapartsfactory.com/2015-autoindustry-trends/ 56 consumers are exposed to all sorts of information about the car, its brand, price, specifications, discounts, quality and performance. all of these factors relate to the automotive value chain and are interested in collecting more customer and car data, but uncertainty about how to use it is still considered to be a matter of doubt. these driving forces are creating an impact on the entire automobile industry. in order to manage them and satisfy both the customers and other stakeholders, it is imperative to understand how these forces are affecting the other variables of the industry (campestrini, mock 2011). 15. increased electronics and software content in the past few decades the cost of software and electronics was only 20% of the entire cost while now it has risen to 35%. now 90% of the innovations and new features are contributed by the electronic systems and new software. infotainment supplies an opportunity for oems and suppliers to differentiate their products. the latest consumer reports survey showed that infotainment equipment was the most difficult to deal with feature in 2014 for vehicles, making a proposal for a powerful upside for companies that can arrange superior systems15. the increasing popularity of infotainment and telematics is forcing the traditional oem and suppliers to change their business thinking and become more innovative and comply with the products and services of the industry’s key players. recently, developments in software are considered to be as important as hardware innovations, and global competition also emphasises nontraditional factors. ever more vital software content has also accelerated the pace of change in products and features. whereas the time frame for new vehicle launches is typically three to four years, the cycle for new software iterations, often driven by interactivity with mobile devices, is measured in months (campestrini, mock 2011). 16. product-mix changes to cope with regulatory needs regulations and laws are becoming stricter and more concerned about the environment. as a result, the governments and other regulatory bodies are creating pressure on the car 15 http://www.chinapartsfactory.com/2015-autoindustry-trends/ manufacturers to comply more with sustainability issues. in order to create a greener environment and to reduce co2 emissions, the governments are encouraging companies to manufacture hybrid and environment friendly cars. for instance, cafe standards in the united states that will go into effect in 2016 are planned to add as much as us$1,000 to the production cost of a vehicle, according to the national automobile dealers association. however, the challenge is that only a few of the automobile buyers are willing to pay more for environmentally friendly choices. thus the cost pressure is falling heavily on the omes. this, however, paves a path towards innovation. in order to make the car more fuel efficient, the companies are reducing the weight of the cars. this is dramatically evidenced by ford’s decision to allocate a considerable amount of steel with aluminum to the 2015 version of its f-150 pickup truck. 17. new developed platforms and platform modularization the pressure of consumer preferences has made car manufacturers become more responsive and flexible. in order to reduce cost and to cater to the want of segmented vehicles, the omes are adding a number of models at the same time, reducing the number of vehicle architectures and thus improving product commonality. volkswagen, gm and many other companies are increasing their number of platforms. it might initially increase the cost but the additional expense is outweighed by savings from the sharing of common components between cars and platforms, and increased volume. 18. the changing face of retail along with the core product and technologies, the sales channels are also changing. customers want a smooth purchase experience including financing, insurance and all other formalities. while most of them are interested in taking a test drive some are looking for an instant purchase from the internet. although it is an emerging sales channels, the dealers prefer a sale through a test drive. accommodating these shifting attitudes about buying a car will require equal changes to 57 dealers’ processes, including investment in new technology16. apart from these forces responsible for the above mentioned changes, some additional historic data trends might also be important for qoros in order to design strategy. in this phase we discuss the current trends in the industry and major concerns such as passenger car industry size, price, market share and major players, annual sales volume and sales trends, co2 footprint and technologies. 19. number of vehicles: after a major decline in sales in 2009, registration of passenger cars steadied in 2012 and 2013 to 12 million, which is still 20% below the volume before the economic crisis. before this crisis, the average volume hovered around 15.5 million annually. for some countries like spain and russian, the dent was even higher; 50% for spain and 25% for russia. the historic data says the market is more concentrated in a handful of countries. in total 75% of the total new car registration is taking place in germany, france, uk, italy and spain and 50% of the market is captured by the top seven brands. germany holds the title of market leader, having 25% of the total new car registration volume (campestrini, & mock, 2011). 20. fuel consumption and co2 emissions under the new eu regulations, 95% of the new vehicle fleet must comply with the 95 g/km target by 2020 (campestrini, mock 2011). 2013 was the first year in which the target of co2 emissions from passenger cars dropped to 130 g/km. from 2021, the manufacturers’ average will be monitored. in percentage term, all manufacturers are given a target of reducing co2 emission by 27% from 2015 to 2021 (campestrini, & mock, 2011). 21. technologies eu or europe is yet to gain maturity in the environmentally friendly hybrid car segment. there are significant differences among the member countries; belgium, france, and spain have diesel take-up rates of around 65%, while in the netherlands the rate is much lower, 29%. surprisingly, 53% of cars newly registered in 2013 were powered by diesel, which is quite different from the us, chinese 16 http://www.strategyand.pwc.com/perspectives/ 2015-auto-trends and japanese markets, which are dominated by gasoline powered cars. on the other hand, hybrid car registration is experiencing growth and reached a level of 1.4% in 2013. however, it is still relatively low compared to the netherlands (5.7 %) and france (2.6 %). if we look into the hybrid shares, brand wise, onefifth of all new toyota vehicles sold in the eu were hybrid-electric. plug-in hybrid (phev) and battery-electric vehicles (bev) make up about 0.4 % of vehicle registration in the eu, with notable differences among the member states. in the netherlands, a stunning 4.1 % of all new sales were phevs in 2013, and another 1.4% were bevs (campestrini, mock 2011). the underlying reason for this shift in manufacturing is directly correlated with the government imposed co2 based vehicle taxation scheme where vehicle that emit less than 50 g/km of co2 receive tax rebates. phevs and bevs accounted for 5.8 % of all new car sales in norway in 2013. and in 2014, that market share further increased to 14.6% during the first half of the year (icct, 2014d). this makes norway the world’s leading market for electric vehicles (in terms of market share, not absolute number of vehicles). underlying reasons are, again, fiscal incentives provided by the norwegian government. however, it is worth mentioning that the europe market has experienced a sharp increase in gasoline direct injection (gdi) to obtain greater efficiency and lower co2 emissions. by 2013, the share is assumed to reach 30%. the top brand of hybrid cars is toyota prius. (campestrini, & mock, 2011). ninety percent of the vehicles in eu-28 are passenger cars and largely dominated by germany, france and uk, holding 60% of all registrations of new cars. germany holds the largest market share with 25%. after a dent in sales due to a government imposed scrappage scheme, the country has remained stable at around 3 million vehicles per year. for the first time in years, vehicle sales in spain increased again in 2013. the european market is very diverse in terms of brands, with the most registered brand, vw, commanding only 13% of the market. the top-five companies dominate about 65% of the market. the vw golf remains the most popular car model in europe. it accounted for about 3.8% of all new vehicle sales in the eu in 2013. the biggest segment 58 of the market is the small and lower medium segment, comprising almost 65% of the entire industry while luxury cars are only 10% of the total. a steady hike, however, is being observed in suv and off road cars since 2009. after the crisis in 2009 where most of the brands either declined or stagnated, bmw and audi continue to have a positive upward trend. (campestrini, & mock, 2011). 22. price sales taxes in the eu are between 18% and 27%. in addition to the general tax, some member states have also introduced a special sales or registration tax for new cars. the price figures from 2001 to 2013 show that there has been a steady growth in price. the luxury brands, audi, bmw and mercedes-benz, are the most expensive brands followed by vw and ford. a positive picture is observed in the hybrid electric segment, where greener vehicles are in a declining price trend (campestrini, & mock, 2011). 23. market in slovakia slovakia is a small country in europe born in 1993. it joined the eu in 2004 and the euro area in 2009. from 2001 to 2008, the economic growth of slovakia was among the highest in the eu, heavily fueled by foreign direct investments especially in the automotive and electronic sectors. the country has cheap skilled labor with low taxes and liberal labor laws along with a favorable geographical location. the qoros management has decided to first launch their product in slovakia as a stepping stone to penetrate the european automotive market. hence, learning about the slovakian automotive market is as important as learning about the european automotive market. the slovakian market started to grow more drastically when it welcomed new plants, and production grew to over one million units. the market comprises 70% of passenger cars. the downfall in the economy has maintained the market decreased of 4.7% from 2012. skoda is the market leading brand with 19.9% market shares, followed by volkswagen at 9.7%. apart from that, the market has new entrants such as hyundai and kia, who have already managed market shares of 8.1% and 7.5% respectively17. 17 http://focus2move.com/slovakia-car-industry-2014outlook/ not only is the automotive industry growing but so is the entire economy of slovakia. the main driving forces are rebound investment and an expansion in private consumption supported by improved labor market conditions. from the end of the 1st quarter of 2015, the automotive industry in slovakia started to grow, with 11% growth from 2012. if qoros can successfully penetrate the eu market and create a strong foothold there highly depends on five major forces. how the market is behaving, how the major players are performing, how the consumers are behaving, how the regulations are changing and how qoros complies with these forces. it is of paramount importance for the qoros management to analyze the industry, its target market and its competitors to design a well thought out strategy. every activity qoros management undergoes should be backed by a well-designed strategy that address the current trends and market demands and has a solution to those18. in the following phase we will discuss is how qoros can use competitive intelligence methods and techniques to respond to the dynamic market and plan their next attempts19. 24. market in the uk another big part of the europe market is the united kingdome (uk) automotive market. of all uk suppliers, more than 70% manufacture their products in the uk. at present, about 80% of all component types required for vehicle assembly operations can be procured from uk suppliers. the uk automotive supply chain typically generates £4.8bn of added value annually. there are around 2,350 uk companies that regard themselves as ‘automotive’ suppliers, employing around 82,000 people (2009 data). (smmt, 2012). it is estimated that every job in the uk vehicle assembly supports 7.5 elsewhere in the economy. uk-based oems are actively committed to increasing local sourcing practices to support new model programs and facility expansion. the uk boasts a production of 1.6 million cars and more than 2.5 million engines yearly. 1.58 million vehicles and 2.5 million engines were produced in the uk last year, and of these, 81% of the total vehicles and 62% of engines were exported. uk automotive is an important part of the uk economy and 18 http://focus2move.com/slovakia-car-marketoutlook-at-july-2012-skoda-wins-in-a-flat-market/ 19 http://focus2move.com/slovakia-light-vehicle-sales/ 59 normally generates more than £55 billion in annual turnover, along with £12 billion in net value-added to the economy. the automotive industry is the uk’s largest sector in terms of exports by value. it generated £27 billion of revenue for the uk in 2011. on average, the sector exports to over 100 markets worldwide and accounts for around 11% of total uk exports yearly20. average new car co2 emissions fell to a new low of 133.1g/km in 2012, and have fallen by over 20% in the last 10 years. uk automotive is at the forefront of the low carbon agenda, investing in r&d and new technologies that will deliver ever cleaner, safer and more fuelefficient cars. the automotive industry is subject to numerous national, eu and global laws and regulations, including those relating to vehicle safety and environmental issues such as emissions levels, fuel economy and manufacturing practices. 25. key environmental legislation there are several recent environmental policies that are now impacting the automotive industry including: in 2009, legislation was passed that committed european car manufacturers to cut fleet average co2 emissions from new cars to 130g/km by 2015 and 95g/km by 2020. from november 1, 2011 all new types of approved vehicles were required to have electronic stability control fitted as standard and from november 1, 2014 all newly-registered vehicles must also comply. the highest selling car in the uk is nissan followed by land rover. the most popular model is ford fiesta. uk car manufacturing peaked in 1972 at 1.92 million units, and 2003 saw the highest car output in recent years, totaling 1.65 million units. although car manufacturing levels have not yet matched pre-recession levels, full year 2012 figures verify that uk car manufacturing reached its highest since 2008 and broke all-time export records21. the volume of cars export to other countries exceeded 1.2 million units, up 8% on 2011. the highest registrations of new cars are observed in west midland followed by scotland. the supermini and lower medium segments are the biggest segments, comprising 60% put together. the mini segment is led by hyundai i10 followed by volkswagen. the supermini segment is led by ford fiesta followed by 20 http://www.cordantrecruitment.com/cordantfocus/driving-the-automotive-industry volkswagen polo. the lower medium segment is led by ford focus. overall, there has been an increment in the usage of cars in the uk market. compared to 2011, 2012 experienced 0.4% more traffic on the roads on average with a maximum spike of 0.9% in the south-west region. a recent study showed 12.6% of co2 emission is caused by cars in the uk. addressing that a concern in 2011, uk vehicle manufacturers reduced energy consumption per vehicle produced by 14%. in addition to producing ever more efficient powertrains, manufacturers have designed various innovations to help drivers save fuel and lower co2 emissions. stop-start technologies automatically cut the engine when a vehicle is stationary. the engine is restarted by releasing the brake or depressing the clutch. tire pressure monitoring systems measure the pressure of each of the tires and will give a warning through the dashboard display if they become underinflated. gear shift indicators show the driver the optimum time to change gear (up and down) while driving. low rolling resistance tyres are designed to improve the fuel efficiency of a vehicle by minimizing the energy wasted when the tyre rolls down the road. the new industry tire labeling scheme indicates fuel efficiency using a rating scale from a(most efficient) to g (least efficient). the difference between an a rating and a g rating could be a reduction in fuel consumption of up to 7.5 % (smmt, 2013). 26. qoros automobileimplementing competitive intelligence model to assess: strengths, weaknesses, opportunities and threats (swot) founded in 2007, qoros automobile, the chinese car manufacturing company, has decided to penetrate and gain a foothold in the european automobile industry. it is worth mentioning that several attempts to penetrate the european market were made by different chinese car manufacturers in the past few years. however, most of them did not succeed. learning from the past, the qoros management has crafted its strategy well considering all the probable pros and cons. in this phase of the report we will make a swot analysis in order to understand the current position of the company and how it can plan to 21 http://blogs.matchtech.com/engineering/ automotive/beginners-guide-uk-automotive-industry/ 60 overcome its threats and weaknesses and capitalize its on its opportunities and strengths. this competitive intelligence method will help the company to narrow down its plans and implement appropriate business activities where necessary. 26.1 threat qoros, being a chinese brand, will experience heavy competition from the other key players in the industry. brands like volkswagen, bmw and mercedes benz have been operating in the european market from the beginning. this means the company needs to compete with the world’s greatest car manufacturers in their own market. this means the company needs to focus on product differentiation and out of the box marketing and communication plans. at the moment, the timing is not the most appropriate. the european market is experiencing a slight decline, while the chinese market is also stagnant. this might create a liquidity crisis for the company. another threat is that, making radical innovations in gasoline powered engines is not easy. this implies that the company should also concentrate on hybrid or green powered cars. 26.2 opportunity starting business in slovakia on a test basis was a smart move. this country can be quite a big market. with 324 cars for every 1000 citizens, the market has yet to grow and qoros can take the opportunity. however, it will have to face skoda, which happens to be the top choice there. the company has initiated an activation plan of describing the cars to its customers over a cup of coffee. this has somewhat positive feedback. the conversion rate of qoros is 6% to 8% while the industry average is not more than 5%. there is a market for a social car. the new customers require comfort, sophistication and digital connectivity. the qoros cars have a digital ecosystem that allows the car to connect with the owner's mobile devices via an app and features a touchscreen "infotainment" system. 26.3 strength qoros has a state of the art manufacturing facility with the capacity of making 350,000 cars. they have strong experience in this market as a player in the largest automobile market: china. they also have a sophisticated design center in munich and engineering facilities in austria. the hatchback introduced has twice the power of vw golf, the most popular brand in the eu. the sedan has a competitive price, considering the power and the features. the price is around 20k, while a car with that power usually prices around 27k. apart from that, they designed unique connectivity with an eight-inch touch screen and a cloud connected platform that enables customers to access social networks and book service appointments. qoros has integrated leading talent around the world across all engineering, commercial business functions and at all levels of management. the management team has been crowned by various automobile business experts and veterans working for long periods in organizations such as volkswagen, bmw and mercedes benz. the company has already achieved a 5 star score in the euro ncap safety testing in 2013, which marks the first time for any chinese brand to gain this ranking. they have also received the red dot design honor award. this means the cars and the brand are in the process of gaining more acceptability and credibility for their end users. unlike other chinese companies, qoros is a venture between israel’s richest man and the state owned chinese automaker cherry automobile. it has advanced and modular architecture to enable the rapid development of a full range of new models and variants and to allow for the adoption of hybrid technologies. it is supported by major global suppliers including magna steyr, trw, continental, bosch, valeo, microsoft and icon mobile. 26.4 weaknesses qoros could not make online purchases easy. it is rather complex and not user friendly. this is due to too much emphasis on engineering, and less effort in business and brand building. this refers to the fact that the company made less effort in marketing and communications. the biggest weakness that qoros will face in the european market is the deeply rooted social stigma against a “chinese brand”. this reflects the lack of trust and confidence in the brand, and thus the core product itself. after a detailed analysis of the company, its desired market and its assessment, we will now 61 discuss how we can use competitive intelligence and its various methodologies to create a dynamic strategy for qoros. in this part of the report we will discuss a few competitive intelligence techniques that the management of qoros could use to analyze the industry structure and competitiveness, customer intelligence, growth path analysis and competitive strategy exploration. 27. industry structure and competitiveness 27.1 adl matrix this analysis helps one understand how an industry’s maturity and competitive position affect strategy. it compares two axes: industry maturity (ranging from embryonic, growing, mature, to aging) and competitive position (from dominant to weak). from the discussion of the european automotive market and slovakian automotive market we can conclude that while the eu market has reached maturity, slovakia is still in the growth stage. on the other hand, with the swot analysis, we can state that in this particular situation qoros is in a favorable position in slovakia but in a tenable position in the eu market. there are a number of challenges due to the social stigma against a chinese brand but it has got an outstanding product portfolio with a five star rating and a very positive conversion rate. according to the adl matrix, the management will have to consider the european market and the slovakian market separately. slovakia is a growing market (324 vehicle for every 1000 citizens) and qoros has a favorable position, the management will have to concentrate on an attempt to improve its position and push for a market share. in order to improve its position in the market, the management will have to craft outstanding marketing and communication strategy. the aim of these activities will mostly include attempts to reduce the social stigma against chinese brands and highlight the five star rating to increase credibility and trust. they would have to remember that qoros will be facing skoda, which has been the favorite brand for a long time with an enviable market share. in order to acquire a market share, it is important to have some similarities and some points of differences with skoda. the parameters could be price, design or more infotainment and electronic features. going for hybrid cars in this market might not be the smartest step at the moment. although there is an opportunity, the market may get price sensitive when it comes to hybrid vehicles. on the other hand, the eu market, being a mature one and qoros being in a tenable position, the management must act a bit less aggressive. the company must gradually build its brand image, slowly and steadily. the best choice at the beginning might be to create a comparatively smaller niche and build the trust of that group. this would disseminate positive word of mouth, which would complement the international ranking scores they are awarded. repeated communication about credibility and quality can help build up the trust of the end users, which might mitigate the negative social stigma. 27.2 porter's five forces analysis: we also analyzed the case via porter’s five forces as a conceptual framework, which will examine the level of competition within the industry. in the following part of this essay, the position of the company compared to its competitors via porter's five forces theory is analyzed: 1. buyer power: as statistics show, for example, in china the company could sell only 7,000 models while the total number of sold cars in the same year exceeded 19 million units (fusheng, 2015); it is strongly suggested to the company to allocate considerable funds to increase their production rate per year. therefore, they will be able to draw more customers to their products. however, the company must keep the price of production as low as possible, compared to other manufactures in the luxury car market to have the competitive advantages as to the highest cost for buyers to switch from their products to those of the others providers. moreover, eventually the company will be able to increase the number of cars sold per year. in this case, the company will be able to cope with the market demands in terms of their state of the art cars. 2. supplier power: the main car manufactures operating in the european market that provide competition are volkswagen, bmw and mercedes benz. in this case, the company needs to provide specific cars 62 with state of the art facilities to cope with the market demands in this really competitive market (lanza, 2014). also, it is suggested to the company to allocate considerable finds to expand its public advertising and special plans for marketing its products. not to be left behind, as a chinese firm the company should focus on both the quality and cost of production to gain and keep its position in the market as a brand new international car manufacturer. in this case, the company can achieve a competitive advantage over these main suppliers by focusing their strength and control over businesses through high tech cars as well as the lowest cost of production. finally, the cost of switching from one car manufacturer to another one for the customers will be really competitive for the company. 3. industrial rivalry: there is a significant rivalry among the company’s cars and the other car manufactures in terms of price and productivity. for instance, qoros 3 hatchback will compete directly with vw’s golf, while the sedan takes on the german automaker’s jetta (tschampa, 2014). in this case, it is strongly suggested to the company to focus more on expanding their products and state of art facilities in daily operations by hiring the most talented staff. therefore, as the company has many competitors that offer equally attractive products and services, keeping an upward trend in product quality and facilitating the latest technology will bring them more competitive power compared to their competitors. this is because suppliers and buyers will go somewhere else if they don't get a good deal from the company. on the other hand, if none of the other companies can provide the same quality cars as the company is providing, then the company can have enormous strength in the market. 4. threat of substitution: as is mentioned in the “industrial rivalry” section, the company must put more emphasis on their production technology and their products’ state of the art technology, as well as productivity and user friendliness of their cars. in this case, the company can have the merit of making it hard for their customers to find an equal substitution for their cars in terms of productivity and user friendliness. for instance, it is expected that average fuel economy (cafe) standards will be 54.5 miles per gallon (23.2 kilometers per liter) by 2025. fuel economy is about maximizing the number of miles your vehicle can travel on a gallon of fuel. the cost of fuel has a major impact on fuel economy. consequently, it is really important for the company to work on expanding such technologies in their production line. in this case if they can make the substitution for their cars easily possible, then this will be a big strong point for the company. 5. threat of new entry: by using some local raw materials provided in china (as a country full of natural and human resources needed in car production) the company would make a big challenge for a new entry into the car industry. also, it is really good practice if the company focuses more on the chinese’s market which has a really big market of approximately 1.3 billion consumers, which could impact the biggest manufacturers and retailers in the world. furthermore, china’s huge population would bring a strong competitive advantage for the company against the most dominant players in the outsourcing industry (evans, 2014). 28. customer intelligence 28.1 journey map “customer journey maps allow you to walk in your customers’ shoes by traveling with them as they interact with your company. when based on sound research, they provide an accurate outside-in view, focusing on desired outcomes from the customer’s perspective. you’ll see what customer needs are at each interaction, how well you meet them, and where opportunities for improvement lay. with this understanding, these are 10 points any company contemplating, planning, or already undertaking a customer journey mapping initiative should consider: • “be clear on what you want to accomplish: having a precise strategy. 63 • “know whose journey you are mapping: being more customer centric and using their point of view. • “talk to your people: gather information about customers from the front end employees. • “talk to your customers: clear, transparent and frequent interaction with customers and potential customers. • “must-haves: the most important matter in this process; understanding what the need of the customer is. what are the “must have” attributes they are looking for? • “nice-to-haves: this part discusses the wants of the customers. how they think and feel and what are the features they consider to be “nice to have” and are willing to pay for. • “the importance of design: this is a customer analysis tool to gather information and turn it into intelligence. so designing this entire process to be simple and easy to understand is very important. this will ensure more qualitative data, which can be very vital in product designing. • “socialize and share: this study needs to be communicated throughout the organization with a pivotal aim. first, all employees must have a clear idea about the target customers and what they want and need. second, it will keep all the employees on the same page when giving the customers any service. this helps an organization to be more customer centric and responsive. • “take action: this is not a customer entertainment tool. so after proper analysis, actions should be taken in order to fill the gaps and implement improvements where necessary. • “avoid analysis paralysis: too much analysis not only wastes time but can also dilute the aim of the study and can shift the focus. the aim of this too is to find out what’s most important to them–bringing the data (and your customers) “to life” as they pursue their 22 http://www.mcorpcx.com/customer-journeymapping-10-tips-for-beginners/ goals. hence it will have to be quick and simple yet effective”22 the reason this competitive intelligence method will be instrumental for the qoros management is that, as a new entrant in the market, it is imperative for them to understand the core customers’ needs and wants. without a thorough knowledge of customer preferences, this company can never achieve its goals. 29. competitive strategy exploration 29.1 innovation ambition matrix the innovation matrix in competitive intelligence is often called an ansoff matrix23. this model helps an organization to understand where to compete and how to compete. this model consists of three innovation horizons and three levels of ambition. in this matrix, when the organization is operating in an existing market with its existing products the strategies can be a line extension or optimization of the existing products. this strategy can be useful for qoros while maintaining business in china. china is the largest automotive market and qoros can concentrate more on optimizing its existing brands/products by introducing new series of its existing models of the hatch back and the sedan. they might also consider revitalizing the market of the electronic bike they manufacture. the second horizon consist of an adjacent market with existing business. this is qoros in slovakia. since it is a new market and there are opportunities to grow, the management will have to consider expanding with their existing brands. here more focus is needed in marketing and communication in order to create awareness and buzz. however, qoros’s long term plan is to enter the european automotive market, which is a new one for the organization. this market has strong players, hence there will be entry barriers. in order to overcome these hurdles, the company will have to develop breakthroughs. the management will have to consider that this market is not necessarily price sensitive, so low pricing might not help and will rather damage the brand image. in this case they will have to add features to their 23 http://www.strategyhub.net/2012/05/ framework-of-week-81-innovation.html 64 products, which will be unique and at the same time they will have to be competitive in price. along with this, proper communication about the brand, its safety and its features should be continuously communicated through proper channels. 30. conclusion from the overall discussion we can observe qoros is planning to penetrate the biggest automotive region in the world that has fierce competition amongst famous brands like volkswagen, bmw, ford and mercedes benz. the market overall is huge, hence it still has the opportunity to grow (6% annually) in the passenger car segment. it is not price sensitive but it has a very demanding customer pool. moreover, the regulatory bodies are concerned about sustainability and instructing the omes to manufacture more environmentally friendly automobiles with lower weight, higher mileage and lower co2 emissions. on the other hand, qoros, being a chinese brand, will have to penetrate the market while facing the challenge of a negative social stigma. moreover, the structure of the uk automotive market is completely similar to the european automotive market. therefore, the company can use the same strategy for the european car market. not to be left behind, the consumer base might be totally different from the uk market and that might be considered to be a powerful factor in changing its marketing and communicational strategy of the company. the customer engagement plans need to be changed accordingly. therefore, the company’s management team might keep the penetration strategy unchanged, but customer engagement and communication will have to be tailored. in this case, managing the social stigma against chinese brands might be even higher, as this is mainly due to the fact that people from the uk tends to have a strong preference for products made in their country or region and are less open to brands from other countries. in order to enter this market and have a strong foothold, the company needs to develop a precise and sustainable business plan. they have shown sensibility by starting with a smaller market where opportunity exists. this will help them create a niche and create awareness. qoros management should analyze both the eu and the slovakian markets very carefully. learning from slovakia will help it to be more effective and smart in the eu market. the company should also analyze the end consumer and should add features to its products that will give them a new experience. the idea of the café was brilliant and can have a positive outcome since vehicles are high involvement products. so, along with improvements in technology and design, the company should also engage different regulatory authorities to test their quality and safety levels. later these testimonies will be instrumental for building trust in the consumer’s mind. regular communication of the brand would mitigate the bad reputation of a “chinese brand”. these strategies might not get them an immediate piece of the market share but they can create a niche market and qoros can then capitalize on that. 31. references "geely aims to become china's largest auto exporter". the global times. april 9, 2012. retrieved july 19, 2012 campestrini, m. & mock, p. 2011, "european vehicle market statistics", international council on clean transportation. evans, michael, 2014. “manufacturing in china can give your business the competitive advantage”, forbes, 2/07/2014: http://www.forbes.com/sites/ptc/2014/02/05/on -shoring-canbring-competitive-advantagefor-manufacturers/. fusheng, li, 2015. ”qoros seeks new strategy amid poor performance”, china daily, 201504-27 07:58:23: http://www.chinadaily.com.cn/cndy/2015 04/27/content_20547586.htm gedalyahu, ben, 2015, “qoros changes marketing strategy: idan offer’s joint car venture plans exports "to central europe and the middle east.”, globes, 04/03/2015, 17:29. http://www.globes.co.il/en/article-qoroschanges-marketing-strategy-1001015857 geoff dyer, in shanghai. "ft.com site: proton in talks with chery over manufacturing." ft.com (mar 30, 2006) http://www.bloomberg.com/research/stocks/priva te/snapshot.asp?privcapid=95147659 lanza, g., hauns, d., hochdörffer, j., peters, s., & ruhrmann, s. state of automotive technology in pr china-2014. murphy, colum, 2015. “struggling chinese car maker’s chief vows to overhaul company”, the wall street journal, april 13, 2015 8:41 a.m. et. pietro, montagna. 2014, “interview with stefano villanti, executive director of sales marketing and product strategy at qoros”, automotivespace.it blog, feb 25th, 2014. 65 porter, m. e. (2008). the five competitive forces that shape strategy. harvard business review, 86(1), 25-40. the society of motor manufacturers and traders (smmt), motor industry facts 2013, report 1 march 2013: http://www.smmt.co.uk/2013/03/motorindustry-facts-2013/ the society of motor manufacturers and traders (smmt), uk automotive defies doubledip in 2012, report december 2012: http://www.smmt.co.uk/2012/12/ukautomotive-defiesdouble-dip-in-2012/ tschampa, dorothee, 2014. ” chinese automaker qoros challenges europeans on home turf”, bloomberg, march 6, 2014: http://www.bloomberg.com/news/articles/2014 -0305/chinese-automaker-qoros-challengeseuropeans-on-home-turf valeri, e., & danielis, r. (2015). simulating the market penetration of cars with alternative fuel powertrain technologies in italy. transport policy, 37, 44-56. xing, w. w. (2002). automakers in the fast lane. the china business review, 7, 2002 vol8no2paper4shaikhandsinghalrevised to cite this article: shaikh, s.a. and singhal, t.k. (2018) business intelligence through patent filings: an analysis of ip management strategies of ict companies. journal of intelligence studies in business. 8 (2) 62-76. article url: https://ojs.hh.se/index.php/jisib/article/view/310 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index business intelligence through patent filings: an analysis of ip management strategies of ict companies shabib-ahmed shaikha,b and tarun kumar singhalc,* asymbiosis international university (siu), lavale, mulshi taluka, pune, maharashtra, india; bcsir-urdip, pune, maharashtra, india; cit management, symbiosis centre for management studies, noida, up, india; *tarun.singhal@sitm.ac.in journal of intelligence studies in business please scroll down for article business intelligence through patent filings: an analysis of ip management strategies of ict companies shabib-ahmed shaikha,b and tarun kumar singhalc* a symbiosis international university (siu), lavale, mulshi taluka, pune, maharashtra, india b csir-urdip, pune, maharashtra, india c it management, symbiosis centre for management studies, noida, up, india corresponding author (*): tarun.singhal@sitm.ac.in received 29 august 2017 accepted 21 august 2018 abstract business intelligence enables enterprises to make effective and good quality business decisions. in the knowledge economy, patents are seen as strategic assets for companies as they provide a competitive advantage and at the same time ensure the freedom to operate and form the basis for new alliances. publication or disclosure of intellectual property (ip) strategy based on patent filings is rarely available in the public domain. because of this, the only way to understand ip strategy is to look at patent filings, analyze them and, based on the trends, deduce strategy. this paper tries to uncover ip strategies of five us and indian it companies by analyzing their patent filings. gathering business intelligence via means of patent analytics can be used to understand the strategies used by companies in advocating their patent portfolio and aligning their business needs with patenting activities. this study reveals that the indian companies are far behind in protecting their ips, although they are now on course correction and have started aggressively protecting their inventions. it is also observed that the rival companies in the study are not directly competing with each other in the same technological domain. different patent filing strategies are used by firms to gain a competitive advantage. companies make use of disclosure as strategy or try to cover many aspects of a technology in a single patent, thereby signaling their dominance in a technological area and at the same time as they add information. keywords business intelligence, competitive intelligence, intellectual property, ipr, ip strategy, patent analytics, software patents 1. introduction business intelligence helps enterprise users make effective and high quality business decisions. it includes multiple applications, tools and technologies for information gathering, accessing, and analyzing involving all factors that affects a business (rajan, 2009). howard dressner, an analyst at the gartner group, first coined the term business intelligence in the early 1990s. business intelligence has become the art of sifting through large amounts of data, extracting pertinent information, and turning that information into knowledge upon which timely actions can be taken. all successful enterprises have made use of business intelligence for their business (chaudhuri, 2011). as per ranjan (2009), business intelligence reveals: •the position of the firm relative to its competitors journal of intelligence studies in business vol. 8, no. 2 (2018) pp. 62-76 open access: freely available at: https://ojs.hh.se/ 63 •changes in customer behavior and spending patterns •the capabilities of the firm •market conditions, future trends, demographic and economic information •the social, regulatory, and political environment •what the other firms in the market are doing business intelligence as a strategic framework is becoming increasingly important in strategic management and in supporting business strategies (alnoukari and hananao 2017). alignment between business and business intelligence strategies can be a powerful enabler of business strategy, including new business models that bring about organizational transformation (watson & wixom, 2007). business intelligence using tacit knowledge can lead to intellectual capital including patents (sveiby, 1997 ; herschel & jones, 2005). the it industry has grown rapidly since the 1960s, starting in the usa and has slowly become global (cameron et al., 2006). information and communication technology (ict) innovations are usually incremental, fast changing and having a short lifecycle (shaikh & londhe, 2016). firms investing in this continuously evolving technology expect quick returns for their investments by means of some protection. intellectual property rights (ipr) are the rights given to persons over the creations of their intellect. the framework of ipr offers a wide range of protections such as patents, trademarks, copyright, design registrations, trade secrets, anti-competitive practices in contractual licenses, protection of new plant varieties and data protection. a patent offers the strongest protection within the framework of ipr. it is a form of intellectual property granted by the government in order to secure legal protection for inventions by means of exclusive rights for a limited period in exchange for the public disclosure of an invention. patents are also important for trade and industry worldwide as they attract foreign investment and rapid technology transfer (oecd, 2004). patents also promote innovation by disclosing an invention in the public domain (moser, 2005; walaski, 2004). patenting decisions are seen as important strategic considerations since gaining maximum value from a patent depends on the individual firm’s ability to enforce the patent (arrow, 1962 ; dornelles, 2016). patents are a major source of information and when properly processed and analyzed, can yield a wealth of information on competitors’ activities, r&d trends, emerging fields, and collaborations. taking into account the filing practices (for example, broad or specific applications, filing routes, and territorial protection sought) associated with specific companies or domains, the analysis of patent portfolios can give a reasonably accurate idea of the volume of the activity in specific research areas, reveal underlying trends, detect emerging or hidden information or deviations from expected patterns, and more. patent analysis can also yield a wealth of information related to research activity, collaborations, location of research work, key inventors and licensing (grandjean et.al., 2005). strategic ip management can be offensive or defensive resulting in the formulation and execution of strategies related to technological ip, including issues such as how to acquire, create, govern, exploit and extract value from patents. patents can also be used to understand technology and competitor intelligence (holgersson 2012; krig & sandra, 2017). patenting usually has strong business corelations (pargaonkar, 2016). in the present study, patent filing data of selected ict companies are used as a source of information for competitive/business intelligence to highlight the intellectual property (ip) management strategies of ict companies. patent landscape and the accompanying ip competitive intelligence involves understanding and anticipating the competitive environment within which a company operates. more specifically, ip competitive intelligence highlights emerging ip risks, provides patent portfolio benchmarking, monitors competitor technology development efforts, and predicts commercialization of technology (pargaonkar, 2016). the main objective of ip competitive intelligence is to create value for competitive advantage. ip competitive intelligence improves decision quality and enables ip strategies by defining the relative competitive position. ip strategy becomes important when firms differentiate themselves using technology. in such cases, ip competitive intelligence analysis plays an important role for defining, creating and sustaining a winning ip strategy. ip competitive intelligence enables value creation and strengthens multiple 64 aspects of an effective ip strategy (pargaonkar, 2016). considering the above, there is a need to understand the various motives of firms to patent. 2. literature review various studies have been carried out in the field of competitive intelligence, business intelligence, their advantages to business in taking timely decisions, as well as the use of patent data for carrying out business intelligence for competitive advantage. hughes (2017) reports that due to the high volume and speed of scientific research, it is impossible to collect, update and analyze the variables that impact the evolution of technologies as disruptive innovations need knowledge from adjacent technologies as well. hughes (2017) proposes a model featuring expanded search depth, breadth and speed along with inputs from internal and external experts for identifying emerging technologies by coupling big data analytics machine learning with technology sequence analysis. on the other hand, gauzelin and bentz (2017) report on how small and medium-sized enterprises (smes) perceive and make use of business intelligence in decision making and highlight that business intelligence systems are perceived as a solution to various unforeseen disruptive events that hit the businesses unexpectedly. they report that assessing the success of business intelligence is not easy as they cover the entire organizations and their benefits are long term. smes lack business intelligence implementation due to a lack of financial and expertise capacity to implement it. however, small businesses deal with increasing volumes of data, hence making the appropriate choice of the best business intelligence in line with their strategy will allow them to have a competitive advantage. collecting and analyzing data on business intelligence from smes, gauzelin and bentz (2017) report that business intelligence and its use have a far-reaching impact on the operation of smes. søilen (2017), highlights the importance of competitive intelligence and market intelligence through a case study of two swedish mncs and reports that companies would succeed only if the competitive intelligence model, along with the specialist’s role, are properly defined in bringing out and reporting facts instead of pleasing their seniors. søilen (2017) also highlights that the expectations from the analysts is predicting the future, which at times is difficult. the analysts often also end up performing different tasks aside from analysis. with the increase in data and its low cost, competitive intelligence is largely defined by how well companies can draw conclusions from it, as the outcome is mainly dependent on the quality of data available and, at times of crisis, the demand for intelligence is the greatest. business intelligence can be viewed as a broader tool that includes knowledge management, enterprise resource planning, decision support systems and data mining (gangadharan and swamy, 2004). business intelligence is also referred to as competitive intelligence, market intelligence, customer intelligence, competitor intelligence, strategic intelligence or technical intelligence (lönnqvist and pirttimäki, 2006; deshpande et.al, 2016). scholars have define business intelligence as the process of collecting large amounts of heterogeneous data from multiple sources, analyzing that data using advanced analytical tools and methods, and quickly presenting a high-level set of reports to multiple users that condense the essence of that data into the basis of business actions, enabling management to make efficient and effective strategic business decisions that can help organizations to survive and thrive in the global economy (stackowiak et al., 2007; zeng et al., 2006; ranjan, 2009). the main challenge in any business intelligence solution is in its intelligence ability (alnoukari and hananao, 2017). business intelligence or competitive intelligence is considered to be an interdisciplinary field (walker, 1994). studies have suggested that competitive intelligence is associated with strategic management as well as knowledge management (gabriel and adiele, 2012; calof and viviers 2001) and intelligence has evolved as a discipline over time (hoppe, 2015). knowledge management can be perceived as an integral component of business intelligence (herschel & jones, 2005). it is usually defined in reference to collaboration, content management, organizational behavioral science, and technologies. knowledge management is a systematic process of finding, selecting, organizing, distilling and presenting information in a way that improves an employee’s comprehension in a specific area of interest (herschel & jones, 2005). it can be seen as consistent with resource-based theories of the firm, such as building and competing in a capability that could be quite difficult for 65 others to imitate practically. knowledge management was seen to be central to product and process innovation and improvement, to executive decision-making, and to organizational adaptation and renewal (earl, 2001). specific knowledge management activities help focus the organization on acquiring, storing and utilizing knowledge for such things as problem solving, dynamic learning, strategic planning and decision making. alnoukari and hananao (2017) report that the integration of business intelligence and corporate strategic management has a direct impact on modern and flexible organizations, which leads to a gain of competitive advantages as well as easier adatation to changing scenarios and corporate strategies. the core advantage of any competitive intelligence system is to extract the knowledge needed about competitors’ opportunities and threats (alnoukari and hananao, 2017). competitive intelligence ensures a firm’s competitiveness in the marketplace through a greater understanding of competitors and the overall competitive environment (solomon, 2004). competitive intelligence and market intelligence can also be built on competitors and influencers from exhibits and tradeshows (solberg-søilen, 2010). intellectual property assets are becoming increasingly important drivers of competitive advantage. this has forced organizations to effectively and efficiently mine their ip for business intelligence. studies suggest that patent data is also a valuable source of competitive intelligence from which to derive a strategic advantage (rouach and santi, 2001; dou et al., 2005; grandjean et al., 2005; shih et al., 2010; deshpande et.al, 2016). stern (2005) highlights that for creating competitive advantage, management must focus on exploiting ip during a product’s lifecycle, which would encompass resource management and ip strategy. ip protection is a strategy that helps in formulating new strategies for protection of innovations and sustainable development. patent data, its legal status and litigation data can be used for business intelligence purposes such as ip portfolio valuation, patent valuation, identification of competitors and their r&d efforts, assessment of active researchers in a particular field, assessment of patent quality, research quality, market trends, discover human capital, and to anticipate product launches (sagacious research, 2017). patent analysis enables firms to make more informed decisions about their ip strategy and create value for their business (great dome associates, 2018). analysis of patent data accelerates innovation, saving time and money (cubicibuc, 2017). a patent portfolio can be analyzed by carrying out patent landscaping (tekic, 2014). intellectual property landscaping is a strategic tool providing valuable business intelligence to ensure maximum understanding of the potential opportunities and competitive threats (hee.org, 2018). patent landscaping provides insights which guide business strategies that include cost optimization, enforcement, licensing, r&d and mergers and acquisitions. patent landscaping supports business strategies that help in the development of a quality patent portfolio, which in turn generates revenue and mitigates risk (ip.com, 2017). ip strategy as a subset of the business strategy requires analysis of a firm’s own inventive capabilities along with the ip landscape (barrett,2005). a patent landscape can give a new perspective on a market by illustrating the players, their technologies and their filing history and behaviors over time. a comprehensive landscape informs companies about the strength of their ip and how it compares to other companies operating in the same market. looking at ip in a broad perspective and applying business intelligence provides decision makers with actionable insights and a clear view of potential outcomes for various strategies (clearviewip, 2017). business intelligence is a systematic way of gathering data, analyzing and utilizing the same while making decisions in expanding, launching a new product, while carrying out mergers and acquisitions or for implementation of corporate strategies. business intelligence from intellectual property rights helps organizations to follow a proactive approach (siddhast.com). it provides information that will allow organizations to predict the behavior of their competitors, suppliers, customers, technologies, acquisitions, markets, products and services, and the general business environment with a degree of certainty (vedder et al., 1999; jourdan et al., 2008) stern (2005) reports that managing ip as a strategic driver helps businesses become market leaders, align their business strategy with product ip strategy and protect their technology via means of maintaining a product monopoly. this provides a competitive 66 advantage, thereby encouraging and defining measures for ip evolution and exploitation. wang (2011) highlights how patent intelligence can be used to make an intellectual property strategy. citing various researchers, wang (2011) reports that patent data can be used in core areas of technology management. jürgensa and solanab (2016) provide insights on the use of patent information for technology watch activities, classifying patent indicators for performance, technology, patent value and collaboration indicators. they report that to gain insights and competitive advantage in a specific technical domain, patent intelligence is used, which is also referred to as technology watch, technology intelligence or technology monitoring. this is a subdomain of competitive intelligence, a methodology for gathering analyzing and managing external information that can affect the organizations plans, decisions and operations. citing various researchers jürgensa and solanab (2016), report that competitive intelligence through patent data allows one to measure current technical competitiveness and forecast technological trends in specific sectors. highlighting a case study of the nanotechnology industry in spain, jürgensa and solanab (2016) report that statistical analysis of patent information and its visualization is a powerful and successful way to gain insights into a technology that can be further used to monitor and evaluate technology activities. patents encourage and promote innovation by the disclosure of a technology in the public domain (moser, 2005; walaski, 2004). patents also promote technology transfers and cross licensing. it is reported that countries that support stronger patent protection laws are much preferred destinations for foreign investments, new innovations and technology advancements (goswami & yadav, 2010; mcgowan et al., 2007). patenting does not always lead to a monopoly in pricing as it helps recover the r&d investment cost (spinello, 2007) and hence the ip law allows the developer to profit from their creation (mcgowan, stephens & gruber 2007). increased incentives for patents have pushed firms towards “patent thickets” (cockburn and macgarvie, 2011). patent thickets constitute a potentially imposing obstacle and do not allow freedom to operate for other businesses (clarkson & dekorte, 2006). patent flooding and thickets have been used as anticompetitive tools to lock out competitors, especially in fast moving technological markets (weatherall et al., 2013). the higher number of patent applications by firms also increases transactional costs and thereby opens the doors for strategic collaboration for patent pooling and cross-licensing so that the negative effects of patent thickets can be reduced (zekos, 2006; cockburn & macgarvie, 2011). patent laws have been interpreted over time to provide protection to the desired licensee. even unwilling infringements by means of ignorance are not an excuse to avoid prosecution (biles & mann, 1992). patent trolls have made an impact on business and innovation in the ict sector. trolls are becoming professional patent exploiters that have high quality technological patents (pohlmann & opitz, 2013). the trolls’ blackmailing tactics can have adverse effects on the whole industry, which in turn may slow down innovation processes (pohlmann & opitz, 2013). bessen & hunt (2007) have warned that strategic patenting by non-r&d firms may pressurize firms to engage in a patent “arms race.” however, useche (2015) reports that a high number of patents reduces the risk of failure and acquisition, while quality increases their attractiveness as an acquisition target. patents may give a firm an upper hand and a competitively advantageous position, thereby adversely affecting the competitor firms’ market values (chung et. al, 2016). large companies see iprs as incentives to compete in ipr portfolios and patents as strategic assets to protect from competition, give design freedom, offer complementary protection and form a basis for new alliances. at the same time, smes see iprs as restrictions and market barriers and they need to build their own ipr portfolio to make themselves more credible players in the market (välimäki, 2001). one strategy followed by successful chinese multinationals was to skip filling in the domestic market and go directly to developed countries by collaborating with the world’s major companies, pointing out that high application does not result in profit (nakai & tanaka, 2010). companies strongly involved in collaborating with customers that are experienced using patents are more inclined to use patents (blind, 2007). among the many strategies used by companies, technology disclosures can be a rational offensive strategy to make its presence felt in a particular technological domain (baker & mezzetti 2005). this helps to make the patent office aware of its availability of 67 potential prior art. this is done intentionally to create prior art that might stop rivals from patenting and making it more difficult to patent, hence extending the patent race through disclosure. disclosing the intermediate results in a multi-stage patent context signals a firms’ commitment to a research project, which may induce the rival to exit the competition or provide its followers ground to work ahead on the technology, depending on the knowledge spill over (gill 2008). this at times leads to future acquisition or collaboration with its followers and at the same time prevents its competitors from working in the same domain. open source software (oss) is attracting increasing commercial interest among firms as they take royalties over patented technologies of products and services sold as top-ups for oss products (fosfuri et al., 2008; wen et. al., 2015). firms with software patents highjack an oss project and direct its development in a particularly favorable direction by threatening or exercising enforcement rights. fosfuri et al. (2008) also states that patenting by firms that support oss can also be for defensive purposes, thereby supporting their defensive strategies. firms with large stocks of software patents or with large stocks of hardware trademarks are more likely to release oss products (fosfuri et al., 2008). red hat is making a profit from the sales, service and support of linux even though linux is open source (mcgowan et al., 2007). it is seen that red hat has patent filings to protect its commercial interests (shaikh & londhe, 2016). firms patent not only to prevent imitation, but also to obtain bargaining power and improve their corporate image, to freely operate in the market, to extract value of their patents through licensing and royalties, to collaborate with technology leaders and to seek a competitive advantage. to strengthen a firm’s technological leadership and to protect its innovation, patents serve as influential instruments of corporate strategy and have become an important source of competitive advantage (grindley & teece, 1997; sullivan, 2001; holgersson, 2012). studies have pointed out the need for integrating and aligning patent strategy with a firm’s business and technology strategy to generate valuable returns (alexy et al., 2009; granstrand, 2000; smith & hansen, 2002; reitzig, 2004; davoudi et.al., 2018; lynskey 2009; holgersson & grandstrand, 2017). the software market was born in the us and it still acts as a trendsetter for software patenting by opening its doors to software and business method patents (cameron et al., 2006). other countries are following the us to protect the interest of their researchers, as the failure to protect might affect a company’s ability to operate freely at the basic level in the global market (clarkson & dekorte, 2006), which in turn would threaten their own existence (dedrick & kraemer, 1993; jyoti et al., 2010). the best way to survive is to study and learn from the patenting strategies followed by the market leaders who are successfully protecting their inventions via means of patenting. since no publication or public disclosure about ip strategies is available, the only way to understand such ip strategies is to look at the patent filings, analyze them and based on the trends, deduce their strategy. these insights thus obtained may help the it industry to customize its strategy with respect to patent acquisition. 3. methodology the study covers patent data published from 2005 to 2014 from five indian and five us ict companies. the list of these companies is given in table 1. the derwent innovation database (https://clarivate.com/products/derwentinnovation/) was used to retrieve the relevant patent data for the study. the text mining and visualization tool vantage point (www.thevantagepoint.com) was used to clean, normalize and analyze the patent data. as the data retrieved was huge, it was also imported into a relational database for further filtering. the search strategy consisted of assignee names of the ten firms. as the study was to find the technological trends and strategies, the patents searched were based on the application year (trippe, 2015). the exemplary search strategy was: cmp=("company names") and (ad>=(20050101) and ad<=(20143112)) as patents are territorial in nature, the same invention may be duplicated by way of multiple fillings in different countries, which can be referred to as patent families. to reduce this form of duplication, one representative of each family was retained to obtain the data set highlighted in table 1. the bibliographic details of patents such as the title, abstract, claim, priority date, assignee name, inventor name, inpadoc family 68 members, and citations have been used for the analysis. table 1 companies with patent data sets and patent families. company patent data set patent families international business machines corp. 87,086 24,206 samsung electronics co. ltd. 168,170 26,885 microsoft corp. 118,860 19,274 google inc. 57,589 8,931 qualcomm inc. 179,640 13,899 tata consultancy services ltd 1,803 414 infosys ltd 644 273 wipro ltd 799 375 hcl technologies ltd 316 205 mahindra it & business services 523 263 4. analysis and visualization 4.1 patenting trends for us and indian it companies the overall patenting activity for these us and indian it companies between 2005 and 2014 can be seen in figure 1 and figure 2, respectively. the figures highlight that the patenting activity of the us companies is higher than their indian counterparts, which lag in protection of software innovations. the us companies applied for about 93,000 patents, while the indian companies applied for less than 2% of that quantity, with about 1500 patent applications in the same time period. it is observed that the patent applications of google and qualcomm have gradually increased in the study period, while that of microsoft decreased. samsung leads the application rate for almost 5 years, with more than 3,000 patents each year. on the other hand, indian companies such as tcs, hcl and wipro aggressively started patenting their activities only in 2010, 2011 and 2012, respectively. infosys and mahindra made their 69 presence felt throughout the decade under consideration. after comparing the indian and the us firms it can be said that the indian companies entered late into the patenting foray. 4.2 origin of inventions for us and indian it companies the origin of an invention can be found by using patent data (trippe, 2015). the priority filing country in the patent document is considered to be an indicator for the origin of a particular invention, as companies usually prefer to first file for a patent in the same country in which the technology is invented. figure 3 illustrates the priority country filing trends for the indian and us it companies. during the study, it was observed that the majority of the patents (67%) claim the us as the priority country. however, a closer look revealed that the indian companies have india as their origin of invention. a further analysis of the top filers from india reveals wipro has its patent origins in at least 9 countries while tcs has its origin of invention in 4 countries, infosys and hcl in 3, and mahindra had its origin of inventions in 2 countries. the study of major us filers reveals that samsung leads the way by priority filing around 78% of its patents first in korea followed by 18% in the us. samsung and qualcomm have priority filings in at least 12 countries and 78% of qualcomm’s, and 86% of microsoft’s, inventions originated from the us. microsoft has filings for origin of inventions from 13 countries. ibm has a spread across 14 countries and has about 88% of its inventions’ priority filings in the usa. around 5% of ibm’s inventions originate in europe. the reason that the us-based companies have many countries as their origins of invention can be attributed to their global presence in the form of technology and r&d centers in multiple countries, along with their collaboration in research. however, this is not the case of the indian companies, as they operate in selected markets other than india such as the usa and europe only. wipro is the only indian company with priority filings for inventions from at least 9 countries. it is also interesting to note that wipro has around 16% of its patents in the usa and 3% of patents originating in singapore. 4.3 patent legal status for us and indian it companies patents’ legal statuses are an important component of patent information. they show whether a patent is dead or alive. they can also throw light on the various strategies used by the patenting firms, such as which technology is still protected and where, or whether it will soon become freely available in the public domain (wipo-a). alive patents are the ones that are valid and can be enforced. the dead patents are the ones whose applications are either withdrawn, rejected or the granted patent has expired, lapsed or been revoked for various reasons such as non-payment of maintenance fees. there is also a third category in the legal status known as “indeterminate,” where patents are assumed to be applications undergoing examination, the examination is pending or whose status is not known. table 2 highlights the legal status of patents in percentage for the 10 companies studied. it is interesting to note that infosys has around 92% of its patents live and enforceable. inversely, about 30% of ibm’s patents are unenforceable due to withdrawal of the application, rejection, lapse or revocation. this may be seen as an offensive tactic by ibm to make data public via means of disclosure to 70 force firms out of competition and at the same time save costs incurred on prosecution or maintenance of patents. it might also be due to the technology in ibm’s patents becoming absolute. even then a figure of 30% is quite high. table 2 patent legality status in percentage. company name living patents dead patents indt. ibm 67 30 3 samsung 85 9 6 microsoft 81 9 10 qualcomm 74 10 16 google 82 6 12 tcs 77 3 20 hcl 9 0 91 mahindra 26 0 74 infosys 92 2 6 wipro 41 0 59 4.4 technological trends of us and indian it companies. the international patent classification (ipc) is used in a patent document to classify the patent according to the technical fields it claims. an analysis into the top ipc-4 digit for the 10 companies studied revealed that 7 companies (ibm, microsoft, google, hcl, infosys, tcs and wipro) lead with maximum patenting in g06f which indicates “electrical digital data processing” (table 3). around 62% of microsoft’s patents were in the ipc-4 digit class g06f, while ibm has around 55% of its patents in g06f and about half of google’s patents were in g06f ipc-4 digits. samsung lead with the majority of their patents in h01l, with 17% of its total filings in the class indicating “semiconductor devices” while qualcomm has about 34% of its patent filings in h04w, indicating “wireless communication networks” and mahindra with 9% in b60r, or “vehicles”. table 3 count of patents for top ipc-4 digits of each companies. ipc-4 digit g06f h01l h04w b60r google 4456 ibm 13192 samsung 4519 microsoft 11889 qualcomm 4750 hcl 91 tcs 184 infosys 187 wipro 188 mahindra 24 table 4 count of patents for the top 3 ipcs of each company. ipc google ibm samsung microsoft qualcomm hcl tcs infosys wipro mahindra g06f001730 1510 2138 2900 9 61 37 g06f001516 685 1544 1675 27 g06f000700 481 g06f000944 1540 1548 43 h04w000400 924 912 h01l002100 504 g09g000500 437 h04l002906 520 h04l000100 508 g06q001000 9 g06f000944 7 27 g06f001700 14 g06q001000 13 g06f001730 12 g06q001006 29 b60r002100 4 b05b001500 3 b60k002000 3 71 table 5 claim count in patent applications. claim count google ibm samsung microsoft qualcomm hcl tcs infosys wipro mahindra 0-10 833 48 7341 6890 1347 200 169 31 308 258 11-20 4539 15349 13533 11448 2844 27 234 128 90 9 21-30 3026 4144 4599 689 3717 12 20 90 74 0 30-50 757 415 1289 214 4179 6 6 25 8 0 51-75 107 16 117 28 1374 0 2 1 1 0 76-100 27 4 11 4 336 0 0 0 0 0 >100 11 0 2 1 103 0 0 0 0 0 table 6 illustration of counts for family size, claim count, citations, number of inventors and assignee count. *rounded off to the nearest whole digit. ib m s am su n g m ic ro so ft q u al co m m g oo gl e t c s h c l m ah in d ra in fo sy s w ip ro average family country* 4 6 6 13 6 4 1 2 2 2 average claim count* 17 16 15 33 21 14 19 6 21 20 maximum claim count 99 126 113 208 119 59 50 18 56 54 minimum claim count 1 1 1 1 1 1 3 1 1 5 maximum assignee count 62 23 19 21 16 13 6 5 11 9 average assignee count* 3 2 2 2 2 2 1 1 3 1 maximum backward reference 571 598 1248 1509 2007 37 15 26 148 51 minimum backward reference 1 1 1 1 1 1 1 2 1 1 average backward reference* 23 16 27 29 26 6 5 10 12 9 maximum forward reference 112 151 189 85 206 32 6 50 101 28 minimum forward reference 1 1 1 1 1 1 1 1 1 1 average forward reference* 4 5 9 4 9 3 2 19 5 5 maximum inventor count 61 21 60 20 29 12 10 8 10 8 average inventor count* 4 3 4 3 3 3 3 3 3 2 a further analysis of the ipcs taking into consideration the full ipc revealed that all these companies are working in different domains with a minimum domain mapping with each other. this is highlighted in table 4 for the top 3 patenting technologies of each company based on the ipc. google has around 17% of its technologies patented in g06f001730 (“information retrieval”), while microsoft and ibm map the same technology with around 15% and 9% of their total patents, respectively. qualcomm and samsung work in the same domain of h04w000400 (“services specially adapted for wireless communication networks”) with about 7% and 3% of their total patent filings in this domain. even though microsoft leads in g06f001730 (“information retrieval”), a closer look of its filings reveals that it has decreased its applications in information retrieval for the last 10 years. at the same time, google has increased its activity in this field. 4.5 claims filed by us and indian it companies claims play an important role in patent document. the patent description reveals how to make and use the invention, while the claims define the scope of legal protection and provide boundaries of the patent owner’s exclusive rights. hence, patent assertion for novelty depends on its claims (merges & nelson, 1990). thus the number of claims of a patent document determines the depth and breadth of the technology for which protection is sought. 72 table 5 shows the claim counts for each of the companies in this study. usually, patent claims are in the range of 1-10, as claims above 10 incur additional filing charges. however, as seen above, less than 20% of the patents have claim counts of less than 10. around 53% of the patents have claim counts between 11 and 20. all of the us-based companies have the maximum patent applications with claims in the range of 11-30. one important thing to note is that the us-based companies also have about 3% of their patents with more than 50 claims in a patent document. at the same time, qualcomm has more than 13% of its patents with more than 50 claims each. google has 11 patents with claim counts of over 100, qualcomm has 103 (about 1%) patents with claim counts of over 100. this is much higher than the average patent claim counts. google can be seen in table 5 with a patent having 119 claims, whereas qualcomm had a patent (application number ep2559309a1) with 208 claims. it can also be seen that qualcomm leads with the highest average claim count in patents with more than 33 and google following it with an average of about 21 claims per patent document. indian companies infosys, wipro and hcl have an average of around 20 claims per patent document. 4.6 analysis based on patent family size, claims count, number of citations, number of inventors and assignees for indian and us it companies as highlighted in table 6, the average family size of a patent is 4.7, while all the indian companies are below this average count, us companies, baring ibm, have an average family size per patent higher than 6. qualcomm has the highest average family, around 13 per patent. base on this, it can be derived that qualcomm tries to enforce its inventions in most countries simultaneously. however, ibm, which has much higher patent families than qualcomm, has an average family size of around 4. this is the lowest for the us-based companies. if correlated with the origin of inventions, ibm has the maximum presence, in 13 countries, from where its technology has emerged. hence it can be deduced that ibm’s strategy is to enforce particular technologies in specific countries only and not in many countries, as in the case of qualcomm. a patent application contains references to other patent documents in its description (wipo-b). these references can be forward or backward references. while the backward citations refer to the publicly available technological documents to form prior-art, the forward citations highlight all other patents and refer to the new patent application (wipoc). these citations, when analyzed, give insights into the evaluation of a particular technology (breitzman, 2010). table 6 shows that all of the us based companies have an average backward citation above 20, except for samsung which has an average citation above 16. with respect to the indian companies, the average backward citation is less than 10. the us-based companies had at least one patent with a maximum backward citation of more than 500. google had a patent with 2007 citations, whereas qualcomm and microsoft have patent publication with maximum backward citations of 1509 and 1248, respectively. the forward citations are also useful from a competitive or business intelligence perspective to identify players working in a similar area or technology to the new patent application. monitoring the forward citations of a new patent application allows a user to identify new competitors entering a similar field of technology, potential infringers and possibly, potential licensing opportunities (minesoft). google and microsoft have the highest average forward citations for patents, with an average of about 9 forward references per patent, while hcl had the minimum with 2. thus it can be inferred that patents of google and microsoft are used by other players to advance their technologies. google has a patent with the maximum of 206 forward citations, while microsoft has 189 forward cited patents for its publication. infosys tops the list on the indian side with 101 forward references in its patent publication number us7787887b2. the number of inventors per patent is summarized in table 6. it can be seen that for all of the companies the average inventor count per patent is around 3. even then, ibm and microsoft have patents with inventor counts of more than 60, and they are the only two companies with an average inventor count around 3.5. 5. conclusion business intelligence in general and competitive intelligence in particular has been traditionally used for inputs related to sales, marketing and finance. however, the use of 73 patents as strategic business tools has opened a new horizon for the use of patent analytics in gaining inputs based on business intelligence and competitive intelligence. patent analytics based on competitive intelligence can be used for understanding the strategies used by companies in advocating their patent portfolio and aligning their business with patenting activities. it can be seen from the study that the ict companies in the study are not directly competing with each other in the same technological domain, except for g06f001730 (information retrieval). indian companies are far behind in protecting their ip, although they are now on course correction and have started aggressively protecting their inventions. it is observed that the patent filing strategy of qualcomm differs from its competitor ibm because qualcomm is filing patents in all major countries while ibm has it presence felt only in specific countries, which can be seen from average patent family countries count. claims in the patent document highlight the technological depth and breadth of patent applications, and qualcomm seeks protection to maximum claims, thereby revealing its strategy of covering many aspects of a technology within a single patent application. based on forward and backward citations, it appears that microsoft and google possess high quality patents. it is apparent that ibm uses disclosure strategies, as 30% of ibms patents are dead, resulting in the technology coming into the public domain. this may be a tactic to force competitors out of their activities. contrary to ibm’s tactics, samsung has 85% of its patents enforced, while rentaining the highest number of patent families, proving it to be a serious player in protecting its intellectual property. business and competitive intelligence, when use to study ip competitive analysis, can yield ip strategies that may enable firms to align their ip strategy with their business strategy. 6. references alnoukari, m. and hananao, a. (2017) integration of business intelligence with corporate strategic management. journal of intelligence studies in business. 7 (2) 5-16. baker, s., & mezzetti, c. (2005). disclosure as a strategy in the patent race*. journal of law and economics, 48(1), 173-194 barrett, w. a. (2005). building a strategy for maximizing intellectual property value. nature biotechnology, 23(3), 387. bessen, j. & hunt, r. m. (2007). an empirical look at software patents. journal of economics & management strategy, volume 16, number 1, 157–189. biles, g. e., & mann, d. a., (1992). software law and its perils : copyright, patent, and the racketeering statute. information systems security, 1:1, 42-49. björn jürgensa* and victor herrero-solanab; (2016); patent bibliometrics and its use for technology watch ; journal of intelligence studies in business ; vol. 7, no. 2 (2016) pp. 17-26 blind, k. (2007). intellectual property in software development: trends, strategies and problems. review of economic research on copyright issues, 4(1), 15-25. breitzman, a. (2010). why do inventors reference papers and patents in their patent applications?. ieee. https://www.ieee.org/documents/ieee_why_inv entors_reference.pdf cameron, d. m., mackendrick, r. s., & chumak, y. (2006). patents for computer implemented inventions and business methods. canadian it law association; toronto, 2006. calof, j.l. & viviers, w. (2001). adding competitive intelligence to south africa’s knowledge management mix. africa insight 31(2): 61-67. chaudhuri, s., dayal, u., & narasayya, v. (2011). an overview of business intelligence technology. communications of the acm, 54(8), 88-98. chung, s., han, k., animesh, a., & pinsonneault, a. (2016, january). competitive impacts of software patents in the it industry. in system sciences (hicss), 2016 49th hawaii international conference on (pp. 5190-5199). ieee. clarkson, g., & dekorte, d., (2006). the problem of patent thickets in convergent technologies. new york academy of sciences, 1093, 180–200. clearviewip (2017), where the value exists in a patent landscape ; accessed online, source : http://www.clearviewip.com/patentlandscape/ 74 cockburn, i., m., & macgarvie, m. j., (2011) entry and patenting in the software industry. management science 57(5):915-933 cubicibuc (2017); strategic ip management ; accessed online, source : http://www.cubicibuc.com/strategic-ipmanagement davoudi, s. m. m., fartash, k., zakirova, v. g., belyalova, a. m., kurbanov, r. a., boiarchuk, a. v., & sizova, z. m. (2018). testing the mediating role of open innovation on the relationship between intellectual property rights and organizational performance: a case of science and technology park. eurasia journal of mathematics, science and technology education, 14(4), 1359-1369. dedrick j. & kraemer, k. l., (1993). information technology in india: the quest for selfreliance. asian survey, vol. 33, no. 5 463-492. deshpande, n., ahmed, s., & khode, a. (2016). business intelligence through patinformatics: a study of energy efficient data centres using patent data. journal of intelligence studies in business, 6(3). dou, h., leveillé, v., manullang, s., & dou jr, j. m. (2005). patent analysis for competitive technical intelligence and innovative thinking. data science journal, 4, 209-236. dornelles, j. (2016). why are they hiding? patent secrecy and patenting strategies.; available at ssrn: https://ssrn.com/abstract=2802153 or http://dx.doi.org/10.2139/ssrn.2802153 earl, m. (2001). knowledge management strategies: toward a taxonomy. journal of management information systems, 18(1), 215233. financial express; 06 jul 2013;pg 7. ; india business insight fosfuri, a., giarratana, m, s. & luzzi, a. (2008). the penguin has entered the building: the commercialization of open source software products. organization science, vol. 19, no. 2, march–april 2008, 292–305. gabriel, j.m.o. & adiele, k.c. (2012). competitive intelligence as panacea for environmental vagaries in nigeria. economic journal of a 2 z 1(1): 25-30. gangadharan, g. r., & swami, s. n. (2004, june). business intelligence systems: design and implementation strategies. in information technology interfaces, 2004. 26th international conference on (pp. 139-144). ieee. gill, d. (2008). strategic disclosure of intermediate research results. journal of economics & management strategy, 17(3), 733-758. goswami, g., & yadav, k.p., (2010), software patents and the current trends, international journal of computer science & communication, vol. 1, no. 1, 39-41. grandjean, n., charpiot, b., pena, c. a., & peitsch, m. c. (2005). competitive intelligence and patent analysis in drug discovery: mining the competitive knowledge bases and patents. drug discovery today: technologies, 2(3), 211-215. great dome associates (2018), the heart of the innovation economy is intellectual property ; accessed online, source : http://www.greatdome.com/intellectual-property-strategy/ hee (2018), ip landscaping ; accessed online, source : https://www.hee.org.uk/services/explore/iplandscaping herschel, r. t., jones, n. e., (2005) "knowledge management and business intelligence: the importance of integration", journal of knowledge management, vol. 9 issue: 4, pp.45-55 holgersson, m., & granstrand, o. (2017). patenting motives, technology strategies, and open innovation. management decision, 55(6), 1265-1284. hoppe, m. (2015) intelligence as a discipline, not just a practise. journal of intelligence studies in business. vol 5, no 3. pages 47-56. hughes, s. f. (2017). a new model for identifying emerging technologies. journal of intelligence studies in business, 7(1). ip.com (2017) ; how to turn patent search into business intelligence ; accessed online, source : http://ip.com/blog/turn-patent-searchbusiness-intelligence/ jourdan, z., rainer, r. k., & marshall, t. e. (2008). business intelligence: an analysis of the literature. information systems management, 25(2), 121-131. jyoti , banwet, d.k., & deshmukh, s.g. (2010). modelling the success factors for national r&d organizations: a case of india. journal of modelling in management, vol. 5 no. 2, 2010, 158-175. 75 krig, m. l., & sandra, l. (2017). business value enhancing factors of aligning ip strategy with corporate strategy; available at : http://www.divaportal.org/smash/get/diva2:1116900/fullte xt02 lönnqvist, a., & pirttimäki, v. (2006). the measurement of business intelligence. information systems management, 23(1), 32 mcgowan, m. k., stephens, p., & gruber, d., (2007). an exploration of the ideologies of software intellectual property: the impact on ethical decision making. journal of business ethics, vol. 73, no. 4, 409-424. merges, r. p. & nelson, r.r., “on the complex economics of patent scope,” columbia law review, vol 90, no. 4, pp.839-916, may 1990. minesoft, the power of patent citations ; accessed from minesoft website on march 2018; source : https://minesoft.com/2016/02/19/the-power-ofpatent-citations/ moser, p., (2005). how do patent laws influence innovation? evidence from nineteenthcentury world's fairs. the american economic review, vol. 95, no. 4, 1214-1236. nakai, y., & tanaka, y. (2010, july). chinese company's ipr strategy: how huawei technologies succeeded in dominating overseas market by sideward-crawl crab strategy. in technology management for global economic growth (picmet), 2010 proceedings of picmet'10: (pp. 1-5). ieee. oecd (2004), patents and innovation: trends and policy challenges organisation for economic co-operation and development. pargaonkar, y. r. (2016). leveraging patent landscape analysis and ip competitive intelligence for competitive advantage. world patent information, 45, 10-20. pohlmann, t., & opitz, m., (2013). typology of the patent troll business, r&d management 43, 2, 103-120. ranjan, j. (2009). business intelligence: concepts, components, techniques and benefits. journal of theoretical and applied information technology, 9(1), 60-70. rouach, d., & santi, p. (2001). competitive intelligence adds value: five intelligence attitudes. european management journal, 19(5), 552-559. sagacious research (2017), accessed online, source : http://sagaciousresearch.com/blog/how-usepatent-data-business-intelligence/ shaikh, s. a., & londhe, b. r., (2016). intricacies of software protection: a techno-legal review; journal of intellectual property rights, vol. 21; 157 165 shih, m. j., liu, d. r., & hsu m. l. (2010). discovering competitive intelligence by mining changes in patent trends. expert systems with applications, 37(4), 2882-2890 siddhast.com ; ip business intelligence & analytic ; accessed online, source : http://siddhast.com/service/ip-businessintelligence-analytic/ søilen, k. s. (2010). boosting innovation and knowledge through delocalization: market intelligence at trade shows. problems and perspectives in management, 8(3), 200-207 søilen k. s. (2017); why care about competitive intelligence and market intelligence? the case of ericsson and the swedish cellulose company; journal of intelligence studies in business; vol. 7, no. 2 (2017) pp. 27-39 solomon, n., (2004) "business intelligence," communications of the association for information systems: vol. 13 , article 15 sophian gauzelin* and hugo bentz; (2017) ; an examination of the impact of business intelligence systems on organizational decision making and performance: the case of france; journal of intelligence studies in business; vol. 7, no. 2 (2017) pp. 40-50 spinello, r. a., (2007). intellectual property rights. library hi tech, vol. 25 no. 1, 12-22. stackowiak, r., rayman, j., & greenwald, r. (2007). oracle data warehousing & business intelligence so. john wiley & sons. stern, a. (2005). leveraging intellectual property for strategic advantage in product development. south african journal of information management, 7(4), 1-1. sveiby, k. e. (1997). the new organizational wealth: managing & measuring knowledgebased assets. berrett-koehler publishers. tekic, z., drazic, m., kukolj, d., & vitas, m. (2014). from patent data to business intelligence–psalm case studies. procedia engineering, 69, 296-303. 76 trippe, a. (2015). guidelines for preparing patent landscape reports. patent landscape reports. geneva: wipo, 2015. useche, d., (2015). patenting behaviour and the survival of newly listed european software firms, industry and innovation, 22:1, 37-58 välimäki, m. (2001). strategic use of intellectual property rights in digital economy–case of software markets. helsinki institute for information technology, online http://citeseerx.ist.psu.edu/viewdoc/download ?doi=10.1.1.196.5665&rep=rep1&type=pdf vedder, r. g., vanecek, m. t., guynes, c. s., & cappel, j. j. (1999). ceo and cio perspectives on competitive intelligence. communications of the acm, 42(8), 108-116. walaski, j. (2004). software patents are they a help or hindrance to innovation?. iee engineering management, , 42-43. walker, t. d. (1994). the literature of competitive intelligence. available at : https://www.ideals.illinois.edu/bitstream/han dle/2142/7958/librarytrendsv43i2i_opt.pdf?se quence=1 wang, x. (2011). patent intelligence and business strategy. african journal of business management, 5(10), 3935-3941. watson, h. j., & wixom, b. h. (2007). the current state of business intelligence. computer, 40(9). weatherall, k & webster, e., (2013), patent enforcement: a review of the literature; journal of economic surveys (2013) vol. 00, no. 0, pp. 1–32 wen, w., ceccagnoli, m., & forman, c. (2015). opening up intellectual property strategy: implications for open source software entry by start-up firms. management science, 62(9), 2668-2691. wipo-a ; accessed from wipo website on february 2018 source : http://www.wipo.int/patentscope/en/programs /legal_status/ wipo-b ; accessed from wipo website on february 2018 source : http://www.wipo.int/export/sites/www/cws/en/ taskforce/citation_practices/docs/epo_citation _practice_summary.pdf wipo-c ; accessed from wipo website on february 2018 ; handbook on industrial property information and documentation; ref.: standards – st.14 page: 3.14.1 recommendation for the inclusion of references cited in patent documents; source : http://www.wipo.int/export/sites/www/standa rds/en/pdf/03-14-01.pdf zack jourdan , r. kelly rainer & thomas e. marshall (2008) business intelligence: an analysis of the literature , information systems management, 25:2, 121-131, zekos, g. i., (2006). software patenting. the journal of world intellectual property, vol. 9, no. 4, 426–444. zeng, l., xu, l., shi, z., wang, m., & wu, w. (2006, october). techniques, process, and enterprise solutions of business intelligence. in systems, man and cybernetics, 2006. smc'06. ieee international conference on (vol. 6, pp. 4722-4726). ieee. page 4 editors note vol 9 no 1 editor’s note vol 9, no 1 (2019) developing new models for intelligence studies the aim of any social science to develop theories and/or models to better understand the business reality. we are happy to see that a majority of contributions this time do exactly that. the first article by nuortimo is entitled “exploring new ways to utilise market intelligence (mi) function in corporate decisions: case opinion mining of nuclear power”. it is an in-depth case study about the monitoring of technology sentiment based on business environment scanning. results show how media sentiment towards nuclear power has been mostly negative, particularly in social media. however, results from similar analyses of the image for the companies currently deploying these technology are less negative, suggesting the importance of companies’ communication and branding activities. the paper shows how technology’s media sentiment can influence a company’s brand image and marketing communications. it concludes that there is a need for better co-operation between different corporate functions, namely technology management, mi, and marketing and strategic planning. the second paper, by bleoju and capatina, entitled “enhancing competitive response to market challenges with a strategic intelligence maturity model” shows a way to gain robustness in confronting unexpected events in real markets by adopting a wider unstructured learning perspective with the help of maturity assessment tools. this helps to pool strategic intelligence skills. the theoretical contribution is called the strategic intelligence capability maturity model. the article by solberg söilen is entitled “how managers stay informed about the surrounding world”. it’s a survey of managers and knowledge workers to find out exactly what sources of information they gather to help their organization stay competitive. conclusions from the data are drawn and a model presented that brings together previous theory with new empirical findings. the first issue of 2019 was delayed primarily due to the journal’s involvement as co-sponsor of the ici conference in luxembourg in may. as always, we would above all like to thank the authors for their contributions to this issue of jisib. thanks to dr. allison perrigo for reviewing english grammar and helping with layout design for all articles and to the swedish research council for continuous financial support. we hope to see as many as possible at the ici conference in bad nauheim in may, 2020. on behalf of the editorial board, sincerely yours, prof. dr. klaus solberg søilen halmstad university, sweden editor-in-chief copyright © 2019 jisib, halmstad university. all rights reserved. journal of intelligence studies in business vol. 9, no 1 (2019) p. 4 open access: freely available at: https://ojs.hh.se/ vol8no2paper1kalle to cite this article: nuortimo, k. (2018) measuring public acceptance with opinion mining: the case of the energy industry with long-term coal r&d investment projects. journal of intelligence studies in business. 8 (2) 6-22. article url: https://ojs.hh.se/index.php/jisib/article/view/307 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index measuring public acceptance with opinion mining: the case of the energy industry with long-term coal r&d investment projects kalle nuortimoa* asumitomo shi fw energia oy, p.o.box 201, fin-78201, varkaus, finland; *kalle.nuortimo@shi-g.com journal of intelligence studies in business please scroll down for article editor-in-chief: klaus solberg søilen included in this printed copy: measuring public acceptance with opinion mining: the case of the energy industry with long-term coal r&d investment projects social business intelligence: review and research directions helena gioti, stavros t. ponis pp. 23-42 and nikolaos panayiotou investigating the competitive intelligence practices of peruvian fresh grapes exporters journal of intelligence studies in business v o l 8 , n o 2 , 2 0 1 8 j o u r n a l o f i n t e llig e n c e s t u d ie s in b u s in e s s issn: 2001-015x vol. 8, no. 2 2018 christophe bisson, maria mercedes pp. 43-61 and tang tong an analysis of ip management strategies of ict companies based on patent filings shabib-ahmed shaikh pp. 62-71 and tarun kumar singhal kalle nuortimo pp. 6-22 business intelligence for social media interaction in the travel industry in indonesia michael yulianto, abba suganda girsang pp. 72-79 and reinert yosua rumagit measuring public acceptance with opinion mining: the case of the energy industry with long-term coal r&d investment projects kalle nuortimoa* a sumitomo shi fw energia oy, p.o.box 201, fin-78201, varkaus, finland corresponding author (*): kalle.nuortimo@shi-g.com received 18 june 2018 accepted 21 august 2018 abstract new web 2.0-based technologies have emerged in the field of competitor/market intelligence. this paper discusses the factors influencing long-term product development, namely coal combustion long-term r&d/carbon capture and storage (ccs) technology, and presents a new method application for studying it via opinion mining. the technology market deployment has been challenged by public acceptance. the media images/opinions of coal power and ccs are studied through the opinion mining approach with a global machine learning based media analysis using m-adaptive software. this is a big data-based learning machine media sentiment analysis focusing on both editorial and social media, including both structured data from payable sources and unstructured data from social media. if the public acceptance is ignored, it can at its worst cause delayed or abandoned market deployment of long-term energy production technologies, accompanied by techno-economic issues. the results are threefold: firstly, it is suggested that this type of methodology can be applied to this type of research problem. secondly, from the case study, it is apparent that ccs is unknown also based on this type of approach. finally, poor media exposure may have influenced technology market deployment in the case of ccs. this paper is the extended version of a paper from the ici 2018 international conference on competitive & market intelligence, june 5-8 bad neuheim, germany. keywords carbon capture and storage, ccs, greenhouse gas control, market deployment, opinion mining, public acceptance, web-intelligence 1. introduction: emerging webintelligence applications for competitor and market intelligence the aim of competitive intelligence (ci) is to analyse and exploit information about a company’s competitors and sectors of activity to determine its competitive strategy and to develop new knowledge about its competitors in an increasingly complex and fast-moving economy to maintain levels of innovation and thus gain a competitive advantage (amarouche et al. 2015). the most popular term used in the literature is competitive intelligence, followed by business intelligence (bi) and market intelligence (mi) (dutoit 2015). the lack of sufficient and reliable information sources about competitors can restrict the capability of ci (xu et al. 2010). traditionally, information about competitors has mainly been obtained from press releases, analyst reports, and trade journals, and recently also from competitors' websites and journal of intelligence studies in business vol. 8, no. 2 (2018) pp. 6-22 open access: freely available at: https://ojs.hh.se/ 7 news sites. unfortunately, such information is mostly generated by the company that produces the product; therefore the amount of information is limited and its objectivity is questionable (xu, et al. 2010). competitive intelligence is favoured at the expense of strategic management as a field and has evolved over the years as a result of the need for enterprises to scan the complex external environment (dutoit 2015). competitive intelligence provides the company with a clearer picture of its competitive environment, while the increasingly frequent use of information and communication technologies (ict), including online shopping sites, blogs, social network sites, and forums, provides incentives for companies to promote their advantages over their competitors (amarouche et al. 2015). due to the emergence of web 2.0, including social media, ci now has a potentially wide field for developing new applications. the large numbers of customer-generated product reviews often contain information about competitors and have become an interesting source of competitive and market intelligence to mine (xu, et al. 2010). finding the weakness of products from customer feedback can help manufacturers improve their product quality and competitive strength. in recent years, more and more people have begun expressing their opinions about products online, and both the feedback of manufacturers’ own products and their competitors’ products could be easily collected (chang et al. 2012). several applications have been developed for next generation ci/mi. the opportunities associated with data and analysis in different organizations have helped generate significant interest in business intelligence and analysis (bi&a). bi&a is often described as the techniques, technologies, systems, practices, methodologies, and applications for analysing critical business data to help an enterprise better understand its business and market, and to make timely business decisions (chen et al. 2012). opinion mining in product ci was discussed by amarouche et al. (2015). a system to efficiently analyse patent data, a patent trend change mining (ptcm) approach that can identify changes in patent trends without the need for specialist knowledge, has been proposed by shih et al. (2010). market intelligence from microblogs, which have become great sources of consumer opinions, has been developed in the form of compact numeric summarization of opinions by li et al. (2013), from which the proposed mechanism can effectively discover market intelligence (mi) to support decision-makers. in 2012, chang et al. introduced weakness finder, which helps manufacturers find their product weakness by using aspect-based sentiment analysis on chinese reviews. in computational linguistics, irony is one of the more challenging topics in sentiment classification, and tools to detect irony were described by reyes and rosso in research focusing on identifying key components for the task of irony detection (2012). this paper describes an opinion mining approach to discover the public acceptance of carbon capture and storage (ccs) technology, in order to highlight influences on long-term r&d strategy. compared to media images of solar and biomass power (nuortimo 2017a&b), differences exist, and can be used to highlight the link and differences between existing theoretical base. 2. case carbon capture and storage (css) the need to reduce atmospheric co2 has resulted in several global agreements (e.g. kyoto protocol, 1997; paris agreement, 2015), all affecting environmental legislation, technology strategies, and decision-making of individual companies. the large-scale adoption of ccs in combination with increased energy efficiency is seen as one option to halt co2 emissions in the short run (wennersten et al. 2015). power plants with ccs in addition to large shares of low carbon generators such as renewables would be required to meet the global targets (brouwer et al. 2015). carbon capture and storage facilities coupled with energy efficient power plants would provide a strategy to permit the continued use of fossil fuels whilst reducing co2 emissions. the ccs process includes three stages of capture and compression of co2 from power stations, transport of co2, and storage away from the atmosphere for hundreds to thousands of years (hammond et al. 2011). however, regardless of the potential, the technology deployment has not been realised due to lack of economic incentives, regulations, and public acceptance (nuortimo 2012). technologies have been connected with societal controversies in the past; for example, nuclear power and gene technologies have been surrounded by dispute, potentially causing public rejection. past rejection of technologies by the public emphasises the urgency to 8 understand the psychological features of societal acceptance of technologies (gupta et al. 2012). public acceptance of technologies such as ccs is crucial for successful introduction into the society (huijts et al. 2012). in this study, the media image of ccs, especially in social media (some), was studied to find possible implications for public acceptance of ccs technology. this was done by reviewing the relevant ccs discussions and studying the media image of ccs from 2014 to 2016. the main research question is formulated as: what is the media image of ccs and its possible implications for public acceptance, and, furthermore, how does this relate to coal combustion technologies in general? this paper is organised as follows. first the literature is analysed in terms of the important aspects of ci/mi tools and developments, case ccs and related public acceptance and market deployment, and subsequently with application of the new method, opinion mining with machine-based media analysis. a possible link from media image to product market deployment is suggested in the discussion section. then follows the methodology section, including explaining the learning machinebased media analysis that was used to demonstrate the importance of visibility for technology acceptance. finally, discussion, conclusions, and policy implications are presented. this methodology is rather new and experimental, but its main contribution is highlighting the paradigm shift from humanmade media analysis to machine-made analysis with a multidisciplinary approach, and describe its possibilities in technology intelligence, especially in weak-signal detection related to long term r&d strategy decisions. 2.1 public acceptance of ccs the viability of ccs, or any other technology, is influenced by economic, regulatory, and technical aspects, but also by public acceptance. public acceptance of ccs is seen to depend on people’s sense of trust in stakeholders and not solely on the properties of the technology itself. (terwel et al. 2011). the size of the project and local history as well as trust in stakeholders may influence local public acceptance of ccs (dütschke 2011). trust in organisations also affects people’s perceptions of the magnitude of risk and the benefits as well, impacting their acceptance of ccs (terwel et al. 2009). similar logic has been presented, for example, for public acceptance of gene technology (siegrist 2000) and also for nuclear waste where overwhelming political opposition has been fueled by the public’s perception of risks (slovic et al. 1991). education about ccs can also affect public acceptance by highlighting qualities of the technology that the public finds acceptable and thereby reducing fundamental opposition (itaoka et al. 2004). public acceptance of different ccs elements— namely plant type, transport, and storage—may, however, be different, as wallquist et al. (2012) indicate. pipelines, for example, may result in lower acceptance, whereas storage location can have the least influence (although environmental legislation practically prohibits land storage in europe), and plant type some influence. itaoka et al. (2009) indicate that different factors, including risks, effectiveness, responsibilities, and fuel use, have varying impacts on ccs acceptance. lay attitudes toward ccs are also seen as relevant, and the lack of public acceptance is seen to potentially reduce the viability of ccs severely (terwel et al. 2009). in fact, people’s acceptance is seen as critical for the widespread deployment of any low-carbon technologies to become viable options for reducing co2 emissions (fleishman et al. 2010). the way ccs might contribute to reducing the impact of global warming is unclear, even to those who believe they have a good understanding (de best-waldhober et al. 2009). this is interesting, as many studies indicate that awareness of the necessity of preventing global warming can be crucial to the acceptance of ccs (itaoka et al. 2009; tokushige et al. 2007) past examples exist for lack of public acceptance being a major hindrance for developing new energy infrastructure costeffectively, affecting many technologies, including nuclear (grove-white et al. 2006), ccs (bradbury et al. 2009), wind farms (firestone and kempton 2007), gene technology (siegrist 2000), nanotechnology (siegrist et al. 2007a), and many others. public acceptance in these cases is typically affected by fears of radiation (kim et al. 2013), co2 being released from the ground and causing suffocation (wallquist et al. 2009), potential noise or threat to animals (wolsink 2007), and unknown consequences (zechendorf, 1994; siegrist et al. 2017b). public acceptance is somewhat an unknown factor in developing public policy for ccs technology (itaoka et al. 2004). only educating 9 in order to increase public awareness of need for mitigating co2 emission would not directly increase the acceptability of ccs (itaoka et al. 2004), but information may increase support for some aspects of the technology, such as storage options. on the other hand, information on ccs may in some cases result in stronger opposition (palmgren et al. 2004), particularly against geological storage under the ocean. it is noteworthy that public acceptance depends on information sourced from different actors, especially people’s influence on each other, emphasizing trust (huijts et al. 2007). international examples may also be required to enhance confidence and trust in ccs, as public acceptance is seen as a requirement for market deployment (de coninck et al. 2009). in fact, high public acceptance is seen as one of the critical factors for widespread deployment of various ccs projects (zhang and huising 2017). public acceptance is seen as one of the important obstacles for ccs implementation, along with a lack of policy framework, costs, and international regulatory framework, a factor that is seen to potentially have the biggest effect on commercial success (gough 2008). in some ways, however, public acceptance is viewed among other uncertainties surrounding ccs (lohwasser and madlener 2012). benefit and risk perceptions are seen to influence on the progress of the technology (wallquist et al. 2010). wüstenhagen et al. (2007) describes three types of public acceptance to highlight different aspects of market deployment, namely sociopolitical acceptance, market acceptance and community acceptance. bell et al. (2007) note how public acceptance can have multiple dimensions by indicating that the acceptance of generic technology might be very different from that of local projects. regardless of general acceptance of ccs, ‘not in my backyard’ (nimby) attitudes can appear when facilities are proposed close to one’s own communities, yet attitudes about ccs are based on concepts and perceptions, not on actual past events, making the possibilities of comparing nimby attitudes to other energy industry developments somewhat limited (krause et al. 2014). although there are many co2 storage sites available, the possibility of co2 leaking from the storage area has affected public opinion towards the technology. wallquist et al. (2011) found the nimby attitudes to exist towards both co2 pipelines and storage sites. such attitudes persist regardless of techno-economic aspects favouring the large technology market deployment of near-zero co2 power production in the medium term (10-20 years). due to public fears, ccs market deployment in the form of building a commercial-size demonstration plant (for example oxyfuel technology) has been delayed (santos 2015). the situation has been seen to have strong linkages to public acceptance and as well as to political decision-making. ccs technologies have been increasingly communicated during their development, starting from the early 2000s (ashworth et al. 2009). the topic has also attracted, to a lesser extent, attention on social media. due to the fact that ccs technology is still under development, its commercialisation is dependent on public opinion and on related media communication. market deployment includes the actions towards managing organisational resources in the marketplace (slotegraaf et al. 2003), and deployment is the next step after the r&d activities in the product cycle (midttun and gautesen 2007). various factors (political, technological, financial, etc.) can promote market deployment. ccs market deployment necessitates achieving effective emission reduction incentives alongside public-private funding for r&d (gielen et al. 2014). from the technological perspective, the energy mix and ambitious co2 reduction targets impact market deployment, whereas should coal be part of the energy mix, ccs is seen as the only technological solution worth deploying (folke et al. 2011). investment costs and co2 allowance prices strongly influence the market deployment of coal-fired ccs power plants (lohwasser and madlener 2012). money is an important factor in the market deployment of new energy industry solutions that necessitate private finance (mathews et al. 2010). market deployment of new technologies such as ccs requires significant investments and entails some technological risks to demonstrate their viability (burnham et al. 2013). attracting the attention of government and industrial sectors is important for ccs market deployment since incentives, financial support, the regulatory system, and venture capital require widespread participation of government and businesses (dapeng and weiwei 2009). complementary policies and 10 incentives are seen to impact market deployment (grubler and riahi 2010). systemic policy strategy is necessary for market deployment to overcome any technology barriers and manage the risks (åhman et al. 2013). different types of policies are potentially needed for supporting lowcarbon technologies along with the technology maturity to support the level of market deployment (iea 2010). because it comprises the measures that aim at promoting energy technologies from early research to market deployment, an energy technology policy is needed (ruester et al. 2014). initiatives such as the strategic energy technology plan, the technology pillar of the eu's energy and climate policy adopted by the european union in 2008, are the first steps toward establishing an energy technology policy for europe. this type of initiative may eventually result in market deployment of key low-carbon technologies at the european level (fütterer et al. 2014). market deployment is potentially hindered by the commonly understood fact that it typically takes some thirty years for a new technology to materialise and to build the necessary expertise, capacity, and knowledge (kramer and haigh 2009). further, those r&d efforts that focus on technologies with modest potential for mitigating climate change result in market deployment initiatives for technologies to remain fragmented (grubler and riahi 2010). in the case of ccs, the time is now critical for the potential market deployment (maddali et al. 2015). market deployment takes its time as the extensive number of wells required for global scale deployment of ccs limits the possibilities of deploying ccs on a wide scale in a rapid manner (maddali et al. 2015). public opinion and attitudes are reflected in political decision making, impacting policies, regulations, and even finance. hence, the realities of ccs market deployment can be affected by the public accepting the technology. 2.2 research methodology this study is a first attempt to study media image, public acceptance, and product market deployment by first studying the literature and then comparing the results to findings from empirical analysis through opinion mining with learning machine-based media analysis of a vast number of editorial and social media sources. therefore, this work is not directly related to one specific field of study; supporting literature is gathered from ci/mi and technology intelligence methods, as well as from corporate decision-making, and is used to describe a possible link from some users to possible effects in company management. the basic research principles have been used in different fields, but are now applied to a single case; in the same way, public acceptance studies have been carried out on other topics using media analysis but with much smaller data sets. bursher et al. (2015) applied a similar approach with editorial content media framing and sentiment analysis by software. in this study the application of media framing, cluster analysis and statistical methods were considered to be non-applicable. this is due to the comparison of editorial content with social media and to the fact that media frame comparability between two different types of communication is challenging with a large amount of data. hence, the learning machinebased media analysis is applied in this study to demonstrate the importance of visibility, whether it would be a driver for technology acceptance, namely public acceptance and product market deployment, or not. the main reasons for choosing the opinion mining approach along with the learning machine-based media analysis method was its applicability to large global data sets (both from editorial content and some), fast data processing, and reduced risk of bias caused by human perceptions and interpretations (matthes & kohring 2008). the analysis period and data for this study covers one year, including a major international climate conference, the paris cop21. much narrower sentiment analyses have previously been carried out in the field of marketing, yet this study applies the existing elements in a new way. the users of the social web now have a new role as data providers, which seems to provide an excellent platform for analysing public attitudes (penalver-martinez et al. 2014). by adopting a media analysis approach and a particular tool, the quantity of media sources to be analysed is drastically increased compared to questionnaires and interviews or traditional media analyses. merely relying on qualitative methods such as research interviews would entail challenges, compared to a global media coverage study. for example, responses can be difficult to code and answers may vary by participant, while respondents can provide socially acceptable responses, telling what is considered acceptable, to the researcher (sovacool et al. 2012). the analysis 11 in this study was conducted to clarify the social acceptance status of ccs technology in order to investigate the possible connection to recent challenges in technology market deployment. the analysis findings were synthesised to obtain a clear view of the effect of media image, resulting social acceptance on ccs technology development, and related market deployment. hence, the research setting in this article is media analysis, where media sentiment is analysed to discover possible implications for public acceptance, political decision-making, and technology market deployment. the methodology used in this study can be considered a fairly new method in media research, especially in a comparison of global editorial media and global social media. in the past, some attempts have been made to create an automated tool for analysing nuclear power acceptance (reis et al. 2011), but media sentiment has not been clarified to this extent. this study relies on commercial software to mine the opinions relating to ccs, a similar method to that applied by bursher et al. (2015). opinion mining can be seen as a highly active research field consisting of natural language processing, computational linguistics, and text analysis technologies with an aim to get various added-value and informational elements from user opinions (penalvermartinez et al. 2014). the analysis was conducted to clarify the ccs technology’s media image. also, the potential effects on social acceptance of technology and its commercialisation were highlighted by comparing literature to data analysis. hence, the research setting used in this article is media analysis for one case, which is then compared to different, similar analyses (nuortimo 2017 a&b) m-adaptive software is used as the main tool in the learning machine-based analysis of global editorial and social media (some) sources. in this study, the m-adaptive sources cover 3 million social media platforms globally and 100,000 news outlets in 71 languages in 236 regions (m-brain 2015). sentiment analysis was carried out based on a combination of linguistic knowledge and human-aided machine learning, which means that the software suggested classifications to researchers who then provided feedback on correctness. by repeating this process a number of times the system learned to improve its classification of content into sentiment categories (m-brain 2015). in practice, the sentiment-coding expressions in the text were first recognised and classified automatically. the software matched all relevant ccs-related documents after which the sentiment-focused types were assessed, while the overall compound judgement displayed four options: positive, negative, neutral, and mixed. data analysis was conducted from 4 december 2014–28 february 2016, by searching ‘carbon capture storage’ and ‘ccs’, which included a total of 4496 data points (3380 editorial/1116 some). according to m-brain’s internal tests, 80 percent of the sentiments are correct on average for a given document when using the m-adaptive software. hence, it is possible that the system may make a mistake with any given individual document, due to inherent ambiguity in natural language. further, it is widely known that humans do not agree 100 percent in similar tests either, due to some individuals not being capable of identifying humour or sarcasm. as is the case for any artificial system, humour, sarcasm and irony are beyond the system's abilities to understand. however, catching the trends in the data becomes more accurate as the number of analysed documents increases, meaning that with large volumes, the overall model qualitatively matches human judgement on the same data. 3. results of machine-aided media analysis of ccs technology the large number of data points enabled the analysis of media sentiment towards ccs. figure 1 depicts overall sentiments towards ccs in both editorial publications and social media. the number of hits for ccs (4496) was low compared, for example, to wind power during figure 1 sentiment analysis of social media and editorial publications. 12 the same period (76,819), indicating relatively low visibility of ccs in the media. the results show that ccs resulted in positive hits mostly in editorial publications but also in social media. nevertheless, a larger proportion of negative hits in social media indicate lower levels of public technology acceptance. additionally, the number of some hits is smaller compared to editorial hits, which also indicates less exposure to the general public. further analysis shows that 33% of hits in the editorial publications were negative and 47% positive, indicating relative technology acceptance among scientists, experts, and journalists. the number of mixed and neutral hits is relatively small, which seems to indicate a consensus towards ccs (figure 2). attitudes in social media appeared somewhat different compared to editorial publications. figure 3 indicates that public sentiment toward ccs in social media is also mostly positive (45%) with only a minor 2% difference compared to editorial publications. the amount of negative hits was 3% higher than in editorial publications, indicating a bit more negative attitude. in mixed hits the difference was 6-11%, which can be seen as an indication of stricter view expression in social media. however, the 4% more neutral hits seem to indicate that some groups have not yet firmly fixed their attitudes, which can be considered an indication of a need to increase communication efforts in some. figure 4 illustrates the social media sentiment of ccs across different media. dividing the social media sentiment by media type reveals that blog writing has attracted most of the social media attention with over six hundred hits, of which the largest share is positive towards ccs. also facebook has been active with over 250, mostly negative, hits. due to a more visible number of negative hits, the social media effect can be considered quite large when public opinion towards technology is formed. in figure 5, media sentiment in selected countries is presented. in germany, france, and finland, the sentiment was more positive than in china or australia, emphasising the need for further communication efforts. relevant international events may also influence the appearance of pertinent writings in the media and media sentiment at the time. for example, during the paris cop negotiations from 30 november to 12 december 2015, a total of 279 hits appeared in the media. the media attention towards ccs was figure 2 sentiment analysis of editorial publications. figure 3 the media sentiment of ccs in social media. figure 4 social media sentiment of ccs across different media. figure 5 negative sentiment percentage in selected countries. 13 approximately doubled during these two weeks compared to an average of 300 hits a month (figure 6) (calculated as monthly average over 15 months). aside from the visibility of ccs being relatively low, it was evident that the editorial hits during the meeting were more negative than usual with 47% negative hits for ccs, while the same for some was only 34%. the normal 15-month averages were 33% and 36%, respectively. the percentages of positive hits during the paris cop negotiations were 44% and 49%, respectively, while the 15 month averages were 47% and 45%. 4. discussion this paper describes the media image of ccs technology, with possible implications especially from some for public acceptance and product market deployment, by synthesising a possible literature-based connection and demonstrating the role of visibility of ccs technology via advanced media analysis. when comparing the literature and empirical findings, the following can be observed. ccs has smaller media exposure with a more positive image. according to some communications theories, large media exposure can have some effect, whether positive or negative; small exposure maybe doesn’t affect at all, and small attention is transferred to be negative—if something is unknown, it has more associated risks. here, this is visible via the number of hits through various media-channels, especially in the editorial/some ratio. when comparing ccs to the case of biomass, ccs also has a positive image with a small number of hits, making the impact smaller. in the case of ccs, one of the main findings is that it is rather unknown, which is the worst case, because people can be afraid of what they don’t know. this is evident both from literature as well as from our analysis, therefore partly validating the method used. in the case of ccs, both communication and corporate stakeholder literature prove beneficial for explaining the phenomenon. for example, traditional stakeholder salience theory does not fully take into account general public attitudes, which can influence corporate decisions both directly and indirectly. in the case of ccs, it is evident that: 1) literature states that ccs is unknown (wallquist et al. 2011), which is empirically true due to low numbers of media hits. 2) pr-communication theory implies that if technology is unknown, it can have poor acceptance (mccorkindale et al. 2013). this is evident via the opposition to end storage in different countries and single projects. also, empirical country by country analysis indicates a high percentage of negative hits in countries with no deployment, such as australia, and also a high percentage of negative hits in some, such as in finland. 3) communication has been intraand interspecialistic (ashworth et al. 2009). this follows the funnel model by bucci et al. (2008). this is empirically visible via the low number of hits, indicating the urgency to increase communication activities to the general public already in the beginning of the product development cycle. 4) poor media image can possibly have an effect on technology market deployment in the case of ccs. this can be deducted from points 1–3. 5) means to measure media image have previously been challenging to apply to large global data sets. this study incorporates a new method, opinion mining approach including machine learning, which is tested and found applicable for fast large dataset sentiment analysis. the total media sentiment relating to ccs was found to be generally positive based on the analysis due to a relatively large number of positive editorial hits, among the rather low media visibility. in the social media, the sentiment seemed to be a bit more negative. for example, facebook appeared as a platform with active discussions concerning ccs with over 250, mostly negative, hits. the appearance of ccs in various platforms used by the public highlights the role of social media in shaping opinions. the sentiment also varies by country, as, for example, germany and france had positive attitudes, whereas australia had a negative media sentiment, with no deployment of the technology possibly twined with the sentiment. the sentiment can also vary among the type of figure 6 media hits during paris cop 30.11-12.12.2015. 14 media, as, for example, in finland, the editorial content was seen to be more positive than in the social media. the general attitude towards the technology may differ from the local as for example in germany, it seems that nimby is large, regardless of positive general attitudes in both editorial and some content, and as projects have been cancelled due to challenges in finding end-storage sites. such matters are not directly visible in media analysis and therefore this is a limitation of the utilised methodology. the analysis, however, indicates that general public opinion can be an important factor for public acceptance, and derived from that aspect, also for political decision making. hence, from the perspective of market deployment, it seems that the more editorial and some content ccs can obtain the better, to counteract the status of being unknown, whereas all possible scientific, technical, marketing and pr communication efforts are important for ccs market deployment, especially those targeted to the general public. the media sentiment toward a technology can be affected temporarily by relevant international events, such as the global climate negotiations, paris cop 21, during which the media sentiment seems to be influenced in one way or another. in this case the effect towards ccs by the editorial publications was mostly negative. although the needs of co2 reduction and the related agreements are of a global nature, technology commercialisation is influenced by regional politics and legislation. it is to be noted that local nimby attitudes are not necessarily clearly visible by using the approach in this study. any discrepancies between media sentiment and the actual project implementation seem to be a clear indication of stronger nimby attitudes. it would seem that one of the main benefits of the study lies in discovering global trends and technology development directions with a larger data set than previous studies, and also trying to establish new methodology for bigdata-based media research. also, this study highlights effectively the differences in channels of communication that may affect public acceptance and perhaps political decision making. the role of some is continuously increasing and presents a challenge for technology developers. it seems that at some level, a speculative negative link from public acceptance, economics, and policies to technology market deployment might exist in the case of ccs. another contribution of this study lies in incorporating a method formerly utilised mainly for marketing purposes to study media image and, furthermore, trying to find correlations to public acceptance of ccs, therefore bringing a new angle to related media and social acceptance issues. this is a new approach compared to questionnaireor interview-based studies with moderate data sets of some hundreds of data points that are used in similar studies (e.g. herassaizarbitoria et al. 2011). when compared to regular qualitative studies, the method has its positives and negatives, but it can be considered an approach that might provide a basis for longitudinal data-series analysis in the future. as highlighted by sovacool (2013), quantitative tools can make it difficult to indicate nuances and variance, and they also seldom look for acceptance. however, by utilising this method and comparing editorial content and some, some indication of acceptance appears to have been gained. hence, it is straightforward that this type of approach would be best, if supplemented with qualitative methods, such as questionnaires. the software sets some limitations, although it still allows the analysis of extensive data sets. the important local media sentiments, such as the nimby syndrome (wolsink 2000), have not been analysed. in accordance with the results by herassaizarbitoria, et al. (2011), it would seem to be a call for research combining qualitative and quantitative study on the public acceptance issue of ccs technologies. the type of approach involving vast data might be most useful to sight larger trends and could be complimented by qualitative methods, such as questionnaires and interviews. also further text analysis methods could be applied, such as framing and discourse analysis, but as in this case, the comparability of two large data sets can be challenging. this is due to different types of communication in some, such as hate speech. the changes that take place in the mass media coverage and framing can also affect public acceptance (heras-saizarbitoria, et al. 2011). however, this is not so visible when using this type of approach. also, these types of issues are often emotionally charged, potentially influencing the appearance of the issue, particularly in social media. according to stieglitz and dang-xua (2013), emotionally 15 charged social media messages tend to be repeated more often and more quickly compared to neutral ones. hence, there is a possibility that media sentiment is influenced by these types of factors. the managerial implications of this study are related to mi/ci method utilization, and also public acceptance research method development issues. this study highlights the fact that in traditional stakeholder theories, a some participant is not considered so much as a salient stakeholder. however, when combining some users into larger groups, there are possible implications at the corporate level in cases needing both proper political decisions and regulatory environment and policies, as well as long-time r&d activities with also perceived technical and hse risks. this study tries to find applications of a new method for power plant investment-related media analysis, a learning machine-based sentiment analysis that utilises a very large global data set. managers working with relevant issues can potentially benefit from the results or the potential of the methodology. the method is applicable to analysing global attitudes, and also their changes, for example, during the time of relevant international events. furthermore, managers planning power projects or long-term r&d development projects may benefit from understanding the needs for public engagement, and the urgency of social media participation. figure 7 describes a possible chain from ccs mediaimage to product market deployment. this chain starts from public image, which influences people’s perceptions of technology. in addition to traditional news media, which can shape public opinion regarding any issue by emphasising certain elements of the broader controversy over others (shah et al. 2002), social media (some) presents more direct opinions, often including emotional content (stieglitz and dang-xua 2013). the application of social media is seen to support market intelligence and product development (berendsen et al. 2015). media framing in editorial content has the potential to influence public acceptance as attention is focused and placed on a field of meaning (herassaizarbitoria, et al. 2011). following this reasoning, in pr-communication literature, the rule of effects describes the chain from media exposure via attention, comprehension, motivation, and behavioural trial to sustained behavioural change (mccorkindale et al. 2013). according to the rule of effects, in the rule of halves describing the effect is halved in each step, leaving the percentage from media exposure to sustained behavioural change to 0.78 %, emphasising the need for extensive media exposure. for ccs, one main challenge when the public perception is considered is that in most countries, the public is rather unfamiliar with the technology (wallquist et al. 2011). this also seems to indicate that communication activities so far have been mostly intraand interspecialistic, following the funnel model by bucci et al. (2008), which states that more popular communication is usually done in the commercialisation stage of the product development. media image influences public acceptance, and furthermore, public opposition can influence ccs projects directly in the form of local action groups, and indirectly via making the political climate unfavourable for ccs (wallquist et al. 2011). recent years have witnessed proliferation of studies on public perceptions of ccs, accompanied by the efforts to translate such knowledge into toolkits for public engagement and communication. at the same time, both literature and toolkits have paid little attention to the organisational dynamics and views of project implementers with regard to public engagement (breukers et figure 7 possible chain from media image to product market deployment/case ccs. 16 al. 2015). allowing for improved understanding of the global capacity and applicability of ccs is seen to potentially strengthen the global trust, awareness, and public confidence in ccs technology (de coninck et al. 2009). for nuclear waste, it was observed that long-term, stable contacts with the local politicians and population are important, but also, as can be seen from the finnish decision by parliament, a good contact with the national politicians is necessary. however, there is not necessarily a link between national public acceptance (or lack of it) and political decisions. national decisions, however, require a local acceptance (le bars, y., et al.). a us-based study found that individually, both ccs and biomass are perceived generally as beneficial for energy development by the news media, though they are not often mentioned in combination, as feldpauschparker et al. (2015) emphasise their value for climate change mitigation and as an alternative to fossil fuels. earlier examples of failed technology commercialisation have indicated that social acceptance is a decisive factor for technologies, including ccs, while the early adoption of the general public may be essential for technology acceptance (ashworth et al. 2009). as a final step from public acceptability to managerial decision-making and technology deployment, a stakeholder salience model (mitchell et al. 1997) can be considered. the stakeholder salience model introduces three key attributes for stakeholder classification: power, legitimacy, and urgency. the question is: how can one evaluate the groups communicating via some? how can one measure someone’s power, legitimacy, or urgency when posting opinions in various discussion forums or on twitter? considering development and technology deployment of a single company, these groups have seemingly no power, legitimacy, or urgency and could therefore be considered traditionally to be nonstakeholders in the decision making and would be perceived as having no salience by the firm's managers. however, reflecting on figure 7, in the case of ccs product market deployment, one pathway for this is suggested. furthermore, figure 8 is synthesised, suggesting that earlier stakeholder adoption would benefit from ccs market deployment. the findings from media study support this hypothesis via implicating negative attitudes toward the technology, especially in some, and low levels of hits in general, implying unknown technology. the figure illustrates how ccstechnology development would have potentially benefited from the earlier stakeholder adaptation. furthermore, due to lack of public acceptance, second generation ccs-technology, development is under risk. some of the managerial implications of this paper are also related to the r&d decisionmaking process and the social media influence. this study indicates that investments in ccs technology may not be favourable due to uncertainties in public acceptance. it was clearly visible that the amount of media attention was not large enough to fully support product commercialisation. the utilised artificial learning machine-based analysis tool may prove beneficial when evaluating social acceptance issues affecting long-term r&d investments. hence, as a practical implication, this study emphasises the need for more versatile analysis of factors affecting long-term r&d investments with strong public involvement both directly and via political decision-making. the limitations of this study include the analysed media sentiment being limited to those classifications possible with the used keywords and also to the english language. using other keywords, or not including some topics, might provide slightly different results. in addition, framing, cluster analysis, and statistical methods were found difficult to apply as the comparability between editorial content and some could have been lost. in addition, although statistical techniques are widely used among communications scholars to identify news frames, they are criticised for not being able to do so in a conceptually valid manner (carragee & roefs 2004). this also brings a challenge to further research. figure 8 stakeholder adoption in ccs product development. 17 the utilised method may entail some uncertainties that require further studies. results correlate to literature, so that based on the analysis, ccs is unknown and also has more positive sentiment. also, the methods that were used for ccs product life-cycle estimation are not based on calculated figures and are only directional. in addition to addressing the limitations of this study, relevant future research could relate to developing the machine/artificial intelligencebased methods further. 5. conclusions and policy implications new ai, computational linguistics and machine learning methods can be utilized for weak signal detection in ci/mi and strategic planning functions of a company. public acceptance appears as a clearly essential part of the energy market products’ market deployment, an issue that should be addressed during the early stages of a product life-cycle. the overall visibility of a technology is important, while if public acceptance is ignored, it can cause delayed or abandoned market deployment of long-term energy production technologies, accompanied by techno-economic issues. this paper has twofold implications. firstly, it studies ccs media image with a new type of method, public acceptance, and product market deployment based on literature. secondly, it highlights the importance of visibility and studies possibilities for closing the gap between the rhetoric and technical progress inherent to ccs, which is critically important to global climate mitigation efforts. developing strong international cooperation to demonstrate ccs with global coordination, transparency, costsharing, and communication as guiding principles would facilitate efficient and costeffective collaborative global learning about ccs. founded on the learning machine-based media analysis, it appears that the popular type of communication might have been beneficial to start to a larger extent during the early stages of ccs product development. as a policy implication, the media image of technologies, possibly affecting larger audience groups’ public acceptance, can be studied by means of learning machine-based analysis. this type of analysis indicates the majority of attitudes in both editorial publication and social media. learning machine-based analysis provides a fast way for policy makers to get information on the general public sentiment. the media image of ccs was found to be mainly positive—however, small and unknown, implying a need to push towards regulations to provide some common ground to commercialise ccs technologies. however, the visibility of ccs is currently lacking. policies favouring ccs could be created as an implication of positive media image; however, not in my back yard (nimby) attitudes need to be assessed and addressed locally. as a future field of study, the further evaluation of adoptability of this type of opinion mining approach to weak signal detection of bi/mi activities is one topic to consider. additionally, opinion mining method development and the application itself would be an interesting field of study. 6. references abrahams, a. s., jiao, j., fan, w., wang, g. a., and zhang, z. (2013). what's buzzing in the blizzard of buzz? automotive component isolation in social media postings. decision support systems, 55 (4): 871. åhman, m., nikoleris, a., and wyns, t. (2013). decarbonizing industry: emerging roadmaps point to major need for financing radical innovation. carbon management, 4 (1): 5-7. alphen, k., voorst tot voorst, q., hekkert, m., and smits, r. (2007). societal acceptance of carbon capture and storage technologies. energy policy, 35 (8): 4368–4380. ashworth, p., boughen, n., mayhew, m., and millar, f. (2009). an integrated roadmap of communication activities around carbon capture and storage in australia and beyond. energy procedia. 1 (1): 4749-4756. le bars, y., murray, c., ormai, p., seppälä, t., and bøhmer, n. summary of the panel discussion concluding session iv on public involvement and acceptance panel iv: ‘can nimby be overcome?’ bell, d., gray, t., and haggett, c. (2005). the ‘social gap’ in wind farm siting decisions: explanations and policy responses. environmental politics, 14 (4): 460-477. berendsen, g., middel, r., pieters, i., angard, f., and hillerström, f. (2015). social media within sustainable product development: an exploratory multiple case study on the perception of social media usability in the new product development process. int. j. 18 technology intelligence and planning, 10 (3/4): 273–293. bradbury, j., ray, i., peterson, t., wade, s., wong-parodi, g., and feldpausch, a. (2009). the role of social factors in shaping public perceptions of ccs: results of multi-state focus group interviews in the u.s. energy procedia, 1 (1): 4665–4672. brouwer, a. s., van den broek, m., seebregts, a., and faaij, a. (2015). operational flexibility and economics of power plants in future lowcarbon power systems. applied energy, (156): 107-128. bucchi, m. (2008). of deficits, deviations and dialogues: theories of public communication of science. featured in: m. bucchi and b. trench (ed.) handbook of public communication of science and technology, new york: routledge international handbooks, 5776. budd, j.m. (2007). information, analysis, and ideology: a case study of science and the public interest. journal of the american society for information science and technology, 58 (14): 2366-2371. budescu, d. v., broomell, s., and por, h.-h. (2009). improving communication of uncertainty in the reports of the intergovernmental panel on climate change. psychological science 20 (3): 299-308. burnham, j., debande, o., jones, o., mihai, c., moore, j. and temperton, i. (2013). report on innovative financial instruments for the implementation of the set plan, first-of-akind project. jrc scientific and policy reports, ref: eur 26058, opoce ld-na26058-en-n, https://ec.europa.eu/jrc/sites/default/files/ldna 26058enn_002.pdf, accessed 23 may 2017. burscher, b., vliegenthart, r., and de vreese, c. (2015). frames beyond words: applying cluster and sentiment analysis to news coverage of the nuclear power issue. social science computer review, 1-16 breukers, s. and upham, p. (2015). organisational aspects of public engagement in european energy infrastructure planning: the case of early-stage ccs projects. journal of environmental planning & management, 58 (2): 252-269. cambria, e., schuller, b., xia, y., and havasi, c. (2013). new avenues in opinion mining and sentiment analysis. ieee intelligent systems 28 (2): 15-21. carragee, k. m. and roefs, w. (2004). the neglect of power in recent framing research. journal of communication, 54: 214–233. chen, h. (2010). business and market intelligence 2.0. ieee intelligent systems 25(1): 68-71. chen, h., chiang, r. h., and storey, v. c. (2012). business intelligence and analytics: from big data to big impact. mis quarterly, 1165-1188. dapeng, l. and weiwei, w. (2009). barriers and incentives of ccs deployment in china: results from semi-structured interviews, energy policy, 37 (6): 2421–2432. de best-waldhober, m., daamen, d, and faaij, a. (2009). informed and uninformed public opinions on co2 capture and storage technologies in the netherlands, international journal of greenhouse gas control, 3 (3): 322– 332. de coninck, h., stephens, j. c. , and metz, b. (2009). global learning on carbon capture and storage: a call for strong international cooperation on ccs demonstration. energy policy, 37 (6): 2161-2165. dessler, a. e. and parson, e. a. (2006). the science and politics of global climate change: a guide to the debate. cambridge: cambridge university press dütschke, e. (2011). what drives local public acceptance – comparing two cases from germany, energy procedia, 4: 6234–6240. du toit, a. s. (2015). competitive intelligence research: an investigation of trends in the literature. journal of intelligence studies in business, 5(2). druckman, j. (2004). priming the vote: campaign effects in a u.s. senate election. political psychology 25 (4): 577-594. feldpausch-parker, a., burnham, m., melnik, m., callaghan, m. l., and selfa, t. (2015). news media analysis of carbon capture and storage and biomass: perceptions and possibilities. energies, 8 (4): 3058-3074. firestone, j. and kempton, w. (2007). public opinion about large offshore wind power: underlying factors, energy policy, 35 (3): 1584–1598. fleishman, l. a., de bruin, w. b., and morgan, m. g. (2010). informed public preferences for electricity portfolios with ccs and other 19 low-carbon technologies, risk analysis, 30 (9): 1399–1410. folke, c., radgen, p., rode, h., irons, r., schaaf, h., read, a., möller, b. f., schoenmakers, h., imber, p., and peter, k. (2011). e.on’s current ccs activities, energy procedia, 4: 6091-6098. fütterer, m. a., carlsson, j., de groot, s., deffrennes, m., and bredimas, a. (2014). european energy policy and the potential impact of htr and nuclear cogeneration, nuclear engineering and design 27: 73–78. gerbner, g. and gross, l. (1976). living with the television: the violence profile. journal of communication 26 (2): 172-194. gielen, d., podkanski, j., and unander, f. (2004). prospects for co2 capture and storage organization for economic co-operation and economic development, (oecd)/international energy agency (iea), paris, france, p.252. godbole, n., srinivasaiah, m., and skiena, s. (2007). large-scale sentiment analysis for news and blogs. icwsm, 7 (21): 219-222. gough, c. (2008). state of the art in carbon dioxide capture and storage in the uk: an experts’ review. international journal of greenhouse gas control 2 (1): 155–168. greenberg, m. and truelove, h. b. (2011). energy choices and risk beliefs: is it just global warming and fear of a nuclear power plant accident? risk analysis, 31 (5): 819-831. grove-white, r., kearnes, m., macnaghten, p., and wynne, b. (2006). nuclear futures: assessing public attitudes to new nuclear power, political quarterly, 77 (2): 238–246. grubler, a. and riahi, k. (2010). "do governments have the right mix in their energy r&d portfolios?", carbon management, 1 (1): 79-87. gupta, n., fischer, a. r. h., and frewer, l. j. (2012). socio-psychological determinants of public acceptance of technologies: a review. public understanding of science 21 (7): 782795. hammond, g. p., akwe, s. s. o., and williams, s. (2011). techno-economic appraisal of fossilfuelled power generation systems with carbon dioxide capture and storage. energy. 36 (2): 975-984. heras-saizarbitoria, i., cilleruelo, e., and zamanillo, i. (2011). public acceptance of renewables and the media: an analysis of the spanish pv solar experience. renewable and sustainable energy reviews, 15 (9): 46854696. huijts, n. m. a., midden, c. k. h., and meijnders, a. l. (2007). social acceptance of carbon dioxide storage, energy policy, 35 (5): pp.2780–2789. huijts, n. m. a., molin, e. j. e., and steg, l. (2012). psychological factors influencing sustainable energy technology acceptance: a review-based comprehensive framework. renewable and sustainable energy reviews, 16 (1) 525– 531. iea. (2010). energy technology perspectives: scenarios & strategies to 2050, international energy agency, paris, https://www.iea.org/publications/freepublicati ons/publication/etp2010.pdf accessed 23 may 2017. itaoka, k., saito, a., and akai, m. (2004). public acceptance of co2-capture and storage technology: a survey of public opinion to explore influential factors, the seventh international conference on greenhouse gas technologies, vancouver, 5 september 2004. kim, y., kim, m., and kim, w. (2013). effect of the fukushima nuclear disaster on global public acceptance of nuclear energy. energy policy, 61: 822–828. kramer, g. j. and haigh, m. (2009). no quick switch to low-carbon energy. nature, 462: 568569 krause, r. m., carley, s. r., warren, d. c., rupp, j. a., and graham, j. d. (2014). ‘not in (or under) my backyard’: geographic proximity and public acceptance of carbon capture and storage facilities. risk analysis, 34 (3): 529– 540. lohwasser, r. and madlener, r. (2012). economics of ccs for coal plants: impact of investment costs and efficiency on market diffusion in europe. energy economics, 34 (3): 850–863. li, y. and li, t. (2013). deriving market intelligence from microblogs doi:https://doi.org/10.1016/j.dss.2013.01.023 liu, b. and zhang, l. (2012). a survey of opinion mining and sentiment analysis. mining text data. springer. 415-463. mathews, j. a., kidney, s., mallon, k., and hughes, m. (2010). mobilizing private finance 20 to drive an energy industrial revolution. energy policy, 38 (7): 3263-3265. maddali, v., tularam, g. a., and glynn, p. (2015). economic and time-sensitive issues surrounding ccs: a policy analysis. environmental science & technology, 49 (15): 8959-8968. midttun, a. and gautesen, k. (2007). feed in or certificates, competition or complementarity? combining a static efficiency and a dynamic innovation perspective on the greening of the energy industry, energy policy. 35 (3): 14191422. mitchell, r. k., agle, b. r., and wood, d. j. (1997). toward a theory of stakeholder identification and salience: defining the principle of who and what really counts. academy of management review 22 (4): 853-886. mccorkindale, t., distaso, m. w., and carroll, c. (2013). the power of social media and its influence on corporate reputation. the handbook of communication and corporate reputation, 497-512. matthes, j. and kohring, m. (2008). the content analysis of media frames: toward improving reliability and validity. journal of communication, (58): 258–279. m-brain. corporate communications. received 11/2015. miller, j. and krosnick, j. (2000). news media impact on the ingredients of presidential evaluations: politically knowledgeable citizens are guided by a trusted source. american journal of political science, 44 (2): 295-309. nasukawa, t. and yi, j. (2003). sentiment analysis: capturing favorability using natural language processing. proceedings of the 2nd international conference on knowledge capture, 70-77. nuortimo, k. (2012). essays on exploring alternatives in co2-neutral power generation product development. licentiate thesis. university of oulu. nuortimo, kalle & harkonen, janne & karvonen, erkki. (2017). exploring the global media image of solar power. renewable and sustainable energy reviews. 81. 2806-2811. 10.1016/j.rser.2017.06.086. nuortimo, k., härkönen, j., and karvonen, e. (2017b). exploring the social acceptance of biomass power, interdisciplinary environmental review, 18 (1): 14–27. oltraa, c., salaa, r., solàa, r., di massob, m., and rowec, g. (2010). lay perceptions of carbon capture and storage technology. international journal of greenhouse gas control, 4 (4): 698–706. palmgren, c. r., morgan, m. g., de bruin, w. b., and keith, d. w. (2004). initial public perceptions of deep geological and oceanic disposal of carbon dioxide, environmental science & technology, 38 (24): 6441–6450. peñalver-martinez, i., garcia-sanchez, f., valencia-garcia, r., rodríguez-garcía, m. á., moreno, v., fraga, a., and sánchezcervantes, j. l. (2014). feature-based opinion mining through ontologies. expert systems with applications, 41 (13): 5995-6008. doi:10.1016/j.eswa.2014.03.022 pietilä, v. (1997). joukkoviestintätutkimuksen valtateillä. tampere: vastapaino. in finnish. rainer, d. (2008). a looming rhetorical gap: a survey of public communications activities for carbon dioxide capture and storage technologies. judge business school, university of cambridge. reis, t., barroso, a. c., and imakuma, k. (2014). monitoring and analysis of nuclear acceptance by information retrieval and opinion extraction on the internet. available from thiago reis, retrieved on 21 june 2016. ruester, s., schwenen, s., finger, m., and glachant, j.-m. (2014).a post-2020 eu energy technology policy: revisiting the strategic energy technology plan, energy policy, 66: 209–217. santos, s. (2015). oxy-cfb combustion technology, its potential role in co2mitigation; o2gen workshop, 18 june 2015, turku, finland. scheufele, d. (1999). framing as a theory of media effects. journal of communication, 49 (1): 103-122. shah, d. v., watts, m. d., domke, d., and fan, d. p. (2002). news framing and cueing of issue regimes: explaining clinton’s public approval in spite of scandal. public opinion quarterly, (66): 339–370. slotegraaf, r. j., moorman, c., and inman, j. j. (2003).the role of firm resources in returns to market deployment, journal of marketing research, 40 (3): 295-309. 21 song, m. and thieme, j. (2009). the role of suppliers in market intelligence gathering for radical and incremental innovation. journal of product innovation management 26(1), 4357. sovacool, b. and ratan, p. l. (2012). conceptualizing the acceptance of wind and solar electricity. renewable and sustainable energy reviews, 16 (7): 5268–5279. siegrist, m. (2000).the influence of trust and perceptions of risks and benefits on the acceptance of gene technology, risk analysis 20 (2): 195–203. siegrist, m., cousin, m.-e., kastenholz, h., and wiek, a. (2007a). public acceptance of nanotechnology foods and food packaging: the influence of affect and trust, appetite, 49 (2): 459–466. siegrist, m., keller, c., kastenholz, h., frey, s., and wiek, a. (2007b). laypeople's and experts' perception of nanotechnology hazards, risk analysis 27 (1): 59–69. slovic, p., flynn, j., and layman, m. (1991). perceived risk, trust, and the politics of nuclear waste. science 254: 1603–1608. stieglitz, s. and linh d.-x. (2013). emotions and information diffusion in social media— sentiment of microblogs and sharing behavior. journal of management information systems 29 (4): 217-248 teo, t. s. and choo, w. y. (2001). assessing the impact of using the internet for competitive intelligence. information & management, 39(1), 67-83. ter mors, e., weenig, m. w. h., ellemers, n., and daamen, d. d. l. (2010). effective communication about complex environmental issues: perceived quality of information about carbon dioxide capture and storage (ccs) depends on stakeholder collaboration. journal of environmental psychology, 30 (4): 347-357. terwel, b. w., harinck, f., ellemers, n., and daamen, d. d .l. (2009). competence-based and integrity-based trust as predictors of acceptance of carbon dioxide capture and storage (ccs). risk analysis 29 (8), 1129– 1140. terwel, b. w., harinck, f., ellemers, n., and daamen, d. d. l. (2011). going beyond the properties of co2 capture and storage (ccs) technology: how trust in stakeholders affects public acceptance of ccs. international journal of greenhouse gas control, 5 (2): 181– 188. tokushige, k., akimoto, k., and tomoda, t. (2007). public perceptions on the acceptance of geological storage of carbon dioxide and information influencing the acceptance, international journal of greenhouse gas control, 1 (1): 101–112. valkenburg, p. and valkenburg, w. (2016). media effects: theory and research.. 67: 315– 338. wallquist, l., visschers, v. h. m., and siegrist, m. (2009). lay concepts on ccs deployment in switzerland based on qualitative interviews. international journal of greenhouse gas control, 3 (5): 652–657. wallquist, l., visschers, v. h. m., and siegrist, m. (2010). impact of knowledge and misconceptions on benefit and risk perception of ccs. environmental science & technology, 44 (17): 6557–6562. wallquist, l., seigo, s. l., visschers, v. h., and siegrist, m. (2012). public acceptance of ccs system elements: a conjoint measurement. international journal of greenhouse gas control, (6): 77-83. wennersten, r., sun, q., and li, h. (2015). the future potential for carbon capture and storage in climate change mitigation – an overview from perspectives of technology, economy and risk. journal of cleaner production, 103 (15): 724-736. wolsink, m. (2000). wind power and the nimbymyth: institutional capacity and the limited significance of public support. renewable energy 21 (1): 49-64. wolsink, m. (2007). wind power implementation: the nature of public attitudes: equity and fairness instead of ‘backyard motives’. renewable and sustainable energy reviews, 11 (6): 1188–1207. wood, e. (2001). marketing information systems in tourism and hospitality smalland mediumsized enterprises: a study of internet use for market intelligence. international journal of tourism research, 3(4): 283-299. wüstenhagen, r., wolsink, m., and bürera, m. j. (2007). social acceptance of renewable energy innovation: an introduction to the concept. energy policy, 35 (5): 2683–2691. xu, k., liao, s. s., li, j., and song, y. (2011). mining comparative opinions from customer 22 reviews for competitive intelligence. decision support systems, 50(4): 743-754. zhang, z. and huising, d. (2017). carbon dioxide storage schemes: technology, assessment and deployment. journal of cleaner production, 142, part 2: 1055–1064. zechendorf, b. (1994). what the public thinks about biotechnology. bio/technology, 12: 870–875. issn: 2001-015x v o l 4 , n o 3 ( 2 0 1 4 ) c o n t e n t s marisela rodríguez salvador, paola cruz zamudio, andrés santiago avila carrasco, elías olivares benítez, beatriz arellano bautista strategic foresight: determining patent trends in additive manufacturing pp. 42-62 dirk vriens, klaus solberg søilen disruptive intelligence how to gather information to deal with disruptive innovations pp. 63-78 o p i n i o n s e c t i o n jonathan calof evaluating the impact and value of competitive intelligence from the users perspective the case of the national research council’s technical intelligence unit pp. 79-90 avner barnea competitive intelligence in the defense industry: a perspective from israel – a case study analysis pp. 91-111 ~ 2 journal contact: mailing address: jisib halmstad university box 823 301 18 halmstad sweden principal contact: prof. dr. klaus solberg søilen school of business and engineering (sbe) email: klaus.solberg_soilen@hh.se copyright © 2014 jisib, halmstad university. all rights reserved. 3 e d i t o r i a l t e a m founding editors prof. henri dou (france), goupe escem prof. per jenster (china), nimi honorary editors prof. john e. prescott (usa), university of pittsburgh prof. bernard dousset (france), toulouse university editor-in-chief dr. klaus solberg søilen (sweden), halmstad university regional associated editors america: prof. g. scott erickson (usa), ithaca college europe: prof. sahbi sidhom (france), nancy university asia: prof. xie xinzhou (china), beijing university africa: prof. adeline du toit (south africa), university of johannesburg t h e e d i t o r i a l b o a r d : dr. mark xu, university of portsmouth, uk dr. subir ranjan das, university of petroleum & energy studies, india associate professor dirk vriens, radboud university, netherlands professor karim baina, école nationale supérieure d'informatique et d'analyse des systèmes (ensias), morocco professor uwe hannig, fachhochschule ludwigshafen am rhein, germany dr. klaus solberg søilen, halmstad university, school of business and engineering, sweden dr. eduardo flores bermudez, bayer schering pharma ag, germany professor kingo mchombu, university of namibia, namibia professor adeline du tout, university of johannesburg, south africa professor pere escorsa, school of industrial engineering of terrassa, politechnical university of catalonia, spain associate professor per frankelius, örebro university, sweden professor malek ghenima, l'université de la manouba, tunisia professor blaise cronin, indiana university, united states dr. john e. prescott, university of pittsburgh, united states dr. michael l neugarten, the college of management, rishon lezion, israel professor mika hannula, tampere university of technology, finnland professor kamel smaili, université nany 2, france professor henri jean-marie dou, atelis competitive intelligence work room of the groupe escem, france professor bernard dousset, toulouse university, france professor g. scott erickson, ithaca college, united states professor sahbi sidom, université nancy 2, france professor xinzhou xie, beijing science and technology information institute, china associate professor jonathan calof, telfer school of management at university of ottawa, canada professor per v. jenster, nordic international management institute, china professor alfredo passos, fundação getulio vargas, brazil professor brigitte gay, esc-toulouse, france professor sophie larivet, ecole supérieure du commerce extérieur (esce), paris, france t h e m a n a g e r i a l b o a r d : way chen, china institute of competitive intelligence (cici) raíner e michaeli, director institute for competitive intelligence gmbh, germany philippe a. clerc, director of ci, innovation & it department at the assembly of the french chambers of commerce and industry, france alessandro comai, director of miniera sl, project leader in world-class ci function, spain pascal frion, director acrie competitive intelligence network, france hans hedin, hedin intelligence & strategy consultancy, sweden javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/49') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/18') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/20') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/19') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/21') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/3') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/22') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/23') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/24') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/25') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/26') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/27') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/28') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/6') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/29') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/17') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/16') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/4') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/7') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/8') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/9') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/10') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/12') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/31') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/13') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/14') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/15') 4 journal of intelligence studies in business halmstad, december 26 2014 e d i t o r i a l n o t e v o l 4 , n o 3 ( 2 0 1 4 ) jisib continues to publish case studies. in addition we also publish in this issue patents analyses. patent analyses can be read both as examples of how to perform such analyses, but may also find interest within specific industries. professor henri dou, who is a founding father of this journal, was one of the pioneers in this area, also with the development of patent analyses software. we have also included a conceptual and theoretical paper. all of the contributions in this issue show that scientific work does not have to be limited to more narrowly defined empirical studies. the paper by salavdor et al. is dedicated to associate professor jonas rundquist, a colleague at halmstad university and at the same time a great admirer of the spanish speaking americas, who passed away in december 2014. he will be greatly missed. . the first paper by salador et al. is also a patent analysis, but this time for the additive manufacturing industry. unlike the first paper this one identifies a number of trends through a keyword patent analysis. “the main areas of research are focused on shaping of plastics and after-treatment of shaped products and working metallic powder and manufacture articles from this material”. the leading countries on additive manufacturing research are united states, great britain and switzerland. the second article by vriens and solberg søilen is an attempt to show the implication of disruptive innovation on intelligence studies. it is a theoretical paper. through a broad discussion of disruptive innovation theory the authors arrive at what they coin”disruptive intelligence”. in addition they describe ‘biases’ which may impair the production of ‘disruptive intelligence’. the third article is a case study written by calof. it is about how the national research council’s technical intelligence unit work with intelligence. the study shows that intelligence users understood and could appreciate a combination of hard and soft intelligence type measures. a survey in the form of an intelligence evaluation instrument was developed to gather data for the paper. the last article by avner is a case study about ci in the israeli defense industry. it confirms previous assumption that the industry in general and especially in israel is using ci intensively to support the decision making process. as always we would first of all like to thank the authors for their contributions to this issue of jisib. on behalf of the editorial board, sincerely yours, prof. dr. klaus solberg søilen editor-in-chief halmstad university i box 823 i s-301 18 halmstad, sweden i tel: +46 35-16 71 00 opinion section 70 revisiting sun tzu in the information overload age for applied intelligence education: stop answering, find good questions jean-maurice bruneau 1 , pascal frion 2 1 telecom business school, france, 2 jules verne institute for prospective & innovative projects, france email: jean-maurice.bruneau@telecom-em.eu pascal.frion@acrie.fr received february 9, accepted may 20 2015 abstract: sun tzu's 'art of war' is an illustration of the chinese strategic mode of thinking. today, faced with information overload it is unclear if the model of ''foreknowledge'' is as relevant as it once was. the method we used in this paper is action research to compare an occidental approach and an asian approach. the results obtained are applied suggestions to intelligence education. the contribution is to show how to step away from the epistemic of the information-centric approach to shift to a more multi-centric approach. we identified anchors such as strategic and critical questioning, identifying source people we do not yet know, and uncertainty-acceptance and bounded rationality. the implications are numerous. we are not so much dependent on the information available as associated with big data and software. our suggestions can be used in small and mediumsized organizations and do not necessitate resources associated with large organizations. keywords: applied intelligence education, sun tzu, competitive intelligence, strategic questioning, information. available for free online at https://ojs.hh.se/ journal of intelligence studies in business vol 5, no 1 (2015) 70-89 mailto:jean-maurice.bruneau@telecom-em.eu mailto:pascal.frion@acrie.fr https://ojs.hh.se/ opinion section 71 introduction the 'art of war' i was written by the chinese general sun tzu centuries ago and continues to be a standard text for the study of intelligence education. the concept of 'foreknowledge' in particular 'observe your environment and you will win your battles' has been used as a cornerstone for discourses and practices in intelligence for business, law enforcement and national security. in this context, we are faced with a gap between our capacity and our intention. baumard (2012) noticed that 'the art of being right overtook that of reflection' (p. 175). we want to notice, we want to observe the environment to win 'battles' but the representation of the environment is much richer today in terms of information ii and the battles are more diverse than ever before. 'noticing noticing' (neugarten, 2008) in small organizations allows the identification of postures and beliefs, different from the traditional discourse that is usually associated with large organizations. our resources to observe the environment have improved over time, but our increasing information needs in today's complex environments continue to push capabilities to the limit. until in the past, our challenge is not lack of information, but an information explosion. so the question is: in the information overload age, how can we adjust our thinking to better inform ourselves iii and our leaders? how can sun tzu's art of war enlighten us today? considering information overload, can we use sun tzu's art of war today in the same manner we have done in the past? the focus of this article is 'how to think and how to inform oneself' differently', in a position of information asymmetry iv , for intelligence matters in small organizations v during other periods than in 'peace' vi . how shall we think and inform ourselves professionally when we suffer from information overload and from missing information? in france, since the 90's, occidental competitive intelligence discourses have not succeeded in influencing small companies. there were epistemological misleadings (frion, 2012). how can we use the chinese strategic thinking mode derived from suntzu's work vii , to produce an operational system when we want to think or to inform ourselves, in an occidental environment, when a company experiences information asymmetry? sun tzu's work has been considered an art and has not been modelized with clear success. should we try and modelize it? our aim is to help occidental leaders to question themselves and to choose between two approaches, and by doing so, offer a modern contribution to applied intelligence education. our challenge is determining when should we use the occidental approach based on modelization and when should we use the asian approach based on the potential of the situation? the authors are also trying to understand similarities and differences in order to identify the transferable skills across the intelligence fields. sun tzu was an army general and his book was written with direct military purposes. we try and use sun tzu's legacy for competitive intelligence in particular for small organizations experiencing information asymmetry. this article is directly dedicated to intelligence education for business, but can be adapted for the police and for the military. our research method is mainly action research with these two approaches, each being put forward by one of the two authors. we will present the major criteria to select the modeling approach and the potential of situation approach, as well as a combination of methods along the continuum between the two. it is difficult to understand the world today; simple situations are rare. it cannot be taken in simple parts: it is complex (morin, 1986). there is a need for a global approach to think and to inform ourselves, as well as a necessity for ad hoc techniques and methods, when established processes are determined to be inappropriate or ineffective. background related work the art of war has been studied, translated and adapted since before the information age. in today's environment, it is important that many major and implicit considerations be identified and made explicit. foreknowledge the scene: sun tzu is leading an army on behalf of a sovereign. he is using a variety of people within and outside his army to collect data. military training teaches to fight, as well as how to observe the environment in order to secure and cease opportunities. he is using simple soldiers, civilians, scouts and spies to maintain situational awareness. many intelligence education works are based on the input-output model. information is sought, gathered and processed. objectivity is key; no preconceived idea can be accepted. in today's environment, technology is a cornerstone in the process. many works deal with information searching on a system, sometimes as a substitute to human intelligence. the human dimension is often ignored, except in a few contributions, such as illustrated by baumard (2012), boutin (2006 & 2007) or bulinge (2009). still, there is an epistemic opacity on how we think and how we opinion section 72 inform ourselves. even in intelligence matters, some people consider that every single bit of information should be considered, gathered, checked and used. consequently, intelligence organizations or team function like a data gathering and data crunching fusion center, rather than as the analysis center they were often intended to be. they target and filter data/information/intelligence. as sun tzu demonstrated, his information requirements were already defined in his orders from his sovereign, therefore, it is not information that comes first but issues-driven orders from a political leader. the way we read sun tzu in the occident is very informationcentered. focusing on information is misinterpreting or over interpreting (eco, 1992) sun tzu's text. spies in chapter xiii of the art of war, sun tzu describes the use of spies. today, conducting competitive intelligence activities for business purposes is legal; however, we always exercise caution not to stray into illegal activities. the value of studying the art of war in this context, is to understand the different aspects of the use of spies, legal and illegal, in order to recognize and prevent these techniques from being used against us. information overload (io) the detrimental impact of information overload on an organization has been neglected or ignored. information overload is defined here as a feeling of too much information during too short a period of time for a project that is too important to be ignored or to do a quick review of the information available. not many works refer to information overload in corporate intelligence, police and national security as an intelligence education literature. io is one symptom of the information asymmetry. size of the organizations the suggestions from the art of war have mainly been prepared for large organizations. sun tzu refers to an army of a hundred thousand men. oriental and occidental modes there has been a lack of knowledge, misreading or disregard for the fact that this text was written in an oriental style and is one illustration of a different strategic thinking mode that was generally unfamiliar to the west. it should not be read as an occidental book, with a beginning and an end. it is more a list of thoughts and experiences, presented in a poetic style. reading mode we agree with other authors who contend that sun tzu' art of war should not be read literally. lévi points out the challenge of translation (2011). for him, one cannot modelize the chinese strategic mode from the art of war with an occidental point of view. how can we take advantage of a book we cannot apply as a model? how can we use speech forms such as metaphors, oxymorons and paradoxes viii in an operational way? jullien (2002) shows that the art of war is the expression of the chinese mode of thinking that is different from the occidental one (with the limit of not suggesting an operating mode to learn to think differently). as for couderc, he provides a deep text analysis (2012). he mentions that the ancient chinese language does not clearly allow us to express an idea. the plasticity of the text, obscurity and ambiguity, made it possible for sun tzu'art of war to live on through centuries. modelling or not modelling ix shall we try and modelize a text that is using so many poetic representations? this text is considered here as not modelizable. so how are we going to suggest operational hints if we can't modelize it? thinking modes major postures in intelligence such as the chinese strategic mode primarily observe the potential of the situation whereas the occidental strategic mode is based on modelizing. in addition to these two modes, we identified other factors that are sometimes taken into account, such as behaviors, beliefs, organizations, methods, theories, tools and techniques based on a variety of modes and conditions such as luck, serendipity, exposition, provocation, totality of information, repeating what has been done before, looking for homogeneous solutions, making waves or no scandal to name a few. a combination of some of them can be useful during a long project whereas during a short activity, beliefs and actions that are not aligned, may create pitfalls. table 1 presents a brief comparison between the occidental and the chinese strategic mode. opinion section 73 table 1: the chinese and occidental strategic modes to apply sun tsu's art of war 'means-end' logic occidental strategic mode 'condition-consequences' logic chinese strategic mode purpose destruction of the enemy (check game) accomplishment and liberty of individuals (realization of 'i') destructuration of the enemy (go game) success of the group / family: harmony between the places of individuals and society (achievement of 'my role') strategy 'confrontation with the opponent' the environment is transformed by the actions of the actors objective: convince encirclement by the reduction of the room for manoeuver of the opponent' actors are transformed by the environment objective: suggest relation to the model general representations of things and time values and beliefs modelize reality distinction (separation and complementarity) between theory and practice impose a shape to the reality materialism, a 'objectivated' world conscience of the subject, of the individual linear time rationality and technological progress adapt the shape to the real use of reality prevails over theorization of reality interdependent world, mysticism. conscience of the group, community spirit. immutable circular time pragmatism, moral and spiritual progress opportunities detection the detection of opportunities based on the reference to a model set by force to reality by the will of the actors actors submit to reality. no opportunity outside the process approach description of the world 1. first, definition of the goal, 2. gather the means, 3. look for opportunities and ways. principle of non-contradiction operating mode: reductionism and logical argumentation 1. identification of the potentiality of the situation, 2. anticipation of the consequences by the detection of opportunities 3. outline the actions depending on the conditions of the environment. third included logic operating mode: aphorisms and metaphors, adjustments, in perspective source: jean-maurice bruneau, based on jullien (1996, 2002) opinion section 74 conceptual framework model design sun tzu's art of war is considered valuable and insights are believed to be transferable to business. the models we use we used the works of jullien (2002) and herrigel (1953/2004) in particular to address epistemology in intercultural approaches, in particular between the chinese strategic mode of sun tzu to create knowledge, and a more occidental way with modelization. the main theories we use user-oriented. dervin & nilan (1986) are regularly cited as a change in paradigm from system-oriented research to user-oriented research. frion & frion (2008) mention that the person who is looking for information is an actor or even a director with the intellectual building of the 'staging of information'. we also use small groups sociology rather than focusing on large groups, and the lack of fulfilment theory from gödel. the frameworks we use informational asymmetry: information is not purely and perfectly distributed among the actors. small companies generally have less information and fewer resources than larger ones. systemism: the chinese thinking mode is interested in processes. complexity: we opt out from the epistemological point of view of objectivity and adopt a more complex position, assuming our subjectivity. in particular, we use the work done by morin (1986). we consider 'how to think and how to inform ourselves' and not 'data/information/knowledge management', 'mastering information' or any information-centric approach. indetermination postulate: there is no predefined information and predefined goal. tier-included logic: the person who is watching the environment is part of the environment and influences it. economic warfare: the authors distinguish periods of 'war' and periods of 'peace' for companies. the hypothesis we make information is not always a given. the authors would like to stress that this article refers to intelligence for business, police and national security and not to data/information/knowledge management. intelligence is taken here as a rare occasion. we often don't know what to expect. is it very different from monitoring the web with deterministic keywords and the 'matching process' among large quantities of information available. the company does not know the topic very well to start with. it simply cannot start analyzing the first information available. on the contrary, we need to start by asking questions. by doing so, we try and push away the limits that a neophyte can have. impossible validation. frion & frion (2008) say we cannot validate information, because we would need to validate the validation of the validation in a vicious circle attaining no more than a point of reference. we can just believe in references. the validating process misleads us. they suggest staging or directing the information scene with a list of criteria to select the information subject to acceptance. we decrease some analysis after the information and we increase the questioning prior to the information. responsibility principle authors use the responsibility principle from hans jonas (1979/1985) to question our future. how shall we inform ourselves today and tomorrow? looking at any data available on the web would not be responsible today when we face information overload. not looking would not be responsible either. looking responsibly, ethically, is what we try to achieve. operational versus true authors are researcher-practitioners. they study to practice in a more operational way and are not so interested in a theoretical truth. small companies are not just large ones on a small scale. they have unique ways of thinking and informing themselves due to their limited access to information and resources. we reject the progress paradigm in relation to information gathering: for the authors, the progress paradigm that says 'more information is better' is simplistic and misleading. the authors take into account the human dimension and the operational constraints and consequently consider that more information is not necessarily better. the authors summarized in table 2, the general pros & cons of classical views on modelization and opportunity seizing. opinion section 75 table 2: pros & cons classical views on modelization and opportunity seizing pros cons or to be addressed opportunity seizing thinking rather than informing oneself because thinking is synonymous with analyzing the information available (mainly with or after the information). allow opportunities to be seized. contextual. difficult to teach. adapted for small projects and topics that can be handled by one person or a small group. weak signals. does not need hierarchy to be run as long as the leader welcomes weak signals. 'if one does not know to which port one is sailing no wind is favorable' seneca not so well adapted for large projects when there is a lot of information or a lot of constraints to review. no beginning and no end. risk of over-interpretation of the information available. some negligible information is taken into account. time consuming to process 'all' the data/environment. feeling of not leading the process. work interruptions. incitation to stay in the known known and the known unknown. modelization informing oneself rather than thinking because informing oneself is synonymous with working before or without the information available to start with. not many questions asked, we follow the plan. avoid/limit work interruptions. easy to teach. there is a beginning, there is an end. no need to process 'all' the data/environment, just the one we need. feeling of leading the process. strong signals. fragility of the check list effect. risk of forgetfulness and blindspots. does not allow opportunities out of the model. not contextual. lack of spontaneity. lack of use of luck. incitation to go to the known unknown. the research method our research method was built in a succession of steps. we started by regularly discussing our observations on intelligence education, allowing us to use the appropriate method. our main observations are as follows. what is the art of war? sun tzu's art of war is regularly quoted in a centuries-old context. there has been no real new examination or point of view expressed despite the recent changes of the information age. the chinese strategic mode aims at observing the potential of a situation, by observing the internal and external environment. opinion section 76 sun tzu's art of war cannot be modelized. we should try other ways to make the most of it in the occidental world rather than to make models out of it. information overload and lack of information many people suffer from information overload. at the same time, they also suffer from a lack of information, in particular on strategic issues. today, it is frequent to have a feeling of too much information. how can we apply some precepts from a period prior to the information overload to aid us with the challenges we face today in small organizations? small organizations small businesses generally represent a larger proportion of the actors compared to a much smaller proportion of larger organizations. still, small organizations are often given the same suggestions than larger ones. they are relatively ignored in scientific research compared to large organizations. for instance, students who are leaving their school or their university to join start-ups or to launch new businesses, have been mainly trained to join a large firm. these start-up have less information than the large companies and still they can be very innovative, before many of them are bought by a large firm. some small organizations take advantage of this situation and favorably benefit from information asymmetry. information asymmetry small organizations have developed ways and means to think and to inform themselves differently from larger ones. small companies are used to thinking and informing themselves without or before information. large companies are more used to thinking and informing themselves with and after information. for instance, data bases and big data, are really topics keep large organizations awake at night rather than small ones. small companies are less likely to use consultants than are larger companies. generally, small companies possess less investigative methods and means than larger ones, and have less time to spare for activities outside producing, selling and administrating the company. small organizations experience an information asymmetry that influences the types of intelligence to which they have access and are able to use. types of intelligence when confronted with large amounts of data, like on the web, one can develop one's intelligence by analyzing and connecting it. people consider that you just need to dig into it, targeting and filtering the information, and nuggets will surely be found eventually. connect the dots. when confronted with smaller and even small quantities of data, one can develop a different form of intelligence, specifically by making assumptions, without being sure of receiving the information they think they need. two major types of intelligence should be studied in particular: intelligence with or after information and intelligence without or before information. different types of intelligence will need a specific validation of information. validation of information strictly speaking, information cannot be validated. we cannot validate information, we can just believe in references. the validating process misleads us. we suggest staging or directing the information scene with a list of criteria to identify the information subject to acceptance. by doing so, we increase the questioning prior to information and decrease some analyses after the information. this becomes an intellectual building of the ''staging of information'' (frion & frion, 2008.) of course this can be a risky process. however, if we do not participate in the validation process, we face cognitive biases we could otherwise limit or avoid. cognitive bias toward the 'strategic void' members of large companies can easily suffer from information overload in general and from cognitive biases such as the confirmation bias in particular. according to baumard (2012), the beliefs of larger organizations are no more robust as those of smaller organizations. by the nature of their organization, large companies tend to work with more established norms, standards and guidelines so that they tend to reject high value incongruous information. the nature of large organizations produces some 'strategic void'. large companies do not work with physical perceptions as much as small ones do. physical perception members of small companies are usually more directly impacted by customers and other physical elements from the realities of their markets. they tend to experience more physical perceptions such as a lack of comfort, uncertainty and solitude while doing their job. physical perception seems to be very useful in different ways in the industrial and information age. industrial and information age states of mind the mastering of information is often taken as a reference to achieve or to get close to. mastering opinion section 77 includes various assumptions such as art, control, virtuosity and superiority. the mastering of information is often understood by its control subjacent meaning. the denial of surprises, of incongruous information and of the unknown are relevant signs that the current state of mind is a heritage from the industrial age. what is the information age state of mind? we observe that people try to adapt from the industrial age state of mind to the information age. awkwardly and out of pique, many people seek more data to solve problems. indeed, big data will certainly address some of our current endemic problems as well as amplifying some others that have not been addressed properly. as an example, web searching skills have been rather poor for the last twenty years, creating poor habits and weak beliefs and the authors do not see why they would spontaneously be corrected with big data. the authors have observed the way many members of companies in occident-mainly in franceusually think and inform themselves. after having acknowledged and presented a short list of the salient elements the authors took into consideration, it is time to turn to the method chosen. the method chosen the authors wanted to go over a contemplative approach of observing gaps between a discourse and its effects and to be in a position to propose new ways of improvement. they introduced the chinese strategic mode in their missions and lectures and made empirical observations in small companies when they think and inform themselves. the authors also introduced sun tzu's art of war in missions and training sessions with small companies. the authors used the action research method. bruneau started from the chinese strategic mode and relied heavily on sun tzu's precepts, sometimes with the use of physically feeling the effect of information and situations. he started from the asian side with sun tzu and walked along towards occidental companies. frion started from the old occidental mindset and started to include the asian influence of sun tzu and also walked along towards occidental companies. he worked with more than two hundred very small and small enterprises on commercial aspects, using competitive intelligence, over the period 2009-2014 in a regional program called 'dinamic entreprises' in france. the two approaches used the 'participant observer' method separately and with different populations. sometimes a group was divided in two subgroups, one using the traditional and occidental approach whereas the other group was introduced to some precepts from sun tzu, in order to compare the results. the authors often compared their results over a period between 2010 and 2014. they also worked together in 2014 with a group of students with bruneau as a teacher and frion as a customer over a few months. the authors observed the participants and also themselves. they had distinct approaches and compatible goals. these two approaches are not quantitative approaches. they are described in detailed below. since our work is due to be used in applied intelligence education, the authors are presenting two practical hints to revisit sun tzu's art of war. at the beginning, they seem to be in opposition; still they share some of sun tzu's heritage, objectives, beliefs and results. we will present bruneau's approach first and then frion's, and we will compare them in a table in order to produce a working document and help to assist in applying the appropriate approach to a specific situation. bruneau's approach success story a five-person firm is specialized in soil biological analysis. its clients are mainly farmers. this very small company is competing with multinational firms and international institutes in agronomic research. despite its world class recognized expertise this company does not receive any public or private funding and still, strives to grow. this company is clearly in a situation of information asymmetry. in this context, sun tzu's precepts such as aphorisms and metaphors were used to facilitate the questioning. as an example, ʺthis knowledge cannot be elicited from spirits; it cannot be obtained inductively from experience, nor by any deductive calculationʺ (chapter xiii on the use of spies) suggests raising an incongruous question like 'has my competitor already done the investigation i intend to launch?' the questioning that follows will lead to factual hypotheses such as: is there a powerpoint file on the web that would present the marketing efforts of company x on soil quality control? while hypothesis check is carried out, surprises often emerge. in our case, we found that a competitor had prepared a document presenting the typology of the various tailored offers on the market, prepared. this approach is based on the idea that actors submit to the reality of the environment. the culture of resource management to reach a goal is neglected in favor of reality exploitation. in the absence of many investigation resources, such as consulting, opinion section 78 expensive databases, large sophisticated personal network, this little company only adapts to the shape of reality without being able to make it or to change it. questioning works in a cascade, based on sun tzu's precepts selected at random. this channeling of sun tzu's precepts produces creativity in the questioning. it favors the generation of pertinent questions for which the absence of answer becomes an issue. priority is given to these questions, which are disturbing, paradoxical or incongruous. based on these types of questioning, more possible factual hypotheses are produced. then an invalidation process is organized and provides additional outcomes that could not be imagined with a more classical needs assessment. as an example: a file from a real estate office that is specialized in vineyards from which winegrowers shall soon retire and need a soil analysis before they can sell their property. the goal of this approach is contrary to the one that starts by defining the information needs. indeed, it consists of eliminating the search for answers and avoids some cognitive biases such as the confirmation bias. exploitation of the competitive reality prevails over theorizing. it is more a logic of 'conditionconsequence'. this leads the small firm to canvass for new customers conditioned by the results of the investigation. based on this success story and on collaborative explication process in working together, the two authors have structured some guidelines and a list of insights. action items / steps step 1: explicitly identify the unknown elements of the environment by developing a list of questions for which the absence of an answer becomes an issue. step 2: use sun tzu's precepts as stimuli to improve the questions. for each 'inspired' question, produce four or five factual hypothesis. step 3: sun tzu's precepts are left to chance, with no specific order. questions chain themselves in a series, matching them to factual hypothesis. verification gives some answers and allows more precision to the subsequent questions and hypothesis. step 4: divide questions in two types. one for players and sources possessing knowledge of the field investigated. the other one for the topic of the investigation. step 5: a first exploration is prepared and a dead line is given. identify the players with experience in the field who are available and who could possibly answer the critical questions for this step. step 6: prepare the meetings and get in touch with these players. turn the critical questions into precise hypothesis so that implicit knowledge can emerge from the players. step 7: interview the people from the field and consolidate their answers. this last step makes the potential of the situation emerge without pre-conceived ideas. the specificity of the answers helps to bring out operational elements. lasting questions that remain with no answer can also be very enlightening. example from frion a small company was curious to know if its main competitor would be to for sale in the next couple of years. two people gathered around the president of this company to work on this topic of special interest. frion suggested his methodological information resistance (temporarily) method or mir(t): for a short period of time, the team started by methodologically resisting the compulsion of acquiring information on the potential target. instead, the team identified a strategic question symbolizing the precise goal. this question was prepared during a one hour discussion made of a succession of attempts. originally, the question was: 'is our competitor going to be for sale soon?' the second attempt became: 'what are the three main options for our competitor in the next couple of years?' the third attempt turned to: 'how can our company increase its production capacity and secure its current margins within the next five years with internal or external growth?' the team was glad to have moved from the first question to the second and third question. the first question seemed useless by this time. then the team started strategic questioning and identified a list of ten significant questions in order to approach and to encircle the topic to be addressed. two hours were necessary to identify the items to be considered, to give them precision, and to turn them into questions. the president did not take part in this second step until the list of questions was presented to him. two questions were disregarded: one seemed useless for the president and one was already answered. the president had some information he forgot to give to his team and the strategic questioning step gave him the opportunity to discuss this extra information. one question was added. four questions were discussed and slightly modified to reach a more incisive question. the initial question of the goal was reviewed and modified slightly to include adjustments that emerged during the strategic questioning. opinion section 79 then, for each question, a prototype was elaborated. the first one needed one hour. the following ones took approximately fifteen minutes each on average. a list of missing information was identified, profiles of sources people human sources were modelized. accesses ways, means and tools to contact these people were prepared as scenarios. when the first best approaches were identified the most promising ones the team experienced a moment of excitement with laughter and little shouts that frion calls the 'success syndrome.' after a quick estimation of time and effort that would be necessary for this operation, the team realized that resources and time would be too limited. the initial command was reviewed and modified one more time, with an agreement that this final adaptation of the strategy was still very good and was worth doing. the seeking started and sources people were contacted. good surprises emerged from some interviews and some questions from the strategic questioning list were considered unnecessary at this time. finally, the company decided to launch an internal growth plan over the next few years instead of waiting for the competitor to be potentially for sale. frion's approach since information is not necessarily a good thing in general and in a situation of general information overload in particular, a temporary methodological information refusal -or resistanceis used first (frion, 2012). frion's method suggests a temporary actionable strategic questioning or an agile questioning before information (frion, 2009a). the method is made of three subsequent steps. step 1: the command. the command is discussed and reformulated to reach a second then a third version and not taking the first version for granted. the command is a question, as it is action-oriented rather than a list of intelligence requirements that is more knowledge-oriented. with a question, it is usually easier to understand the point of what we are looking for and when we reach this point. one working principle is that 'a leader doesn't clearly know what he wants to start with.' the reformulation is compulsory. step 2: the strategic questioning. instead of analyzing the existing data, one person or a small group of persons tries to find approximately ten right ways to go about the 'problem'. the leader does not take part in the process at the beginning. it starts with brainstorming to identify concerns, refines and adds precision to these concerns, and ends in finalizing precise questions regarding these concerns. we try and ask questions and identify what we would like to learn-what is missing in order to move on. going from step 1 to step 2 can involve a confirmation bias, however the questions in step two are useful to identify what has not been said so far and what has been believed either consciously or unconsciously. the leader is given this list of ten questions. he usually already knows the answer for one of them, is not interested in two of them, may add another question and modifies three or four or them. if the leader only says the questions are ok, the exercise is doomed to fail: he needs to get involved in the questioning process. the question from step 1 is usually modified with a longer description and more precise wording. after a general picture is developed, we dive into a more analytical approach taking the context into consideration. step 3: the information seeking prototype. for each question of step 2, there is an information seeking prototype. it starts with the identification of the most suitable format to give as an answer to address this question. this format can be a short memo, a table, a pie chart, a picture, a conversation with an expert, a verbatim explanation, among others. in this document we intend to produce to fit our leader's cognitive style, we identify three best missing information that would fill this content. for each piece of missing information, we modelize the profile of a source person. we want source persons and not access. source persons are in the best position to help us reformulating a poorly developed question. for each source person, we produce a scenario or a script to approach this person. how is he or is she going to react to my questions? he or she must not tell me a secret and it must be the person in charge for this matter. sometimes we need to ask a portion of the command to figure out the big question without asking for it directly. it is a framework rather than a strict procedure. the idea is to keep it simple and to develop relations between the leader and the task force. through a succession of three main tasks, we produce loops and reviews at different levels. the command evolves throughout the process and it is 'easy' to adjust to the 'new' formulation of the command because we do not invest a lot of time in processing data. at step a1, a2, a3, the scenario goes to the point of two indicators to be met: subcontracting: a seeking prototype can be subcontracted to someone from our team without major difficulty. thus, it has to be well presented and explained with details. success syndrome. a physical syndrome of success must be experienced before the interviews start. no success syndrome, no seeking. in fact this approach provides so much preparation that the participant must feel an easiness to act with or without surprise, a bit like the art of archery (herrigel, 1953) with a zen approach. opinion section 80 figure 1: acrie method various constraints are identified or explicitly asked and this situation will provoke ideas to reach the predefined goal. at each step, there is an ambition to formulate or to identify the best question, the best source person, the best access. this first best technique mobilizes the energy of the game of the 'treasure hunt'. this method is particularly adapted to on-the-spot questions and rather not for monitoring purposes. we try and avoid or limit different mistakes and cognitive biases: the sticky information to start with; the confirmation bias when a popular information is repeated; we avoid the validation fallacy, among others. comparison between bruneau and frion there is a long list of similarities, shared beliefs and similar results and another one with differences. major noticeable similarities both approaches aim at improving, skills, business behaviors, and a sustainable activity. both rely heavily on human behaviors. therefore, they need to be taught during an action-training period over a few weeks: 3 days minimum between 3 to 9 weeks for bruneau, and 5 days between 5 and 8 weeks for frion. the maximum impact of the two approaches is at the beginning, whereas in the classical ci approach a major impact can be seen later. the two approaches can be used with a new topic, with people who do not particularly fear of missing out (fomo). missions like canvassing on export or on unknown markets, economic war, innovation, r&d, start-up launching are particularly adapted. small companies or small team inside of larger ones, will benefit from these two approaches, in particular when they face information asymmetry. both approaches can provoke serendipity. with bruneau's methods it can spring at the beginning and with frion, it usually appears at the end, during interviews. in both cases, the main idea is not to find answers, it is rather to have our fist questions contradicted and improved. answers will eventually join. both approaches save the time that is usually spend with the classical competitive intelligence approach to gather a lot of information prior to analysis and distribution. there is no ongoing and tedious monitoring. no software is necessary; the internet is not necessarily used as a cornerstone. electricity is an option: these two approaches can be realized with a place to gather physically in a quiet environment, with a small team. a combat or a game energy will be expected with both approaches. figure 2 shows that both approaches aimed at improving occidental companies. bruneau starts from the oriental prospective and frion from the occidental one. opinion section 81 figure 2: the oriental and occidental prospective major noticeable differences with bruneau's approach, the profile of the participants is key. some people will subscribe to this approach, in particular if they already have a liking for non-deterministic activities such as: art, horse riding or hunting. with frion's approach, there can be a clear time for ending the task because constraints are helping to design the work to be done. different profiles of persons can jump into this approach. when shall we use these two approaches to think and to inform ourselves of intelligence matters? we identify 4 main situations: 1. we ought to observe the potential of the situation 2. we ought to modelize 3. we ought to use both 4. undetermined to keep it simple, we have written a few words for each choice. this synthesis needs to be read as a comparison and not as an eternal truth. how to choose between the two approaches one and only one of these two approaches can be launched at the same time. they are based on very different assumptions and would inevitably clash if used together without great care. people who are visionary, innovators, pioneers and users leaders with naturally enjoy more bruneau's approach. in particular if they come from complex activities where uncertainty is accepted and when structuring is needed. obligation is more based on means with bruneau's approach and more on result with frion's one. as far as the environment is concerned, with bruneau's approach, people consider that the environment is taken as it is whereas with frion's approach, it can be changed. long term issues will probably benefit more from bruneau's approach. in order to use extensively the potential of frion's approach, the leader must be actively participating three times during the process. people who consider that information overload is so present and so annoying that they believe information is not so much a good thing today as it used to be when we didn't have so much of it, these persons might be happy to try the methodological and temporary information resistance mir(t) from frion, as a starting point. people who want to identify and reformulate theirs needs rather than waiting for the best from the environment, will also probably enjoy frion's approach. objectivists and positivists will happily turn to bruneau, and subjectivists and constructivists will turn to frion. surfers will turn to bruneau, planners will turn to frion. none of these two approaches is rejecting the other point of view, still both of them stress differently on as it can be shown in table 4. table 4: trial and error vs. modelling trial and error modelling bruneau 80% 20% frion 20% 80% each author possesses his own justifications to prefer his own approach and none of them tried and convince the other one. both respect and admire the other's approach and enriched their own in the process of this comparison. when one of these two approaches has been experienced with no great success, the other one is probably a good alternative to revamp the motivation as well as a mean to keep on working on the initial mission with a second chance. some situations are more undetermined and do not particularly call for any of these two approaches. when people want to know 'everything', when a very strict administrative process is running, when internet searching is the only possible way to think or to inform oneself, when there is necessity to use many resources from various places in a large organization, when people are not ready to lose one's grip for a short period of time, then the authors recommend not to put much hope in their approaches. opinion section 82 after having described our method, we will turn to the results of this research. results both authors received various level of enthusiastic welcome from many companies. some members of these companies expressed their disagreement with these new approaches but they represent a small chunk of the population studied. although the appreciation was positive, the authors verified that trained people tend to go back to their good old ways if the 'coach' or their leader does not make sure the new approach carries on as shown. possessed by the information both authors of this article observed that the word 'information' was present in many sentences when discussions were going on the topics of thinking and informing oneself. people think first and foremost with or after 'information'. outside information, there seemed to be no way out. therefore, the authors concluded that many people were possessed by information, that is they cannot imagine thinking or informing themselves without or before information. authors regret that information is only considered as a raw material. sun tzu is putting forward the model of 'foreknowledge' in chapter xiii on spies foreknowledge and not information. sun tzu's approach is more postured-centered and knowledgecentered than information-centered. nowadays, there should not only be information to be taken into account. information should not be the center of our professional universe. with information overload in particular, a complex situation is emerging. there is no unique center, there are several ones: we are facing a hubble revolution. information is an important dimension but thinking and informing ourselves cannot be reduced to the single dimension of information. incongruous strategic information this research confirms the results of jones (1989) and baumard (2012) relative to incongruous strategic information. indeed, in the art of war, speech forms such as oxymorons and metaphors provoke unexpected combinations of words and ideas that proved to be useful to stimulate the thinking process. they can be used as starting points for strategic questioning as well as critical questioning. it is the opposite with the use of databases, big data, and internet web 'key-word matching' techniques, that is looking for similarities. various possibilities can be used to monitor the environment, in particular three of them: the classical one in competitive intelligence is looking around for information, as much as possible, targeting and filtering it; looking for the unknown through a strategic questioning; making assumptions and hypothesis; modelizing the environment. before monitoring the environment, one could consider these alternatives and select the most appropriate one with regards to his situation. distancing both authors influenced their audience to dismiss information available to provoke more strategic questioning, at least for a short period of time. bruneau used physical exercises, feelings, poetry or loosening one's grip. frion used weaning or his (temporary) methodological information resistance. these techniques allowed people to focus on to questions rather than the answers. it seemed to reduce the number and the intensity of cognitive biases such as confirmation bias. as baumard states 'dominant logic channels the observation on signals that reinforce our expectations and remove strategic attention from contradictory signals' (baumard, p. 140). the use of sun tzu's art of war appeared to be a good opportunity to encourage people to think differently, and to get out of the closed and simple system of targeting and filtering data. there is a unique and short period of time during which we can think 'before' and 'without' information on a new topic. once we have the first pieces of information on a new topic one cannot pretend to think without being under the influence of what he has just learned. our current information management is usually more concerned with answers than with questions. good surprise the authors have experienced with success the value of being surprised, feeling insecure during a cognitive process, and to commute between one's comfort zone and a lack of comfort. different frameworks, sometimes opposite ones, are the cornerstones of the reform of the strategic thinking as baumard describes it, as well as putting forward atypical behaviors and impertinence (p. 152). 'what defines the strategic dimension is the capacity to reveal what is surprising, what is disturbing, what does not fit to the existing beliefs' (baumard, p. 153). toxicity of information the authors confirm the potential toxicity of information available (taleb, 2005), based on a relatively poor information-centered approach, with not much prior questioning. thinking differently, opinion section 83 questioning ourselves individually and collectively, and questioning the environment, have the potential to enrich our approaches. recently with the information explosion, information has proved to be potentially useful but the amount of information available makes us shift from the interest of accumulating information towards questioning a situation. when small companies face too much information, it is toxic. when they face deceptive information in tiny quantities it can also be toxic. so, small companies very often were inclined to be intoxicated by information or 'infoxicated'. responsibility and accountability theoretically, information can be a good thing and it has often been stated that we need to inform ourselves. but today this theoretical dimension is overtaken by the applied dimension: small companies destroy more value with information than they produce value with it. this has been witnessed most frequently with the proliferation of emails. only a small number of emails are considered useful and creating value whereas the largest proportion of emails are said to be counter-productive, destroying more value than they may create. it is therefore our responsibility to reconsider some weak messages such as 'we need information to think.' both our approaches showed we need to flee from the 'nice to know approach' with large quantities of information to the 'vital to know' based on what is usually missing and really needed. in the future, we could become accountable for the information we lack and for the information we unnecessarily accumulate with no applied outcomes. profitability is it more profitable to possess large amounts of data? the authors interviewed many people and they did not find any convincing direct or indirect link between information possession and profitability. on the other hand, companies mentioned ever growing costs in acquiring, handling, processing, sharing, memorizing, and cleaning data, with and without information technology. structuring uncertainty the authors revealed the known uncertainty and the unknown one. uncertainty was presented as a valuable period of time to explore the potential of a situation (bruneau) or our needs (frion). with different approaches the authors reached the same conclusion: they helped and structured uncertainty for a beneficial effect. how can small companies benefit from sun tzu's art of war precepts? for whom is it vital? companies that do not have many resource nor competences to access a lot of information, can use some precepts from sun tzu's art of war. here is a short list of these situations: during the strategic move of a competitor on a market, when the company is striving to survive, to make an urgent and important decision, to choose a supplier for a key element, to identify a threat, when a local authority is locked up on its territory for a larger scope issue, when a small organization cannot afford to work with a consultant or with an expert. explication of a list of beliefs: when a simple situation happens, when there is no doubt it is a simple situation, then a simple response can be operated. when a situation is not simple, when no automatic procedure can face the situation, we can have recourse to a principle or to a motto, in order to draw a line of conduct without a long period of potentially useless discussions. here is a short list of them that the authors experience with good results. 'i am not certain and it's ok' (bruneau); 'less data is better than more' (frion); 'information is toxic' (taleb); a large proportion of the success in intelligence is in identifying what and where to look at (bruneau); processing large amounts of data/information is frequently tiresome and counterproductive (frion); 'don't use the word 'all' and denounce the spirit of 'totality' as not strategic' (frion); 'stop answering, find good questions' (bruneau). these short sentences do not represent the truth but rather illustrate working principles. when in doubt, they can help getting started. if people do not adopt their own motto, when they face complicated situations, they will revamp some motto from their memory, their education, their habits, and these spontaneous mottos could be inappropriate. working on these mottos is useful introspection, although it is easy to stay in the dark for particularly complex situations. sun tzu's art of war is not compulsory. the authors do not pretend their approach can be used unconditionally. the actual informationcentered approach can still be used. the authors identify the following conditions that call for the traditional target-filter input-output approach: when information exists as a raw material; when information is available; when resources are available; when key-word standardization is acceptable on mature topics; when context is not very important (there is almost no context on a query on a system); when continuity of work is preferred to opinion section 84 'made on the spot' thinking; when there is a logic of result rather than a more philosophical questioning approach; when the human dimension is negligible; when a decision is taken in cold blood with facts and only facts; when rationality is not bounded, without cognitive biases, without errors of judgment; when we want to know everything; when information can be simply transformed into knowledge; when information is unconditionally a good thing and when the progress paradigm applies. when we can/should work in silos and mutilate the thinking process, such as in particularly secret discussions. as a shortcut, we could say we can use the traditional competitive intelligence discourse when 'more information is better'. totality of information do we need the totality of information to think or to inform ourselves? does sun tzu observe everything? he definitely observes the global environment and he does not reduce his environment to some specific indicators, avoiding the rest in the meantime. since an interview isn't an option, we can only refer to his text. sun tzu used the word 'all' 28 times in his art of war (giles, 1910). apparently, he is in a state of mind as if he wanted to know everything. how does it compare to other intelligence reports? in france, with the five first official report on competitive intelligence, the number of times we can read the word 'all', that is, 'tous, tout, toute, toutes', is 74% per page. with the art of war translated by lionel giles, the percentage to take is 'per word' and not 'per page' because the case of the words is much larger in the art of war. the percentage of 'all' per word, in sun tzu's art of war is 0,255%. it is very similar to 0,264% per word in the first five french ci official reports. table 3: the use of the word 'all' in the art of war vs. other references in intelligence field competitive intelligence police military sun tzu reports / books / manuals 5 french official reports (harbulot 1990, martre 1994, carayon 2004, mongereau 2006, buquen 2012) practice advice on analysis (asso. of chief police officers and nat. policing improvement agency, uk (2008). field manuel 2-22-3, land force (human intelligence collector operations) the art of war % per page (occurrences over p.) 74% per page (543 over 728p.) 52% per page (76 over 145p.) 119% per page (452 over 384p.) 55% per page (28 over 51p.) % per word 0,26% per word (287 543) 0,19% per word (38 564) 0,29 per word (157 123) 0,25 per word (10 968) it seems obvious that the reference to 'all' doesn't bother the different authors in intelligence reports, books or manuals. working in intelligence would therefore consider gathering all the information. it is sometimes clearly written as such, but not in the art of war. still, we identified that the myth of totality is present in the intelligence documents we studied here. the mean for the different documents in table 3, shows that the word 'all' is 0,24% of the words. with 0,25%, sun tzu is just a little bit above the mean. the authors are aware that the idea of totality in occident is different than the one in asia. in particular, the taoist and buddhist philosophies have not much in common with the occidental mode. in asia, the idea of 'all' could be seen as to lose one's grip, whereas the occidental view would rather mean the control. a last result has been obtained, in the shape of a working document presenting and comparing bruneau's approach and frion's, in order to discover sun tzu's work from two different perspectives, to apply a specific approach according to various situations, for a very similar effect. discussion and implications three levels of discussion and implications will be presented, for science, for companies, and for applied intelligence education. opinion section 85 discussion and implications for science scientifically speaking, this article is adding some knowledge to the intercultural study of occidental and oriental business cultures, to the study of small organizations and to intelligence studies. the two authors have humbly expressed their approaches, their methods, their practices and their beliefs. two authors, two very different ways of thinking and still, one common suggestion to use sun tzu's art of war with strategic questioning. what is most noticeable is their suggestions to use sun tzu's art of war by an occidental audience despite the impossible modelling of the masterpiece studied. in particular, when they release the constraint of the information-centric approach of normal sciencex, other disciplines like psychology, sociology, information science and communication, can be enriched by this research. the two authors humbly contribute to a complex approach, by including as fundamental two dimensions in particular: information overload and a more human oriented approach. research would benefit from more frequent and more robust 'points of view' exposed, explained, and discussed. indeed some fundamental beliefs such as 'is information a good thing' is usually not addressed and it can be difficult to follow a scientific article and its operational suggestions when some fundamental issues are kept in an epistemic opacity. there is a tendency to stick to 'information', working on acquiring it and analyzing it. there are rather new approaches that stress communication and not only 'information' (libaert & moinet, 2013) or data science (big data for instance). we subscribe to a more communicational approach and we also reckon the potential for technical and informational approaches for large organizations. still, our main concern in this article is to work on information asymmetry in small organizations. both authors are willing to consider some conventional and unconventional topics. still they include a temporality in their approach so that these topics are brought to the table within a methodology: bruneau will address this concern with an uncomfortable strategic questioning to start with, whereas frion will start by a methodological information resistance (temporarily.) both authors are crediting innovation and the discontinuity of the information age after the industrial age. when topics are inextricable or orthogonal, the authors suggest the use of another thinking mode, a new angle of vision, a new posture, a paradoxical questioning, to stimulate reflection and to create an appropriate new frame of reference. besides the public good that science can represent, discussions and implications for small companies need to be carried on. discussion and implications for small companies sun tzu was in the military and his books are directly dedicated to prepare, to avoid or to direct a war. he did not write a book on peace keeping. the topic of 'war' can be sensitive in some civilian companies and it can be tricky to use war metaphors to convince civilians, in particular antimilitarists. and yet, some lessons can be adapted and drawn from the military. as an example, during special forces trainings, the idea of 'one bullet to kill' is used rather than the image of a 'hail of bullets' with a machine gun. the image of 'one bullet to kill' in a military context could be adapted by 'one vital question to ask'. the figure 'one' should be understood here as a small number, between one and ten approximately. comfort and lack of comfort there is general trend that emphasizes comfort and that tries to eradicate lack of comfort in companies. however in chaining up questions and hypothesis, one can clarify the nature of uncertainty. along the way, with a learning process, uncertainty can vanish or diminish at least. according to bruneau, looking for a physical lack of comfort is a simple and often useful way to explain the gap between the known and the unknown. from a uncomfortable situation, we don't know what will be learned: we don't know what we don't know. it is radically different than starting from a comfortable situation when we know what we know. according to frion, starting from the comfort of a model also necessitates a level discomfort, in particular during the interviews of source people: indeed there is an additional advantage to just receiving an answer during an interview, and that is when the source person calls our question into question. we learn more from a call into question than from an answer! the value is greater, the advance is more significant, the focus defocuses, and the way of thinking is improved. during targeted interviews we are specifically monitoring indicators of physical reaction with the source persons, because these physical reactions are usually spontaneous and reveal indicators before a sentence is said in reply to the question asked. discussion and implications for applied intelligence education a list of concerns and beliefs has been developed that should be taken into consideration in intelligence for business, police and military. still this article is dedicated to business applications. opinion section 86 the discourse on competitive intelligence over the last twenty years was evaluated as a failure for small companies (frion, 2012). many assumptions in this discourse were evaluated as weak or wrong. therefore the discourse did not reach the 'applied' level and remained at the 'theoretical' level. in particular, the discourse ignored information overload and usually emphasized the need for more information without setting any limit apart from focusing and targeting. the authors condemn the conventional discourse based on these false collective beliefs. the use of sun tzu's art of war precepts can be a good opportunity to refresh our view on competitive intelligence in explicit beliefs and assumptions. the two authors consider that intelligence education needs to give more room to the following fundamental topics in particular: the human and cultural dimensions (individually and collectively), the feeling of information overload, the value of questioning over information in some cases. reviewing the chinese strategic mode in the light of these two topics will also contribute to opening up the barriers that have been excluding topics so far. using sun tzu's precepts in a creative process is a way to access the incongruous nature of strategy. in particular, accepting the third-included approach will improve the vision of contradiction that is excessively considered as a bad thing. looking for contradictions could actually improve our understanding of others' needs and we can better understand the information available as well as the missing information. also we contribute to building and fostering a collaborative and interdependent conscience and way to work with different cultures, accepting that someone can think and inform himself differently without being wrong. limits the main limits to this article are presented in the following list of questioning: ancient chinese language is elliptical and may be hard to understand; moving from chinese ideograms to an alphabetical system can be puzzling; military and business share some common topics and also retain specificities; ancient thinking mode is used for a modern thinking mode: how can we adapt an old discourse to the evolutions in business, in technology and in sociology for instance; use of poetic style to contribute to a business style; diversity of translations; two languages used: the authors of this article are french and the writing is in english. inevitably, some questions remain unanswered when we try and use sun tzu's art of war in today's business live. the two authors humbly recognize this. this research was realized by two french researcherpractitioners and might need to be tested and evaluated by researchers from other countries to see if the results can be replicated. on initial examinations, the two approaches presented by the two authors seem to be in opposition. with a closer look, bruneau's approach is not only observing the potential of the situation and frion's approach is not only about modelling. each of these two approaches needs some conditions to be used. if these conditions are not met, then, these approaches might not be relevant and even worse they could be misleading and out of the responsibility principle for the future. both of the approaches are counter-intuitive. therefore, they can attract the attention of atypical persons like explorers and early adopters of innovation. people who have an artistic sensibility will tend to join in quicker. followers will have more difficulties in adopting them. clearly there is a barrier of entry related to culture, psychology and competences in particular. agreement and disagreement although the two authors reach a common ground and declare together that questioning is better than information, they diverge on the intensity in the way they include some constraints. in particular, bruneau considers that the 'evaluation of needs' will most certainly start with the evaluation of what we know and that will induce cognitive biases such as the confirmation bias. indeed, frion reckons that when identifying needs, the tendency can be seen to keep the investigation within the scope of what is already known. on the contrary, bruneau argues that the incongruous question can make the reflection start from a new point of view, with no obvious preconceived idea, and new assumptions can emerge. however frion also argues that with the mir(t) approach it is possible to limit or to eradicate this concern. both authors shared a real commitment to their different approaches and neither changed his mind. still both authors learned a great deal on the best conditions in which to apply their own approaches, and their limits, and they gained a better methodology for explaining their own point of view. both authors are willing to present the two approaches to use sun tzu's art of war, including information overload, on top of the classical way to use it, ignoring the information explosion. opinion section 87 there is no such thing as a universal method. there are different methods to apply to different situations, and some are more appropriate to small companies that suffer from information asymmetry. the effectiveness of sun tzu's legacy is inversely proportional to the size of the company. the art of war is less relevant to large companies that rely on the action of planning. interestingly enough, small companies are potentially better suited to use sun tzu's work despite their lack of resources and competences. conclusion and research agenda sun tzu is still a valuable source of inspiration today for applied intelligence education. however, we should not apply the occidental representation of his ''foreknowledge'' model in a straightforward manner, before considering the implications of information overload. sun tzu's approach is more postured-centered and knowledge-centered than information-centered. this article presented two accomplished approaches to applied intelligence education including terms, practical details and returns on the experience required to operate them. these two approaches can contribute to intelligence education, with the following main concerns: ease of use, adding value, inexpensive to run, profitability, responsibility and durability. therefore it can become vital for some small organizations to apply it. this article shows that sun tzu's art of war can be used from different points of view for a common apprenticeship more human oriented to think and to inform oneself differently, with alternation of control and loosening one 's grip. small organizations, experiencing uncertainty, lack of time to practice classical competitive intelligence, and facing information asymmetry, will benefit from either of the two approaches presented above. it is often more operational to raise questions than to look for answers. doing so is also more profitable in terms of time and money. it usually brings more value than crawling the web. the two approaches remain very different. bruneau starts from orient and goes to occident whereas frion start from occident and also goes to occident. still the two approaches are very similar regarding fundamentals. both bruneau and frion are dedicated to applied actions for strategic questioning. in companies experiencing information asymmetry, stop answering questions and find good questions: a big question is often better than big data. both of these two approaches can be beneficial and the authors don't believe one is better than the other, nor that only one is good for any given situation. how shall we choose? there are some objective conditions and there is also the idea of a bet. these two approaches are a bet and this bet is usually subconscious. we would be better off if we could consider these two approaches and see if the one we usually choose is aligned to our usual conditions. when it is not, we know that we can have another approach to try. a bit of both approaches can be a good combination in a time line. in the very short term, a temporarily methodological information resistance should be applied first, even during a short period of time, in order to have once and only once the possibility to think 'before' and 'without' information. in a longer term, observing the potential of the situation should be applied, 'with' and 'after information' in order to avoid blind spots. various situations give us different options in using sun tzu's art of war. we need to consider not only information but also other key intelligence influences such as: time, crisis, aim, and information availability, among other things. we need to consider how we inform ourselves and not only how we manage information. we need to inform ourselves more on how we inform ourselves. whatever the method we use, we need to think more about the way we think. the contribution of the authors is more appropriate for small companies in a position of information asymmetry. still they believe that large companies can also adapt these findings to their benefit. it is not a copernican revolution. a more complex revolution is emerging: a hubble revolution. we tested different approaches with companies. we believe many assumptions also hold for police forces and national security. opinion section 88 bibliography baumard philippe (2012), le vide stratégique, cnrs editions, 250 p. ben israel isaac (1989), philosophy and methodology of intelligence: the logic of estimate process, intelligence and national security, vol. 4, n°4 (october), pp. 660-718 boutin eric (2006), biais cognitifs et recherche d'information sur internet : quelles perspectives pour les indicateurs de pertinence des moteurs de recherche, colloque vsst, 7 p. boutin eric (2008), la recherche d’information sur internet au prisme de la théorie des facettes, habilitation à diriger des recherches, université du sud toulon-var, 9 octobre couderc yann (2012), sun tzu en france, editions nuvis bruneau jean-maurice (2007), emergence de l'intelligence économique territoriale : les leçons du déploiement des réseaux hauts débit, thèse en sciences de l'information et de la communication, université de poitiers (non diffusée) bruneau jean-maurice et samier henri (2007), de la veille à la chasse des signaux faibles : proposition méthodologique, vsst, marrakech bruneau (2013), mettre en application des préceptes de sun, tzu : cas du déploiement des réseaux haut-débit, conférence vsst, october 23-25th, nancy, france bulinge franck (2009), renseignement et analyse d'information : une approche épistémologique, laboratoire i3m – université du sud toulon-var, cerad.canalblog.com/archives/2010/01/16/16541 580.html, downloaded on january 10th 2015 dervin b. & nilan m. (1986), information needs and uses, annual review of information science and technology, 21, pp. 3-33. eco umberto (1992/1996), interpretation and overinterpretation, cambridge university press frion jean-jacques et frion pascal (2008), la validation de la source d’information : la construction intellectuelle du « metteur en information », revue r3i – www.revue-r3i.net frion pascal (2009a), de l'intention stratégique du décideur, au plan de recherche d'information : observations et proposition d'une méthode pour les pme-pmi, colloque esc bretagne brest “à la recherche de l'intention : l'imagination au service de la gestion”, les 29 et 30 janvier 2009 frion pascal (2009b), le paradigme du progrès et la recherche d'information : quelles alternatives ? séminaire vsst 2009, inist vandoeuvre lès nancy, 30-31 mars frion pascal (2009c), l'information préalable et l'intelligence économique : de sun zi à nos jours, symposium d’analyse et de réflexion sur les modèles, méthodes, ingénierie de l’intelligence compétitive, beaulieu-sur-mer, france, 25 et 26 novembre. frion pascal (2010), la surinformation et l'intelligence économique, mythe ou réalité, colloque vsst, toulouse, 25-29 octobre frion pascal (2012), généalogie de la faible percée du discours sur l'intelligence économique dans les tpe françaises : errements épistémologiques et propositions opérationnelles, université de poitiers, thèse présentée et soutenue le 7 décembre, 640 p. giles lionel (1910/2009), the art of war by sun tzu, translated by, classic edition, el paso norte press griffith s. b. (1963/1972) sun tzu, the art of war, oxford university press, 197 pages herrigel eugen (1953/2004), zen in the art of archery: training the mind and body to become one, penguin hibbs pherson katherine & pherson randolph h. (2013), critical thinking for strategic intelligence, cq press sage libaert thierry et moinet nicolas (2013), la communication dimension oubliée de l'intelligence économique, coordination par, presse universitaire de bordeaux, 295 p., pp. 512 jonas hans (1979/1985), the imperative of responsibility: in search of an ethics for the technological age, the university of chicago press jones reginal victor (1989), reflections on intelligence. london, uk: heinemann. jullien françois (2002), traité de l'efficacité, le livre de poche kuhn thomas s. (1962/1970), the structure of scientific revolutions. second edition, foundation of the unity of science, volume ii, number 2, chicago: university of chicago press lahneman william j. & arcos rubén (2014), the art of intelligence: simulations, exercices, and games, rowmann & littlefield, 282 pp. lévi jean (2011), sun tsu l'art de la guerre, hachette littératures morin edgar (1986), la méthode : 3. la connaissance de la connaissance, anthropologie de la connaissance, editions du seuil, paris neugarten michael louis (2008), noticing noticing: the role of noticing in the praxis of competitive intelligence, thèse de doctorat, university of gallen, graduate school of business administration economics law ans social sciences, n° 3399, 322 p taleb nassim nicholas (2005), fooled by randomness: the hidden role of chance in life and in the markets, random house, new york http://www.revue-r3i.net/ opinion section 89 endnotes i sun tzu's art of war is an illustration of the chinese strategic mode. ii in this article we consider the word information as a convenient and generic term for sign, signals, data, information, knowledge and intelligence. they share at least one attribute that is the progress paradigm. it has been commonly believed so far that more 'information' is better. iii in this article we distinguish 'thinking' from 'informing oneself'. for the time being, 'thinking' rather means analyzing information available and 'informing oneself' rather means looking for missing information. iv information asymmetry is mainly used here as a situation when a small company has much less information and resources than a large firm. v by small organizations, the authors refer to (very) small and medium-sized enterprises, local administration, professionals like plumbers or lawyers, with no team dedicated to business intelligence or competitive intelligence. vi war and peace. this article presents and suggests behaviors, topics and methods for war times. by war times, the authors mean periods with surprises, crises, battles, treachery, spies and enemies such as competitive moves, lures, innovation, illegal practices from a competitor, anti and counter intelligence from a competitor, rumors and e-reputation. this article is not primarily dedicated to 'peace times' for companies idealized as in a few example like administrative behavior, knowledge management, production efficiency, norms and regulation, in pure and perfect information situation when markets are showing no significant sign of change. vii sun tzu's name can vary in time and space. for convenience, we are using the most used name. other writings exist, such as sun tze, sun tzu (amiot, chung, fayard, giles, griffith, levi, phélizon), sun zu, sun zi (lavis), sun wu (lavis, chung), souen tse(u) (levi), sun wou (levi) and sometimes sun pin (levi) or master sun (phélizon). indeed, it is difficult to adapt a chinese sound in french or in english. sun zi was not selected here for convenience in this article, despite an official orthography in pinyin. viii example of an oxymoron: 'the general who is skilled in defense hides in the most secret recesses of the earth; he who is skilled in attack flashes forth from the topmost heights of heaven' (chapter 4.) antithetical terms are put together. example of a metaphor: 'military tactics are like unto water; for water in its natural course runs away from high places and hasten downwards. si on war, the way is to avoid what is strong and to strike at what is weak. water shapes is course according to the nature of the ground over which it flows; the soldier works out his victory in relation to the foe whom he is facing. therefore, just as water retains no constant shape, so in warfare there are no constant conditions (chapter 6.) two realities are put together. example of a chiasmus: 'that general is skillful in attack whose opponent does not know what to defend; and he is skillful in defense whose opponent does not know what to attack' (chapter 6.) the use of two consecutive phrases in which the second is an inverted version of the first. example of a comparison: 'a victorious army opposed to a routed one, is as a pound's weight placed in the scale against a single grain' (chapter 4.) ix modelling is defined here as an attempt to list variables, relations and considerations suitable for imitation x kuhn, p. 5 ''normal science, the activity in which most scientists inevitably spend almost all their time, is predicated on the assumption that the scientific community knows what the world is like.'' 41 analysis of competition in chinese automobile industry based on an opinion and sentiment mining system xie xinzhou * , wang qiang ** , chen anqi ** * competitive intelligence and competitiveness research center of peking university, beijing, china. xzxie@pku.edu.cn ** key laboratory of competitive intelligence and innovation evaluation, beijing academy of science and technology, beijing, china. wq.malmsteen@gmail.com received 10 january 2011; received in revised form 12 march 2011; accepted 11 march 2012 abstract: in this paper a methodology for a mining system is introduced. the architecture of the system is based upon what is called opinion and sentiment mining. the mining system is used to analyze competition in the auto industry. the results show the advantages with each of the two cars used for this study. instead of offering theory this is a hands-on approach to help solve specific problems by describing a complex process. keywords: competitive intelligence, opinion mining, chinese automobile industry 1. introduction internet has become the main source for competitive intelligence (ci). the reason is that internet users express their opinion and attitude towards products and images of enterprises online. this paper presents a concept for how to analyze the competition in the automobile industry. the main focus is based on what is called opinion and sentiment mining. a comparative analysis between two auto brands in china is shown as an example. first the role of opinion and sentiment mining in ci will be introduced. further on we present the methodology for this study as well as key issues of opinion and sentiment mining. finally the architecture of the opinion and sentiment mining system and how to use this system to analyze the competition in the auto industry is discussed. 1.1 the role of opinion and sentiment mining in ci as shown in table 1, internet users increased dramatically with the development of internet over the past years. the number of internet users has available for free online at https://ojs.hh.se/ journal of intelligence studies in business 2 (2012) 41-50 https://ojs.hh.se/ 42 reached close to 2 billion, and is about 30% of the world’s population. the number is higher in developed countries and developed areas. (table 1) table 1. world internet users and population statistics users express their thoughts online, making internet the main information distribution and access channel. this provides new opportunities and challenges for the development of ci as a discipline. it opens up user preferences and topics such as: how do users evaluate the products? do users like the products? which properties of the products make users like or dislike them? how do internet users perceive the image of the enterprise? which practices of the enterprises do users like or dislike? how do users choose between different products? what properties make users buy the products? opinion and sentiment mining provide views and preferences of internet users for different companies. the users’ comments are important for companies and for product development. take windows vista as an example. vista has been selected by time magazine as one of the 10 biggest tech failures. mr. nash, windows vice president of product, confirmed the hesitation to launch the product, based on early users opinions. it said that the service was not being user-friendly, which again influenced other users in a negative way. users of products are an important information source for ci, and their opinions can provide companies with rich contents, making them an important reference for enterprises. 2. the methodology opinion and sentiment mining goes through five major steps as shown in figure 1: figure 1. framework of opinion and sentiment mining 43 1. determine object analysis in the object analysis stage we answer the following questions: which competitors should be analyzed? what are the products, brands and services of the competitors? according to our needs, these aspects are defined as our objects. 2. determine information sources in the stage of determining information sources, an alternative information source list can be created, containing authoritative forums, web stations, and blogs. it can be filtered according to the influence and quality of the information. it can also be filtered and complemented with help from industry experts. 3. evaluation index system configuration the third step is to build an evaluation index system to describe the properties of our objects. for example, the index system may contain engine, computer screen, wheel, seat and so on in an auto industry analysis. the index system creates an alternate property list. a sentiment vocabulary need to be built, which describes the “sentiment” of the properties like good, excellent, terrible and so on. in this step, the participation of industry experts who will help us filter and complement the property list and sentiment vocabulary is necessary. the relationship and weight of properties should be determined, after which a complete index system is constructed. 4. collection and integration of information the properties of index systems are used as the query words to retrieve from the information sources. at the same time, the opinion and sentiment words are extracted. this information will be integrated into the opinion and sentiment database. 5. intelligence analysis the final step is to analyze the data. before the analysis, some provisions need to be done, including error correction and elimination of duplicates. then we need to identify the emotion tendency, which can be positive, neutral or negative. some intelligence analysis methods like association, comparative and trend analysis are used to research the competitive situation further. 3. key issues the introduction above is the framework of the methodology, and in almost every step there are some key issues including: how to select the more authoritative information sources? how to obtain and integrate the information which is heterogeneous? how to build index systems which can describe our objects comprehensively? choose an opinion and sentiment mining algorithm. (1) selection of authoritative information source in the source selection, methods such as web metrics can be used to evaluate the information source, and inputs from industry experts are essential. (2) acquisition and integration of multiple heterogeneous information sources during the acquisition and integration of multiple heterogeneous information, spam and filter noise should be removed through metadata standards, using segmentation algorithms to process unstructured and semi-structured information. (3) evaluation index system for different ci tasks, the index system is different. this step is a semi-automated process and some work must be done manually. in order to improve efficiency, software to help industry experts build or modify the index system was developed. (4) opinion and sentiment mining algorithms the core part of the opinion and sentiment mining system is the algorithms, which include the corpusbased approach, dictionary-based approach, supervised machine learning methods, image segmentation algorithm and other opinion extraction algorithms. during the development of this system, a dictionary-based algorithm is more suitable for chinese information processing, and the accuracy is about 82%. that is acceptable for a commercial operation. 44 4. architecture of opinion and sentiment figure 2. architecture of opinion and sentiment mining system the opinion and sentiment mining system is developed to gather data about opinions and sentiments related to products and services. the system consists of four parts: data acquisition, data pretreatment, data analysis and user interface, as shown in figure 2. the function of the data acquisition part is information selection, information extraction and information integration; the function of the data pretreatment is to eliminate duplication of information, do error correction, emotion tendency judgment and so on; the main task of the data analysis part is to do association research, comparative research and trend research; the analysis of the result will be shown through different types of terminals. 5. analysis of competition in the chinese auto industry how to use this system to analyze the competition in china’s auto industry will be illustrated through a case study. in this case, peugeot 307 and ford focus (shown as figure 3), are used as examples. both cars have a high selling rate and the competition between them is fierce. we performed an analysis of the competition of the two cars through analyzing the comments of internet users. 45 figure 3. auto products used in the case study (1) information source the information was mainly collected from auto forums using systems and saved information in databases which provided information about the targeted cars. the information sources are shown in table 2. no url logo 1 http://www.autohome.com.cn/ 2 http://www.xcar.com.cn/ 3 http://www.chetx.com/ 4 http://auto.sina.com.cn/ 5 http://auto.qianlong.com/ 6 http://www.ieche.com/ 7 http://auto.sohu.com/ 8 http://auto.huanqiu.com/ 9 http://www.feelcars.com/ table 2. information source 46 (2) evaluation index system the index system was established containing properties, such as sunroof, abs, air-condition and engine. indicators used in the index system are shown in table 3. sunroof chassis power window ebd side airbags cd support center armrest rearview mirror valve structure external audio interfaces center console air-condition spare wheel gps body side molding sun visor mirror speaker brake pedal front brake fuel consumption transmission headlight seat belt alloy wheels head airbags car phone bluetooth rear outlet cnd electric trunk seat vehicle door abs ba central locking keyless go rear lcd screen single-disc dvd cylinder cover qa quality assurance appearance rke rear suspension tire airbags single-disc cd multi-disc cd cylinders max.hp temperature zone control trim ascd steering wheel cylinder bore eas rear side airbags car tv drive mode drl internal hard disk displacement maximum power compression ratio cylinder stator rear head airbags hud sunshade rear brake auto parking front passenger airbags engine maximum torque windshield wiper stroke sport kit view camera air conditioning maximum speed multi-disc dvd power assisted steering computer screen front suspension head lamp tumbler holder fuel way man-machine interactive system others table 3. indicators used in the index system (3) sentences extracted by the system a data set can be obtained through opinion extraction. take peugeot 307 for example (shown in figure 4), the first line is the sentence about appearance, the second is about other properties that is not described in the remaining part, the third is about air-condition and the fourth is about doors. figure 4. sentences extracted by the system (in chinese) 47 (4) attention comparison figure 5 is the comparison of the attention between our targeted cars. attention is measured by the number of posts about the given car. the red line is the attention of ford focus and the green line is for peugeot 307. in this figure it is shown that users pay more attention to ford focus than to the peugeot 307. figure 5. attention comparison between peugeot 307 and ford focus (5) positive comments after identifying the emotional tendency, we summed up the positive comments through which a trend of the users’ positive comments are shown. the number of positive comments for ford focus is higher than for peugeot 307, which indicates that users prefer the ford focus over peugeot 307. this results may help people who want to buy a family car make their decision. it can also attract the attention of staff from peugeot 307 who should like to change the image of the car. figure 6. positive comments of target cars (6) negative comments figure 7 shows the comparison of the negative comments. in this figure we see that the negative comments about these two cars are similar. after combining the positive and the negative analysis, the conclusion is that the negative comments occupy much larger proportions of the users’ comments of peugeot 307 than for ford focus. 48 figure 7. negative comments of target cars (7) skylight comparison a comparison of the selected properties of the two cars is valuable because it tells us why the users like or dislike the products. the comparison in figure 8 shows that users prefer the skylight of peugeot 307 over the skylight of ford focus. figure 8. skylight comparison between target cars 49 figure 9. overall comparison between target cars (8) overall comparison other properties are compared in a similar way achieving this overall result. we see that compared to peugeot 307, users prefer ford focus, but the appearance and trim of the peugeot 307 is preferred to its rival. peugeot 307 is better on ford focus is better on skylight, fuel consumption, seat, appearance, trim, headlight, door, rke, cruise control system, abs, electronic anti-theft, speaker engine, air-condition, rear suspension, tire table 4. comparison result of peugeot 307 and ford focus (9) comparison result we came to the conclusion that the advantages of ford focus is the car’s power and performance, which is embodied in the engine, air-condition, rear suspension and tire. peugeot 307 on the other hand has an advantage in appearance and design which is embodied in the skylight, fuel consumption, seat and so on. peugeot 307 ford focus increase the pr about appearance and design. let consumers understand the importance of vehicle performance. fix engine deficiencies. strengthen the design of appearance and trim. table 5. recommendation according to opinion and sentiment mining 50 6. outlook further research in this field could include: use opinion and sentiment mining system to perform other industry analysis, such as for cosmetic industry and health industry and see what are best applied areas. improve the accuracy of the opinion extraction and sentiment judgment; embed natural language processing algorithms of other languages, which can make this system analyze the information of several languages at the same time. references a hownet word list for sentiment analysis (beta version). retrieved 2010-04-30. available online at url: http://www.keenage.com/html/c_index.html. agarwal, a. & bhattacharyya, p. (2005). sentiment analysis: a new approach for effective use of linguistic knowledge and exploiting similarities in a set of documents to be classified. proceedings of the international conference on natural language processing (icon). chao, l., jian, s., yi, g., xingjun, x., lei, h. & sheng, l. (2009). etc. chinese chunking with maximum entropy models. proceedings of cips-parseval-2009. fuld & company. intelligence software report 2008-2009. london, united kingdom. fuld & company, inc. 2009. gang, l. & qiangbin, d. (2008). an approach based on words numbers for extracting text from web pages. information science, 26(3). hatzivassiloglou, v. & mckeown, k. r. (1997). predicting the semantic orientation of adjectives. proceedings of the 35th annual meeting of acl. internet world stats. available online at url:http://www.internetworldstats.com/stats.ht m. pang, b. & lee, l. (2008). opinion mining and sentiment analysis. foundations and trends in information retrieval, 2(1-2): 1-135. whitelaw, c., garg, n., & argamon, s. (2005). using appraisal groups for sentiment analysis. proceedings of cikm-05, 14th acm international conference on information and knowledge management, bremen, germany. pp. 625–631. zhao, j., xu, h., huang, x., tan, s., liu, k. & zhang, q. (2008). overview of chinese opinion analysis evaluation 2008. proceedings of the first chinese opinion analysis evaluation (coae 2008). pp. 1-20. page 4 editors note vol 6 no 3 editor’s note vol 6, no 3 (2016) what role does technology play for intelligence studies at the start of the 21st century? all articles published in this issue show the role technology plays for intelligence studies in business. we see how patents can be used for competitive and business intelligence, how datamining and software can be used for geoeconomics, how it may measure the success of open source innovation in different cultures, how business intelligence software can be evaluated using fuzzy promethee and how software and the internet are used for economic and industrial espionage. singh writes on geoeconomics on a micro scale, the question about where a business should be located geographically to be economically viable. the author presents a new geospatial methodological approach using census data. arcgis software is used as a geospatial analytics tool for hotspot analysis and for producing maps. deshpande, ahmed, and khode’s article entitled “business intelligence evaluation model in enterprise systems using fuzzy promethee” presents a new model to evaluate business intelligence for enterprise systems. the article by capatina, bleoju, yamazaki and nistor show how strategic intelligence solutions, once performed in a collaborative culture environment, will lead to the improvement of the partners’ managerial competences and will act as enablers for competitive positioning, proving the added-value of the acquired know-how through open innovation practices. the article by maadi, javidnia and khatami shows how patents can be used as a source of information for competitive/business intelligence to highlight the technological trends in the field of energy efficient cooling of data centers. as such it is a good applied example for how patent analysis can be done in a specific industry. the last article entitled “economic and industrial espionage at the start of the 21st century – status quaestionis” is by solberg søilen. it is an attempt to define where the field of economic and industrial espionage is today, more than ten years after the author wrote a dissertation on the subject. as always, we would above all like to thank the authors for their contributions to this issue of jisib. thanks to dr. allison perrigo for reviewing english grammar and helping with layout design for all articles and to the swedish research council for continuous financial support. on behalf of the editorial board, sincerely yours, prof. dr. klaus solberg søilen halmstad university, sweden editor-in-chief copyright © 2016 jisib, halmstad university. all rights reserved. journal of intelligence studies in business vol. 6, no 3 (2016) p. 4 open access: freely available at: https://ojs.hh.se/ vol8no2paper2gioti_etal to cite this article: gioti, h., ponis, s.t. and panayiotou, n. (2018) social business intelligence: review and research directions. journal of intelligence studies in business. 8 (2) 23-42. article url: https://ojs.hh.se/index.php/jisib/article/view/308 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index social business intelligence: review and research directions helena giotia, stavros t. ponisb* and nikolaos panayiotoub ahellenic open university, greece; bschool of mechanical engineering, section of industrial management and operations research, national technical university athens, greece; *staponis@central.ntua.gr journal of intelligence studies in business please scroll down for article editor-in-chief: klaus solberg søilen included in this printed copy: measuring public acceptance with opinion mining: the case of the energy industry with long-term coal r&d investment projects social business intelligence: review and research directions helena gioti, stavros t. ponis pp. 23-42 and nikolaos panayiotou investigating the competitive intelligence practices of peruvian fresh grapes exporters journal of intelligence studies in business v o l 8 , n o 2 , 2 0 1 8 j o u r n a l o f i n t e llig e n c e s t u d ie s in b u s in e s s issn: 2001-015x vol. 8, no. 2 2018 christophe bisson, maria mercedes pp. 43-61 and tang tong an analysis of ip management strategies of ict companies based on patent filings shabib-ahmed shaikh pp. 62-71 and tarun kumar singhal kalle nuortimo pp. 6-22 business intelligence for social media interaction in the travel industry in indonesia michael yulianto, abba suganda girsang pp. 72-79 and reinert yosua rumagit social business intelligence: review and research directions helena giotia, stavros t. ponisb* and nikolaos panayiotoub a hellenic open university, greece b school of mechanical engineering, section of industrial management and operations research, national technical university athens, greece corresponding author (*): staponis@central.ntua.gr received 14 june 2018 accepted 20 august 2018 abstract social business intelligence (sbi) is a rather novel discipline, emerged in the academic and business literature as a result of the convergence of two distinct research domains: business intelligence (bi) and social media. traditional bi scientists and practitioners, after an inevitable initial shock, are currently discovering and acknowledge the potential of user generated content (ugd) published in social media as an invaluable and inexhaustible source of information capable of supporting a wide range of business activities. the confluence of these two emerging domains is already producing new added value organizational processes and enhanced business capabilities utilized by companies all over the world to effectively harness social media data and analyze them in order to produce added value information such as customer profiles and demographics, search habits, and social behaviors. currently the sbi domain is largely uncharted, characterized by controversial definitions of terms and concepts, fragmented and isolated research efforts, obstacles created by proprietary data, systems and technologies that are not mature yet. this paper aspires to be one of the few -to our knowledge contemporary efforts to explore the sbi scientific field, clarify definitions and concepts, structure the documented research efforts in the area and finally formulate an agenda of future research based on the identification of current research shortcomings and limitations. keywords βig data, business intelligence, review, social business intelligence, social media 1. introduction in the last decade, business intelligence (bi) has proved, beyond any doubt, that it is a rapidly expanding domain in both research and business terms with the number of bi related scientific publications and organizations embracing bi methodologies, techniques, tools and platforms rapidly increasing year by year. this remarkable growth is directly connected with the abundance of customer/user data as a result of increased bandwidth, technological advancements in information systems and mobile applications and the explosion of user generated content mostly materialized by social media and other web 2.0 platforms. nowadays, social media and bi are converging faster than ever before. the confluence of these two emerging domains is already producing new added value organizational processes and enhanced business capabilities utilized by companies all over the world to effectively harness social media data and analyze them in order to produce added value information such as customer profiles and demographics, search habits, and social behaviors. this point of convergence is exactly the scientific area where this paper sets its focus and research efforts, i.e. social business journal of intelligence studies in business vol. 8, no. 2 (2018) pp. 23-42 open access: freely available at: https://ojs.hh.se/ 24 intelligence (sbi), a very new concept trying to capture this transformation of bi systems in the era of big data and amidst the social media revolution. this paper constitutes the third -to our knowledgeeffort to explore the sbi scientific field, clarify definitions and concepts, structure the documented research efforts in the area and finally formulate an agenda of future research based on the identification of current research shortcomings and limitations. in doing so, this paper follows a structured literature review approach utilizing data from one of the most established academic databases in the world, i.e. elsevier’s scopus, and imposing a ‘search and filter’ process based on a carefully selected set of inclusion and exclusion criteria described in detail in the next section. the collected papers were studied thoroughly with the objective to initially eliminate duplicates and critically exclude papers dealing with sbi superficially, fragmentally or not at all. at the end of the literature scrutiny process, 83 papers were selected for further in-depth, full-text examination with the objective to provide the reader with an overview of the main themes and trends covered by the relevant sbi literature. the review process imposed on the 83 papers included in the final review sample produced several interesting findings regarding the current structure of the domain and the necessary prioritization of the research activities for the future. the remainder of this paper is structured as follows. the next section provides a brief theoretical background of the two domains under study, i.e. bi and social media. it aims to provide the necessary information for understanding the importance of big data for bi and the potential impact and transformative nature that social media have on existing bi research and practice with a special focus on user generated content (ugc) and trends related to specific social media platforms. in section 3, the methodological approach to the review and the results of the selection process are presented, followed by the review of the selected papers and the synthesis and taxonomization of the identified research efforts in section 4. finally, section 5 attempts a critical discussion of the review findings in section 4 and concludes with a proposed sbi domain research taxonomy and a suggested list of priorities and directions for future research. 2. background business intelligence (bi) is an “umbrella” term including a wide range of processes, applications and technologies through which various data sources can be gathered, stored, accessed, and analysed in order to gain meaningful information crucial for decisionmaking (olszak, 2016). the term, although growing in popularity recently, was first introduced more than seven decades ago to describe “an intelligence system utilising dataprocessing machines for auto-abstracting, autoencoding and profiling of action points in an organisation” (luhn, 1958). however, only recently it turned to a prevailing field for academics and practitioners and a leading commercial concern for most business organisations. according to chen et al. (2012), there are several reasons explaining this incremented popularity. on the one hand, there is a great opportunity from the rapid expansion of readily available web data sources and on the other, bi tools are becoming more sophisticated, easier to use and find applications in many business processes. meanwhile, intensive competition and global economic pressures set the success barrier too high, leading companies to a continuous fight for improvement, better quality of service (qos) and more productive operations. chaudhuri et al. (2011) underline the declining cost of data storage and acquisition as an additional reason for the extensive proliferation of bi systems. the same applies to hardware, which is becoming more technologically advanced and less expensive, allowing for more powerful architecture of data warehouses. the implementation of bi provides modern organisations, even smes (ponis et al., 2013), with the ability to achieve timely and quality decision-making, which constitutes a crucial prerequisite to build a stable competitive advantage. upon the effective aggregation of “intelligent” data regarding the internal and external business environment, executives are able to take proactive actions preparing their firms for future economic trends and conditions. according to ranjan (2009), bi is like a “crystal ball” in the hands of managers, revealing the best course of action depending on five major parameters: the company’s position in relation to its rivals; the overall strengths and weaknesses of the company; current and future market demographic and economic trends; social, political and regulatory environment; competitions’ 25 decisions and strategy and finally, customer preferences and purchasing patterns. beyond any shadow of doubt, the business landscape in the era of a fast paced and intensively competitive environment is dominated by the struggle to proactively respond to changes, satisfy the increasingly demanding customer needs and timely decision making on the best courses to action. bi and sophisticated analytics provide contemporary enterprises with the tools, methods and corporate mentality required to survive the hard business arena and maintain profitable relationships with the whole value chain surrounding their activities. the concept of participation, on which web 2.0 is based, has also great economic implications and opens up significant new potentials for enterprises (tziralis et al., 2009). in this very demanding and fiercely competitive environment, businesses have found a powerful ally in the face of social media applications and their fast-paced advancement and prevalence in the business and internet ecosystem. social media are online platforms through which users can communicate, share content and connect with each other. since their first appearance in the early 2000s, social media are constantly increasing in numbers, types and popularity. according to the academic literature, social media constitute a reasonable aftereffect of web 2.0, an argument that is summarised in kaplan and haenlein's (2010) definition: “social media is a group of internet-based applications that build on the ideological and technological foundations of web 2.0, which allows the creation and exchange of user-generated content”. however, what clearly distinguishes social media from other web 2.0 applications is the element of social connectivity on a personal level. within such sites, users pre-select their connections and own privacy control over the content they share (heijnen et al., 2013). when it comes to classification, there is no systematic way in which social media can be categorised. indicatively, diamantopoulou et al. (2010), propose a rational social media segmentation based on their major activity (i.e. communication, collaboration, share, rate and opinions’ expression) and purpose of use (leisure, work/business, democratic engagement). kaplan and haenlein (2010), however, suggest a matrix categorisation consisting of two social media dimensions, namely; self-presentation/ self-disclosure and social presence/media richness. the outburst of social media and their increasing popularity has led to an era of fast and immense internet data generation. consequently, the notion of social media analytics and its utilisation in bi systems has become a dominant trend in the entrepreneurial world, due to its huge potential in added-value applications (fan et al., 2015). in the next sections an attempt to structure the current research domain on the intersection of these two disciplines is made, following a systematic literature review approach. 3. research method according to hart (1998) a literature review is an objective, thorough summary and critical analysis of the relevant available research literature on the topic being studied. a review of prior and relative literature of a scientific area is an essential feature of academic progress and theory development, since it creates a solid foundation for understanding the current research status quo, while at the same time highlights underdeveloped or unexplored areas as candidates for future research. the literature review should contain processed information from all available sources, be unbiased to the highest possible extent, be free from jargon terminology and supported by a well-defined and consistent search and selection strategy (hart, 1998). this review examines literature contributions directly addressing sbi, i.e. the use of social media for bi purposes between 2006 and 2016. expanding the search before 2006 was deemed unproductive since the advent of social media in its current form is connected with the launch of facebook in 2004. previous efforts, like friendster and myspace, are not taken into consideration in this study, since they never managed to establish their social media presence and were either defunct (friendster) or forced to pivot their offerings (myspace). in this paper, we utilize a systematic literature review (slr) approach, which is a trustworthy, rigorous and auditable methodology for evaluating and interpreting all available research relevant to a particular research question, topic, area or phenomenon of interest (keele, 2007). the selection process was straightforward. initially, it was decided that the scopus academic database was adequate in order to provide this study with a representative list of relevant contributions, within the context of this paper. second, the 26 list of keywords was kept to a representative minimum by using the strings: “social business intelligence”, “social media and business intelligence”. the keywords were applied to the title, abstract and keywords sections of scrutinized publications included in the scopus database. the search includes publications in scientific journals, peerreviewed conference proceedings and book chapters. the research focus of our approach led us to the decision to eliminate books and editorial reviews. we decided not to exclude publications in peer-reviewed conference proceedings, since sbi is a rather new and emerging scientific area and will be populated by more than a few first stage publications in the conference dissemination channel. other types of publications such as notes and short surveys, are also excluded from the study. the keyword search described above returned 131 papers published from 2006 to 2016, as shown in table 1 and table 2 below. these initial results show that contributions using sbi as a term are scarce (14) implying that, indeed, sbi is a scientific area in its infancy. the collected papers were studied thoroughly with the objective to eliminate duplicates and then critically exclude the ones dealing with sbi issue superficially, fragmentally or not at all, in the case of the publications included in table 3. contributions that were included in the initial sample fulfilling the keyword string criteria but not directly dealing with the study subject were excluded from the database. finally, a sum of 83 relevant papers was selected for in-depth, full-text examination with the objective to provide the reader with an overview of the main themes and trends covered by the relevant sbi literature. table 1 search results for keyword string ‘social business intelligence’. table 2 search results for keyword string “social media and business intelligence”. year of publication source type 20 06 20 07 20 08 20 09 20 10 20 11 20 12 20 13 20 14 20 15 20 16 journal paper 1 1 2 5 6 8 12 16 conference paper 1 2 5 8 8 11 13 11 book chapter 2 3 1 1 sum = 117 papers 2 3 7 15 17 20 25 28 4. literature review 4.1 descriptive analysis as stated in the previous section, the main body of literature identified comprises 83 papers. while 2006 is the first year of publication where contributions were sought, the first published papers found were from the year 2010, further validating the decision not to extend the study period prior to 2006. the allocation of the publications within the researched period (2006-2016) is presented in figure 1. the allocation of papers in the three source types, i.e. journal papers, papers in conference proceedings and book chapters, is presented in figure 2. it is noted that contrary to what was expected there seems to be an even distribution between journal papers (44.6%) and conference year of publication source type 20 06 20 07 20 08 20 09 20 10 20 11 20 12 20 13 20 14 20 15 20 16 journal paper 1 conference paper 2 1 1 4 2 book chapter 1 2 sum = 14 papers 2 1 2 7 2 27 proceedings (44.6%), with book chapters corresponding to the smallest share (10.8%) of the work published on sbi between 2006 and 2016. a closer look in the data set shows that a significant part of the publications (14 documents or 16.9%) originate from the institute of electrical and electronics engineer (ieee) association (10 conference papers, 3 journal papers and 1 book chapter). this is no surprise, since ieee is a leading organization with a wide scientific area coverage including the technical background and information systems infrastructure necessary for sbi to be facilitated in companies and other organizations. in the same direction, association for computing machinery (acm) leads the item count when it comes to publications in peer reviewed scientific journals, with its cross-discipline journal entitled “acm transactions on management information systems” leading the relative list with four publications. in table 3, the number of papers per journal in the dataset is presented. the journals are presented in four categories depending on their main focus and thematic interest, i.e. information systems in management, information and computer science, social networks and miscellaneous. it is interesting to note the absence of any special issues dedicated to sbi and the scarcity of papers’ appearance in more specific domains, such as social networks and journals. 4.2 thematic analysis sbi, as evidenced from the descriptive statistics in the previous section, is a relatively new area, with the first publications referring explicitly to the term dating back to 2010. for those critically standing before the rapid emergence of the subject, sbi is nothing but the next logical step of bi evolution, providing enhanced collaborative capability in the decision-making process of an organization by adding the analytical capability pertaining to social media. for others, sbi is a bi paradigm revolution, especially when combined with the emergence of big data and the ever increasing variety, volume and velocity with which they arrive in front of business systems’ queues for further processing in order to effectively support decision making. needless to say that this duality of perspectives, coupled with the initial triggering of the term from the it business area, has led to a plurality of terms describing sbi, still serving different business needs or marketing of it products, thus creating confusion and reduced clarity on its definition. on the academic front, dinter & lorenz (2012), who according to our knowledge provide the single academic reference attempting to develop a framework of research in the sbi area, along the same lines as this paper, argue that lack of definition clarity for sbi might lie in the ongoing use of diverse related terms, coming mostly from industry literature freely accessible on the web. zeng et al. (2010) provide one of the few available definitions of the term as a set of tools and techniques that “derive actionable information from social media in context rich application settings, in order to develop corresponding decision-making frameworks and provide architectural designs and solution frameworks for existing and new business applications”. in this paper, the term sbi is explored in literature and used as the term of focus for the following study. in that direction, thematic analysis of available literature in the sbi research field is organized into the four following distinct sections: the use of social media data in bi systems, sbi tools and techniques, bi applications in prevalent social media and finally, industry-specific sbi applications. figure 2 distribution of publications per year across the study period. figure 1 allocation of publications in source types. table 3 number of papers per scientific peer-reviewed journal. journal title # of publications main thematic focus acm transactions on management information systems 4 information systems in management decision support systems 1 journal of enterprise information management 1 journal of the university of pardubice 1 management decision 1 production and operations management 1 technology analysis & strategic management 1 journal of decision systems 1 journal of destination marketing & management 1 international journal of services technology and management 1 intelligent systems in accounting, finance and management 1 procedia manufacturing 1 15 information systems 1 information & computer science international journal of computer technology and applications 1 information systems frontiers 1 frontiers in artificial intelligence and applications 1 ieee computer graphics and applications 1 ieee transactions on knowledge and data engineering 1 international journal of engineering & technology 1 ieee transactions on visualization and computer graphics 1 ksii transactions on internet and information systems 1 knowledge and information systems 1 scandinavian journal of information systems 1 knowledge-based systems 1 mobile networks and applications 1 sensors 1 information visualization 1 journal of computer information systems 1 procedia computer science 1 17 journal of internet social networking & virtual communities 1 social networks international journal of sociotechnology and knowledge development 1 social network analysis and mining 1 3 the decision sciences journal of innovative education 1 miscellaneous the scientific world journal 1 2 4.2.1 the use of social media data in bi systems meredith and o’donnell (2010; 2011) and sathyanarayana et al. (2012) were among the first to detect the value of social networks in bi systems, beyond sales and marketing applications. they developed a framework to classify the social media functions that foster the web 2.0 core concepts of user collaboration and contribution, and used it in order to exploit how it can “create more effective and ‘active’ bi applications”. shroff et al. (2011) introduced 29 the term “enterprise information fusion” to describe an emerging bi need across multiple industries, such as manufacturing, insurance and retail. the term includes the publicly available data, derived from social media, that can potentially be of immense business value for the enterprise ecosystem. on the same account, ruhi (2014) attempted to outline the undeniable value of social media analytics, incorporated in a bi perspective. as he explains, the advantage of social media analytics in the business environment is twofold, as it can help organisations “formulate and implement measurement techniques for deriving insights from social media interactions” and, alongside “evaluate the success of their own social media initiatives”. wongthongtham and abu-salin (2015) emphasise the need of evaluation of traditional bi warehouses, which are more focused on handling structured internal enterprise data, in order to support the tremendous volume of valuable, yet unstructured, social media information, such as customer reviews and brand-related posts. finally, ram et al. (2016) conducted a survey in it consultants and managers in various industry sectors of china, in order to prove the paradigm shift that social media have dictated in business strategies globally. with a semi-structured questionnaire, they managed to identify the critical issues in creating value through big data and social media analytics for bi systems. alongside the prevalence of social media in bi applications, several traditional business terms were redefined in academic literature in order to incorporate the new social trends, i.e. social customer relationship management (scrm), digital marketing (luo et al., 2015), voice of customer (voc) and voice of market (vom). bachmann and kantorova (2016) separate the original concept of crm “based rather on face-to-face and offline communication in the physical environment”, from social crm which is mainly conducted “through social networks and relationships within online communities”. beverungen et al. (2014) argue that the global penetration of social networks constitutes a fertile ground for novel crm strategies (rosemann et al., 2012). after introducing the social crm emerging field of research, the authors propose a framework to exploit facebook data in crm strategies and testify its applicability by building management reports for the retail industry. berlanga et al. (2014, 2016) use advances in opinion mining techniques and sentiment analysis to describe the new opportunities arising in the vom and voc concepts in bi applications. as they explain, organisations can take advantage of the wealth of sentiment data in massive social media (e.g., social networks, product review blogs, forums) to ‘listen’ to their customers’ needs and extract valuable business insights. in the same context, lotfy et al. (2016) propose a framework to integrate customer opinion streams extracted from social media, with preexisting corporate data, so as to constitute an integrated data warehouse. according to them, such a multidimensional data base “can perform advanced analytical tasks and lead to better insights that would not have been possible to gain without this integration”. chan et al. (2015) deliberately examine the challenges faced by contemporary bi systems, associated with user-generated content (ugc) derived from social media communication channels. according to them, the available social data is not fully exploited for three main reasons: its unstructured format, its subjective nature and tremendous volume. on that account, they propose a systematic approach to social media data analysis, which counterbalances the aforementioned challenges and captures the real value of online social content for bi applications. likewise, tayouri (2015) also draws attention to risks associated with social media in the corporate environment, highlighting cyber security issues, such as fraud through social media activities, leakage of sensitive business information and damages to a firm’s reputation. hence, he suggests a consistent cyber security training framework supported by social media site monitoring tools, able to assist companies in building a robust sbi strategy by keeping track of correlated malicious activities and threats. 4.2.2 sbi tools and techniques sbi tools and techniques is a predominant research field in academic literature. data visualization tools; online analytical processing (olap); ugc and natural language processing (nlp) techniques; sentiment and opinion mining in the social media context; and user profiling and personalized marketing tools are some of the core thematic areas associated with contemporary sbi practices. 4.3 visual analytics zimmerman et al. (2015), zimmerman & vatrapu (2015) and sigman et al., (2016) 30 highlight the importance of visual analytics (va) toolkits in assisting the interpretation of the unstructured data derived from social media into meaningful business or educational insights. their research project provides a series of visual dashboards able to comprehensively project the analytics related to a brand and its marketing campaigns outcomes. the technical architecture and the specific characteristics of this set of dashboards is further explained and defined in ‘social newsroom’, a prototype va tool for sbi, which was developed to “provide practitioners with user interfaces that can assist them in interpreting social media data and taking decisive actions” (zimmerman et al., 2015). lu et al. (2014) proposed a va toolkit able to handle “noisy, unstructured data and use it for trend analysis and prediction” in sales forecasting and advertisement analysis. their data visualization tool was successfully applied in twitter users, in order to predict movie revenue and ratings. moreover, pu et al. (2016) focused on the valuable geo-location data available in social media applications by introducing the ‘social check-in fingerprinting (sci-fin)’ tool which offers organisations “the opportunity to capture and analyze users’ spatial and temporal behaviors” through social network check-in data. respectively, wen et al. (2016) suggested an alternative va system, called ‘socialradius’ that can interactively explore spatio-temporal features and check-in activities, in a variety of applications, ranging from bi applications to transportation and information recommendation systems. meanwhile, kucher et al. (2014; 2016) presented a va tool for social media textual data that “can be used to investigate stance phenomena and to refine the so-called stance markers collection” with respect to sentiment and certainty. lastly, wu et al. (2014) introduced ‘opinionflow’ a va system detecting opinion propagation patterns and providing gleaned insights in government and bi applications. 4.4 olap techniques, ugc and nlp tools gallinucci et al. (2013; 2015) defined sbi as the “discipline of combining corporate data with user-generated content (ugc) to let decisionmakers improve their business, based on the trends perceived from the environment”. in order to enable contextual topics extraction and aggregation at different levels, they introduced ‘meta-stars’, a model based on ugc and real-time olap techniques. golfarelli (2014) demonstrated an empirical application of a prototype demo of the model in real-world marketing campaigns, in order to prove its technical robustness and methodology. he furthermore presented the available olap solutions, for ugc analysis, that enable decision-makers analyze their business environment based on trends perceived from social media. lin and goh (2011) proposed a least-square (ls) algorithm to model sales performance and business value derived from social network data, by emphasizing the role of social marketer-generated content in influencing ugc sentiment and attitude. the authors actually suggest that there is a positive relationship between “the richness of information embedded in both user-and marketer-generated content and firm sales performance”. finally, ferrara et al. (2014) provide a classification of the available ugc extraction tools in two main categories, namely the enterprise and social web data extraction (wde) tools, through a structured literature review. in a natural language processing (nlp) context, dey et al. (2011) discuss a series of methodologies that can be followed in order to “obtain competitive intelligence from different types of web resources, including social media, using a wide array of text mining techniques”. as they explain, social media do not only provide valuable competition insights but also constitute an open forum where customers express their opinions about different brands’ offerings. sleem-amer et al. (2012) introduce ‘doxa’, a semantic search engine for the french language, with nlp capabilities and social bi application. centering their work on two separate business cases, the authors explain how ‘doxa’ can be applied to discover “hidden patterns in social media data, using rich linguistic resources”. lastly, bjurstrom and plachkinova (2015) propose a controlled natural language that does not require advanced technical skills and can be directly compiled into executable code, for automated social media data extraction. 4.5 sentiment analysis and opinion mining sentiment analysis and opinion mining techniques are two research areas that attracted the academic interest from the early stages of introduction of social media as a powerful leverage for bi systems. upon the rise of web 2.0 and the increasing popularity of social network sites (sns), castellanos et al. 31 (2011), in collaboration with hp and its bi software solutions, introduced ‘lci’, a prototype sentiment analysis platform able to extract sentiment from textual data in realtime. the platform’s interface consisted of multiple chart and visualization options that dynamically changed as soon as new data was ingested, exploiting state-of-the art sentiment analysis algorithms. a year later, yang and shih (2012) proposed a rule-based sentiment analysis (r-sa) technique “to automatically discover interesting and effective rules capable of extracting product features or opinion sentences for a specific product feature”. that way, they offered a means of effective and realtime analysis of the tremendous volume of data, hidden in social media applications, regarding customer reviews about business offerings. in the same direction, liu and yang (2012) developed a buyer behavior prediction technique, using dynamic social network analysis and behavior pattern mining algorithms on e-commerce purchases and viral marketing applications. qazi et al. (2014) focused on the suggestive type of customer reviews, found on online review forums, by combining machine learning techniques and sentiment analysis. their findings suggested that sentiment analysis “achieves maximum performance when employing additional preprocessing in the form of negation handling and target masking, combined with sentiment lexicons”. later, colombo et al. (2015) compared two novel methodologies for sentiment analysis with cross-industry application, by using secondary unstructured textual data from twitter, yelp and cars.com, while kim and jeong (2015) applied their opinion mining methodology in online reviews about the oldest instant noodle snack in korea. finally, nithya and maheswari (2016) implemented a scoring system technique to identify the most promising features of a product offering, consisted of two rating attributes, namely the ‘sentiment score’ and the ‘feature score’. their technique provides managers with valuable insights regarding future demand, brand promotion and product penetration. 4.6 user profiling and personalized marketing tools sbi tools and techniques for customer-centric marketing applications constitute another popular research field in academic circles. personalized advertising messages, based on intelligent user profiling, is top priority for the contemporary business world, striving to survive in a highly competitive and globalized environment. ranjan et al. (2014), using an association rules mining (arm) algorithm, exploit social media data to locate tie-strength networks and active friends, in order to be used as a basis for targeted and relevant advertising campaigns. yang and chen (2014) introduce a novel profile expansion mechanism which enhances the effectiveness of personalized recommendation systems in social bookmarking sites to assist companies in developing “effective service offerings that are better tailored to their customers’ needs” (gronroos, 2008). in a more targeted approach about accurate profiling of social media users, liu et al. (2014; 2015) develop ‘hydra’, a solution framework to identify linkages across multiple social networks and discover correlations between different user profiles. the authors argue that ‘hydra’ can be a profitable addition to existing bi solutions, as it was successfully implemented in a tenmillion data base and correctly identified real user linkage, across seven dominant social network platforms, outperforming “existing state-of-the art algorithms by at least 20% under different settings”. finally, yang and chang (2015) highlight the knowledge gained from social tagging system (also known as folksonomy) as an invaluable asset for enhancement and upgrade of existing bi applications. on that account they employ delicious, an established social bookmarking service, to construct “a statistical-based thesaurus, which is then applied to support personalized document clustering”. their empirical study indicated that such services improve the overall quality of sbi systems, and promote their efficiency in handling targeted marketing applications. 4.6.1 bi applications in prevalent social media a fairly important percentage of existing academic literature on bi focuses on specific social media use-cases and their potential applicability on corresponding systems. tools and techniques able to extract value added data from popular social network platforms, such as twitter and facebook blogs or websites containing customer review content, are among the most preferable research subjects. 4.7 twitter rui and whinston (2011) argue that twitter hides a huge business potential as a base 32 platform for bi applications, given its valuable structural information and the tremendous volume of data flows that are produced by its users in real-time. within this context, they introduced a twitter-based bi system for revenue forecasting, which was successfully implemented in movie box office revenue prediction, achieving remarkable results. seebach et al. (2012) focused on the corporate reputation management area and how firms can use social media intelligence in order to handle reputation threats timely and effectively. by using sentiment and manual content analysis techniques on twitter, regarding posts about a large american bank, they showed “how social media might impact corporate reputation and what organizations can do to prepare themselves”. lee et al. (2013) used twitter as a real-time event detection system for crisis management and bi applications. their proposed framework is able to detect emerging events from social network streams and “accurately extract ontology entities associated with specific events for decision supporting applications”. o’leary (2015) highlights ‘twitter mining’ as an invaluable asset for the majority of fortune 100 companies. in his paper he reviews some of the most prevailing bi applications of twitter data extraction on a prediction, discovery and informative basis. in the same year, arora et al. (2015) applied sentiment analysis tools in order to investigate whether tweets provide a sufficient ground to gain useful insights on competitive brands, using the smart-phone industry. their results showed that although twitter data is rich regarding costumer sentiments, the exposure of different brands varies significantly making their comparison a rather ambiguous task. in a similar approach, chilhare et al (2016) designed a marketingdriven competition analysis tool to “recognize specific areas in which businesses are leading and lagging”. in their paper, they propose a methodology combining nlp techniques and sentiment benchmarks, in order to analyze and structure multilingual twitter data for competitive fmcg companies into meaningful business insights. sijtsma et al. (2016) introduced ‘tweet-viz’, an interactive tool to assist companies in actionable information extraction from unstructured textual twitter data. in their paper, they prove that twitter can provide bi systems, customer preferences, demographics and location data. completing the twitter bi academic cycle, piccialli and jung (2016) summarize the businessgenerated tweet content in three categories; namely informative, advertising or a hybrid of the two. according to their estimations, the hybrid approach increases customer engagement and promotes ugc activity with brand related content. 4.8 facebook according to scholars, facebook, apart from being the most dominant social network on a global basis, contains such a high volume of ugc data that it could also turn to an alternative customer relationship management (crm) platform, replacing traditional in-house corporate software. bygstad and presthus (2013), conducting a case study on two scandinavian airliners' pages on facebook during the ash crisis in april 2010, showed that crm through the platform proved more effective in terms of dynamic interaction and customer engagement. milolidakis et al. (2014), aiming to provide a generic framework for social media data extraction and transformation into meaningful business insights, used facebook fan pages of three greek communication service providers as their case study. according to their findings, facebook includes data capturing of all the standard bi indicators, and moreover provides additional user sentiment information through artifacts features, such as the “like” button, that can turn to intelligent business statistics through visual excavation tools. 4.9 blogs and micro-blogs banerjee and agarwal (2012) used a natureinspired theory to model collective user behavior from blog-originated data in order to explore its application on bi systems. based on swarm intelligence, “where the goal is to accurately model and predict the future behavior of a large population after observing their interactions during a training phase”, they concluded in promising results about blog value in trend prediction applications. meanwhile, kulkarni et al. (2013) draw attention on the importance of social media brand propagation enablers. on that basis, they study the degree of customer engagement through blog contents and the corresponding analytics for bi systems. obradović et al. (2013), in the context of the ‘social media miner’ project combined textual analysis methods with a blog processing technique to “aggregate blog articles of a specific domain from multiple search services, analyze the social 33 authorities of articles and blogs and monitor the attention they receive over time”, in order to provide a highly automated bi tool. lastly, jingjing et al. (2013), using as a reference the chinese micro-blogging platform ‘sina weibo’, conduct a social influence analysis to discover “information retrieval, recommendations and businesses intelligence opportunities”. according to their findings, their proposed framework can overcome difficulties related to volume and complexity found on microblogging platforms and can find numerous applications in bi systems. 4.10 amazon.com social media, based on principles and technologies deriving from the user-centered web 2.0, constitute by definition an open platform where users can express their sentiments, share their knowledge and build a social environment. within this context, consumers exchange their opinions towards different brands, share their experiences through word-of-mouth (wom) and provide their own reviews. the importance of social activity related to brand offerings and the added-value of publicly available customer reviews has naturally attracted the interest of the business and academic world. zhang and chen (2012) studied the business impact of social media and ugc in sales and marketing, by applying text mining techniques and a set of innovative metrics focusing on customer reviews on two popular e-commerce websites, namely bn.com (barnes&noble) and amazon.com. according to their findings, usergenerated reviews have serious effects on product sales and should be consistently processed by bi systems, through carefully selected measures. similarly, ngo-ye and sinha (2012) argue that customer-generated reviews in e-marketplaces “are playing an increasingly important role in disseminating information, facilitating trust, and promoting commerce”. on that account, they developed an amazon.com based tool to automatically identify the most important reviews and provide meaningful customer feedback. finally, zhang et al. (2013) in an attempt to further explain how wom is affecting product sales, they combined network analysis with textual sentiment mining techniques to build product-comparison networks consisted of customer reviews. their empirical study on amazon.com suggests that it is imperative for firms to understand and manipulate the wom process taking place in social media, in order to survive in the increasingly competitive online landscape. 4.10.1 industry-specific sbi applications the integration of social media analytics in bi systems is a need soon realized both by organisations and academia. sbi tools and techniques are not limited in a specific area but have rather a cross-industry application, a fact that is clearly reflected in the existing literature. heijnen et al. (2013) argue that the potential of social medial data is invaluable for multiple facets of bi systems, yet it is “largely unused by companies, and it remains unclear what data can be useful for which industry sectors”. their findings indicate that key performance indicators typically differ between industry sectors and therefore sbi metrics should accordingly adapt to their corresponding needs. the need to approach the matter from industry-specific perspectives led to a series of academic publications focusing on distinct sectors: education, automotive, pharmaceutical, cosmetics, tourism, fashion, government and politics. 4.11 education moedeen and jeerooburkhan (2016) focus on the higher education sector to explore how “social media strategies can be aligned with business strategies to help universities gain a competitive edge”. using the facebook page of a university as their case study, they argue that higher education organizations pay attention solely to advertising and reputation management aspects, while neglecting other business objectives that could be met through a holistic sbi application. 4.12 government and politics bendler et al. (2014) associate static environmental characteristics with dynamic user-generated content from social media to explain and predict criminal activity in metropolitan areas. by combining traditional statistics, such as zero-inflated poisson regression and geographically weighted regression with social media data, they provide a framework that enhances the accuracy of criminal activity forecasting. meanwhile, chung et al. (2014) developed an approach to pinpoint opinion leaders in social networking sites that could be approached by policy makers to collaborate and “bring about change in the communities and the general public welfare”. in a more generic approach, golfarelli 34 (2014; 2015) studies sbi options in politics. according to him, processing of user-generated content through a robust sbi system could prove invaluable for political entities in order to align their governmental decisions with environmental trends and public opinion. finally, beigi et al. (2016) explore crisis and disaster management through sentiment analysis and social media visual analytics. according to them, individual posts in social media about natural disasters and emergencies can be used as inputs in governmental sbi systems “to improve situational awareness and crisis management (…) while assisting in locating people who are in specific need during emergency situations”. 4.13 automotive abrahams et al. (2012) introduce a decision support technique for vehicle quality management designed to identify and prioritise automotive defects, deriving from reviews in vehicle enthusiasts’ online forums. they suggest that conventional sentiment analysis does not suffice to efficiently detect customer complaints and therefore, bi systems should incorporate advanced text mining algorithms specifically designed for social media applications. baur et al. (2015) also focus on the vehicle industry by exploring chinese auto forums as a new proactive means of market research. according to them, although the increasing popularity of social media offers a fertile ground for novel marketing techniques, there is a number of arising challenges to be confronted, namely the tremendous volume of posts, their unstructured format and the wide range of user languages requiring complex natural language processing techniques. on that basis, they propose ‘marketminer’ a novel framework for “search, integration, and analysis of crosslanguage user-generated content”, specifically designed for the competitive automotive sector. one year later, baur (2016) examines alternative applications for ‘marketminer’ in public administrative bodies and commercial firms. his results indicate that the tool can significantly improve the processing of multisource and multi-language social media generated content and apply to cross-industry sbi systems. 4.14 pharmaceutical according to basset et al. (2012) the social media sphere is a challenging environment for the pharmaceutical industry, as it is associated with a number of ethical and legal issues imposed by governments globally. however, sbi systems can prove valuable to such an antagonistic sector mainly for marketing, customer relationship management and competition monitoring applications. bell and shirzad (2013a; 2013b) propose a social media data extraction model to assist pharmaceutical companies to effectively position themselves in new marketplaces. according to them, social media networks offer a channel of communication for business-to-business environments and can enable companies to connect with all the actors of their value chain (i.e. customers, partners and even competitors) on a real-time, global basis. finally, he et al. (2016) using the three biggest drugstore chains in us as their case-study, suggest a model for competitive strategy formulation by applying quantitative analysis, sentiment analysis and text-mining techniques in social media ugc content. their findings indicate that such tools can prove invaluable if adopted by existing bi systems. 4.15 tourism online social networks, and web 2.0 applications in general, are rapidly becoming a significant marketing channel for the tourist industry which is challenged by new and emerging business models utilizing social media and other crowd sourcing and shared economy applications, such as airbnb. in this new and turbulent environment, social bi can be a source of critical competitive advantage in a very demanding and customer-service intensive industry such as tourism. in that direction, palacios-marqués et al. (2015) study the effect of online social networks on firm performance and explore ways of adding value to established market competences. the authors conduct a large survey in one of the world’s largest tourist destination, spain, with the participation of top managers from 197 fourand five-star hospitality firms. their results show that social bi has a significant positive relationship with firm performance by enhancing market intelligence and knowledge management competences, thus leading to the acquisition of a significant advantage over the competition. remaining in the same geographic territory but penetrating one layer deeper in the social bi area, marine-roig and clave (2015) study the usefulness and applicability of big data analytics for the industry and specifically for a smart city tourist destination, barcelona. the authors 35 study the online image of the city by analyzing more than a hundred thousand travel blogs and online travel reviews by people who have visited the destination in the last decade. by extracting bi through these large volumes of user generated content, the authors provide an efficient decision support tool for industry executives and city officials to develop and evaluate competition, marketing, branding and positioning strategies and policies, which will enhance the city’s image as a smart tourist destination. 4.16 fashion and luxury the fashion and luxury products industry has for many years resisted the adoption of the ecommerce channel, since they associated anything digital with malpractices such as discounting, counterfeiting and brand dilution. this is not the case anymore and currently emblematic brands, such as ferragamo, have entered the e-market arena, which according to a report from mckinsey and altagamma (2015) has reached €14 billion in 2014, a 50% increase from 2013. this change has created the need for managing user-generated content in order to better understand customer profiles, identify preferences and determine trends, with the latter playing a crucial role for product development of companies in the fashion industry. in that direction, petychakis et al. (2016) turn their research focus on a very important aspect of social media analysis, which is the identification of opinion makers within the social media ecosystem, the monitoring of their behavior and the extraction of targeted campaigns utilizing their media presence. the authors present a platform providing marketers and product designers with data analytic services for influencer identification and trend analysis and evaluate it in a single case from the fashion industry. fourati-jamoussi (2015) explores the concept of e-reputation by applying bi practices to analyze the social media presence of four companies from the organic cosmetics industry. the author attempts to compare the reputation of the participating brands by using different monitoring tools, conducts user profiling for each brand and finally proposes recommendations for enhancing marketing strategies. 5. conclusions in this paper 83 papers, which were published in the period from 2006 to 2016 dealing with sbi concept, management, tools and applications, were collected. the review of these papers and the analysis of their content, presented in the previous chapter, produced useful information, in order to synthesize a comprehensive research agenda for sbi including major directions and identified shortcomings that seem to shape the future of research in this area. the core focus of the research, as expected, seems to be the unearthing of the currently unused, to its full potential, value of sbi and put it to good use for the benefit of businesses and organizations around the globe. in that direction, academic literature in the novel research field of sbi is essentially developed around three main pillars of research orientation. the first pillar attempts to provide answers to the question ‘what is sbi and how can it help a business or organization”, putting sbi’s business validation and real-life applications in the epicenter of research, thus given the title ‘business descriptive’. papers in this pillar are attempting to highlight the prevalent acceptance of social media as a source of business value and the parallel expanded usage of bi systems through social media data for multiple operations within companies, in a variety of industry-specific applications. in doing so, they provide mostly definitions, methods, models and frameworks, which support a wide range of corporate activities, spanning but not limited to strategic decisionmaking functions, business processes’ optimization, operational efficiency improvement and revenue management. within this pillar, one can identify two discrete waves of publications that can be organized together based on their focus and objectives. the first identified wave of publications within the business descriptive pillar deals mostly with determining the current status quo of bi in contemporary organizations and provides means of expanding its reach through the exploitation of social media. the first step in this direction is the identification and validation of social media potential and functionalities to act as a consistent bi decision-making support tool through solid argumentation and empirical tools like surveying experts in interested business areas. at the same time, the second wave of publications attempts to deal with sbi by exploring the enhanced capabilities that it gives to traditional bi systems and how these can be rethought and restructured in order to be ready to absorb and process the abundance and large variety of data that social media 36 produce. what is interesting at this point is the determination of sbi usefulness and transformative impact on other established business functions such as marketing and customer relationship management (crm). the introduction of novel marketing and crm strategies such as social crm, vom and voc as a result of information harnessed by sbi practices is explored in depth by many publications and specific algorithmic sbi techniques and tools, e.g. opinion mining, sentiment mining, are mentioned as playing a critical role for business success and competitive advantage. finally, the main barriers/shortcomings identified in this pillar of literature are the following: probably the most important issue identified is that of data security and privacy. there are major concerns for all levels of data usage, i.e. data creators (users), data suppliers (e.g. facebook or telco companies) and businesses in need of the data. what makes the situation even more complicated is the fragmentation of legislation between continents and nations, which make compliance a cumbersome and sensitive task, especially in the case of companies operating at a global level. the second most important issue identified in this pillar of literature is data governance by businesses. in other words, the ability of companies to streamline their processes and systems in order to provide more accurate information, achieve increased visibility and in essence better analytics. there seems to be a consensus that much more is needed to be accomplished in this area. finally, the third prominent issue identified in this pillar is process governance. the huge impact of social media data on current established business processes and its transformative effect on every-day operations, coupled with the need for the use of more advanced analytical systems, creates the need for research on business process management and reevaluation of traditional processes and their efficient transformation. the second pillar attempts to reveal ‘under the hood’ knowledge and answer the question “how does sbi work”. it sets technical implementation in the epicenter of research, thus this pillar is given the title, ‘technical descriptive’. papers in this pillar provide mostly technical information on algorithms, techniques and tools that are used in order for sbi to process social media data and produce meaningful information to be used directly or passed for further processing by traditional bi systems. the prevalent techniques, which seem to dominate the research interest in this pillar are those dealing with three major issues of sbi at the technical level: user profiling, user (customer) voice translation into actionable information and data visualization. the main shortcomings identified in this pillar of literature are the following: there is an increased demand for new ai algorithms for the automation of the user generated content extraction and translation procedure. current algorithmic efforts in research are many. still their validation in actual commercial environments does not commensurate with the materialized research. the need for a switch towards an ai based, data-scientist agnostic sbi process is evident in the literature. user profiling and the underlying targeted marketing and personalized recommender systems are very important issues in the sbi literature especially for companies that are forced to enter the paid advertising arena by increased competition and the need to sustain profitability. although profiling models and algorithms present a rapid increase in numbers and variety of approaches there are still several unexplored areas in profiling that need intensified research and investments. data visualization has seen many advances in the last few years with the emergence of the dashboard logic in data presentation and display. although there is a fair number of social media tools already providing services like data collection, aggregation and analysis into key performance indicators, there is still a deficiency in visualizations, especially when it comes to standards and design principles, thus making the support from data scientists and supplementary systems mandatory. finally, the third trend attempts to answer the question “does sbi work in real life?” real 37 life cases of sbi applications in practice are the focus of research in this pillar, which thus is given the title “case descriptive”. two discrete waves of publications can be identified. the first focuses on industry-specific applications and describes how sbi can provide valuable services for businesses operating in these industries. in doing so, papers in this pillar explore successful applications of sbi in real business cases, highlighting the crossindustrial nature of sbi and its potential impact for a variety of industries and governmental organizations. specifically, they provide focus on the impact of sbi in traditional business models and processes and its operational fit in order to support industryparticular requirements. the second wave of publications includes papers focusing on specific social media use-cases, with twitter and facebook being the platforms most widely used as data providers and application test beds. tools and techniques able to extract value added data from popular social network platforms, blogs or websites containing customer review content, are among the most preferable research subjects. the main shortcomings identified in this pillar of literature are the following: utilizing sbi to support real-life cases is a cumbersome task demanding a holistic approach, including technological and organizational aspects, leading to a complex transition requiring high executive competences supported by a global strategy. this is not the case dealt within the publications studied in this pillar. empirical evidence provided is rather fragmented and cases seem isolated from the business ‘big picture’, while connection with ‘bottom line’ metrics is loose. there is a, to some point justifiable, strong focus of sbi research on social networking giants, like facebook and twitter. still, there is an abundance of social networking sites and other emerging social media business models like snapchat, vine and reddit for example, for which the possibility of more open data extraction and enhanced algorithmic testing could take place, that are currently not sufficiently explored. at this point, a research agenda can be formed including eight discrete research directions, each one dealing with the shortcomings identified in literature and discussed previously in this section. in table 4, a summary of the literature review’s main findings is presented. the three main pillars’ research offerings are shortly described and specific publications are assigned to each one of the pillars in accordance with their number in the reference list at the end of this assignment. the eight research directions comprising the future research agenda for sbi are categorized per pillar and presented in table 4. finally, it has to be noted that adoption of this paper’s findings should take into account the inherent limitations of this study, which are: the big difference between current and published capabilities of academia, especially coupled with the fast pace of the sbi scientific field. the author is certain that several research efforts providing innovative approaches and empirical use table 4 sbi future research directions. title (main research offerings) publications (by ref. number) first pillar business descriptive (definitions, methods, models & frameworks) rd1: data security & privacy rd2: data governance rd3: process governance [116], [201], [19 ], [20 ], [55], [163], [128], [129], [173], [166], [22], [190], [30], [158], [9], [169], [120 ]. second pillar technical descriptive (algorithms, techniques and tools) rd4: improvement / development of new ai algorithms sbi process automation rd5: user profiling rd6: data visualization [210 ], [211], [64], [211], [212], [65], [110], [52], [28], [179], [114], [204], [202], [118], [160], [206], [157], [103[, [113], [112], [205], [96], [101], [39], [25], [156], [139], [199], [103], [176], [92]. third pillar case descriptive (empirical evidence / industry focus & social media focus) rd7: holistic sbi approaches enhanced validation rd8: extend research coverage in social media [135], [71], [167], [1], [12], [138], [11], [210], [171], [16], [17], [107], [27], [102], [80], [209], [91], [142], [131], [18], [37], [63], [122], [140], [13], [14], [8], [145], research directions 38 cases highlighting novel applications of techniques do exist, that are either in development or already finished but yet unpublished. unfortunately, the academic publishing pipeline has a lead time of six to eighteen months in some cases and work in progress papers are relatively low in numbers, thus creating problems to researchers who conduct a literature review. furthermore, significant research on sbi is done by or on behalf of big players in this area, such as social media platforms, big advertising companies and global brands. these studies are based on home-grown methodologies, use proprietary tools and perhaps focal datasets and thus never made public, making the task of the researcher who conducts the review even more difficult. finally, the reader, before adopting the results of this study, has to consider its methodological limitations, related to the selection of the academic library, i.e. elsevier’s scopus, the inclusion of specific source types, i.e. peer reviewed journal papers, conference proceedings and book chapters and finally the selection of the search keywords for conducting the review. 6. references abrahams, a.s., jiao, j., wang, g.a. and fan, w. 2012. vehicle defect discovery from social media. decision support systems, 54(1), 87-97. arora, d., li, k.f. and neville, s.w. 2015. consumers' sentiment analysis of popular phone brands and operating system preference using twitter data: a feasibility study. in: proceedings of advanced information networking and applications (aina) ieee 29th international conference, pp. 680-686. bachmann, p. and kantorová, k. 2016. from customer orientation to social crm. new insights from central europe. scientific papers of the university of pardubice, series d, faculty of economics and administration, 36/2016. banerjee, s. and agarwal, n. 2012. analyzing collective behavior from blogs using swarm intelligence. knowledge and information systems, 33(3), 523-547. basset, h., stuart, d. and silbe, d. 2012. from science 2.0 to pharma 3.0 semantic search and social media in the pharmaceutical industry and stm publishing. a volume in chandos publishing social media series. baur, a., lipenkova, j., bühler, j. and bick, m. 2015. a novel design science approach for integrating chinese user-generated content in non-chinese market intelligence. baur, a.w. (016. harnessing the social web to enhance insights into people’s opinions in business, government and public administration. information systems frontiers, pp.1-21. beigi, g., hu, x., maciejewski, r. and liu, h. 2016. an overview of sentiment analysis in social media and its applications in disaster relief. sentiment analysis and ontology engineering, pp. 313-340, springer international publishing. bell, d. and shirzad, s. r. 2013. social media business intelligence: a pharmaceutical domain analysis study. international journal of sociotechnology and knowledge development (ijskd), 5(3), pp. 51-73. bell, d. and shirzad, s.r. 2013. social media domain analysis (somedoa)-a pharmaceutical study. webist, pp. 561-570. bendler, j., ratku, a. and neumann, d. 2014. crime mapping through geo-spatial social media activity. in: proceedings of 35th international conference on information systems, auckland 2014. berlanga, r., aramburu, m.j., llidó, d.m. and garcía-moya, l. 2014. towards a semantic data infrastructure for social business intelligence. new trends in databases and information systems, pp. 319-327, springer international publishing. berlanga, r., garcía-moya, l., nebot, v., aramburu, m.j., sanz, i. and llidó, d.m. 2016. slod-bi: an open data infrastructure for enabling social business intelligence. big data: concepts, methodologies, tools, and applications, pp. 1784-1813, igi global. beverungen, d., eggert, m., voigt, m. and rosemann, m. 2014. augmenting analytical crm strategies with social bi. digital arts and entertainment: concepts, methodologies, 39 tools, and applications, pp. 558-576, igi global. bjurstrom, s. and plachkinova, m. 2015. sentiment analysis methodology for social web intelligence. bygstad, b. and presthus, w. 2013. social media as crm? how two airline companies used facebook during the “ash crisis” in 2010. scandinavian journal of information systems, 25(1), 3. castellanos, m., dayal, u., hsu, m., ghosh, r., dekhil, m., lu, y., ... & schreiman, m. 2011. lci: a social channel analysis platform for live customer intelligence. in proceedings of the 2011 acm sigmod international conference on management of data (pp. 1049-1058). acm. chan, h.k., wang, x., lacka, e. and zhang, m. 2015. a mixed-method approach to extracting the value of social media data. production and operations management. chaudhuri, s., dayal, u. and narasayya, v. 2011. an overview of business intelligence technology. communications of the acm, 54(8), 88-98. chen, h., chiang, r.h. and storey, v.c. 2012. business intelligence and analytics: from big data to big impact. mis quarterly, 36(4), 11651188. iso 690 chilhare, y.r., londhe, d.d. and competiti, e.m. 2016. competitive analytics framework on bilingual da bilingual dataset of amazon food product. ijcta, 9(21), pp. 179-189. chung, w., zeng, d. and o'hanlon, n. 2014. identifying influential users in social media: a study of us immigration reform. in: proceedings of the 20th americas conference on information systems, savannah, 2014. colombo, c., grech, j.p. and pace, g.j. 2015. a controlled natural language for business intelligence monitoring. lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), 9103, pp. 300-306. dey, l., haque, s.m., khurdiya, a. and shroff, g. 2011. acquiring competitive intelligence from social media. in: proceedings of the 2011 joint workshop on multilingual ocr and analytics for noisy unstructured text data, p. 3. acm. diamantopoulou, v., charalabidis, y., loukis, e., triantafillou, a., sebou, g. foley, p., deluca, a., wiseman, i. and koutzeris, t. 2010. categorization of web 2.0 social media and stakeholder characteristics. nomad project. eu. pp.19. available at: http://www.padgets.eu/downloads/deliverabl es/tabid/75/ctl/versions/mid/623/itemid/56/de fault.aspx [accessed 2 march 2017] dinter, b. and lorenz, a. 2012. social business intelligence: a literature review and research agenda. in: proceedings of the 33rd international conference on information systems, orlando 2012. fan, s., lau, r.y. and zhao, j.l. 2015. demystifying big data analytics for business intelligence through the lens of marketing mix. big data research, 2(1), 28-32. ferrara, e., de meo, p., fiumara, g. and baumgartner, r. 2014. web data extraction, applications and techniques: a survey. knowledge-based systems, 70, 301323. fourati-jamoussi, f. 2015. e-reputation: a case study of organic cosmetics in social media. in: proceedings of the information systems and economic intelligence (siie) 6th international conference, pp. 125-132, ieee. gallinucci, e., golfarelli, m. and rizzi, s. 2013. meta-stars: multidimensional modeling for social business intelligence. in: proceedings of the 16th international workshop on data warehousing and olap, pp. 11-18, acm. gallinucci, e., golfarelli, m., & rizzi, s. 2015. advanced topic modeling for social business intelligence. information systems, 53, 87-106. golfarelli, m. 2014. social business intelligence: olap applied to user generated contents. in: proceedings of the e-business (ice-b) 11th international conference, pp. is-11, ieee. golfarelli, m. 2015. design issues in social business intelligence projects. in european business intelligence summer school (pp. 6286). springer international publishing. gronroos, c. 2008. service logic revisited: who creates value? and who co-creates? european business review, vol. 20, no. 4, pp. 298–314. hart c. 1998. doing a literature review. sage publications, london he, w., tian, x., chen, y. and chong, d. 2016. actionable social media competitive analytics for understanding customer experiences. journal of computer information systems, 56(2), 145-155. 40 heijnen, j., de reuver, m., bouwman, h., warnier, m. and horlings, h. 2013. social media data relevant for measuring key performance indicators? a content analysis approach. in: proceedings of the international conference on electronic commerce, pp. 74-84, springer berlin heidelberg. jingjing, w., changhong, t., xiangwen, l. and guolong, c. 2013. mining social influence in microblogging via tensor factorization approach. in: proceedings of cloud computing and big data (cloudcom-asia), december 2013 international conference, pp. 583-591, ieee. kaplan, a. m. and haenlein, m. 2010. users of the world, unite! the challenges and opportunities of social media. business horizons, 53(1), 59-68. keele, s. 2007. guidelines for performing systematic literature reviews in software engineering. in technical report, ver. 2.3 ebse technical report. ebse. kim, y. and jeong, s. r. 2015. opinion-mining methodology for social media analytics. tiis, 9(1), 391-406. kucher, k., kerren, a., paradis, c. and sahlgren, m. 2014. visual analysis of stance markers in online social media. in: proceedings of visual analytics science and technology (vast), 2014 ieee conference, pp. 259-260, ieee. kucher, k., schamp-bjerede, t., kerren, a., paradis, c. and sahlgren, m. 2016. visual analysis of online social media to open up the investigation of stance phenomena. information visualization, 15(2), 93-116. kulkarni, a. v., joseph, s., raman, r., bharathi, v., goswami, a. and kelkar, b. 2013. blog content and user engagement-an insight using statistical analysis. international journal of engineering and technology, 5(3), pp. 2719-2733. lee, c., wu, c., wen, w. and yang, h. 2013. construction of an event ontology model using a stream mining approach on social media. in: proceedings of the 28th international conference on computers and their applications, 2013, cata 2013, pp.249-254. lin, z. and goh, k. y. 2011. measuring the business value of online social media content for marketers. in: proceedings of the 32nd international conference on information systems, shanghai. liu, s., wang, s. and zhu, f. 2015. structured learning from heterogeneous behavior for social identity linkage. ieee transactions on knowledge and data engineering, 27(7), 20052019. liu, s., wang, s., zhu, f., zhang, j. and krishnan, r. 2014. hydra: large-scale social identity linkage via heterogeneous behavior modeling. in: proceedings of the 2014 acm sigmod international conference on management of data, pp. 51-62, acm. liu, x. and yang, j. 2012. social buying met network modeling and analysis. international journal of services technology and management, 18 (12), 46-60. lotfy, a., el tazi, n and el gamal, n. 2016. scif: social-corporate data integration framework. in: proceedings of the 20th international database engineering & applications symposium, june 2016, pp. 328333, acm. lu, y., wang, f. and maciejewski, r. 2014. business intelligence from social media: a study from the vast box office challenge. ieee computer graphics and applications, 34(5), 5869. luhn, h. p. 1958. a business intelligence system. ibm journal of research and development, 2,14-31 luo, j., pan, x. and zhu, x. 2015. identifying digital traces for business marketing through topic probabilistic model. technology analysis & strategic management, 27(10), 1176-1192. marine-roig, e., & clavé, s. a. 2015. tourism analytics with massive user-generated content: a case study of barcelona. journal of destination marketing & management, 4(3), 162-172. mckinsey and altagamma 2015. digital inside: get wired for the ultimate luxury experience. available at: https://www.mckinsey.de/files/dle-2015global-report.pdf [accessed 5 march 2017] meredith, r. and o'donnell, p. a. 2010. a functional model of social media and its application to business intelligence. in: proceedings of the 2010 conference on bridging the socio-technical gap in decision support systems: challenges for the next decade, 41 august 2010, pp. 129-140, ios press, netherlands. meredith, r. and o'donnell, p. a. 2011. a framework for understanding the role of social media in business intelligence systems. journal of decision systems, 20(3), 263-282. milolidakis, g., akoumianakis, d. and kimble, c. 2014. digital traces for business intelligence: a case study of mobile telecoms service brands in greece. journal of enterprise information management, 27(1), 66-98. moedeen, b. w. and jeerooburkhan, a.s. 2016. evaluating the strategic role of social media analytics to gain business intelligence in higher education institutions. in: proceedings of emerging technologies and innovative business practices for the transformation of societies (emergitech), ieee international conference, pp. 303-308. ngo-ye, t. l. and sinha, a.p. 2012. analyzing online review helpfulness using a regressional relieff-enhanced text mining method. acm transactions on management information systems (tmis), 3(2), 10. nithya, r. and maheswari, d. 2016. correlation of feature score to overall sentiment score for identifying the promising features. in: proceedings of computer communication and informatics (iccci) international conference, january 2016, pp. 1-5, ieee. o'leary, d. e. 2015. twitter mining for discovery, prediction and causality: applications and methodologies. intelligent systems in accounting, finance and management, 22(3), 227-247. obradović, d., baumann, s. and dengel, a. 2013. a social network analysis and mining methodology for the monitoring of specific domains in the blogosphere. social network analysis and mining, 3(2), 221-232. olszak, c.m. 2016. toward better understanding and use of business intelligence in organizations. information systems management, 33(2), 105-123. palacios-marqués, d., merigó, j. m. and sotoacosta, p. 2015. online social networks as an enabler of innovation in organizations. management decision, 53(9), 1906-1920. petychakis, m., biliri, e., arvanitakis, a., michalitsi-psarrou, a., kokkinakos, p., lampathaki, f. and askounis, d. 2016. detecting influencing behaviour for productservice design through big data intelligence in manufacturing. in: proceedings of working conference on virtual enterprises, pp. 361369, springer international publishing. piccialli, f. and jung, j. e. 2016. understanding customer experience diffusion on social networking services by big data analytics. mobile networks and applications, 1-8. ponis, s. t., & christou, i. t. 2013. competitive intelligence for smes: a web-based decision support system. international journal of business information systems, 12(3), 243258. pu, j., teng, z., gong, r., wen, c. and xu, y. 2016. sci-fin: visual mining spatial and temporal behavior features from social media. sensors, 16(12), 2194. qazi, a., raj, r.g., tahir, m., cambria, e. and syed, k.b.s. 2014. enhancing business intelligence by means of suggestive reviews. the scientific world journal, 2014. ram, j., zhang, c. and koronios, a. 2016. the implications of big data analytics on business intelligence: a qualitative study in china. procedia computer science, 87, 221226. ranjan, j. 2009. business intelligence: concepts, components, techniques and benefits. journal of theoretical and applied information technology, 9(1), 60-70. ranjan, r., vyas, d. and guntoju, d. p. 2014. balancing the trade-off between privacy and profitability in social media using nmsant. in: proceedings of advance computing conference (iacc), 2014 ieee international, pp. 477-483, ieee. rosemann, m., eggert, m., voigt, m. and beverungen, d. 2012. leveraging social network data for analytical crm strategies: the introduction of social bi. in: proceedings of the 20th european conference on information systems (ecis) 2012, ais electronic library (aisel). ruhi, u. 2014. social media analytics as a business intelligence practice: current landscape & future prospects. journal of internet social networking & virtual communities, 2014. 42 rui, h., & whinston, a. 2011. designing a socialbroadcasting-based business intelligence system. acm transactions on management information systems (tmis), 2(4), 22. sathyanarayana, p., tran, p.n.k., meredith, r. and o'donnell, p. a. 2012. towards a protocol to measure the social media affordances of web sites and business intelligence systems. dss, pp. 317-322. seebach, c., beck, r. and denisova, o. 2012. sensing social media for corporate reputation management: a business agility perspective. ecis, p. 140. shroff, g., agarwal, p. and dey, l. 2011. enterprise information fusion for real-time business intelligence. in: proceedings of the 14th international conference, information fusion (fusion), pp. 1-8, ieee. sigman, b. p., garr, w., pongsajapan, r., selvanadin, m., mcwilliams, m. and bolling, k. 2016. visualization of twitter data in the classroom. decision sciences journal of innovative education, 14(4), 362-381. sijtsma, b., qvarfordt, p. and chen, f. 2016. tweetviz: visualizing tweets for business intelligence. in: proceedings of the 39th international acm sigir conference on research and development in information retrieval, july 2016, pp. 1153-1156, acm. sleem-amer, m., bigorgne, i., brizard, s., dos santos, l.d.p., el bouhairi, y., goujon, b. and varga, l. 2012. intelligent semantic search engines for opinion and sentiment mining. next generation search engines: advanced models for information retrieval, pp. 191-215, igi global. tayouri, d. 2015. the human factor in the social media security–combining education and technology to reduce social engineering risks and damages. procedia manufacturing, 3, 1096-1100. tziralis, g., vagenas, g., & ponis, s. 2009. prediction markets, an emerging web 2.0 business model: towards the competitive intelligent enterprise. in web 2.0 (pp. 1-21). springer, boston, ma. wen, c., teng, z., chen, j., wu, y., gong, r. and pu, j. 2016. socialradius: visual exploration of user check-in behavior based on social media data. in: proceedings of the international conference on cooperative design, october 2016, visualization and engineering, pp. 300-308, springer international publishing. wongthongtham, p., & abu-salih, b. 2015. ontology and trust based data warehouse in new generation of business intelligence: stateof-the-art, challenges, and opportunities. in industrial informatics (indin), 2015 ieee 13th international conference on (pp. 476483). ieee. wu, y., liu, s., yan, k., liu, m. and wu, f. 2014. opinionflow: visual analysis of opinion diffusion on social media. ieee transactions on visualization and computer graphics, 20(12), 1763-1772. yang, c. s. and shih, h. p. 2012. a rule-based approach for effective sentiment analysis. pacis, p. 181). yang, c.s. and chang, p.c. 2015. mining social media for enhancing personalized document clustering. in: proceedings of the international conference on hci in business, pp. 185-196, springer international publishing. yang, c.s. and chen, l.c. 2014. personalized recommendation in social media: a profile expansion approach. pacis, p. 68. zeng, d., chen, h., lusch, r. and li, s.h. 2010. social media analytics and intelligence. ieee intelligent systems, 25(6), 13-16. zhang, z., guo, c. and goes, p. 2013. product comparison networks for competitive analysis of online word-of-mouth. acm transactions on management information systems (tmis), 3(4), 20. zhang, z., li, x. and chen, y. 2012. deciphering word-of-mouth in social media: text-based metrics of consumer reviews. acm transactions on management information systems (tmis), 3(1), 5. zimmerman, c., & vatrapu, r. 2015. the social newsroom: visual analytics for social business intelligence. in: proceedings of the international conference on design science research in information systems, pp. 386-390, springer international publishing. zimmerman, c.j., wessels, h.t. and vatrapu, r. 2015. building a social newsroom: visual analytics for social business intelligence. in: proceedings of the ieee 19th international conference, enterprise distributed object computing workshop (edocw), pp. 160-163, ieee. vol6no2paper1 barnea to cite this article: barnea, a. (2016) study on competitive intelligence in israel: 2016 update. journal of intelligence studies in business. 6 (2) 5-16. article url: https://ojs.hh.se/index.php/jisib/article/view/156 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index study on competitive intelligence in israel: 2016 update avner barneaa aschool of business administration, the netanya academic college, israel; avnerpro@netvision.net.il journal of intelligence studies in business please scroll down for article study on competitive intelligence in israel: 2016 update avner barneaa aschool of business administration, the netanya academic college, israel *corresponding author: avnerpro@netvision.net.il received 13 march 2016; accepted 20 august 2016 abstract this paper investigates the state of competitive intelligence among israeli firms in 2014. the methodology used was self completion questionnaires, which were responded to in may and june of 2016. a response rate of 26% was achieved with 39 questionnaires returned of the 69 questionnaires that were sent out to 65 local firms, most of them with an annual turnover of greater than 100 million usd. the results indicated that there were insignificant changes in the use of competitive intelligence in israel in the last 10 years, since a survey conducted in 2006. initially it looked as if the use of competitive intelligence was expanding, but the actual findings shows that the contribution of competitive intelligence to the decision making process was not progressing as it was expected to and there were difficulties in making competitive intelligence an integral part of the decision-making process and having it reach an influential position. the results indicated that the recent global downturn evidently had only a minimal effect on the competitive intelligence scheme and in 75% of the firms there were actually almost no changes in the competitive intelligence programs. clearly, competitive intelligence was primarily a tool used by the larger organizations and most of the firms that responded (60%), were among those who competed in the global markets. i have also attempted to look into the quality attributes of competitive intelligence performance, and it seemed that the low use of analytical tools was an indicator that we cannot ignore. only 33% of the competitive intelligence professionals were using these tools regularly as part of their analysis work and in presenting their findings. keywords business strategy, ci in israel, competitive intelligence, israeli firms 1. introduction business research literature deals extensively with competition between firms, and global competition has made the competition a more dynamic environment (grant 2005, chan kim & mauborgne 2004). business strategy literature deals with the early detection of competitors' intentions and capabilities (fellman & post 2010) and recognition strategies of their objectives, strengths and weaknesses combined with trends in the markets and among consumers. hughes, le bon & rapp (2013) explain that they all are critical components in the success of corporations. a study of 800 firms showed that an important factor in the success of companies is the special expertise of customers' requirements and competitors' moves (nunes & breene, 2011). the importance of monitoring the business environment (external environment) arises with respect to rapid technological developments (grant 2005). it is impossible to win competition strategy (strategic competition) without introducing competitors, warning of threats (henderson, 1981) and analyzing information on the competition environment (fleisher, right & allard 2008; chernev & kotler 2012). the basis for competitive intelligence was the need for environmental scanning of information about activities that happen around firms and have an impact on their journal of intelligence studies in business vol. 6, no. 2 (2016) pp. 5-16 open access: freely available at: https://ojs.hh.se/ 6 performance (aguilar 1967). the increase of environmental uncertainty gradually strengthened the demand for information processing activities within firms (daft & macintosh 1981; culnan 1983). firms' skills to adjust to market conditions largely rely on their competences in processing relevant information, mainly on market conditions. broud (2006) went on to connect competitive intelligence and environmental scanning in the process of building scanning capabilities to affiliate firms' strategy with important changes in the external environment. competitive intelligence (ci) is a process involving the gathering, analyzing and communicating of environmental information to assist strategic decisionmaking (dishman & calof 2007). although there are calls (hoppe 2015) to move away from a narrow perspective of the practice to pursue a broader understanding of intelligence as an organizational discipline, the above definition of ci is widely recognized by most scholars who are doing research on competitive intelligence and related areas like business strategy and information sciences. intelligence as part of strategy, (solberg søilen 2015) mainly marketing as an instrument to increase a firm's competitiveness in its strategic planning process, has been long recognized (montgomery & weinberg 1979) and is also backed strongly by porter (1979, 1980). many scholars have proposed theories about intelligence processes in business. from environmental scanning (aguilar 1967), strategic intelligence (montgomery & weinberg 1979), competitor analysis (ghoshal & westney 1991) and market intelligence (maltz & kohli 1996), day and schoemaker (2006) brought forward the concept of "peripheral vision" which is near to the concept of ci in its broader sense. most works (bulger 2016) look at ci as an essential requirement for better strategic planning and execution. the literature shows evidently that ci is not only about competition but covering the whole business environment. more firms were aware that one of the keys to success was intimate knowledge of the global markets (bulley, baku & allan 2014) by ongoing monitoring of the changes, and it was not enough to offer advanced technological solutions (prescott 1999) and prevent business failures as a result of intelligence downfalls in business (tsitoura & stephens 2012). many corporations already understood that ci (blenkhorn & fleisher 2005) can be of a great help in reaching a competitive advantage and sustaining it (global intelligence alliance 2009, 2011). it is evident that companies with poor information about competitors are stuck being reactive (le bon 2013). contrary to findings by reinmoeller and ansari (2016), ci added value can be assessed mostly by strategic planning and decision making (hambrick 1982; fingold, carlucci & page 2005; grant 2005) although it is not an easy task as the ci discipline is broadly based on qualitative evaluation. the growth of the israeli economy was highly dependent on its exports, mainly hightechnology industries and the ability to develop new technologies and applications that would be attractive in the global markets (central bureau of statistics 2014). the use of ci in israel can be found mostly in large-size companies. it was moving forward slowly, according to recent studies (barnea 2006, 2009). it seems that the discipline of ci in israel is still looking for its position of influence, since it is focused on management practices and fulfilling the immediate needs of the corporation rather than working closely with the strategic planning and the senior decision-makers. it is largely focused on formal intelligence activity through ci units, while there are those who believe (hoppe 2015) that in most organizations intelligence is constructed informally. 2. past studies on competitive intelligence in israel there were a few studies on competitive intelligence in israel conducted in previous years. the first one was conducted in 2003 (barnea 2003) and was published in israel (in hebrew) which was followed by an english version that was also updated (barnea 2004). the next ones were published in 2004 (belkine 2004; shirtz 2004). both studies showed that competitive intelligence in israel was in its early stages, more in the stage of ad hoc approaches, but they identified the move towards established activity. it pointed towards the potential of the progress of competitive intelligence in israel as the needs were obsevered. the next study was published in 2006. it was titled "why start-up companies failed to adopt competitive intelligence" (barnea 2006). the key conclusion was that the absence of competitive intelligence awareness was one of the main reasons why israeli start-up companies failed in the global markets during 7 the 1990s. the author has offered different ways to change the situation: one of the primary ways was to appoint a senior executive to take care of this issue, as monitoring the international markets was a critical factor for such companies. the author has recommended also that the investment ventures that usually heavily support these initiatives encourage these ideas and act to implement them, and by doing so they could save a lot of money and help to make better decisions. the next study was concluded in 2006 (barnea 2006). its focus was on competitive intelligence in large israeli exporters. the key findings were that ci was used by almost 50% of the companies and that ci professionals were succeeding in bringing added value through their activities, mainly tactical insights. the study stated that ad hoc solutions were still common but there was a growing understanding of the need of ci expertise. the findings showed that the use of open source intelligence (osint) was wide while the use of primary sources was limited, mainly due to a lack of awareness of its potential. another important result was that the use of expert tools (i.e. software) was very rare, while the expectations of the developers of such tools were higher, as israel had a strong orientation toward using information technology tools. in 2008 and 2009, two short studies on ci in israel by barnea were published (in hebrew) in two israeli management magazines. the key findings were that ci in israel is moving forward slowly while the main obstacle is the lack of awareness by senior executives who expect to present their intelligence needs and the needs of other units. the conclusion was that without their firm support the creation of durable intelligence capabilities will be difficult. another study that has looked at ci in israel mainly from the aspects of using expert tools (barnea 2009) has revealed that "local firms were not prepared to invest in new ci tools that would enable ci professionals to perform better. as a result, most ci professionals have to continue using generic tools such as office (microsoft), which offers unsatisfactory solutions to their ci program needs". and also that "the high level ci solution has not reached its potential target market due to a lack of support by senior executives who did not see it as critical to move ci forward in their firms". in 2015, research on the use of open source intelligence by israeli firms (markovich 2015) showed that there is an intensive use of these sources, but the added value to the corporate decision-making process was low. it overlooked the entire picture of ci in the israeli business scene. it was therefore challenging to conduct a new study of ci in israeli companies, especially in the time after the global downturn (2008/9). the objective was to compare the results with previous studies, to evaluate the latest findings to see what still has to be done and to try to indicate the directions that ci in israel may have to take in order to strengthen its position. research conducted by the federation of the israeli economic organizations (2011), showed that the global financial crisis almost had limited affect on israeli global corporations. the depression moderated the growth of israeli companies abroad. despite the economic crisis, israeli multinational companies showed impressive economic strength. research objectives: 1. to evaluate the existing use of competitive intelligence within israeli companies, primarily large companies with annual revenues of 100 million usdand above. 2. to compare the findings with previous studies and to recommend what has to be done in the future to support the use of ci. 3. methodology the study was based on a questionnaire of 25 questions that was sent out to 65 israeli companies. the directory of the companies included in this research was based on records of participants in competitive intelligence conferences held in israel in the last five years. the questionnaire was divided into six sections: 1. general questions about each firm, 2. questions about the characteristics of the competition in the relevant industry, 3. how ci is conducted, 4. the value that ci was delivering to the firm, 5. the state of the competition in the recent global downturn 6. recent changes in the mode of ci activity. the data was collected by self-completion questionnaires. they were sent directly to ci 8 managers that have been identified in each company. sixty-nine questionnaires were sent out. thirty-nine completed questionnaires (56%) were received. these questionnaires were analyzed. the high rate of response is related to my personal acquaintances with the responders. the actual meaning was that all companies studied had active ci functions. 4. limitations the limitations of this study were as follows: the results were based only on the self experience of the ci managers rather than on their superiors. it was impossible to know how much these replies represented the view of senior executives in these companies about some of the questions, for example the added value of ci. 5. data analysis the profiles of companies that responded and participated in this study by sector are shown in figures 1-5. figure 1 sectors (industry type) of responding companies. figure 2 annual revenue (2013) by company. a company with annual revenues exceeding 100 million usd (100 m$) is usually considered to be a large corporation in israel. figure 3 number of employees by company. figure 4 primary markets where the companies compete. a few companies operate in both markets: global and local. the questionnaire instructed the respondent to indicate the primary market. figure 5 where ci is done (internally or externally) all ci managers that responded indicated that their ci units were operating in –house, meaning that they were part of the company's structure and located in the company's premises and thus interacted continuously with its people. none of these units was operating externally. obviously, many of these companies were receiving input from external suppliers, mainly information gathered from public domains. in comparison, the "global study on large companies" (global intelligence alliance, 2009) has stated that 71% of the intelligence activities were produced within the company. 9 figure 6 the size of the ci unit: number of employees per unit. the results in figure 6 indicate that the size of the competitive intelligence units in israel were usually small. in 90% of the firms the ci units were two people or less. there were no differences in the size of the units between companies who focused on the local market and those that were competing in the global markets. the hypothesis that israeli companies in the global market needed larger ci units than in the local markets due to the scope of the intelligence tasks was not supported by the results of this survey. as ci units were small, ci was usually fulfilled through a centralize unit. it is possible that israeli companies in the global markets were using outsourcing services by information professionals more intensively than those operating internally, but this was not substantiated in the results of this study. figure 7 the profile of competitive intelligence units: how old is the ci unit in your organization? it was found in this study (figure 7) that 69% of the units are more than four years old while the rate of new ci units in the last three years was only around 30%, meaning that in this period the growth of ci in israel was slowing. these results were contrasted with my initial assumption that ci is growing in israel in the last three years faster than in the years before. figure 8 to whom the ci director reports. the majority of ci directors in israel were reporting to the senior level management, i.e. to vps (figure 8). it seems that ceos preferred not to manage the ci function directly, mainly as a result of a lack of ability to allocate management attentiveness. in most of the firms, ci was part of the marketing or sales units, and their directors were reporting to the vp level. second most common were ci units that operated under the guidance of the vp business development. the vps of strategic planning were getting continual support from ci, but usually were refraining from taking direct control of ci. figure 9 the participation of ci in major decisions. the question here was referring to the rate of participation by ci directors in the regular meetings of the senior management and the results showed that the level of participation on a regular basis was low while the participation on an occasional basis was 30 percent (figure 9). it was not satisfactory but it revealed that the awareness of the importance of the contribution of ci is growing. the following question regarding the level of satisfaction from the contribution of the ci activity added a better perspective on this issue (figure 10). 10 figure 10 to what extent does the ci provides added value to the firm? figure 10 indicates that most of the ci directors were aware of the situation that their units were not graded very highly by their executives. these results also exhibited that the ci managers were aware of the need to improve their performance. although the results came from the ci managers, it was reasonable that they took into account the feedback they received regularly from their "internal customers", mostly the executives. figure 11 the advantages the firm is gaining from ci. the primary advantage of ci (approximately 70%) was placed on the identification of threats (figure 11). this may also be pursuant to the directions they got from their superiors. it was intriguing and annoying to find out the low rate (8%) that ci received in improving the decision making process. it is possible to deduce that the most important advantage was threat identification, while they felt a lesser need to support in the decisionmaking process. figure 12 primary users of ci products. the results of the question shown in figure 12 remained in firm correlation with the results in figure 8. evidently, ci was primarily serving the needs of marketing or sales. as a result of a lack of awareness and resources, the service to other functions was low as ci was incapable of looking simultaneously in other directions, mostly due to a lack of resources. figure 13 the existence of a systematic process of establishing kits. the results show undoubtedly that setting up a systematic process of kits has been executed very well (figure 13). it shows also that the routine of ongoing amendments was working properly. ci directors had intense awareness of the significance of keeping their attention on the real needs of their firms. it remained unclear why 25% of the ci directors were not operating using the same procedure. i tend to believe that this was a lack of awareness, which had an impact on their level of expertise in the ci discipline. in comparison to the global scene, 87% of the companies were systematically collecting and analyzing information. 11 figure 14 the use of information from primary and secondary resources. the results in figure 14 show that using secondary resources was a standing procedure while using primary sources was less frequent. these results correlated with the difficulties of building a primary source network, which could be a result of the lack of capabilities by the ci professionals and/or a result of difficulties in establishing themselves in their firms. figure 15 the use of ci dedicated information technology tools. although israel was positioned high in the development and the use of advanced information technology tools, the rate of ci units that were using these tools was low, only one third of the companies (figure 15). the prospects for the future were not promising. it is relevant to add that there were three local companies that provided excellent ci dedicated tools (barnea 2009). the results in figure 15 did not match the results of "the global study on large companies" (global intelligence alliance, 2009), stating that 64% of the firms utilized technological ci tools and 9% were intending to do so. the difference between the results in this survey and the one by gia is high, especially while israel is considered to be advanced in using new technologies. the findings from the global intelligence alliance survey on market intelligence in global organizations (2011), did not relate to this issue. figure 16 this figure relates to three questions: 1) return on investment (roi) of the ci unit (financially), 2) the contribution of ci to the decision making process, and 3) the contribution of the ci to the understanding of the competitive environment. looking at the question of the roi, (blue bars, figure 16), the results did not supply any hard figures to support the estimation of the roi grades. the replies expressed the perspective of the ci managers and their observations. it looks as if the high grades (4 and 5) that have exceeded 84% of the replies, may be too high, and it would be possible to accept them only if we had substantial data to support them. however, it is possible to say that ci managers believe that the ci units had proven themselves also from a financial perspective. i did not use specific models to measure the roi (faran 2003) and thought that the above results were sufficient. the other two questions (green and red bars in figure 16), reviewed the involvement of the decision makers that were expressing high satisfaction to the ci managers regarding their position and their abilities to contribute to the firmsquestion no. 2: 87% in grades 4,5 and question no. 3: 66% in grades 5, 6. the results to question no. 3 were extremely high – almost all the replies, except one, ranked the contribution as 4, 5, or 6. the results of the global study on large companies (2009) indicated that 98% of companies are utilizing ci while making key decisions. the results of these three questions (figure 16) show the high satisfaction of the ci managers with their contribution to the firms and to the internal process of the decisionmaking. these figures were also in firm correlation with the results in figure 10. comparing them to the results in figure 9 revealed that ci managers were not pleased with the level of their participation in the decision making process, and they seem to believe that they could be more effective. 12 figure 17 the key success factors of ci function. it is clear from figure 17 that the ability of the ci function to fulfill the immediate needs of the management was leading by far. this means that ci was perceived mostly as a tactical tool. ci managers did not think that ci would be more effective if it was pushing for sharing the information it acquired and encouraged different management layers to use it. it could be an indicator that ci managers were not yet fully aware of their role to push for sharing the information horizontally and vertically. another conclusion from the results in figure 17 was that ci managers may not feel that they had the support of the senior management to make ci prosperous. from the point of view of the firm, as long as the ci managers were provided with immediate information, it was good enough. figure 18 the improvement of the culture of sharing of information. although the ci managers did not think that sharing information was one of the ksfs of ci as we saw in figure 17, actually the results of figure 18 showed that while ci was active in the firm, it still had a significant effect on the development of the culture of the sharing of information, as one of the by-products of this activity. figure 19 the use of analytical tools (such as: 5 forces, swot, scenario analysis, benchmarking/gap analysis, financial analysis, profiling). this question referred to the use of one (or more) of the analytical tools that are the most familiar and practical (figure 19). the results were very disappointing as most of the ci managers (67%) admitted that they did not use even one of them on a regular basis. the question which was left unresolved was how they still fulfill their analytical objectives. figure 20 changes in the intensiveness of the competition since the downturn. most of the ci managers (75%), have indicated that they did not spot any changes in the magnitude of the competition in the various fields where they were competing since the economic slowdown (figure 20). however, 23% have felt more competition since the recent economic events. in the "global study on large companies (2009)", 45% of respondents felt strongly that ci activities have increased significantly after the global downturn in their industry. the average increase across all industries is 17%, almost similar to the results acquired in figure 20. 13 figure 21 changes in the demand for intelligence products as a result of the economic slowdown. most of the replies (65%) in figure 21, suggested there were no changes in the character of the needs and products these ci units produced. these results were in correlation with the results of figure 8, which showed no indications of significant changes in the volume of the competition. figure 22 did the ci function change since the global downturn? the results in figure 22 show that the recent global downturn had almost no effect on the size of the ci functions. those ci units that have been downgraded (20%) were affected by the general downsizing of many organizations due to the slowing of the world economy. it seems that ci units did not have to make internal modifications in their modus operandi, while most of them were successful in protecting their staff against dismissals. 6. conclusions as a result of the recession into which the global economy slipped in 2008, budgets have been cut in most corporate functions, with intelligence activities being no exception. yet simultaneous with the thinning resources, the demand for high quality information has stayed intact. we have learnt from the results of this research conducted in israel that ci units are operating mainly inside large companies in almost all the main sectors in the israeli economy. most of the companies (75%) have had ci functions for less than five years. it is evident that ci is growing slowly in israel. according to the results, ci in israel is considered to be mostly a tactical tool to identify immediate threats. around 70% of the responses mentioned this as the prime advantage the companies were gaining from ci. ci directors thought (77%) that they were successfully fulfilling this task. after following ci in israel for several years, i have noticed that ci is not considered to be a meaningful tool for strategic decisions. this may also be a result of the relative weakness of the performance of strategic planning in israel. in the us and europe (kahaner 1997; prescott & miller 2001), intelligence management is a business needs oriented process that transforms data into intelligence allowing companies to make better strategic decisions. it is a key task for the overall company's strategic management focusing on the observation of the external environment. this does not take place in israel. business strategy literature emphasizes the crucial need to monitor the competitive environment to utilize information more effectively (grant 2005, 1997) while competitive intelligence is the major tool used to fulfill this fundamental management challenge (herring 1992). almost 80% of the respondents assessed ci as performing fair or satisfactory and only less than 20% thought that the overall performance was high. this is another indication that ci managers are not aware of the need to improve their contribution to the corporate decision making process. still, around 70% of the ci directors indicated that they were not participating in major decisions, and it is hard to say why the rate of involvement of ci was so low. ci managers had to be bothered as these results were possibly projecting their unsatisfactory performance. the position of the ci unit under the vp of marketing and/or sales, as seen in almost 70% of the firms, did not have any impact towards better performance of the ci as a second tool for better comprehension of the marketplace. the ci function has to become part of the firm’s organizational structure as other units and thus conclude the forums and crossroads in which it officially participates. this research did not enter into ci's roi through a deeper survey, by using different models (rouach & santi 2001). the process of carrying out ci is performing well – 75% of the companies declared they had a systematic process of setting up key intelligence topics, meaning that their gathering efforts are well in place. unfortunately, the use of primary sources, 14 mainly the internal network, was found to be not good enough, and it may be an outcome of a lack of awareness by the ci directors and/or a result of insufficient resources. still, 77% of the ci managers thought that they were playing a major role in expanding the organizational culture of sharing of information internally. thus, it is necessary to improve the collection of information, through a better use of primary sources and the internal networks. this research reveals multiple phases of creating meaningful intelligence within the process. it also discovered that the practice of competitive intelligence, while strong in the area of information collection, was weak from a process and analytical perspective. the research identified an actual problem in the performance of the analysis by the ci function. the use of analytical tools was relatively low but these results did not stop ci managers from mentioning strongly that ci functions were a valued investment and that their contribution to the decision making process and the understanding of the external environment was fairly good. ci directors were not satisfied with of their involvement in major decisions. the low rate of the use of ci dedicated it tools (36%) could not be just a result of a lack of budget, but instead a result of a lack of pressures on the ci managers who may think that they can manage with ordinary tools instead of using advanced ones. there is a need in israel to fulfill advanced tools such as dedicated software for gathering, analysis, and dissemination to improve ci performance. the ci global survey has achieved different results, presenting data that show 64% utilize technological ci tools and 9% intend to do so. and finally, ci managers firmly declared that they noticed only a small amout of growth in their activity since the recent downturn. most of them kept their staff while the profile of their tasks remained intact and the magnitude of the competition had almost no influence on them. the global survey on ci (2009) indicated different results. from this, 45% of the respondents felt strongly that ci activities have increased significantly after downturn in their industry. the average increase across all industries was 17%. and a final note – israel is unique in the sense that many of the executives have been exposed to the benefits of the intelligence discipline in their military service. thus, one could expect that the penetration of competitive intelligence would be faster and its influence on strategic moves in addition to tactical ones would be more visible. however, the results are different. maybe this is a result of an israeli business culture marked by high self-confidence, by strong capabilities of fast adjustments to changes instead of careful planning and by believing that they are actually utilizing informal ci in their daily performance and thus do not perceive the benefits of ci as a strategic focus function. 7. references aguilar, f. (1967). scanning the business environment, toronto: macmillan. barnea a. (2006). "israel study on competitive intelligence". competitive intelligence magazine, vol. 9 no. 2, marchapril 2006. barnea, a. (2003). "introducing of competitive intelligence in israeli companies", status magazine, (israel, in hebrew), february 2003. barnea, a. (2004). "introducing of competitive intelligence in israeli companies", competitive intelligence magazine, septemberoctober 2004. barnea, a. (2006). "why start -up companies failed to adopt competitive intelligence", competitive intelligence magazine, vol. 9, no. 1, januaryfebruary 2006. barnea, a. (2009). "intelligence solutions through the use of expert tools", competitive intelligence magazine, vol. 12. no. 4, julyaugust 2009. belkine, m, (2004), "competitive intelligence in israel", journal of competitive intelligence and management, volume 2, number 2. blenkhorn, d. l., & fleisher, c. s. (2005). competitive intelligence and global business. westport, ct: praeger. broud, f. (2006). "development of an expert system on environmental scanning practices in sme's: tools as a research program", journal of competitive intelligence and management, vol. 3 no. 4, pp. 37-58. bulger, n. (2016). "the evolving role of intelligence: migrating from traditional competitive intelligence to integrated intelligence", the international journal of intelligence, security and public affairs, vo. 18, no. 1, pp. 57-84. bulley, c., baku, k. and allan, m. (2014). "competitive intelligence information: a key business success factor", journal of management and sustainability; vol. 4, no. 2. central bureau of statistics, state of israel (2014). http://www.cbs.gov.il/www/hodaot2014n/16_1 4_170e.pdf chan kim, w. and mauborgne, r. (2004). "blue ocean strategy", harvard business review, october, reprint: r0410d. cullan, m. (1983) "environmental scanning: the effects of task complexity and source 15 accessibility on information gathering behavior", decision sciences, vol. 14, april pp. 194-206. daft, r. and macintosh, n. (1981). "a tentative exploration into the amount and equivocality of information processing in organizational work units", administrative science quarterly, vol. 26, no. 2 207-224. day, g., & schoemaker, p. (2006). peripheral vision: detecting the weak signals that will make or break your company. harvard business school. dishman, p. and calof, j. (2007). "competitive intelligence: a multiphasic precedent to marketing strategy", european journal of marketing, vol. 42, no. 7/8, pp. 766-785. faran, d. (2003). manifesting the cost of uncertainty, competitive intelligence magazine, vol.6 no. 5, september-october 2003. fellman, p. & post, j. (2010). "complexity, competitive intelligence and the first mover advantage" in unifying themes in complex systems: vol. vi: proceedings of the sixth international conference on complex systems, in minai, a. braha, d. & bar-yam, y. (eds.), springer; pp. 114-121. fingold, d. carlucci, s. & page, a. (2005). "how to conduct competitive intelligence in your biotech startup". nature, 25 april. retrieved from http://www.nature.com/bioent/building/planni ng/042005/full/bioent854.html ghoshal, s., & westney, d. (1991). "organizing competitor analysis systems", strategic management journal, vol. 12, pp. 17–31. global intelligence alliance (2009). "competitive intelligence: a global study on large companies", http://www.globalintelligence.com/insightsanalysis/white-papers/best-practices/ global intelligence alliance (2011). "market intelligence in global organizations: survey findings in 2011", https://www.mbrain.com/wpcontent/uploads/2015/04/10852.pdf grant, r. (2005). contemporary strategy analysis, blackwell publishing, ma, pp. 9, 112-117, 181, 507-508. grant, r. (1997). "the knowledge-based view of the firm: implications for management practice". long range planning, 30 (3), pp. 450-454. hambrick, d. (1982). "environmental scanning and organizational strategy", sloan management review, vol. 3, pp. 159-174. henderson, b. (1981). "understanding the forces of strategical natural competition", journal of business strategy, winter, pp. 11-15. herring, j. (1992), "the role of intelligence in formulating strategy". journal of business strategy, 13 (5), pp. 54-60. hoppe, m. (2015). "intelligence as a discipline not just a practice", journal of intelligence studies in business, vol. 5, no. 3, pp. 47-56. hughes, d. le bon, j. and rapp, a. (2013). "gaining and leveraging customer-based competitive intelligence: the pivotal role of social capital and salesperson adaptive selling skills" journal of the academy of marketing science, vol. 41, pp. 91-110. kahaner, l. (1997), competitive intelligence: how to gather, analyze and use information to move your business to the top, ny, a touchstone book, simom & schuster. le bon, j. (2013). "use your sales force's competitive intelligence wisely", harvard business review, november 26. maltz, e., & kohli, a. (1996). "market intelligence across functional boundaries". journal of marketing research, vol. 33, no. 1 (feb.), pp. 47-61. markovich, a. (2015). "the impact of perceived quality of web information sources on the use of competitive information by decisionmakers and on firm's performance." ma dissertation, the university of haifa, school of management, the department of information and knowledge management. montgomery, d. b., & weinberg, c. (1979). "toward strategic intelligence systems". journal of marketing, 43: 41–52. nunes, p. & breene, t. (2011). jumping the scurve: how to beat the growth cycle, get on top, and stay there, harvard business review press. prescott, j. (1999). "the evolution of competitive intelligence, designing a process for action", apmp, spring. porter, m. (1979). "how competitive forces shape strategy", harvard business review, march/april. porter, m. (1980). competitive strategy: techniques for analyzing industries and competitors, ny, the free press. prescott, j. and miller, s. (2001). proven strategies in competitive intelligence, john wiley & sons, ny. rouach, d. & santi p. (2001). "competitive intelligence adds value: five intelligence attitudes". european management journal, 19 (5), pp 552–559. shirtz, d. (2004). "getting rid of the mysticismcreating a new intelligence", competitive intelligence magazine, vol. 7, number 5, september-october 2004. the federation of the israeli economic organizations, 16 http://www.industry.org.il/_uploadscl/dbsatt achedfiles/m11211.pdf solberg søilen, k. (2015). "a place for intelligence studies as a scientific discipline", journal of intelligence studies in business, vol. 5, no. 3, 35-46. tsitoura, n. & stephens, d. (2012). "development and evaluation of a framework to explain causes of competitive intelligence failures" information research, 17 (2), paper 521 eg-uk conference paper style guide 59 standards, evaluation, certification and implications for the study of competitive intelligence christian bourret * * university of paris-east marne-la-vallée, france. bourret@univ-mlv.fr received 10 december 2010; received in revised form 19 february 2011; accepted 27april 2012 abstract: the rise of standards, evaluations and certifications are expressions of what may be called the cult of performance and efficiency. standards and assessment are frequently presented as inevitably, improving quality through a project approach. as such they reflect a strong focus on efficiency in a world dominated by the quantitative approach. these standards and evaluations may hinder competitive intelligence goals. building on the interdisciplinarity of information and communication sciences (ics), we propose another qualitative approach to standards and assessment. finally, we considers the challenges represented by standards in the context of globalization of the economy and of trade. keywords: standards, evaluation, certification, competitive intelligence 1. introduction standards have become increasingly important in our society. in 1997, the french sociologist l. thévenot had already spoken of "government by the standards." since then the phenomenon has been largely amplified, with a close link between standards, outsourcing and its control, and evaluation. standards have also become a main issue in the process of globalization. standards are considered as part of modern management, for private companies and for public institutions alike. standards are also as a main issue in globalization, with the role of iso and of the “society of risk” (u. beck) and a key point in risk management. standards also have strong interconnections with competitive intelligence stakes as the analyst sets out to predict future scenarios. this article begins by demonstrating how the rise of standards, evaluation (assessment) and certification are a part of what we shall call the cult of performance and efficiency. then we proceed by proving how standards and evaluation are important to improve service quality through a project approach. standards can lead to an obsession with available for free online at https://ojs.hh.se/ journal of intelligence studies in business 2 (2012) 59-67 mailto:bourret@univ-mlv.fr https://ojs.hh.se/ 60 efficiency in a too exclusively quantitative approach. this ambivalence of standards and evaluation processes can involve contradictions with competitive intelligence goals and methods. based on the interdisciplinary of information and communication sciences (ics), this article proposes another qualitative approach to standards and assessment. the perspective of this article is finally broadened by considering the challenges due to standards in the larger context of globalization. 1.1 standards, assessment, certification or the rise of the cult of performance and efficiency the concept of standards is ancient. in france, this term has a latin origin (norme) and dates back to the year 1160. in the craft sector, guilds imposed a strict respect of the manufacturing processes. the french revolution swept corporations away as vestiges of the “old regime”, with the revolutionaries willing to change both the things that were made and the people. the revolution imposed new standards such as the metric system, a new calendar (“revolutionary”), and a new division of national territory (the departments replacing the provinces). even in metrology aspect (weights and measures), standards have deep social influences. other standards (calendar, administrative districts) constitute the basic framework of daily life in a developed society. today standards frame information exchanges (pdf, excel and so on). all the classifications are not neutral and they imply debatable statistical classifications (for example of social categories 1 ). classifications condition people’s representation and the vision of the future. as such it also affects the study of ci, as it decides how we look and try to analyze future events. the industrial revolution relied on the standardization of production, particularly from the early twentieth century with the scientific organization of work advocated by f. taylor. the accounting techniques, which appeared in venice (italy) in 1494, are also based on standards, to assess the revenue and expenditure of companies, to assess profit (development of capitalism). according to colbert’s view in france in the seventeenth century (development of the administrative or absolute monarchy), the state point of view of standards are for tax purposes: french accounting plans of 1947 and 1982 met these two different goals. standards and assessment (evaluation) are thus an integral part of the management that has 1 classifications are never neutral: documentation and statistical bodies (insee in france) are linked to social categorizations and used to support any form of government, as with apartheid in south africa. gradually emerged, following the pioneering works of the french engineer h. fayol in the early twentieth century. this was also part of the main characteristic of the united states (departments of management for example at harvard university). according to le moënne (2004), the big managerial disruption in the late eighties, corresponding to the spatial and temporal dislocation of companies, is probably the largest movement of managerial standards, most systematic and most radical since the origin of capitalism. it is accentuated by the digital revolution. we must not forget other “revolutions” either: the taylorization and fordisme at the beginning of the 20 th century. boussard (2008) defines "managerial ideology" as based on thee main points: monitoring and controlling an organization (the main justification of management), aiming at enabling organizations to be effective and efficient and finally relying on a rational and methodical approach to problems. the three keywords of management are: control, performance and rationality (boussard 2008, pp. 25-27). the dislocation of companies corresponds to the development of outsourcing, contributing to control and evaluation of results (regarding the goals contracted). the evaluation (assessment) began in the anglo-saxon countries and in private companies. in france, it gradually extended to the public sector (traditionally important in france) with the nmp (new public management / nouveau management public), which gradually developed in the 1980s, succeeding to the ppbs (planning programming budgeting system) and in france rcb (rationalization of budget choices). the main idea of the nmp is to transpose management methods of the private sector to the public sector in order to improve efficiency, relying on the "3 es": economy, effectiveness and efficiency. since 1996 when the social budget of the nation in france became higher than the state budget, parliament members voted for the annual lfss (law of financing social security / loi de financement de la sécurité sociale). later came the logic around goals or outcomes imposed by the lolf (organic law of public finance / loi organique des finances publiques), which gradually after 2003 transformed all management processes in the public sector, including universities (dashboards, indicators) and the focus on ppp (partenariats public privé). as a result our society has progressively become a “society of mistrust”, as trust is a main stake. standards are said to help "build confidence in an era of suspicion." in this perspective, d'almeida (2001) emphasized the role of brands, labels and trade marks of companies and their products. these "work as safeguards to promote the security and sustainability of the exchange, 61 matching supply and demand in selective criteria clearly identified” (d'almeida 2001, p. 242). d'almeida (with men like boutinet, gramaccia) show how the project process, which is seen as increasingly natural in companies (boutinet 2001), leads to a focus on innovations and has almost become an affair of state. the project process is at the heart of the modernization of the state as viewed by rocard’s government in 1989. developed in a competitive market space, the project has also been put at the service of improving the functioning of the state services, seeking to move the system from administration around procedures to administration with responsibility (d'almeida 2006). the project, as a network for innovation, has become a symbol of our post-industrial society. this system has been implemented with notions of performance and efficiency and in relation with quality approaches. this article aims to outline the role of quality approaches. born in japan after 1945, the notion of quality was developed in the industrial field in a process of continuous improvement (kaizen). this gradually became total quality management (tqm), and expanded to the western world in the 1980s. it then expanded to all sectors of organizations, whether private or public, and was backed by statements of procedures and certification corporations (iso, afnor in france) and the development of references as standards of measure. thevenot (1997) points to the evolution towards a "government by the standards" linked to market development, including the construction of the european market in the context of globalization. the rise of normalization corresponds to the competition in the market and is thus an integrated part of capitalism. thevenot (1997) outlines the extension of the standardization area from that of goods, products and services to that of people (standardization of skills). it's a process to standardize objects or acts in order to bring consistency to an efficient industrial operation (taylorization). the challenge is to ensure new surrounding formal contractual relations between individual subjects, with the risk of information dominated by a uniform standard of cognition. the evolution of the notion of standards has met two other major issues in the last sixty years: the development of the welfare state and the development of services (tertiary sector) with the shift to the “taylorization of services”. the welfare state, often interventionist, particularly in france, has gradually evolved to become more of a guide, a motivator and an arbitrator. this in a context of limited resources, deep deficits and higher charges, has implied a tighter cooperation with the private sector. with a social or welfare budget which amount is larger than that of the state’s itself during the last twenty years, the state has been forced to delegate, develop partnerships with the private sector and learn to "manage risk", especially financially. at the same time, western societies have become service societies, since the service sector now counts for nearly 75 percent of the active working population, with a high proportion of "knowledge workers." 1.2 standards and assessment for improving quality according to afnor (french standards association or association française de normalisation), the best way to introduce standards and norms is to recall the definitions of "standard" as proposed in iso/cei 2 . standardization is an "activity of establishing, in front of real or potential problem, provisions for common and repeated use, aimed at obtaining the optimum degree of order in a given context." the document states that "this activity involves, in particular, the formulation, dissemination and implementation of standards." it says that standardization offers significant advantages, including better adaptation of products, processes and services for which they are assigned, for the prevention of trade barriers and facilitating technology cooperation. the same guide outlines that "the standards are based on the consolidated results of science, technology and experience and seek the optimum benefit of the community." we shall retain the ideas of "common and repeated use for obtaining optimum degree of order in a given context and facilitate cooperation". all organizations, private companies or public sector agencies, have developed customer approaches based on standards and benchmarks to ensure the quality of the services offered. the change has largely concerned management devices which have proliferated in all organizations. boussard (2006) conclude that "the management devices between organizational and professional standards” systems of standardization (of quality, security) about integration of information (erp: enterprise resource planning) and assessment (of skills, of financial results), are imperative in the name of the ideal organization, which is rational and efficient because regulated and controlled. according to boussard (2008), these management devices constitute the privileged support of the the "makers of performance". this article comes to a key point: 2 normalisation et activités connexes – vocabulaire général (2004), european standard reference en 45020, in france nf en 45020.using iso definitions (international standards organization), website : http://www.bivi.metrologie.afnor.org/ofm/metrologie/i/i20/i-20-10/4 (visited on september 2010, 25 th ). javascript:bivi_preredirect('nf%20en%2045020'); http://www.bivi.metrologie.afnor.org/ofm/metrologie/i/i-20/i-20-10/4 http://www.bivi.metrologie.afnor.org/ofm/metrologie/i/i-20/i-20-10/4 62 the link between standards, productivity and the evaluation of the performance. the development of a "government by the standards" and by the quantitative techniques of management is inseparable from evaluation. the use of increasingly important sub-contracting (outsourcing) or of a delegation and contracting approach can be defined as an objective or outcome approach and requires an assessment of the results obtained by the contracting party in comparison with the targets written in the original contract. states often try to master huge deficits, particularly in the health sector in france. lievre invites j. plante who defines "assessment as the formation of value judgment on action in the perspective of decision making." plante continues: "the quality of an assessment lies in the degree of integration of the results produced in the representations to come of the sponsors" (lievre 2002, pp. 22-23). in the public sector or quasipublic social protection in france, these notions of standardization and evaluation correspond to the proliferation of different agencies. for example in the healthcare sector, france developed andem (national agency for the development of evaluation in medicine), established in 1990, then in 1997 it became anaes (national agency for assessment and accreditation in health) and finally it became the high authority for health (has) in 2005. then there is the afssaps for sanitary security and health products. in the case of healthcare networks, devices of cooperation between public and private sectors wanting to articulate the activities of the hospital and primary care, it is outlined that: "the assessment of healthcare networks means to appreciate the achievement of qualitative and quantitative goals to measure their impact on the quality of care for patients, the quality of access to care, practices of health professionals and on all the context of these healthcare networks." 3 the risks of drifts from a "government by the standards" are important in this case. the pointillist application of guidebooks and procedures (to take documents literally) can override the main spirit, forgetting the importance of context, as the cult of quantitative approaches overriding more qualitative approaches. quality does not amount to the only application of standards. it constitutes above all a state of mind, a culture modulating behaviour, and a way of being and know how to face situations 4 . 3 circular cnamts (health insurance)/dhos – ministry of health (march 2 th , 2007) about orientations for evolution of healthcare networks in france, p. 2. 4 ecole des enseignants-chercheurs en qualité, cnqp (comité national de la qualité et de la performance) – université de technologie de compiègne (utc), paris, negocia, 27 janvier 2011. quality is not only standards; it is not only order or rule without meaning. it is rule and meaning. the problem is when we have rules without meaning or against meaning. 1.3 the cult of standards or the risk of efficiency obsession in a too exclusive quantitative approach alémanno-parrini and le moënne (2010) have outlined how the issue of evaluation of professional practices has become central in various sectors, including that of home services. alémanno-parrini and moënne (2010) conclude that: "this concept is obviously ambivalent. sometimes value judgment focused on practices, based on estimations of disparities with the specifications or expected results, in the case of projects (with extremely passionate reactions and mass movements of resistance). it can also be understood as a device for improvement or as an overall issue of resource management". this ambivalence is between the possibility of improvement and instrumental control. the rise of "performance devices" refers to the "injunction to professionalism" that "most often come into collision with the ideas that the professionals themselves have about their activity" (boussard, demazière & milburn, 2010). in the healthcare sector and especially in the hospital, schweyer (2010) highlights the tension between costs (administrative and economic point of view about efficiency, corresponding to a will to control expenditure) and values (of the different professions). the central objective of cost containment in the healthcare sector is also based on standards. mintzberg (2001) is particularly vehement in his denunciation of the drifts of a too exclusively quantitative approach, notably in "note on an ugly word: efficiency." 5 for mintzberg (2001) "management, as practiced now, may be causing the problem and do not propose the solution. it can work against our vital interests (...) a management obsessed with the idea of efficiency is a management obsessed with the idea of the quantifiable. the cult of efficiency became the cult of the quantifiable. and here lies the real problem (...) because the economic benefits are more easily quantifiable than the social benefits, efficiency often leads the organization to adopt an economic ideology that can sometimes mean social immorality" (mintzberg 2001, pp. 479-485). critics of mintzberg are met by de gaulejac (2009) when 5 mintzberg h (2001), « remarque sur un bien vilain mot : "efficience"», in le management. voyage au centre des organisations, paris, ed. d’organisation, p. 479 – 485. 63 he denounces the “society sick of management”. de gaulejac (2009) concudes in his preface that "disease of management becomes an epidemic." he stresses the point that "management by project became the model of governance." "the performance is not measured by the quality of service delivered, but only in terms of cost and financial results." de gaulejac (2009), who has been associated with the creation of the university of management in paris dauphine, emphasizes that "our purpose is not to condemn management. management is necessary to optimize the functioning of organizations and administrations. it is not bad in itself. it becomes bad when, with the pretext of reform or rationalization, tools are applied blindly, without concern for human consequences, organizational and social (…) when management is at the service of instrumental rationality, it loses its legitimacy" (de gaulejac 2009, pp. 9 -13). there are examples of drifts, in france, as in the case of companies like france telecom (orange), known for scandals of moral harassment or in the pôle emploi (french organization for unemployment). scepticism has also be directed towards the gap between the display of "quality certification" in ratp (underground company in paris) and at sncf (french railways) stations. the reality perceived by the users is of a sharp deterioration of the service during the last years. this is also the case in call centers (symbols of the “taylorization” of services), where quality guidelines emphasize the speed of response and limitation of waiting times, which is praiseworthy, but these guidelines rarely mention the quality and the added value of the information given to users. in order to stick to quality procedures, these users have become “customers”, even in the public services. in parodying the title of the work of ehrenberg (2000) on the "tiredness of being oneself" about an "individual uncertain, more and more exhausted by the "cult of performance". jeannot (2010) speaks of the "tiredness of being a customer", also in the public sector. jeannot (2010) stresses that these are not "users" who wish to become "customers". it is a "managerial standard", highly debatable, since the so-called customer has no real choice between different service providers. this "king customer" is more "confused", in "probation freedom" or suffering "pressures close to the forced sale" (jeannot 2010, pp. 35-39). the emphasis is strongly on information and communication, but wolton (2009) among others, states that "to inform is not to communicate." that is the question of meaning, especially in the public sector where the notions of "public service" and "public interest" no longer seem to have the same significance. 2. methodology our approach relies on a literature review and mainly on a qualitative method (with emphasis on qualitative and not just in the speeches of leaders and in the titles of laws, but in the reality of daily activity), nevertheless without neglecting the quantitative aspects. a first step is to measure the gap existing between the official speeches of the leaders and the daily reality lived by employees. the question of meaning is critical, as in any approach linked with the "intelligence of complexity", by giving full value to autonomy and responsibility of "knowledge workers" (dortier 2005). the question is also essential in the answers proposed both by mintzberg and by de gaulejac. they outline the imperative to "give meaning to action", changing the point of view from the "employee as a resource" to the valorization of the "individual subject" and so a "more human management of resources" (de gaulejac 2009, pp. 302-310). with the equally critical issue of developing trust (le cardinal): in oneself, in others and in the future, in the people and in sociotechnical devices. beyond standards, it is necessary to bet on the intelligence of the relationship. thus we meet both n. d'almeida (2001), who insists on a "relationship economy" with all the importance of networks and zacklad (2009) with his “economies of conviviality” and his “semiotics of cooperative transactions”. 3. standards and competitive intelligence not always an easy relationship these developments and shifts, which increase the gap between the noisy and incantatory speeches which are "customer focused" and the reality perceived by the so-called customer about the deterioration of delivered services, can contribute to the degradation of the image of companies. thus, the excesses of a "government by the standards" and of performance only considered in quantitative terms ask the question about the difficult relationship between standards and competitive intelligence. according to levet (2001), "competitive intelligence is the ability to understand our environment and to anticipate change (...) it is based on mastering information and on the production of new knowledge" (levet 2001, vii). the intelligence economique mémo, prepared by the french national gendarmerie (2006) distinguishes three families of threats for a company: 1) the damage to image and reputation 2) exposure to economic and financial risks 3) risks of information and know-how. the document, intelligence economique mémo, thus clearly 64 distinguishes between human threats and technological threats. for le bas and picard (2003), if "information is at the heart of any competitive intelligence device (...) it is no longer considered as a scarce resource (...) but what became rare and may be considered as a source of competitive advantage for companies that control this resource, they are the skills needed to use, to interpret, or assimilate information" (le bas & picard 2003, p. 17). in an organization that turns into a "learning organization", workers become "knowledge workers" (dortier, 2005). moral harassment and lack of motivation among employees may constitute a major risk for the company, resulting in risk management at different levels, a major concern for the function of competitive intelligence. holmes (2002) refers to bernstein, for whom, "the boundary between modern times and the past is the mastery of risk" (holmes 2002, p. 2). for bernstein, "risk management is an active process" (holmes 2002, p. 6) concerned with "the relationship between risk and change" (holmes 2002, p. 8). introducing new management methods and methods for assessing performance, standards induce powerful changes in human relations and in the lives of individuals, and all of these consequences are normally not taken into account in ci analysis as analysts try to select the best scenarios. for their part, metayer and hirsch (2007) insist on ethical risks and human needs in the company, referring to maslow's pyramid: need for belonging and of self respect and need for achievement. in this article emphasis has been on risks that the standards applied rigidly, expressed as instrumentalization. the standards used properly can contribute to a positive image of the company by improving the quality perceived by customers. these standards can also improve cooperation between organizations, especially in the context of globalization. it is only in their drifts, also for the project (boutinet) standards and project often being associated that they constitute a risk for companies. 3.1 a different approach to standards and competitive intelligence relationship the author believe that another approach of the relationship between standards, assessment and competitive intelligence is possible, especially based on the concept of “reliance”, important in the interdisciplinary of information and communication sciences (ics). bernard (2006) positions the information and communication sciences at the articulation of four issues: relationship, meaning, knowledge and action. ollivier (2000) points out three issues: meaning, power and identity. the question of meaning is essential. it is at the heart of the specificity of ics, by providing the question of interactions with that of relationship (interactions or relationship) with knowledge and with action (issues of representations) , and with the joint issues of competitive intelligence as an aid to decision making in a strategic perspective. the human dimension is essential. wolton (2009) emphasizes that to "think communication is to think the lack of communication, he speaks of “incommunication”. for wolton "to communicate is less and less about how to transfer, rarely to share, but usually to negotiate and finally to cohabit" (wolton 2009, p. 94). this importance of meaning must be enhanced in relation to the notions of situation and contextualization as expressed by mucchielli (2010) through his approach of "situational semiotic”. mucchielli proposes to analyze situations for an actor from different frameworks or contexts: through identification of actors, positioning of actors, space and temporal contexts, standards, values, quality of relationships. these should be applied to standards in companies, for goods or services, for a wider general use in society (social norms) but also as a method, as for technical requirements to supervise activities, standards established by iso or french afnor. this is the subject of this communication. it is essential for "situational semiotic” to analyze the situation for any actor following these dimensions for reflection. the ics approach tries to answer the central question of the meaning of the activity, recognizing issues that are central in management for a more complex approach. genelot (2001) stresses the importance of "making sense" and "build a culture", by "putting the human being at the heart of the company", "knowing how to recognize and articulate different logics to go back to the source of representations" (genelot 2001, pp. 336 340). 3.2 standards: an example of the globalization only for the benefit of its dominant countries and companies? besides their weight of standards on the evolution of organizations, including those imposed through socio-technical devices such as information systems or management, standards are also a strategic issue for economic globalization. the competition between companies and countries is now global, both in the field of industrial products (cars, computers, machine tools and so on) but also in services (energy, insurance, banking, retail, transport, telecommunications and so on). producers seek to generate margins in one battle at a time, all centered around cost, sales, and 65 the setting of prices as essential in the context of fierce competition. for their part, buyers and regulators seek qualitative benchmarks, for selecting the most competitive, rather than the less expensive suppliers or contractors. in this perspective, as already stressed by d'almeida, the company's image and its reputation (around the concept of brand) can be valuable with all the challenges of e-reputation or reputation by examining information from internet. standards and certifications (as recognized signs of quality) may also help to develop the confidence of buyers and consumers and, therefore, constitute a strategic issue for companies, as part of a competitive intelligence analysis. the definition of standards is presented in basic documents published by the standards’ organizations as the result of a consensus. in this article the author questions the weight of the anglosaxon countries and companies, especially united states of america, particularly in the iso (international organization for standards) which, by progressive or more coercive methods, contribute to impose standards on the rest of the world. these standards correspond to their particular approach and interests, helping to create a competitive advantage for their own businesses. other standard organizations such as afnor in france, integrate and use the standards proposed by iso, more or less willingly. as for patents and industrial property, the standards battle is a major issue for the credibility of the european union and the economic weight of the countries of the old continent in the global marketplace. after the quasi abandonment of the national policy of scientific and technical information in france in the 90’s, hope was placed on the european level. worries have been expressed about the recent draft agreement (in december, 2010) between the european patent organization (epo) and google for the translation of the european patents 6 . the stakes are particularly high in the field of standards, concerning the production of industrial goods or services, but there is also a key issue around accounting standards, as demonstrated by capron (2007). capron (2007) has stressed that in france, accounting is often perceived as a neutral technique (also often perceived as esoteric) that may be required objectively. furthermore, capron (2007) states that it is above all a social convention, historically dated, evolutionary, developed according to the big economic movements, more or less buffeted by conflicting pressures and intended to produce economic and social effects, the most important thing is bringing confidence in trading. 6 la dépêche du gfii (groupement français des industries de l’information) 2010, december 1 st . by focusing only on learning the ways of recording and bookkeeping system, france is in a vulnerable position, not reconsidering the foundations of the accounting systems. this includes the principles that guide accounting choices: any accounting system is a choice of representation of the economic and financial reality among many other possibilities. this instrumental and technical approach impedes being aware of the diversity of accounting systems in the world and across time, and more importantly, to underestimate the importance of valuation methods and valuation of companies. these are crucial to define the value of companies in case of purchase and also for taxation. taxation is dependent on the criteria for evaluating benefits and benefits in term depend on provisions and depreciations. for example anglosaxon accounting systems grant more freedom to the accounting players as shown in the case of enron (2001). as seen afterwards, this perspective of the accounting system must be questioned. it is for the competitive intelligence function to detect its weaknesses in advance. thus questioning the whole system becomes its domain. 4. conclusion and future research standards, certification and evaluation are key areas which influence the future of our world. the field of ci must be aware of the stakes. in this article the author has showed the risk of our existing standards in the form of certification and evaluation, which may lead to an obsession with instrumental and quantitative techniques. examples of this is stressed by mintzberg (2001) and de gaulejac (2009), where the subtitle of the book is "managerial ideology, managerial power and social harassment." we must not deny the interest of management or the standards for the development of confidence, both for consumers and policy makers, to ensure the quality of goods and services, but must also foster comparisons. it is necessary to assess all the issues (not always seen) in the field of standards, both in the overall context of the globalization of trade and markets, but also the risks of abuses in daily activities in enterprises and organizations. the technique or even the idea of progress itself, standards, certification and evaluation, and more widely quality approaches, are at the end ambivalent. they must be seen as tools and not as an end in themselves. in this perspective, the problems of the relationship, meaning, knowledge and action, as presented in an ics (information and communication sciences) approach are essential. this approach values the importance of the investment in the field of standards, certification and assessment by competitive intelligence actors, 66 to restore its relational and human dimensions (not leaving it only to engineers and technicians) both at the strategic, the policy (macro), and day-to-day working (micro) levels. the challenge is to create relationship and meaning to have better choices. in this spirit the author has also wanted to offer some areas for future research linked with challenges in the development of trust, meaning and cooperation in a new qualitative approach around “quality 2.0” or ”sustainable quality”. in what can be called the stereotypical speeches of main world organizations (such as wto: world trade organization), some states and large companies insist on the benefits of free global competition for consumers. many are questioning whether or not these are smokescreens, trying to hide a manipulation. strategic issues such as standards, are they not often ultimately a tool for domination of a few countries and for big multinational companies? more broadly, does not the unbridled pursuit of profit through the obsession of performance and efficiency (stiglitz speaks about “cupidity”) risk to forget the quality, in the best sense of the word, sacrificing for example the healthcare and the environment because it is not profitable? the relationship between standards and the study of competitive intelligence here meets the challenges of sustainable development, outlining the limits of the current globalization process. references alémanno-parrini, s., le moënne, c. 2010. appel à contributions pour le n° 38 : « evaluation, communication ? », revue communication & organisation : http://www.fabula.org/actualites/communication -et-organisation-n38-evaluationcommunication_39084.php (visited on december 2011 3 rd ). avenier, mj. 1997. le management stratégique dans la complexité : un cadre de réflexion, consultable sur http://www.strategieaims.com/montreal/avenier.pdf bernard, f. 2006. « les sic une discipline de l’ouverture et du décloisonnement », in bouzon (arlette) sous la dir. de, la communication organisationnelle en débat. champs, concepts, perspectives, paris, l’harmattan, pp. 33 – 46. boussard, v., demaziere, d., milburn, p. 2010. l’injonction au professionnalisme. analyses d’une dynamique plurielle, presses universitaires de rennes, 176 p. boussard, v. 2008. sociologie de la gestion. les faiseurs de performance, paris, belin, 263 p. boussard, v. (red.) 2005. au nom de la norme : les dispositifs de gestion entre normes organisationnelles et normes professionnelles, paris, l’harmattan, 224 p. boutinet, jp. 2001. anthropologie du projet, paris, puf, 6 e éd., 350 p. cacaly, s., le coadic, yf., pomart, pd. and sutter, e. 2008. dictionnaire de l’information, armand colin, 3 e éd., 294 p. capron, m. 2007. « les enjeux de la mondialisation des normes comptables », l’economie politique, 2007 / 4, n° 36. carayol, v. 2004. communication organisationnelle. une perspective allagmatique, paris, l’harmattan, 235 p. d’almeida, n. 2006. « les organisations entre projets et récits », in bouzon (arlette) dir., la communication organisationnelle en débats. champs, concepts et perspectives, paris, l’harmattan, p. 145 – 158. d’almeida, n. 2007. les promesses de la communication, paris, puf, 2001, rééd., 2007, 264 p. david, a. (red.) 2010. intelligence economique et problèmes décisionnels, paris, ed. hermes lavoisier. diaz-bone, r., thévenot, l. 2010. « la sociologie des conventions. la théorie des conventions, élément central des nouvelles sciences sociales françaises », trivium, 5– 2010 : http://trivium.revues.org/index3626.html. (visited on june 2010 27 th ). dortier, jf. 2005. « les professionnels de l’intelligence : portrait de groupe », les travailleurs du savoir, sciences humaines, n° 157, pp. 28 33. ehrenberg, a. 1991. le culte de la performance, paris, calmann-lévy. ellul, j. 2001. la technique ou l’enjeu du siècle, paris, economica, 1990, rééd. 2001, 423 p. gaulejac, v. 2009. la société malade de la gestion. idéologie gestionnaire, pouvoir managérial et harcèlement social, paris, 2005, nouvelle éd., points-seuil, 353 p. gendarmerie nationale (2006) mémo intelligence economique, 55 p. genelot, d. 2001. manager dans la complexité, paris, insep consulting, 357 p. guilhon, b., levet, jl. (reds.) 2003. de l’intelligence economique à l’economie de la connaissance, paris, economica, 199 p. holmes, a. 2002. risk management, oxford, capstone publishing, 122 p. jeannot, g. 2010. « la fatigue d’être client », informations sociales, les services publics face à leurs usagers, n° 158, pp. 34 – 41. lebas, c., picard, f. 2003. « intelligence économique, analyse stratégique évolutionniste et compétences de l’organisation », in http://www.fabula.org/actualites/communication-et-organisation-n38-evaluation-communication_39084.php%20(visited%20on%20december%202011%203rd http://www.fabula.org/actualites/communication-et-organisation-n38-evaluation-communication_39084.php%20(visited%20on%20december%202011%203rd http://www.fabula.org/actualites/communication-et-organisation-n38-evaluation-communication_39084.php%20(visited%20on%20december%202011%203rd http://www.fabula.org/actualites/communication-et-organisation-n38-evaluation-communication_39084.php%20(visited%20on%20december%202011%203rd 67 guilhon, b., levet, jl. (reds.) de l’intelligence economique à l’economie de la connaissance, paris, economica, pp. 15 31. le moënne, c. 2004. « la communication organisationnelle à l’heure de la dislocation spatio-temporelle des entreprises. la mutation des formes organisationnelles », sciences de la société, in chessel, m.-e., cochoy, f. dir., marché et politique. autour de la consommation engagée, toulouse, lerass, presses universitaires du mirail, n° 62, 2004, pp. 209 – 224. levet, jl. 2001. l’intelligence economique. mode de pensée, mode d’action, paris, economica, 154 p. lievre, p. 2002, evaluer une action sociale, rennes, ed. ensp, 115 p. mayère, a. 1990. pour une économie de l’information, paris, editions du cnrs. métayer, y., hirsch, l. 2007. premiers pas dans le management des risques, paris, afnor, 2007, 135 p. miège, b. 2004. l’information-communication objet de connaissance, de boeck, bruxelles, 248 p. mintzberg, h. 2002. « nous vivons dans le culte du management », entretien, in les organisations. etat des savoirs, cabin (philippe) coord. par, editions sciences humaines, auxerre, pp. 91 – 97. mintzberg, h. 2001. le management. voyage au centre des organisations, paris, ed. d’organisation, 570 p. morin, e., le moigne, jl. 2003. l’intelligence de la complexité, paris, l’harmattan, 332 p. mucchielli, a. 2010. communication & influence. approche situationnelle, editions ovadia, nice – genève – paris – bruxelles – montréal, 124 p. mucchielli, a. 2001. les sciences de l’information et de la communication, hachette supérieur, 3 e éd., 158 p. ollivier, b. 2000. observer la communication. naissance d’une interdiscipline, cnrs editions, paris, 184 p. plante, j. 1991. principes d’une évaluation socialement utile. leçons d’une expérience québécoise », in outils, pratiques, institutions pour évaluer les politiques publiques, paris, la documentation française. schweyer, fx. 2010. « hôpital, une tension entre coûts et valeurs », in halpern (catherine) coord. par, la santé. un enjeu de société, auxerre, ed. sciences humaines, pp. 278 – 287. thévenot, l. 1997. « un gouvernement par les normes. pratiques et politiques des formats d’information », in conein, b., thevenot, l. dir., cognition et information en société, paris, editions de l’ehess, pp. 205 – 242. wolton, d. 2009. informer n’est pas communiquer, paris, cnrs editions, 147 p. zacklad, m. 2009. « les économies de la convivialité dans les sociétés de l’information et des services », leçon inaugurale, paris, cnam, 17 juin 2009. web sites accessed afnor (association française de normalisation) : www.afnor.org association pour la pensée complexe. programme européen « modélisation de la complexité » : http://mcxapc.org iso (international standards organisation): www.iso.org http://www.afnor.org/ http://mcxapc.org/ http://www.iso.org/ 5 toward a better understanding of smb ceos' information security behavior: insights from threat or coping appraisal yves barlette 1 , katherine gundolf 1 , annabelle jaouen 1 1 montpellier business school, france email: y.barlette@montpellier-bs.com k.gundolf@montpellier-bs.com a.jaouen@montpellierbs.com received march 15, accepted may 16 2015 abstract: this study presents an empirical investigation of factors affecting smb ceos decision to improve or not their company's information security (iss). we developed a research model by adopting the protection motivation theory (pmt) to investigate the effect of threat and coping appraisal on protective actions. we conducted a questionnaire-based survey with smb ceos. prior studies using pmt have never been focused on smb ceos behavior, and we postulate that in smbs where there is no cio or even it people, ceo’s actions are of utmost importance for achieving a satisfying iss. keywords: protection motivation theory, coping, ceo, smb, behavior, information security. available for free online at https://ojs.hh.se/ journal of intelligence studies in business vol 5, no 1 (2015) 5-17 mailto:y.barlette@montpellier-bs.com mailto:k.gundolf@montpellier-bs.com mailto:a.jaouen@montpellierbs.com https://ojs.hh.se/ 6 1. introduction many threats to information security (iss) come from employees' behavior which are not compliant with information security policies (chu & chau, 2014; siponen et al., 2014), iss organizational rules or even guidelines or requirements (ifinedo, 2012; workman et al., 2008). however, numerous surveys and studies have confirmed that managerial support is essential in obtaining adherence of employees to iss (avolio, 2000; johnston & hale, 2009). in addition, employees’ involvement and propensity to act are directly dependent on managers’ concrete actions (dong et al., 2009; forcht & ayers, 2000). to date, little attention has been given to top management’s role. withal, many scholars advocated that iss should be addressed at the top management level (markus, 1983; longeon & archimbaud, 1999; friend & pagliari, 2000; knapp et al., 2006). the mis literature repeatedly shows that managers must not only be aware but also be personally involved. managers' involvement is essential in the implementation, maintenance and success of issrelated actions (johnston & hale, 2009). rockart & crescenzi (1984) declared that managers must recognize that information is a strategic resource and that "senior executives are increasingly feeling the need to become informed, energized, and engaged in information systems" (p.3). top managers must be considered as the starting point for satisfactory iss (robinson & volonino, 2004). according to longeon & archimbaud (1999): "determining and supervising the security policy are top management concerns. nothing valuable can be done without the manager, provided that he knows all the challenges involved." (p. 19). however, some managers are poorly involved or are poorly acting in their company’s iss, leading to potentially disastrous consequences. few studies aimed at understanding ceos' participation and actions in iss (dong, 2008; zwikael, 2008; barlette, 2012). moreover, studies dedicated to factors influencing action, their incidence on iss, and major actions that are incumbent to managers usually focus on medium or large business executives (lee and larsen, 2009; vance et al., 2012). this study investigates iss in french smbs. in 2013, smbs (less than 250 employees) accounted for 99.8% of all enterprises active in the eu28 non financial business sector, representing 66.8% of total employment, including a large part of small (less than 50 employees) and micro‐enterprises (less than 10) (european commission, 2014). iss surveys have revealed that smbs are far behind larger companies in implementing protection because they lack technical (labodi & michelberger, 2010) and financial resources (lee & larsen, 2009). smbs have to face important issues: (1) it is more difficult for smbs to recruit and keep ict or iss specialists (monnoyer, 2003; pritchard, 2010), (2) ongoing risk assessment is often lacking (gupta & hammond, 2005), and (3) many smb managers are not sufficiently aware of iss issues (mitchell et al., 1999) and consider information security to be a ‘large business’ concern (rees, 2010). the unfortunate truth is that smbs are as much – and in some cases more – at risk from security breaches that could threaten their organization (rees, 2010). therefore, smbs and their managers constitute a specific case for iss research. in this study we test protection motivation theory (pmt) on smb ceos and observe what factors explain their intention to engage in protective actions for their firm. this paper is structured as follows: in section two, the literature review will lead to our model and hypotheses development. third section introduces our methodology. we present our results in the fourth section and discuss them in section five. in the last section, we sum up our main results and introduce our next study. 7 2. research background in this section, we will introduce successively protection motivation theory, then our model and hypotheses. 2.1. protection motivation theory (pmt) pmt (rogers, 1983) is one of the most powerful explanatory theories for predicting an individual's intention to engage in protective actions (anderson & agarwal, 2010). pmt can be divided into two major components: threat appraisal and coping appraisal factors. 2.1.1. threat appraisal the perception of threat is defined as the anticipation of a psychological, sociological or physical violation or harm to oneself or others (lazarus, 1991; workman et al., 2008). people perceiving this threat will adjust their behavior according to the amount of risk they are willing to accept. this adjustment is based on the perceived severity of cost and damage associated with the threat and their perceived vulnerability related to the threat. perceived vulnerability is the conditional probability that the threatening event will occur provided that no adaptive behavior is performed or there is no adaptation of an existing behavior (lee & larsen, 2009). the more perceived vulnerability to a security breach the more iss behaviors people will exert (ryan, 2004), the opposite can be also true, e.g. perceived invulnerability can lead to less iss behaviors (bulgurcu et al., 2010; ryan, 2004). perceived severity corresponds to the perception of the severity of the consequences of an iss problem, because iss measures were insufficient or ineffective (ifinedo, 2012; liang & xue, 2010). it includes for example the perceived level of company's loss of activity, loss of data, financial losses and the eventual side effects (e.g. loss of image). this perceived severity will lead people to behave in a more cautious manner if this perception increases, but the reverse effect also exists, e.g. people will be less cautious if the perceived severity diminishes (bulgurcu et al., 2010; herath & rao, 2009). 2.1.2. coping appraisal coping behavior will depend on the control perceived by people on this behavior, their perceived capabilities, and the effort they will expend to accomplish that behavior (bandura, 1977). three components will influence this coping appraisal: response efficacy, self-efficacy and response cost. response efficacy corresponds to the beliefs about the perceived benefits of the behavior exerted by the individual (rogers, 1983). if people perceive the available coping mechanisms as adequate, for example because available security measures are improving (kankanhalli et al., 2003), they are less likely to omit an iss-related behavior. on the contrary, if people have a negative perception of the efficacy of the necessary behavior, because no matter what they do security breaches will go on increasing, they will be more likely to omit this behavior (workman et al., 2008). self-efficacy is defined as "people’s beliefs about their capabilities to produce designated levels of performance that exercise influence over events that affect their lives" (bandura, 1994, p. 81). prior research has demonstrated people are more motivated to cope with or perform it security behaviors as the level of their self-efficacy increases (workman et al., 2008). response cost resembles to the physical and cognitive efforts necessary for the adaptive response (lian & xue, 2010). it can correspond to money or time to invest in the behavior or the security measure, the inconvenience or the difficulty of the behavior itself. this perceived effort is put into balance with the perceived value of the iss-related behavior (workman et al., 2008). 8 2.2. the research model and hypotheses figure 1. the theoretical model threat appraisal: an increase in perceived severity and vulnerability leads to greater intention to behave in a healthier manner. therefore we postulated (see fig. 1): h1: perceived severity of potential information security threats influences positively and significantly smb ceos’ intention to perform information securityrelated actions. h2: perceived vulnerability from potential information security threats influences positively and significantly smb ceos’ intention to perform information securityrelated actions. coping appraisal: according to pmt, it consists of self-efficacy, response-efficacy and response cost. response efficacy, in the context of our research, refers to the ceos' belief in whether performing information security-related actions can enhance their company's security and reduce security flaws. we postulated: h3: response efficacy to potential information security threats influences positively and significantly smb ceos’ intention to perform information securityrelated actions. self-efficacy referred here to ceos' belief in their ability to perform information security-related actions. we believe that self-efficacy to potential information security threats has a positive and significant impact on ceos' intention to perform information security-related actions. we therefore postulated: h4: self-efficacy to potential information security threats influences positively and significantly smb ceos’ intention to perform information security-related actions. response cost represents any costs (e.g. time, monetary, difficulty, complexity, effort) associated with taking the adaptive coping response. hence, we postulated: h5: response cost influences negatively smb ceos’ intention to perform information security-related actions. gender has been found to be important in it contexts (venkatesh et al., 2003). therefore we postulated: h6: male smb ceos have a greater intention to perform information security-related actions than female ceos. age showed significant differences in the involvement of managers and their perception of troubles affecting their company's is (stevens et al., 1978, venkatesh et al., 2003). thus, we posited: behavioral intention perceived severity perceived vulnerability response efficacy gender age self-efficacy response cost size coping appraisal threat appraisal h1 h2 h3 h4 h5 h8h7h6 9 h7: age negatively affects smb ceos' intention to perform information securityrelated actions. lee and larsen (2009) did not identify that the size had any significant influence on the behavioral intention. anyway, we posit that the smaller the size of the company, the more important the role of the ceo in the management of information security. thus, we postulate that a larger firm’s size is negatively related with ceo’s behavioral intention to take or implement i.s. security measures. h8: company’s size influences negatively smb ceos' intention to perform information security-related actions. 3. methodology 3.1. research design the research model was tested using a field survey. we administrated the questionnaire to smb ceos. each participant received an email explaining the purpose of our study, including a link to our webbased questionnaire. a total of 258 responses were returned between december 2014 and january 2015. after removing incomplete and invalid responses, we obtained 177 usable responses. response rates for information security-related surveys are usually low (kotulic & clark, 2004). in addition, smb ceos are very difficult to contact by email and time is a scarce resource for them (wolcott et al., 2008). the scales used in this study (see appendix a) were taken from previously validated research. the response efficacy and perceived severity scales (eff. r, sev.) had measures adapted from vance et al. (2012). the self-efficacy scale (eff. s) had measures borrowed from lent et al. (2006) and vance et al. (2012). the response cost and perceived vulnerability scales (cost, vuln) had measures borrowed from vance et al. (2012). the behavioral intention scale (int.) used measures adapted form workman et al. (2008) and yoon and kim (2013). all items, except nominal variables, were measured using 7-point likert scales anchored at 1="strongly disagree" and 7="strongly agree". the questions included in our instrument were first pre-tested through face-to-face interviews with smb ceos (n=14). based on ceos' feedback, the readability of the questions was improved. the questionnaire itself was created using qualtrics tool. in the beginning of the questionnaire, an introductory text defined information security and specifying that only ceos of businesses with less than 250 employees were authorized to respond. participation in the study was voluntary and respondents were assured that individual responses would be treated with anonymity and confidentiality. 3.2. measures our purpose was to determine the influence of antecedents on behavioral intention. all the items of the questionnaire are described in appendix a. dependent variable the dependent variable behavioral intention (int.) was calculated through a factorized construct (cronbach’s alpha = 0.904) composed of two items, int1 and int2. independent variables the independent variables were divided into two groups. to measure threat appraisal, we observed perceived vulnerability (vuln.) and perceived severity (sev.). to measure coping appraisal, we used three variables: response efficacy (eff. r.), selfefficacy (eff. s.), response cost (cost.). all items exhibited a reliability score over 0.7, which is considered as satisfying. variable factoriz ed constru ct cronbac h’s alpha items (see appen dix a) threat apprai sal perceived vulnerabil ity vuln 0.857 vuln1, vuln2, vuln3 perceived severity sev 0.770 sev2, sev3 copin g apprai sal response efficacy eff. r 0.795 eff. r1, eff. r2 selfefficacy eff. s 0.899 eff. s1, eff. s2, eff. s3 response cost cost 0.712 cost1, cost2, cost3 table 1: constructs and reliability of measurement items control variables as control variables, we included gender, size and age. we included gender in the form of a dummy variable (male = 0; female = 1). size was measured through a scale according to the european classification of firms: less than ten employees (micro-enterprises = 1), ten up to 49 employees (small enterprises = 2) and 50 up to 250 employees 10 (medium enterprises = 3). age represents the respondent’s age. 3.3. data analysis to test the hypotheses, a multiple regression analysis was performed using the statistical analysis software spss (version 21). in doing so, we performed regressions of the control variables size, age and gender as well as the independent variables, on ceo’s behavioral intention, our model’s dependent variable. the common method bias was controlled by a harman’s single factor test (podsakoff et al., 2003). the most covariance explained by one factor in our data is 17.6 percent; hence cmv bias was not a problem for our data. 4. results as showed in table 2, the main part of the respondents were male (about three quarters). our proportion of 25 percent of female ceos is close to the 29 percent european figure (european union, 2014). sizes of companies were distributed as follows: 58.8 percent micro-enterprises with less than ten employees, 29.4 percent businesses between 10 and 49 employees, and 11.9 percent of medium-sized businesses. our sample shows a slight under representation of the smallest businesses compared to european figures (oecd, 2013), but remains closer than previous studies dedicated to information security in smbs (gupta and hammond, 2004; lee and larsen, 2009). the average age was around 40 years old (see table 3). variable frequency percent (%) gender male 132 74,6% female 45 25,4% size 0-9 104 58,8% 10-49 52 29,4% 50-250 21 11,9% table 2: demographic characteristics of the sample (n=177) table 3 shows the means, standard deviations, and correlations of our variables. variables mean sd 1 2 3 4 5 6 7 8 9 1. size 1,53 ,70 1 2. gender 0,25 ,43 ,190* 1 3. age 39,9 12,08 -,132 -,087 1 4. vuln. -,008 ,99 -,068 -,047 ,196* * 1 5. sev. ,007 ,99 ,002 ,028 ,047 ,000 1 6. eff. r. ,008 ,99 ,230* * -,151* ,260* * ,000 ,000 1 7. eff. s. ,006 ,99 -,157* -,139 -,095 ,000 ,000 ,000 1 8. cost ,004 1 -,089 -,142 -,091 ,000 ,000 ,000 ,000 1 9. int ,007 ,99 -,104 -,162* ,066 ,224* * ,058 ,298* * ,202* * ,199* * 1 n= 177; significance: *** p < 0.001; ** p < 0.01; * p<0.05 table 3: descriptive statistics and correlations 11 table 4 presents the regression results. we integrated the control variables in model 1 to determine their effects. model 1 reports no significant effects: neither the firm size, gender nor cio’s age impact significantly the behavioral intention. in model 2, to test all hypotheses, we included the different independent variables to examine to which degree they determine behavioral intention. the results of the f-test (f = 8.26; p < .001) are significant. hence, we can reject the null hypothesis, concluding that there is strong evidence that the expected values in the groups differ. we also evaluated the reliability by examining the multicollinearity of measures to determine their variance inflation factor (vif). all vif were less than 2, therefore we can say that all indicators have an acceptable reliability. variables model 1 vif model 2 vif step 1: controls size -,069 1.050 ,002 1.131 gender -,136 1.040 ,053 1.087 age ,045 1.022 ,027 1.163 step 2: main effects vuln. ,232*** 1.056 sev. ,056 1.005 eff. r. ,292*** 1.128 eff. s. ,189** 1.057 cost ,187** 1.039 r² ,031 ,222 adjusted r² ,014 ,185 δr² ,031 ,191 f 1,82 8,26*** significance: *** p < 0.001; ** p < 0.01; * p<0.05 table 4: multiple regression analysis: dependent variable = behavioral intention cio’s behavioral intention is significantly influenced by perceived vulnerability, and by coping appraisal (response efficacy, self-efficacy and response cost). as shown in table 4 and as illustrated in figure 2, the total explained variance is 18.5 percent. figure 2. results for the tested hypotheses (***: p < 0.001; **: p < 0.01; *: p<0.05) behavioral intention (r²=0,185) perceived severity perceived vulnerability response efficacy gender age self-efficacy response cost size coping appraisal threat appraisal 0.232*** 0.056 0.292*** 0.189** 0.187** 0.0020.053 0.027 12 perceived vulnerability (β = 0.232; p < .001), response efficacy (β = 0.292; p < .001) and selfefficacy (β = 0.189; p < .01) serve as significant determinants of behavioral intention to implement security measures. these findings support hypotheses h1, h3 and h4. response cost (β = 0.187; p < .01) had an opposite influence contrary to what was expected, thus h5 is not supported. the influence of perceived severity was nonsignificant, thereby h2 is not supported. none of our control variables, gender, age and size showed any significant effect, therefore h6, h7 and h8 are not supported. 5. discussion table 5 shows the previous studies we identified dealing with the protection motivation theory. papers year target company size models tested behavioral intention actual behavior workman et al. 2008 employees large it firm pmt (threat control model) n/a take measures to protect infos (subjective) + logs (objective) herath & rao 2009 employees all sizes pmt, deterrence compliance with orga issp n/a lee & larsen 2009 executives smb (2008) pmt, social influence support, encourage purchase purchases of antimalware soft ifinedo 2012 employees all sizes pmt, tpb compliance with orga issp n/a vance et al. 2012 administrative city govt habit, pmt compliance with orga issp n/a yoon & kim 2013 employees all sizes pmt, tra take measures to protect info n/a siponen et al. 2014 employees all sizes (2006) pmt, tra compliance with orga issp compliance + recommend & assist johnston et al. 2015 employees city govt pmt, deterrence changing password n/a issp: i.s. security policy table 5: previous studies and characteristics if we compare our respondents with all the previous studies in table 5, only lee and larsen’s study was dedicated to executives (yet nearly 60 percent were is-experts) and to smbs (yet less than 500 employees). we posited that for the smallest sizes of businesses, as no cio exists in the company, ceo’s importance is reinforced in the management of information security. our study is clearly different from the previous ones because: smbs of our sample follow the european definition: “less than 250 employees”, with an average size of 27 employees (vs. 192 employees for lee and larsen’s study); we focused exclusively on ceos ; deterrence theory was not used because we contend that it is more relevant to explain employees’ behavior than ceos’ one ; as ‘behavioral intention’, we used the implementation of is security measures, as ceos take part and/or support the creation and the implementation of security policies whereas compliance can be seen as more passive and more requested from employees. perceived vulnerability had a strong and significant positive influence on iss behavioral intention. this confirms the results of ryan (2004) and bulgurcu et al. (2010) concerning ceos. the more company’s i.s. is perceived as vulnerable, the more ceos tend to develop or apply iss policies and procedures in their companies. response efficacy and self-efficacy had a positive influence on smb ceos’ iss behavioral intention: our study extends the results of kankanhalli et al. (2003), showing that when ceos have a positive perception of the efficacy of their behavior, they intend to be more secure and to implement iss 13 measures. our results are also in line with the results of ifinedo (2012) and lee and larsen (2009) as we confirmed that behavioral intention is mainly influenced by coping appraisal. another interesting result is that if is-experts accounted for nearly 60% of lee and larsen’s study respondents (2009), 40 percent were non is-experts (ceos, cfos and coos 1 ). they could assess strong differences between is experts and non-is experts. as very often ceos are far from being is experts, our results are also consistent with the fact that behavioral intention of non-is experts is more influenced by coping appraisal, while behavioral intention of is experts is more influenced by threat appraisal (lee and larsen, 2009, p. 184). therefore, the fact that perceived severity had a weak and nonsignificant influence in our study is also in line with lee & larsen’s findings. the size of the company was not relevant to explain ceo’s behavioral intention to take or implement security measures: this means that when the ceo is alone or even if a dedicated function exists (cio or other employee who takes in charge information security), the cio’s level of intention to act doesn’t vary significantly. therefore, our study confirms the importance of ceos’ role in smbs’ iss. surprisingly, response cost influenced positively the ceo’s behavioral intention, which is counterintuitive and contradictory to previous studies results. such result means that the more ceos feel costly their behavior in terms of efforts or inconveniences, the more important their behavioral intention. we can suppose that ceos feel that information security is not only important, but also implies vital and compulsory changes in their smbs. response cost could be, in this case, linked with the perception of iss as a strategic issue and with the level of ceos’ commitment in their businesses. studying the link between response cost, ceos’ commitment and the related stakes, would be an interesting avenue for future research. to conclude with this discussion, in our study the strongest effect was exerted by response efficacy, explaining 30 percent of behavioral intention variance. self-efficacy and response cost also proved to have a significant although lower effect. 5.1. limitations although this study’s findings provide meaningful implications, our study has some limitations. 1 chief x officer. x = e for executive, o for operation, f for finance. first, our research used a web-based questionnaire, which may have introduced response bias because people outside the target population may fill out the questionnaire, or people in the target population could submit more than one response: even if we partially addressed this problem by controlling the respondent’s ip address, by eliminating companies’ sizes over 250 employees, some non-ceos could have filled our questionnaire. second, this study only examined positive actions instead of maladaptive actions which may require further investigation. third, we could not assess the effects of certain variables such as industry type or the fact that a company is it-intensive or not (lee and larsen, 2009). to end, this study did not examine actual iss-related behavior. it would be interesting to compare the behaviors of taking or implementing security measures in large companies (workman et al., 2008) with actual behaviors in smbs. 5.2. implications for researchers and practitioners this study confirmed the importance of ceos’ role in smbs’ iss. smb ceos must realize that they sometimes just have to communicate on the importance of information security or set an example (such as shredding confidential documents), and security measures are not systematically expensive or cumbersome. as numerous meetings and seminars are organized for entrepreneurs, trainings or communications during those events could integrate some advice and insist on good practices related to iss. for researchers, we showed that even if it is relevant to study employees’ behaviors to decrease negative behaviors and improve positive behaviors it is of utmost importance to dedicate more research on smb ceos as they constitute a specific and important population, and as it has been proved that their actions influence employees’ behavior and have a strong impact on smbs’ overall security (barlette, 2012). 14 6. conclusion the involvement of ceos in implementing security measures is important for improving the level of information security in smbs. we tested a model based on protection motivation theory (pmt) using data collected from 177 french smb ceos. the results showed that response efficacy had the strongest effect, explaining 30 percent of behavioral intention variance. self-efficacy and response cost also proved to have a positive and significant impact on ceos’ intention to implement information security measures. on the contrary, perceived vulnerability did not have a significant impact on the behavioral intention to implement these measures. we highlighted some of the reasons why ceos' iss behavior was so important in smbs in general and more particularly in the smallest ones where the ceo cannot rely on an internal it expert. it will be also interesting to identify actual actions, especially who takes iss in charge in smbs, and for which size of smb. for example, we could identify thresholds were it people or a cio exist, or in the smallest smbs, employees assuming this charge informally. this could be a trigger for ceo-specific behavior or at least provide insight on their issrelated behavior. the next step of this study will consist in working with a more important dataset, including social influence and other variables and the notion of direct (doing) and indirect behavior (supporting the person who does, when the ceo does not act). references anderson, c.l. and agarwal, r., (2010). "practicing safe computing: a multimethod empirical examination of computer user security behavioral intentions", mis quarterly, vol. 34, n°3, p. 613-643. anderson, e.e. and choobineh j. (2008). enterprise information security strategies, computers & security, n°27, p. 22-29. ashenden, d. (2008). "information security management: a human challenge?", information security technical report, n°13, p. 195-201. avolio, f.m. (2000). "best practices in network security: as the networking landscape changes, so must the policies that govern its use. don’t be afraid of imperfection when it comes to developing those for your group." network computing vol. 60, n°20, p. 60-72. bandura, a. (1994). self-efficacy. in v.s. ramachaudran (ed.), encyclopedia of human behavior, vol. 4, p. 71-81, new york, ny: academic press. barlette, y. (2012). "implication et action des dirigeants : quelles pistes pour améliorer la sécurité de l'information en pme", systèmes d'information et management, vol. 17, n°2, p. 115-149. boss, s.r., kirsh, l.j., angermeier, i., shingler, r.a. and boss, r.w. (2009). "if someone is watching, i'll do what i'm asked: mandatoriness, control and information security", european journal of information systems, n°18, p. 151164. bruce, g. and dempsey r. (1997). security in distributed computing did you lock the door? hewlett packard company, palo alto, usa. bulgurcu, b., cavusoglu, h. and benbasat, i. (2010). "information security policy compliance: an empirical study of rationality-based beliefs and information security awareness", mis quarterly, vol. 34, n°3, p. 523-548. chu, a. m. y. and chau, p. y. k. (2014). "development and validation of instruments of information security deviant behavior", decision support systems, vol. 66, p. 93-101. dong, l. (2008). "exploring the impact of top management support of enterprise systems implementations outcomes", business process management journal, vol. 14, n°2, p. 204-218. dong, l., neufeld, d. and higgins, c. (2009). "top management support of enterprise systems implementations", journal of information technology, n°24, p. 55-80. dutta, a. and mccrohan, k. (2002). "management's role in information security in cyber economy". california management review, vol. 45, n°1, p. 67-87. european commission, (2014), annual report on european smes 2013-2014, eu publication office, 124p. forcht, k.a. and ayers, w.c. (2000). "developing a computer security policy for organizational use and implementation", journal of computer information systems, vol. 41, n°2, p. 52-57. friend, m. and pagliari, l.r. (2000). "establishing a safety culture: getting started", professional safety, vol. 45, n°5, p. 30-32. grover, v. (1993). "empirically derived model for the adoption of customer-based interorganizational systems", decision sciences, vol. 24, n°3, p. 603-639. gupta, a. and hammond, r. (2005). "information systems security issues and decisions for small businesses: an empirical examination", information management and computer security, vol. 13, n°4, p. 297-310. herath, t. and rao, h.r. (2009). "encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness", decision support systems, vol. 47, n°2, p. 154-165. hofstede, g., neuijen, b., daval-ohayv, d. and sanders, g. (1990). "measuring organizational cultures: a qualitative and quantitative study 15 across twenty cases", administrative science quarterly, vol. 35, p. 286-316, cornell university. ifinedo, p. (2012), "understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory", computers & security, vol. 31, p. 83-95. jarvenpaa, s.l. and ives, b. (1991). "executive involvement and participation in the management of information technology". mis quarterly, vol. 15, n°2, p. 205-227. johnston, a.c. and hale, r. (2009). "improved security through information security governance", communications of the acm, vol. 52, n°1, p. 126-129. johnston, a.c., warkentin, m. and siponen, m. (2015). "an enhanced fear appeal rhetorical framework: leveraging threats to the human asset through sanctioning rhetoric”, mis quarterly, vol. 39, n°1, p. 113-134. kankanhalli, a., teo, h.-h., tan, b.c.y. and wei, k.-k. (2003). "an integrative study of information systems security effectiveness", international journal of information management, n°23, p. 139-154. knapp, k.j., marshall, t.e., kelly rainer, r. and nelson ford, f. (2006). "information security: management's effect on culture and policy". information management and computer security, vol. 14, n°16, p. 24-36. kotulic, a. and clark, j.g. (2004). "why there aren't more information security research studies". information and management, vol. 41, n°5, p. 597-607. kyobe, m. (2008). "the impact of entrepreneur behaviours on the quality of e-commerce security: a comparison of urban and rural findings", journal of global information technology management, vol. 11, n°2, p. 58-79. labodi, c. and michelberger, p. (2010). "necessity or challenge – information security for small and medium enterprises", annals of the university of petrosani, economics, vol. 10, n°3, p. 207-216. lazarus, r. s. (1991). emotion and adaptation, oxford university press, ny. lee, y. and larsen, k. r. (2009). "threat or coping appraisal: determinants of smb executives' decision to adopt anti-malware software", european journal of information systems, vol. 18, p. 177-187. liang, h. and xue, y. (2010). "understanding security behaviors in personal computer usage: a threat avoidance perspective", journal of the ais, vol. 11, n°7, p. 394-413. longeon, r. and archimbaud, j.l. (1999). guide de la sécurité des s.i. à l'usage des directeurs, cnrs, paris. loonam, j.a. and mcdonagh, j. (2005). "exploring top management support for the introduction of enterprise information systems: a literature review", the irish journal of management, vol. 26, n°1, p. 163-178. lucas, h.c. jr. (1981). implementation: the key to successful information systems, new york, ny: columbia university press. markus, m.l. (1983). "power, politics, and mis implementation", communications of the acm, vol. 26, n°6, p. 430-444. mitchell, r.c., marcella, r. and baxter, g. (1999). "corporate information security management". new library world vol. 100, n°1150, p. 213227. monnoyer, m.c. (2003). le manager confronté à la décision d'investissement en tic, in boutary, tic et pme: des usages aux stratégies, paris: l'harmattan. pahnila, s., siponen, m. and mahmood, a. (2007). "employees' behavior towards is security policy compliance", 40 th hawaii international conference on systems science (hicss), january 3-6, ieee, los alamitos. pinto, j.k. and slevin, d.p. (1987). "critical factors in successful project implementation". ieee transactions on engineering management, vol. em-34, n°1, p. 22-27. podsakoff, p.m., mackenzie s.b., lee j.y. and podsakoff np. (2003). common method biases in behavioral research: a critical review of the literature and recommended remedies, journal of applied psychology, vol. 88, n°5, p. 879-903. pritchard, s. (2010). "navigating the black hole of small business security", infosecurity, sept. oct., p. 18-21. ragu-nathan, b.s., apigian, c.h., ragu-nathan, t.s. and tu, q. (2004). "a path analytic study of the effect of top management support for information systems performance", omega, vol. 32, p. 459-471. rainer, r.k., marshall t.e., knapp, k.j. and montgomery, g.h. (2007). "do information security professionals and business managers view information security issues differently?", information systems security, n°16, p. 100-108. rees, j. (2010). "information security for small and medium-sized business", computer fraud & security, vol. 9, p. 18-19. reid, r.c. and gilbert, a.h. (2009). "cognitive support for senior manager's decision making in information systems security". proceedings of the academy of information and management sciences, vol. 13, n°1, p. 58-62. robinson, s. and volonino, l. (2004). principles and practices of information security, pearson prentice hall, new jersey. rockart, j.f. and crescenzi, a.d. (1984). "engaging top management in information technology". sloan management review, vol. 25, n°4, p. 3-16. rogers, r. (1983). "cognitive and psychological processes in fear-based attitude change: a revised theory of protection motivation", in social psychophysiology: a sourcebook, j. cacioppo & r. petty (eds.), guilford press, ny, p. 153-176. 16 rondeau, p. j., ragu-nathan, t. s. and vonderembse, m. a. (2006). "how involvement, is management effectiveness, and end-user computing impact is performance in manufacturing firms", information & management, vol. 43, n°1, p. 93-107. ross, j. and weill, p. (2002). "six decisions your it people shouldn't make", harvard business review, november, p. 85-91. ryan, j. (2004). "information security tools and practices: what works?", ieee transactions on computers, n°53, p. 1060-1064. siponen, m., mahmood, m. a, and pahnila, s. (2014). "employees' adherence to information security policies: an exploratory field study", information & management, vol. 51, p. 217-224. stemberger, m.i., manfreda, a. and kovacic, a. (2011). "achieving top management support with business knowledge and role of it/is personnel", international journal of information management, vol. 31, p. 428-436. stevens, j.m., beyer, j.m. and trice, m.h. (1978). "assessing personal role and organizational predictors of managerial commitment", academy of management journal, n°21, p. 380-396. vance, a., siponen, m. and pahnila, s. (2012). "motivating is security compliance: insights from habit and protection motivation theory", information & management, vol. 49, p. 190-198. venkatesh, v., morris, m.g., davis, g.b. and davis, f.d. (2003). "user acceptance of information technology: toward a unified view", mis quarterly, vol. 27, n°3, p. 425-478. vermeulen, c. and von solms, r. (2002). "the information security management toolbox: taking the pain out of security management", information management & computer security, vol. 10, n°3, p. 119-125. williams, p. (2007). "executive and board roles in information security", network security, n°8, p. 11-14. wolcott, p., kamal, m., qureshi, s. (2008). "meeting the challenges of ict adoption by micro-enterprises", journal of enterprise information management, vol. 21, n°6, p. 616632. workman, m., bommer, w. h. and straub, d. (2008). "security lapses and the omission of information security measures: a threat control model and empirical test", computers in human behavior, vol. 24, p. 2799-2816. yoon, c. and kim, h. (2013). “understanding computer security behavioral intention in the workplace”, information technology & people, vol. 26, n°4, p. 401-419. zwikael, o. (2008). "top management involvement in project management: exclusive support practices for different project scenarios", international journal of managing projects in business, vol. 1, n°3, p. 387-403. 17 appendix a nb: the colors used for the variables are in line with those of our model. variables authors item code adapted from vance et al, 2012 implementing information security policies in our organization keep is security breaches down. effr1 adapted from vance et al, 2012 if i comply with information security policies, is security breaches are scarce. effr2 vance et al. 2012 i can implement information security policies by myself. effs1 vance et al. 2012 implementing information security policies is easy for me. effs2 lent et al. 2006 i have the capability to solve possible problems during the implementation of security measures. effs3 vance et al, 2012 complying with information security policies would require considerable investment of effort other than time. cost1 vance et al, 2012 there are too many overheads associated with complying with information security policies. cost2 vance et al, 2012 complying with information security policies inconveniences my work. cost3 adapted from vance et al, 2012 if i lost my computerized data, there would be serious information security problems for my organization. sev2 adapted from vance et al, 2012 if my computerized data were temporarily not available, serious information security problems would result. sev3 vance et al, 2012 an information security problem could occur if i did not apply security policies. vuln1 vance et al, 2012 i could be subjected to an information security threat, if i did not apply information security policies. vuln2 vance et al, 2012 my organization could be subjected to an information security threat if i did not apply security policies. vuln3 i intend to implement security measures in the next months. int1 i plan to implement security measures in the next months. int2 age venkatesh et al, 2003 age age gender venkatesh et al, 2003 male =0; female =1 gend firm size european union <10 employees =1 ; 10-49 employees =2; 50-250 employees =3 size control variables coping appraisal adapted from workman et al, 2008; yoon and kim, 2013 behavioral intention perceived vulnerability perceived severity threat appraisal response efficacy self-efficacy response cost 22 the impact of crm on qoe : an exploratory study from mobile phone industry in morocco amine aziza 1 , mourad oubrich 2 and klaus solberg søilen 3 1 institut national des postes et télécommunications (inpt), morocco, 2 madinat al irfane rabat-institutes-morocco, 3 halmstad university, sweden e-mail: oubrich@inpt.ac.ma, amineaziza10@gmail.com, klasol@hh.se received august 10, accepted october 10 5 2015 abstract: today’s mobile phone sector is marked by intensified competition and strong market penetration. in this environment, the carriers offer their customers a wide variety of services that are quite similar from one operator to another. these customers are always searching for a quality of experience (qoe). on one hand, operators interact with their customers through crm practices inspired by their marketing strategies and rolled out through their procedures and technological support. on the other hand, the customers expect an extremely high quality of service (qos) and subjectively perceive the utility and usability (qp) of these mobile services. this paradox led us to study the impact of crm on the customer experience (qoe) in the mobile phone industry, in this study with data from morocco. empirical data confirms existing theory, crm determinants for qoe include quality of service, quality of interaction with customer, claims management and customer knowledge. however, we also found that practitioners are aware that organizations should look beyond the relationship to manage the customer experience. to this end we developed a model based on the first four crm determinants and the findings in this study. keywords: crm, qoe, qos, qp, mobile services, business intelligence, erp available for free online at https://ojs.hh.se/ journal of intelligence studies in business vol 5, no 2 (2015) 22-35 mailto:oubrich@inpt.ac.ma mailto:amineaziza10@gmail.com https://ojs.hh.se/ 23 1. introduction the field of customer relation management (crm) is linked to that of business intelligence (bi) in that crm systems rely on ever greater sets of data and datamining capabilities. interest in crm has begun to grow in the 1990’s (xu and al., 2002). within the sector of information technology management research, crm has become its own niche thanks to its relative newness and growth explosion (lambert, 2010). according to nguyen (2013), dyché (2001), greenberg (2004), osarenkhoe and bennani (2007), crm allows companies to build a lasting relationship with their customers whilst constantly keeping in touch with them. according to ejaz and al. (2013), crm is considered as one of the best approaches to satisfy and retain customers. the results of their studies have shown that crm has a positive impact on customer satisfaction and on customer experience which in turn directly impact customer loyalty. our research goes in the same direction as that of ejaz and al. (2013), but with a different vision. our objective is to explore the determinants of crm and those of the quality of the customer experience in order to study their causal relationship. the customer relationship is a subject of great interest, especially in the domain of service activities/interactions due to the importance of the "supplier-customer" interface to achieve a high quality of the realization of service (qos) (damperat, 2005). in addition, services have now become a priority; they are by nature "moments of truth", which makes them more sensitive to good perceived quality (qp) in the exchange relationship (giordano, 2006). furthermore, the quality of experience (qoe) is a subjective measure of the adequacy of a service which the customer was expecting. in the literature, we found that there is little empirical research on the study and the measurement of the impact of crm on qoe (research gap). it is important to understand the cause and effect relationship between crm practices and (qoe) in order to establish a conceptual framework. we begin by drawing from the literature of those two concepts, theirs definitions, theoretical foundations, models and functions. secondly, we present the research methodology and the results of the exploratory qualitative study of thirteen crm practitioners. in conclusion, we propose a preliminary conceptual model that links crm to qoe. 2. literature review the customer and the service provider are found in the service relationship in two separate logics (averous, 2004). everyone perceives their service delivery according to their perspective and its repository. the customer repository is one of the affects, the subjectivity and the holistic cognition while as the display domain of the service provider can be defined as the technicality, occupation, objectivity and accountability (averous, 2004). the interaction between the two perspectives is not obvious and requires efforts in terms of listening, proximity and anticipation. from this come the sensitivity and complexity of the crm field of study and qoe for both service providers and customers respectively. as crm advances, so does its multidimensional character. we therefore think that to go through the crm practices and determinants, is worthwhile by studying the link to qoe. the mobile phone industry is a major area for crm practices. the question is how does crm impact qoe? 2.1. crm crm is a strategic concept which draws its basis from economic and social exchange theories and relationship marketing (damperat, 2005). the supporters of transactional exchange paradigm as coase (1937) and williamson (1979) study the customer-supplier relationship in its absolute transactional sense. the paradigm of social exchange supported primarily by hakansson (1982), raises the importance of the social relationship that promotes greater transactional exchange. other authors such as marion (2001), parvatiyar and sheth (2001), arndt (1979) bring the notion of relational exchange that takes into account both transactional and social exchange with a concept of relationship sustainability over à long period of time. since 2000, supporters of the new technology approach as plakoyiannaki and tzokas (2002), grabner and moedritsher (2002), chang and young (2007) and coovi (2010) defend the role of technology in crm. crm can be defined as a business strategy oriented towards the customer (park and kim, 2003). this strategy is supported by information and communication technology and aims to facilitate and improve relationships with customers (lamparello, 2000; mckim, 2002). several definitions have been developed by several authors (table n°1); it appears that the crm is seen as both a business strategy and a technological process (dionne, 2001), thus the increasing importance of business intelligence (bi) and datamining. 24 the depth and specificity of different crm definitions can be seen in the form of crm layers. for instance, trepper (2000) propose three categories: operational, analytical and collaborative crm. collaborative crm includes exchange channels with the customer (chen and al., 2006), while the analytical crm enables the analysis of information gathered (zikmund, 2003) and finally the operational crm, which aims to industrialize the company’s daily contacts with its customers through a pre-established process (cast, 2003; pepper and rogers, 2004). according to lambart (2010), crm is the business process that provides the structure and the way for how customer relationships are developed and maintained. specifically, the crm process is divided into several stages combined with practices. these are defined by chen and russell (2007) as a set of actions taken by the company to retain current customers and attract potential ones. these practices include customer segmentation, database marketing, personalization and one-to-one marketing, proactive selling, cross-selling and loyalty program (peelen and al., 2009). while shaw (1999) defines crm as an interactive process for achieving the optimum balance between corporate investment and the satisfaction of customer needs to generate the maximum profit. objectives and crm functions are multiple; it is a way to get superior financial performance (lambert, 2010; boulding and al., 2005; bohling and al., 2006), a differentiator with a competitive advantage (almquist and al., 2002; missi and al., 2002) and a long-lasting contact support for customer loyalty through long-term relationships (nguyen, 2007; greenberg, 2004; osarenkhoe and bennani, 2007). crm also allows the company to customize and improve the quality of customer service (nguyen, 2007) and to share customers knowledge within and between offices (nguyen, 2007) and consequently to achieve profitable growth (greenberg, 2004) and better performance. crm is considered a strategic approach, oriented toward processes (lambert, 2010; payne and frow, 2006; zablah and al., 2005), it’s cross-functional (lambert, 2010; payne and frow, 2006), a mutual value creator for the buyer and the seller (lambert, 2010; boulding and al., 2005; payne and frow, 2006). the analysis of the most important and various crm models that we found in the literature review allowed us to highlight some determinants (table n°2), where it is recognized that strategy, people, technology, and processes are all important factors in crm (chang, 2007). all models which are found in the literature review are predictive, conceptual and integrators of factors which explain crm. our theoretical contribution will be to study the determinants of crm and their relationship with qoe. 2.2. qoe the customer experience is an interdisciplinary concept that has been the subject of research in various fields including economics, psychology and management (qing et al., 2013). the customer experience is considered a new concept that refers to all the emotions and feelings experienced by a customer before, during and after the purchase of a product or service (gentile et al., 2007). it is a source of satisfaction and loyalty influence (lefranc, 2013). pine and gilmore (1999) were the first who studied the concept of the customer experience and they showed that the customer experience can provide be a new area of competition. table n° 1: crm approaches crm as a business strategy parvitiyar and sheth (2001), buttle (2001), thieriez (2002), zablah and al (2005), singh and al (2003), peppers and rogers (2004), peelen and al (2009), allard and guggémos (2005), rogers and dorf (1999), urbanskienė and al (2008), hobby (1999), dalziel and al (2011), osarenkhoe and bennani (2007), lambert (2010). crm as a strategy supported by technology lamparello (2000), mckim (2002), crosby and johnson (2002), dionne (2001), ramaseshan and al (2006), allard and guggémos (2005). crm as a technological process bose (2002), xu (2002), missi and al (2002), payne and frow (2006), khanna (2001), stone and woodcock (2001), frock (2000), ryals and knox (2001), chen and al (2009). 25 to provide an optimal and a positive customer experience is important, seeing as it impacts customer satisfaction and creates an emotional connection with the brand. it therefore enhances customer loyalty (gentile et al., 2007). the quality paradigm is the theoretical basis of the qoe, through disconformity theory based on the measurement of the gap between customer expectations and performance of the product or service (oliver, 1980; churchill and suprenant, 1982). the american school, known as servqual (parasuraman et al., 1985) suggests a conceptualization of perceived quality seen in ten dimensions and refined in five dimensions: reliability, helpfulness, insurance, tangibility and empathy. in comparison the nordic school defended by grönroos (1990) is based on the work of swan and combs (1976) and identify two dimensions of service quality, the technical quality (what the customer receives) and the functional quality (what the customer perceives). theories of psychology have also treated the customer experience including the ergonomic psychology theory in the context of humantechnology interaction that revolves around usefulness, usability and acceptability (dillon and morris, 1996; tricot and al., 2003). other psychosocial theories analyze the subjective component of the customer experience, mainly the theory of reasoned action (tra) (fishbein and ajzen, 1975), the theory of planned behaviour (tpb) (ajzen, 1991) and the interpersonal behavior theory (ibt) (triandis, 1980). for soldani et al., (2006), the term (qoe) refers to the perception of the user on the quality of a particular service. it is expressed in human feelings as "good", "excellent", "poor", etc. soldani et al., (2006) highlight in their researcs, focused on umts networks, the difference between qos and qoe, stating that the quality of service (qos) is inherently a technical concept. it is measured, expressed, and understood in terms of technical features, mechanisms and procedures between the user equipment and the network, which usually makes little sense for the end user. many methods have been proposed to evaluate qoe subjectively and objectively (xin yu et al., 2012). qoe, is a subjective measure of the adequacy of a service compared to customer expectations. it measures the "rendering" of the use of a service and how a user perceives the conviviality of a service, the satisfaction level that comes with a service in terms of conviviality, accessibility, continuity and integrity of the service (soldani et al., 2006). the literature review allowed us to highlight two different approaches of qoe (table n°3): -the qoe as objective and subjective measure of the customer experience. -the qoe as an evaluation of customer perception, the gap between expectations and performance. 26 table n° 2: summary of the determinants according to different crm models determinant model summary model author strategy the customer connections ernest & young model sign in and get closer to customers to make them real partners allard and derringer, (2000) strategy the model of the idic methodology identify, differentiate, interact, customize peppers and rogers, (2004) strategy, process, hr, organization, customer centric. balanced scorecard calculation of the performance: financial perspective, perspectives related to the customer, internal processes to the business, organizational learning kaplan and norton, (1996) customer centric model based on the several stages of customer life cycle initialization or acquisition maturation and rupture dwyer and al., (1987) customer centric, organization and culture, hr, process, technology the crm value chain primary level are centered on customer and support conditions are focused on profitability buttle, (2001) strategy process technology the model of the strategic framework crm the development strategy the information management the value creation process the process of performance evaluation multi-channel integration payne and frow, (2006) organization et hr service and profit chain model there is a link between satisfaction and employee motivation and customer satisfaction heskett and al , (1994) strategy an integration framework of crm implementation strategy analysis formulation and strategy selection implementation of the strategy osarenkhoe and bennani, (2007) process measures framework of crm impact on economic added value impact on sales, cost of goods sold, total expenditures, inventory investment, other current assets, and investment in fixed assets lambert, (2010) strategy culture contexte conceptual framework for overall crm macro factors: internal and external to the company micro factors: marketing activities, customer focus, buying behavior. conceptual framework for overall customer relationship management ramaseshan and al., (2006) technology strategy hr challenges for overall customer relationship management -technology -economy and market -regulatory framework -culture and social ramaseshan and al, (2006) process hr technology crm implementation the successful implementation of a crm requires an integrated and balanced approach of technology, processes and human resources injazz and popovich, (2003) 27 table n° 3: qoe approaches qoe objective and subjective measure (kilkki, 2008), (rehman and al., 2011), (xin and al., 2012), (mitra and al., 2011), (hassenzahl, 2008), (chen and el zarki, 2011). assessment of customer perception gap between expectations and performance (rehman and al., 2011), (fiedler and al., 2010), (chumpitaz and swaen, 2004), (gentile and al., 2007), (lefranc, 2013), (johnston and kong, 2011), (johnson and mathews, 1997). 3. epistemology and research methodology this research aims to explain the relationship between crm practices and the quality of the customer experience (qoe). to sort out this relationship, we position ourselves within a positivist perspective based on the hypotheticodeductive approach. this epistemological position aims to draw a state of the art to build an adequate theoretical framework for this relationship and derive hypotheses that will bring forward a more representative reality (miles and huberman, 1991) through a qualitative study in order to explore the main determinants of crm practices and the most significant factors in the quality of the customer experience. in this paper, we present an exploratory qualitative study in terms of crm practices in the mobile phone industry. the sample consists of about 60% of practitioners among telephony mobile operators, 16% of vital service provider and 24% of ss2i. interviews were carried out according to an interview guide constructed at the base of the determinants of crm identified from the literature review summarized it in table n°2. for data analysis, we collected, recorded and transcribed data by transcriber application. to this end, we mobilized the content analysis method (bardin, 1977). moreover, with the sphinx lexica, we treated and coded all the answers and we analyzed the verbatim by following the method of parsing (syntactic unit) and semantic (andreani and conchon, 2005). following this analysis, we got answer segments that we have grouped around recurring key ideas that revolve around the five factors: strategy, process, organization, personnel and technology. for greater objectivity, we opted for a statistical analysis of key ideas through coding categories (andreani and conchon, 2005), marking out the words forming these categories. with the method of multiple correspondence analyses (mca) 1 , we have five sets of contingencies tables that intersect in multiple matrices, as variables for each practitioner. at the end we treated statistically the contingency tables by xlstat for the study: the rate of inertia 2 which measures the practitioner’s opinions dispersion around the variables (key ideas) from the center of gravity (crm determinant) as two factorial axes. the factorial axes are the most active components of crm determinant and around which the variables and observations disperse. these are the main terms or combinations formed by matching variables to observations and the observations of each variable (absence, presence, recurrence). the variance of the distribution of the practitioner’s notices by qualitative variable associated with the variance of the distribution of variables per practitioner around factorial axes to represent the eigenvalue. 3 the total inertia rate is the sum of the eigenvalues. when the inertia ratio is high, it means that there is a strong dependence between variables and observations, if the total inertia ratio is low, the variables are independent of observations. the cumulative percentage of inertia indicates the level of inertia or dispersion and can explain the categories of profiles alike. in our research we have practitioners who share the same point of view about the correspondence of the crm determinants. 4. results and interpretations the analysis of the crm determinants components by the mca method allowed us to identify for each determinant, the total inertia ratio, the eigenvalues, inertia percentage and percentage of accumulated inertia. 4.1 the crm strategy determinant crm practitioners mostly confirm the existence of a customer-centric crm strategy and perceive crm as a software tool. they argue that the crm goals are: quality of customer service (qos), satisfaction, customer loyalty and profitability of the company. other objectives were mentioned but with less 1 the multiple correspondence analysis (mca) is a statistical method to study at least the association between two variables, observations (crm practitioners) and terms of observational variables (absence, presence, recurrences). 2 inertia ratio is the sum of the projected variances. 3 this is the projected variance of inter-qualitative variables for a variance inter-practitioners. 28 frequency, for example performance, segmentation, complaints management, customer knowledge. the inertia of the key components of crm strategy is 3,923. this is the highest value of the calculated rate. it indicates that there is a high practitioner’s opinions concentration around the crm strategy variable and its perception as an information technology tool. it’s focus is on a customer-oriented approach, segmentation and claims management means, satisfaction etc. this concentration is measured around the gravity center of all crm strategy components with the first three eigenvalues μ = 0.492, μ = 0.376, μ = 0.318. these values are close together and involve a high association between correspondences of practitioners opinion concerning the crm strategy formulated by the variables listed in table n°4. 4.1.1 eigenvalues, inertia percentage and percentage of accumulated inertia: for table n°5 we have: -the first line represents the rank of the factorial axis considered, p = 23 factorial axes, the second line shows the eigenvalues of the matrix associated with each axis, the third line gives the inertia ratio explained by the axes, the last line gives the cumulative inertia ratio (that is to say, explained the subspace formed by the axis and the previous). the first tree values together account for over 30% of the total inertia opinions of practitioners according to the crm strategy determinant (point cloud), so we can therefore consider other significant factorial axes that represent a combination of correspondences (variables strategy and practitioners). we can extend the factorial space to f13 which shows over 77% of the total inertia of the point clouds. 4.2 the crm process determinant the practitioner’s descriptions of the crm process allowed us to deduce a perceptual schema crm process. this scheme focuses on the phase and the quality of interaction with customer, customer data collection stage, qualification of customer data and integration of multi-channel communication with crm. table n°5: the 23 factorial axes . f1 f2 f3 f4 f5 f6 f7 f8 own value 0,492 0,376 0,318 0,280 0,253 0,227 0,198 0,188 inertia (%) 12,542 9,579 8,106 7,142 6,446 5,775 5,055 4,801 %accumulated 12,542 22,121 30,227 37,369 43,815 49,590 54,645 59,446 f9 f10 f11 f12 f13 f14 f15 f16 own value 0,166 0,147 0,144 0,131 0,124 0,113 0,098 0,094 inertia (%) 4,232 3,743 3,674 3,335 3,153 2,874 2,501 2,396 %accumulated 63,679 67,422 71,095 74,43 1 77,584 80,45 8 82,959 85,356 f17 f18 f19 f20 f21 f22 f23 own value 0,090 0,088 0,084 0,081 0,078 0,077 0,077 inertia (%) 2,283 2,252 2,138 2,071 1,979 1,961 1,961 % accumulated 87,638 89,890 92,029 94,100 96,078 98,039 100,000 table n°4: semantic recurrences related to the practitioners crm strategy variable. v a r ia b le s tr a te g y c u st o m e r c e n tr ic s tr a te g y e x is te n c e to o l s a ti sf a c ti o n q o s p ro fi ta b il it y l o y a lt y s e g m e n ta ti o n p e rf o rm a n c e m a n a g e m e n t o f c la im s c u st o m e r k n o w le d g e a c ti v it y r e p o rt in g p ro x im it y a n ti c ip a ti n g c u st o m e r w a ll e t p ro c e ss la u n c h n e w p ro d u c t d a ta c u st o m e r fo c u s b u si n e ss c o m p e ti ti v e a d v a n ta g e p ro d u c ti v it y c o st u m e r c o n q u e st r e c u r r e n c e s 14 11 10 10 9 8 8 5 5 5 5 4 4 4 3 2 2 2 2 2 4 2 1 1 29 the determinant crm process is in the second position with inertia ratio of 2.6. the analysis of crm process asymmetric graphic components and observations shows that there are three different categories of profiles but closely spaced. the majority of practitioners category which recognizes the existence of the crm process confirms its efficiency and describes it as a series of phases: customer interaction stage, customer data collection stage, qualification and treatment of data customers stage, quality interaction with the customer, billing, claims management, through procedures and certifications that enact the script and interaction with the costumer in order to satisfy and offer them the best qos. also there is a class of practitioners who focuses on respect of charters, crm procedures and scripts, the quality of customer interaction and multi-channel integration with communication channels and finally another group who perceive crm process through the interaction with the customer stage, customer data collection stage and the multi-channel integration with the communication channels in the crm. thanks to iso certification standards, charters, scripts and quality procedures, the crm process is considered efficient and cover among other aspects of the company's business, billing and claims management. the efficiency of the different crm processes respectively depends on: targeted training around the crm function and delivery by the team which in most cases is conducted to work in networks, the sensitization and assessment system of crm human resources and their professional skills. the first three eigenvalues are: μ = 0.413, μ = 0.348, μ = 0.316, they are close together which explains that there is a significant association between concepts, listed in table n°6 to explain the crm process. own values, inertia percentage and percentage of accumulated inertia: f1 f2 f3 f4 f5 f6 own value 0,413 0,348 0,316 0,297 0,249 0,196 inertia (%) 15,902 13,387 12,149 11,422 9,571 7,548 % accumulated 15,902 29,289 41,439 52,860 62,432 69,980 f7 f8 f9 f10 f11 f12 own value 0,187 0,155 0,138 0,114 0,099 0,086 inertia (%) 7,211 5,978 5,312 4,370 3,823 3,327 % accumulated 77,191 83,169 88,480 92,850 96,673 100,000 table n°7: the 12 factorial axes 4.2.1 eigenvalues, inertia percentage and percentage of accumulated inertia: for table n°7 we have: the factorial axis rank is p = 12, the first 3 values together account for over 41% of the total inertia practitioners opinions in relation with crm process determinant. we can think about other factor axes that are significant and represent the combination of correspondences (process variable and practitioners). we can extend the factorial space to f5 with more than 62% of the total inertia of the point clouds. 4.3 the crm organization determinant the crm function is considered by a minority of practitioners as a call center job. crm is a project table n°6: semantic recurrences related to crm process according to practitioners. concepts number of occurrences interaction with the customer phase 18 integration multi channels with crm 16 qualification and customer data processing 15 efficiency procedure 11 collecting customer data phase 10 claims management 9 quality of interaction with the customer 8 billing 8 charter, user guide, scripts respect 7 quality of service 5 iso certification, internal procedures 5 satisfaction 3 existence of crm procedures 6 absence of crm procedures 1 30 that is often supported by top management but without a specific function in the organization. in addition, it is located halfway between the marketing function, the business function, the customer service function and sometimes the information system direction (isd). the determinant of the crm organization gives us an idea about the crm position inside the service provider’s organization. its inertia ratio is 2.286 and it comes third after the crm process determinant. we found that there are three positions categories with average dispersion. there is a category of practitioners where the crm is positioned at the top management level and largely deviates from the two other categories. the second category positions crm into the sales function level with an average concentration of observations around this variable. the third category consists of practitioners who share their opinions around a crm organizational position that integrates the marketing function, is direction, management services and customers, n-1 levels of top management and the sales office. the first three eigenvalues are μ = 0.413, μ = 0.315, μ = 0.281, they are less close together which explains that there is a less significant association between the variables representing crm organization listed in table n° 8. own values, inertia percentage and percentage of accumulated inertia: 4.3.1 eigenvalues, inertia percentage and percentage of accumulated inertia: table n°9: the 12 factorial axes we considered twelve factorial axis p = 12, the first tree values together account for over 44% of the total inertia practitioners opinions related to the crm organization determinant. also we can take into account other factorial axes. we can extend the factorial space to f5 with more than 62% of the total inertia of the point cloud. 4.4 the crm technology determinant the technological component of crm comes in the fourth position with 1,81 as total inertia ratio. there are several categories of profiles relatively dispersed according to their crm expectations but concentrated into two categories. the first category of practitioners use the software crm (integrated crm software in the erp, crm-sql, vocalcom, nobelsystem, software grc, efbi platform, microsoft dynamic crm, sap crm, saleforces, zoho, sugarcrm) and other software managements such as elag and business management software. they are interested in reports generated by the crm and indicators that these reports occur. while the second category consists of a minority of practitioners who are aware of the importance of the crm software and dashboards they generate, they don’t use it in their own activities because they are involved as ss2i; in other words as, assistant project manager in crm solutions integration. these results reflect the overall vision of a recent study published by the gartner institute for the year 2014 "magic quadrant for business intelligence and analytics," especially for the point of operational and decision-making ability of crm that are raised f1 f2 f3 f4 f5 f6 own value 0,41 3 0,31 5 0,28 1 0,22 5 0,20 4 0,17 9 inertia (%) 18,0 77 13,7 76 12,2 89 9,85 7 8,91 4 7,84 8 %accumul ated 18,0 77 31,8 53 44,1 43 54,0 00 62,9 14 70,7 62 f7 f8 f9 f10 f11 f12 own value 0,149 0,133 0,124 0,094 0,087 0,081 inertia (%) 6,526 5,817 5,404 4,132 3,801 3,560 % accumulated 77,288 83,105 88,508 92,640 96,440 100,000 table n° 8: semantic recurrences according to the crm organization concept number of occurrences top management 9 business function 8 existence of responsible unit 7 management services and clients 6 marketing function 5 customer relationship centre 4 level n-1 3 is direction 3 marketing officer 3 networks team 3 claims management centre 2 sales management 2 31 in this report. the report also highlights that "historical leaders of the crm market: oracle, microsoft, ibm and sap are this year the big losers” with a speed loss on the clear quadrant. the first three eigenvalues of crm technology determinant are μ = 0.360, μ = 0.234, μ = 0.193. they are less close which explains that there is less and less of an important combination between concepts that represent the crm technology that we list in table n°10. table n° 10: semantic recurrences on crm technology according to practitioners concept number of occurrences specific software 9 other software 6 dashboard 2 performance report 5 accessibility and flexibility 8 excellent experience, satisfaction and customer knowledge 7 managements indicators 6 performance indicators 6 sales report 4 marketing campaign report 4 periodic reports 4 independence 4 profitability 4 performance 4 predictors 3 reliability 3 management report 2 sale force automating 3 zoning report 2 according to the data analysis, the most cited crm tools are the specific solutions (sap crm, saleforces, zoho, sugarcrm, microsoft dynamic crm, crm-sql software vocalcom, nobelsystem) or other management solutions. they are either integrated into erp, operated in open source configuration, internally developed or developed with the help of a professional integrator. nnn we noted the positive feedback toward practitioners dashboards generated by their crm. the periodic sales tables, marketing campaigns and performance are the most cited and produce management indicators, predictive and performance indicators. they are deployed in the decision making on several levels. however, it must be said that crm practitioners still expect more accessibility, flexibility, reliability and independence of their information technology solutions to impact the customer experience and to know them better in order to satisfy them. 4.4.1 own values, inertia percentage and percentage of accumulated inertia: f1 f2 f3 f4 f5 f6 own value 0,360 0,234 0,193 0,161 0,158 0,156 inertia (%) 19,875 12,943 10,666 8,898 8,754 8,638 %accumulated 19,875 32,818 43,484 52,383 61,137 69,775 f7 f8 f9 f10 f11 f12 own value 0,124 0,114 0,096 0,078 0,076 0,059 inertia (%) 6,840 6,313 5,312 4,321 4,201 3,239 %accumulated 76,615 82,927 88,239 92,560 96,761 100,000 table n°11: the 12 factorial axes we consider 12 factorial axes, the first tree values together account for more than 43% of the total inertia of the point cloud. beyond third factor, the difference between values becomes insignificant, so we limit ourselves to f3. 4.5 crm human resources determinant the determinant of human resources is the latest one with a total inertia ratio of 1,286. it means that practitioners disagree with a wide dispersion about the key components of human resources namely staff skills, training on crm and sensitization and assessment systems developed around crm. the analysis of asymmetric graph of variables and observations showed a big gap between the profiles of practitioners and high data dispersion. the first three eigenvalues of the hr crm are μ = 0.707, μ = 0.327, μ = 0.252. they are not at all close, which explains that there is a weak association between concepts that represent the human resources as a determinant of crm. table n° 12: semantic recurrences related to human resources crm according to practitioners concepts number of occurrences staff skills 12 crm training 30 sensitization system around crm 10 assessment and control system 16 32 4.5.1 own values, inertia percentage and percentage of accumulated inertia: f1 f2 f3 own value 0,707 0,327 0,252 inertia (%) 54,957 25,442 19,601 % accumulated 54,957 80,399 100,000 the first line represents the rank of the considered factorial axis, p = 3 factorial axes, the first tree values together account for 100% of the total inertia practitioners opinions according to hr crm determinant. we can limit our analysis to the first factor with 54% of inertia and for more significations connections we can also consider the second axis with more than 80% of the total inertia of the point clouds conclusion to conclude, crm is a strategic choice for enterprises and mainly for mobile phone service providers. they have to guide the overall strategy toward the costumer. in other words, it is essential to rethink the organization and business structure around customer service, train and develop management and it skills related to crm, implement an effective process and support it with technology. the objective is to offer consequently a quality customer experience in the use of services across crm practices. furthermore, we understand with evidence that interactive links between the determinants of crm and the determinants of the quality of the customer experience (qoe) exist. on one hand, the semantic analysis of crm determinants brings up the determinants that we found in the literature review of the quality of customer experience, like quality of service, quality of interaction with customer, claims management and customer knowledge. and on the other hand, it turns out that practitioners are aware that we should look beyond the relationship to manage the customer experience to satisfy and retain thereafter. to this end, we will propose a preliminary model built around the first four crm determinants taking into account the results obtained (figure n°1) of the exploratory study and our conclusion. figure 1: crm determinants our research has been limited by the problem to interview professionals and the double burden of transcription and coding the dialectal language to foreign language. the next stage of our research is to study the determinants of qoe in order to develop a conceptual model of the relationship between crm and qoe. references arndt, j. (1979), “toward a concept of domesticated markets”, journal of marketing, vol. 43, pp. 6975. ajzen, i. (1991), “the theory of planned behavior,” organizational behavior and human decision processes, 50, 179-211. almquist, e., heaton, c. and hall, n. (2002), “making crm make money”, marketing management, chicago, 11, 3, 16-21. andreani, j. and conchon, f. (2005), “methods of analysis and interpretation of qualitative studies”, marketing conference proceedings 2005, www.escp-eap.net. averous, b. and averous, d. (2004), “manage and measure the quality of service, the method cyq», insep consulting editions, p5. 33 allard, p. and guggémos, p.a. (2005), “crm: the key to success”, organization edition, paris2005. allard, p. and derringer, d. (2000), “customer relationship strategy”, dunod, paris alireza, f. (2010), “the critical success factors for implementation of crm and knowledge management in a work setting”. 3pgcic, 140148. bardin, l. (1977), “content analysis”, puf bose, r. (2002), “customer relationship management: key components for it success”, industrial management & data systems, vol. 102, 89-97. boulding, w., staelin, r. and al. (2005), “a customer relationship management roadmap: what is known, potential pitfalls, and where to go”, journal of marketing, vol. 69, no. 4, pp. 155-166. bohling, t. and al. (2006), “crm implementation: effectiveness issues and insights”, journal of service research, 9, 184194. buttle, f. (2001), “the crm value chain”, marketing business, volume 96, p 52-55. chang, h. and young, g. (2007), “critical factors and benefits in the implementation of customer relationship management”, total quality management, vol. 18, n°5, 483-508, july 2007. chen, j-s. and russell, k.h.c. (2007), “the effects of mobile customer relationship management on customer loyalty: brand image does matter”, proceeding of the 40 th annual hawaii international conference on system sciences, ieee 2007. chen, j-s., yen, h-j-r. and li, e. (2009), “measuring crm effectiveness: construct development, validation and application of a process-oriented model, total quality management and business excellence”, scci journal, vol. 20(3). chen y-h., su, c-t. and sha, d.y.(2006), “linking innovative product development with customer knowledge: a data-mining approach”, technovation, volume 26, issue 7, july 2006, pages 784–795. chen, p. and el zarki, m. (2011), “perceptual view inconsistency: an objective evaluation framework for online game quality of experience (qoe)”, ieee 2011. chumpitaz, r. and swaen, v. (2004), “the perceived quality as a determinant of customer satisfaction in business-to-business. an empirical study in the telephony sector”, marketing research and applications, 19, 2, 31-52. coase, r. h. (1937), "the nature of the firm," economica, 4,386-351. crosby, l.a. and johnson, s.l. (2002), “high performance marketing in the crm era”, marketing management, pp. 10-11 churchill, g.a. and suprenant, c. (1982), “an investigation into the determinants of customer satisfaction”, journal of marketing research, vol. 19, no. 4, special issue on causal modeling, pp. 491-504 coovi, b. (2010), " customer lifecycle management: proposal of a conceptual model of evaluation of the use of crm software ", portfolio management. auvergne university, clermontferrand i, french. dwyer, f.r., schurr, p.h. and oh s. (1987), “developing buyer -seller relationship”, journal of marketing, 51, 11-27. dalziel, n., harris, f. and laing, a. (2011), "a multidimensional typology of customer relationships: from faltering to affective", international journal of bank marketing, vol. 29 iss: 5, pp.398 – 432 dillon, a., morris, m.g. (1996), “user acceptance of new information technology: theories and models”, annual review of information science and technology, 14(4):3-32 damperat, m. (2005), “customer relationship approaches: evolution and nature, "1st conference of research in marketing, iris lyon iae. dyché, j. (2001), “the crm handbook: a business guide to customer relationship management”, boston: addison wesley. dionne, m. (2001), "to understand the crm: the logic of russian dolls", available on www.crmodyssey.com. ejaz, r. and al. (2013), “impact of crm practices on customers behaviors”, international journal of business and management invention issn, volume 2 issue 7, pp.79-88. fiedler and al. (2010), “the psychology of implicit emotion regulation: a special issue of cognition”, cognition and emotion, volume 25, issue3. fishbein, m. and ajzen, i. (1975), “belief, attitude, intention, and behavior: an introduction to theory and research”, reading, ma, addison-wesley. greenberg, p. (2004), “crm at the speed of light, essential customer strategies for the 21 st century”. new york: mc graw-hill/ osborne. gentile, c. and al. (2007), “how to sustain the customer experience: an overview of experience components that co-create value with the customer”, european management journal, vol. 25, n°5, pp.395-410. giordano, j.l. (2006), “the perceived quality approach”, organization editions, p12. grönroos, c. (1990), “service management and marketing: managing the moments of truth” in service competition, lexington books, new york. grabner, k.s. and modritscher, g. (2002), “alternative approaches toward measuring crm performance”, 6th conference on relationship marketing and customer relationship management, atlanta, 9-12. hassenzahl, m. (2008), “user experience (ux): towards an experiential perspective on product quality”, university of koblenz-landau, http://dblp.uni-trier.de/db/conf/3pgcic/3pgcic2010.html#faedrt10 http://www.sciencedirect.com/science/article/pii/s0166497205000799 http://www.sciencedirect.com/science/article/pii/s0166497205000799 http://www.sciencedirect.com/science/journal/01664972 http://www.sciencedirect.com/science/journal/01664972/26/7 http://www.emeraldinsight.com/action/dosearch?contribstored=dalziel%2c+n http://www.emeraldinsight.com/action/dosearch?contribstored=harris%2c+f http://www.emeraldinsight.com/action/dosearch?contribstored=laing%2c+a http://arizona.openrepository.com/arizona/simple-search?filter_field_0=author&filter_type_0=equals&filter_value_0=morris%2c+michael+g. http://www.crmodyssey.com/ 34 germany media city, åbo akademi university, finland, www.marc-hassenzahl.de huberman and miles. (1991), “analyse des données qualitative: recueil de nouvelles méthodes”, boeck university, brussels. hobby, j. (1999), “looking after the one who matters”, accountancy age, 28–30. heskett, j. l. and al. (1994), “putting the serviceprofit chain to work”, harvard business review, 72(2), pp. 164-174 hakansson, h. (1982), “international marketing and purchasing of industrial goods: an interaction approach”, wiley, new york. injazz, j. c. and popovich, k. (2003), “understanding customer relationship management (crm): people, process and technology”, business process management journal, vol. 9 no. 5, 2003, pp. 672-688 johnson, c. and mathews, b. p. (1997), the influence of experience on service expectations, international journal of service industry management 8(4): 290-305. johnston, r. and kong, x. (2011), “the customer experience: a road-map for improvement, managing service quality”. emerald group publishing limited, vol. 21, no.1, pp. 5-24. kilkki, k. (2008), “quality of experience in communications ecosystem”, journal of universal computer science, vol. 14, no. 5 (2008), 615-624 kutner, s. and cripps j. (1997), “managing the customer portfolio of healthcare enterprises”, the healthcare forum journal, 40(5), 52-54. kaplan, r.s. and norton d.p. (1996), “the balanced scorecard: translating strategy into action”, boston: harvard business school press. khanna, s. (2001), “measuring the crm roi: show them benefits,” available at http://www.crmforum.com. lefranc, e. (2013), "management of customer experience: beyond satisfaction surveys, the extent of the experience," thesis: june 2013. lambert. d. m, (2010), “customer relationship management as a business process”, usa, journal of business & industrial marketing, volume 25, number 1, 4–17. lamparello, d. (2000), “doing more for the right customers”, bank systems and technology, new york, 37, 1, r10-r13. laghari, k.r. (2012), “on quality of experience (qoe) for multimedia services in communication ecosystem”. institut national des télécommunications, 2012. english, nnt : 2012, tele0008. laghari et al. (2011), “qoe aware service delivery in distributed environment”, advanced information networking and applications workshops, biopolis, singapore, march 22 25, 2011. leo y.m., alan c.b. and frederick h.k. (2005), “crm: conceptualization and scale development”, european journal of marketing vol. 39 no. 11/12, 2005 pp. 1264-1290. missi, f., alshawi, s. and irani, z. (2002), “customer relationship management in the ebusiness: data integration issues”, 7th conference of the association information management, hammamet, tunisia, 19. mitra , k. and al. (2011), “a probabilistic contextaware approach for quality of experience measurement in pervasive systems”, sac '11 proceedings of the 2011 acm symposium on applied computing, pages 419-424 marion, g. (2001), “relationship marketing is there?” marketing decisions, n°22. mckim, r. (2002), “information: the newest currency”, target marketing, philadelphia, 22, 7, 36-37. nguyen, t.h and al. (2007), “strategies for successful crm implementation”, information, management & computer security, vol 15, 102 – 115. nguyen, b. and mutum, d.s. (2013), “a review of customer relationship management: successes, advances, pitfalls and futures”, business process management journal, vol. 18 no. 3, pp. 400419, emerald group publishing limited. osarenkhoe, a. and bennani, a. (2007). “an exploratory study of implementation of customer relationship management strategy”.business process management journal, vol13, 139-164. oliver, r. (1980), “a cognitive model of the antecedents and consequences of satisfaction decisions”, journal of marketing research, vol. 17, n°. 4, pp. 460-469. peelen, e. and al., (2009), “an empirical study into the foundations of crm success”, journal of strategic marketing,vol. 17, n°6, 453-471. parasuraman, a., zeithaml, v. and berry,l. (1985), “alternative scales for measuring service quality: a comparative assessment based on psychometric and diagnostic criteria”, journal of retailing, volume 70, issue 3, pages 201–230 plakoyiannaki, e. and tzokas, n. (2002), “crm: a capabilities portfolio perspectives”, journal of data base marketing, 9, 3, 228-237. parvatiyar and sheth. (2001), “customer relationship management: emerging practice, process, and discipline”, journal of economic and social research, 3(2), pp1-34. pine, bj. and j.h. glimore. (1999), “welcome to the experience economy”, harvard business review, 76: p. 97-105. payne, a. and frow, p. (2006), “customer relationship management: from strategy to implementation”, journal of marketing management, 22, 135-168. park, c.h and kim, y.g. (2003), “a framework of dynamic crm: linking marketing with information strategy”, business process management journal, vol. 9 no. 5. peppers. d, rogers. m, (2004), “managing customer relationship: a strategic framework”, hoboken, n.j: john wiley & sons qing, y. z and al. (2013), “empirical study on the relation between customer experience and http://www.marc-hassenzahl.de/ http://www.crm-forum.com/ http://www.crm-forum.com/ http://www.acm.org/conferences/sac/sac2011 http://www.acm.org/conferences/sac/sac2011 http://www.sciencedirect.com/science/journal/00224359 http://www.sciencedirect.com/science/journal/00224359/70/3 35 behavioral intentions in tibetan cultural theme hotel”, international conference on service science, ieee. ramaseshan, b. bejou, d. jain, s. mason, c. and pancras, j. (2006), “issues and perspectives in global customer relationship management”, journal of service research, 9, 2, 195-207. rogers, m. dorf, b. (1999), “the one-to-one in practice”, organization editions. ryals, l and knox, s. (2001), “cross functional issues in the implementation of relationship marketing through customer relationship management (crm)”, european management journal, 2001, vol. 19 no.5, pp.534-42 stone, m. and woodcock, n. (2001), “defining crm and assessing its quality,” successful customer relationship, marketing”, eds. london: kogan. swan, j.e. and combs, l.j. (1976), “product performance and consumer satisfaction: a new concept”, journal of marketing, vol. 40, april, pp. 25-33. shaw, r. and reed, d. (1999), “measuring and valuing customer relationships: how to develop the measures that drive profitable crm strategies”, business intelligence, p4. saint cast. n, (2003), “organize your customer relationships today: the crm new way”, maxima editions. singh and al., (2003), “crm: conceptualization and scale development”, european journal of marketing, vol. 39 no. 11/12, 2005 pp. 12641290. soldani, d and al. (2006), “qos and qoe management in umts cellular systems”, john wiley & sons edition, p2-4. triandis, h. c. (1980), “values, attitudes and personal behavior, beliefs, attitudes and values”, university of nebraska press. tricot, a., plégat-soutjis, f., camps, j. f., amiel, a., lutz, g., and morcillo, a. (2003), “utility, utilisability, acceptability: interpret the relationship between the three dimensions of evaluation”, environnements informatiques pour l'apprentissage humain. strasbourg. trepper, c. (2000), “match your crm tool to your business model”. information week, vol, 15, 74. thieriez .a, (2002), “un crm européen pour la banque ? ”, revue banque stratégie, n°193, pp.569-582. urbanskienė. r, žostautienė. d, chreptavičienė, v. (2008), “the model of creation of customer relationship management (crm) system”, engineering economics, the economic conditions of enterprise functioning. no 3 (58). williamson, o. e. (1985), “the economic institutions of capitatlism”, the free press, new york. xin, y. and al. (2012), “no-reference qoe prediction model for video streaming service in 3g networks”, iee 2012. xu, y. and al. (2002), “adopting customer relationship management technology”, industrial management & data systems, vol. 102, 442-452. zablah, a.r., bellenger, d.n., and johnston, w.j. (2005), “customer relationship management implementation gaps”, journal of personal selling & sales management, 279-295. zikmund, w.g., mc leod. r. jr and faye. g.w. (2003), “customer relationship management: integrating marketing strategy and information technology”, hoboken, n. j.: wiley. 23 synergy between competitive intelligence and knowledge management a key for competitive advantage jihene chebbi ghannay1 and zeineb ben ammar mamlouk 2 1esct, tunis, tunisie, jihene.ghannay@yahoo.fr 2essec, tunis, tunisie, zeinebbenammar@yahoo.fr received 5 may, revised form 11 september, accepted 27 september 2012 abstract: the market orientation perspective states that organizations have no option but to look beyond internal business activities and to integrate events from the external environment. these are complex, turbulent and rapidly changing. firms today are led to utilize information and the knowledge of companies because to succeed in the information economy comes from harnessing these resources. knowledge and information become strategic, paramount and must therefore be managed. integrating knowledge management (km) and competitive intelligence encourage the use of these resources, improve their quality and allow an enterprise to respond more rapidly to changing business conditions. the aim of this article, is to present similarities, differences, benefits of km and ci for the organization through the study of current literature. besides, we present critical success factors needed to achieve a successful implementation of these two processes, and further, highlight the importance of km and ci integration for the organization to compete in the knowledge economy. keywords: knowledge management, competitive intelligence, competitive advantage 1. introduction the globalization of markets accompanied by rapid change in information technology has increased the competitiveness in most industries. in the struggle to remain competitive, many companies have turned to new technologies to improve their business activities. this development is also true for information-related activities and will directly affect the development and quality of a firm’s business and corporate level strategies. these activities are integrated in the ci and km functions of the company. deed and hill (1996) argue that ”firms that are acquiring kno wledge will be able to create and sustain a competitive advantage in the knowledge-based economy. those (firms) that are not will have difficulty maintaining their competitive position”. ci has long been recognized as a strategic management tool and a fast growing field. ci is rapidly becoming a major technique for achieving competitive advantage (davis, 2004). essentially, ci involves the legal collection of information on competitors and the overall business available for free online at https://ojs.hh.se/ journal of intelligence studies in business 2 (2012) 23-34 mailto:jihene.ghannay@yahoo.fr mailto:zeinebbenammar@yahoo.fr https://ojs.hh.se/ 24 environment. the knowledge gained from this information is used to enhance the organization’s own competitiveness. as such, ci can also be viewed as a subset of km. organizations possess numerous resources, but it is the resources that are unique, inimitable, and valuable which are central to a competitive advantage (barney, 1986, 1991; prahalad and hamel, 1990; wernerfelt, 1984). an organization’s knowledge is one such resource. according to civi (2000) and gupta, iyer, and aronson (2000), the only competitive advantage that organizations will have in the 21st century is what they kno w and ho w they use it. this is because the proper management and leveraging of knowledge can propel an organization to become more adaptive, innovative, intelligent and sustainable (wong & aspinwall, 2004a). in fact, km has become an important strategy for improving organizational competitiveness and performance by applying it to production, marketing, research and development, personnel, planning and inno vation. it is also considered as creating sustainable competitive advantage for organizations (king and zeithaml, 2001; johannessen and olsen, 2003; lado and wilss, 1994; ofek and sar vary, 2001). thus, the vision of km is to improve a firm’s competitive powers or to maintain a firm’s competition powers. km is the management of knowledge assets within an organization to enhance competitive power by steering product, leadership, operational excellence, and customer intimacy. 2. literature review 2.1 defining ci ci is a current topic in the business world today. hence, workshops, seminars, training courses and books have been increasing in numbers steadily since 1980. ci has been reported as one of the fastest growing disciplines in the us (scip, 2000; miller, 2000; kahaner, 1998). the concept of ci is very vague, numerous definitions of ci available in literature are imprecise and inclusive, and the expression is often used integrally with other related concepts such as a business intelligence and competitor intelligence. practitioners and theorists have largely failed to agree on a common definition of ci. although, consensus about some aspects of the function have been achieved, fuld & co., a high profile ci consulting firm, takes an inclusive approach in defining the function of ci thus: “competitive intelligence can mean many things to many people. a research scientist sees it as a heads-up on a competitor’s new r&d initiatives. a salesperson considers it as an insight on how his or her company should bid against another firm in order to win a contract. a senior manager believes intelligence to be a long-term place and its rivals” (fuld & co, 2002). the society for competitive intelligence professionals (scip), gives a more precise definition: “a systematic and ethical program for gathering, analyzing, and managing external information that can affect your company’s plans, decisions, and operations. put it another way, ci is the process of enhancing marketplace competitiveness through a greater-yet unequivocally ethical-understanding of a firm’s competitors and the competitive environment” (scip web site, 2002). ci can be defined, also, as knowledge and foreknowledge about the external operating environment. the ultimate goal of each intelligence process is to facilitate decisionmaking that leads to action. “competitive intelligence is a formalized, yet continuously evolving process by which the management team assesses the evolution of its industry and the capabilities and behavior of its current and potential competitors to assist in maintaining or developing a competitive advantage. (prescott and gibbons, 1996). 2.2 km definition km is often viewed as multidimensional and multidisciplinary concept. there are many definitions of km in the literature, thus comparisons must be made to know the focus by each author. some of the focuses are highlighted below. professor michael sutton (2008) of the gore school of business at westminster college reported at the ickm (international conference on knowledge management) meeting in 2008 that he had assembled a library of more than 100 of them (mclnerney c and koeing m, 2009). three definitions of km ones are presented here. at the very beginning of the km movement, davenport (1994) offered the following: “knowledge management is the process of capturing, distributing, and effectively using 25 knowledge”. this definition has the virtue of being simple, stark, and to the point. a few years later, the gartner group created another definition of km, which is perhaps the most frequently cited (duhon, 1998): “a discipline that promotes an integrated approach to identifying, capturing, evaluating, retrieving, and sharing all of an enterprise’s information assets. these assets may include databases, documents, policies, procedures, and previously un-captured expertise and experience in individual workers”. finally, the definition given by peter drucker (1994), whom many consider as the father of km, defines the need for this function: “knowledge has become the key resource, for a nation’s military strength as well as for its economic strength (...) is fundamentally different from the traditional key resources of the economist—land, labor, and e ven capital (...) we need systematic work on the quality of knowledge and the productivity of knowledge (...) the performance capacity, if not the survival, of any organization in the knowledge society will come increasingly to depend on those two factors”. 3. ci and km processes 3.1 ci process the ci process consists of the following steps: monitoring business environment (external data, information and knowledge), gathering, analyzing, filtering and disseminating intelligence that will support decision making process in order to increase competitiveness and improve position of organization. figure 1: ci process many versions of the conceptualization of the ci cycle can be found in the literature. to show their similarities and differences, table 1 presents the basics steps identified by several authors, each of whom divides the ci process into four to six phases. 26 table 1: models of ci cycle information management cycle (cheo, 2002) cia (2001) fuld & co, (2002) pirttila (1998) kahner(1998) miller (2000) identification of information needs (1) planning and direction (1) planning and direction (1) definition of competitor and information needs (1) planning and direction (1) identification on key decision makers and intelligence needs information acquisition (2) collection (2) secondary published information sources (2) systematic collection of competitive information (2) collection (2) collection (2) primary source collection (3) organization and storage (3) processing (3) screening analysis of collected information (3) analysis and production (4) analysis and production (4) analysis (3) analysis (3) information production and services (4) report and information information distribution (5) dissemination (5) distribution related user groups (5) dissemination (5) dissemination (5) information use (6) the models presented in table 1 are similar; however, some distinctive dimensions are evident. regarding the first step, we see that, despite the different titles, each model recognizes the importance of identifying the type of intelligence/information that is needed to begin the process. although planning should be the starting point of any process, we argue that, in the ci cycle, planning relates mainly to the identification of the intelligence needs that must be fulfilled and of the various activities and analyses that are required to fulfill such needs. each model also includes a collection or acquisition stage as a second step. fuld & co. differentiates the collection of information in two parts: secondary/published and primary sources. after the collection of information, the only ci cycle that identifies a step related to the processing of information is the cia model. in comparison to the information management cycle, the organization and storage of information is a step that is regularly overlooked by the ci community. this step is key to an effective information-related system. all ci models presented here include an analysis stage. although it is not part of the information management model, this stage is an integral part of any intelligence process. analysis transforms information into intelligence using a variety of techniques. pirttilä’s model, which omits the organization and storage step, includes “screening” in the analysis step. 3.2 km processes we earlier defined knowledge management as performing the activities involved in discovering, capturing, sharing, and applying kno wledge so as to enhance, a cost-effective fashion, the impact of knowledge on the unit’s goal achievement. thus, knowledge management relies on four main kinds of km processes. as shown in figure 2, these include the processes through which kno wledge is discovered or captured. it also includes the processes through which this knowledge is shared and applied. these four km processes are supported by a set of seven km 27 sub-processes, as shown abo ve with one subprocess — socialization— supporting two km processes (discovery and sharing). of the seven km sub-processes, four are based on nonaka (1994). focusing on the ways in which knowledge is converted through the interaction between tacit and explicit knowledge, nonaka identified four ways of managing knowledge: socialization, externalization, internalization, and combination. the other three km sub-processes — exchange, direction, and routines — are largely based on grant (1996) and nahapiet and ghoshal (1998). figure 2: km processes 4. ci and km benefits for the organization 4.1 ci, which advantages for the organization? according to prescott and bhardwaj (1995), ci practitioners believe ci programs provide the following benefits: • influencing actions of decision-makers • improving early warning signals • identifying new opportunities • exploiting competitor vulnerabilities • sharing of ideas • better serving the company’s customers prescott and bhardwaj (1995) argue that these benefits are directly identifiable, although there are no quantitative measures to support this. an improved market position and improved revenue/profits are not directly identifiable since they are “uncertain effects”. these benefits fall into the category of bottom-line measures, which are usually the most commonly requested. simon and blixt have tried to measure these uncertain effects. they describe the relevant issues to be measured when considering uncertain effects or monetary benefits of a ci program as: • quality, relevance, timeliness, and accuracy of intelligence • accuracy of data in analysis • increasing number of clients and additional business from current clients • business success and performance measured by industry benchmarking ci re veals the state of business, exposes the unkno wn, and sho ws how to tackle current market conditions. it helps recognize risks and new market opportunities earlier and act faster. good ci delivers often surprising truths, gives a head-up on what’s coming, and equips the organization with the knowledge to outmaneuver the toughest rivals. using the accurate and objective knowledge, good ci provides particularly during unpredictable and turbulent time can gain better control over their business in the future. 4.2 benefits of km 28 according to modern approaches, km is already considered as a key factor in the organization's performance and, the best resource and the only sustainable competitive advantage to individuals and organizations, because it deals with different resources that can aid decision makers in many ways (keen, 1991). most commentators writing on the subject highlight the primary purpose of km as efficiency and productivity achieved through the reuse and sharing of experience and know-how. often overlooked is the potentially important goal of promoting quality of work product and practitioner training that can be shown to increase the value of the client service. km can serve a wide variety of purposes. according to petter gottschalk, of the department of technology management at the norwegian school of management, "effective knowledge management pays off in fewer mistakes, less redundancy, quicker problem solving, better decision making, reduced research development costs, increased worker independence, enhanced customer relations, and improved service”. table 2: benefits and challenges of km benefits of km challenges of km fosters innovation requires full employee participation improves efficiency requires constant updating improves coordination and efforts must sort useful knowledge from useless information enhances customers and employee satisfaction -km projects are not always successful in term of increased profit margins and reduced costs improve response time rewards employees improves market time responsive to market changes reduces costs encourages free flow of ideas connects geographically dispersed people (e.g., customers, employees, suppliers, and consultants) foster collaboration improves information access expertise localization 5. km and ci success factors 5.1 key success factors of ci according to stanat (1990) no single system architecture can be found appropriate for developing a successful intelligence program because of cultural and structural issues. ci process is likely to be unique in each organization. therefore, there is rarely a similarity between successful ci processes. despite, some general success factors and guidelines can be mentioned. in fact, ci process should reflect the organizational culture, available resources and goals of each specific company (gilad, 1985; fuld, 1997). 5.1.1 top management support and participation the support from top management is considered the most important success factor for ci implementation success. intelligence operations should have full senior management commitment and an operating mandate from the top. an intelligence strategy must have full support at board level if it is to succeed (bord, 1997; kahaner, 1996). it is also essential to make sure top management has the available intelligence at their fingers (hering, 2000). 5.1.2 identifying ci needs 29 the company’s management must view the ci as a key resource for better decision-making. this means identifying the impending threats, becoming important and alert management to new business opportunities. 5.1.3 ci culture/ awareness for a company to use its efforts successfully, an appropriate ci culture that support open communication, team spirit, information and knowledge sharing and focus on shared goals, is necessary (olivier et al., 2003). according to calof (2000) the attitudes of people when they don’t trust ci, and are unwilling to share information is considered a main barrier that prevent firms from effectively gathering and using ci. the organization should develop programs that make people want to share their knowledge and acquire new one (iivonen and huotari, 2000; den hertog and hnizeng, 2000). 5.1.4 ci tools and resources a good ci functions must also have adequate resources to deliver the required judgments, insights, and analysis that support the management’s decisions. asking one or more individuals to “take responsibility for the company’s ci” requires providing them with the budget and resources for professional development, outsourced research, and technology tools to implement and succeed with a ci process. 5.2 key success factors of km km covers a wide range of functionalities and support different sets of activities. some factors are considered critical for the successful implementation. however, there exist different views among practitioners and researchers on how a km program can be designed and implemented in organizations. several studies have proposed several key variables for successful implementation. 6. km and ci to achieve competitive advantage 6.1 what is meant by competitive advantage? concept of competitive advantage has a long tradition in the strategic management literature. ansoff (1965) defined it thusly: “(...) (to) isolate characteristics of unique opportunities within the field defined by the product-market scope and the growth vector. this is the competitive advantage. it seeks to identify particular properties of individual product markets which will give the firm a strong competitive position”. 30 table 3: success factors of km researcher success factor for using knowledge managemenr kuan yen wong (2005) senior management support, culture, information technology, strategy and goals, measures, organizational infrastructure, activities and processes, motivational support, resources, education, human resources management mathi (2004) knowledge-base d organizations, culture strategy, systems and information technology infrastructure, systematic and effective process, measures. martins et al. (2003) organisationnel culture, motivation and skills, senior management, structures ans process, information technology moffett et al. (2003) a friendly organizational culture, senior management leadership and commitment, employee involvement, employee training, trustworthy teamwork, employee empower ment, information system infrastructure, knowledge structure reyan and prybutok ( 2001) an open organizational culture, senior management leadership and commitment, employee involvement, teamwork, information system infrastructure devenport et al. (1998) technology infrastructure, organizational infrastructure, balance of flexibility, evolution and cost-ofaccessibility to knowledge, shared knowledge, knowledge friendly culture, motivate d workers who develop, share and use of knowledge. hospal and fusion (1997) management factors, coordination, control, leadership and measures ; factors related resource : knowledge, people, financial and non-financial resources , environmental factors : competition, markets, time pressures, economic and government situation. nnn south (1981) defined competitive advantage as the “philosophy of choosing only those competitive arenas where victories are clearly achievable”. porter (1985) states "competitive advantage grows fundamentally out of value a firm is able to create for its buyers that exceeds the firm's cost of creating it." he argued that a firm’s ability to outperform its competitors lay in its ability to translate its competitive strategy into a competitive advantage. competitive strategy entails positioning the firm favorably in an industry relative to competitors. he confirmed that there are, in general, only two possible competitive advantages a firm may possess, a cost advantage or a differentiation advantage. others, particularly proponents of the resourcebased view of the firm (barney, 1991; conner, 1991), have extended the definition to include a wider range of possible advantages such as physical capital (williamson, 1975), human capital (becker, 1964), technological opportunities and learning ( teece, 1980; 1982; 1986), and organizational capital (tomer, 1987). 6.2 synergy between ci and km to obtain competitive advantage knowledge management (km) is the process through which organizational performance is improved through better management of corporate knowledge. its goal is to improve the management of internal knowledge processes so that all information required for corporate decisions can be made available and efficiently used. competitive intelligence (ci) is a process for gathering usable knowledge about the external business environment and turning it into the intelligence required for tactical or strategic decisions. both km and ci systems are designed to enhance the information resources of an enterprise, but often target different information types and sources. while ci is concerned with gathering information from the external environment to enable the company to gain competitive advantage (williams, 2002), most investigation into km has focused on capturing the knowledge stored within the minds of individual employees (nidumolu, subramani, & aldrich, 2001). bagshaw (2000), johnson (2000), rubenfeld (2001), and williams (2002) all focus on the use of km for collecting, 31 managing, and sharing internally generated knowledge. the combination of effective km and appropriate ci provide the right mix of the right information to the right decision maker at the right time. certainly, these two fields are starting to blend into the same melting pot. however, each field has some unique qualities that differentiate it from the other. table 4: a comparison between knowledge management and competitive intelligence the fields of ci and km have a number of differences as shown on in the table abo ve, but potential relation can exist if we instinctively regard them in terms of applying enterprise knowledge of the internal and external environment for long-term competitive advantage. the goal of both disciplines is to evaluate the business decisions, locate and deliver appropriate knowledge from within and without the organization and, in the end help to give it meaning and help decision makers. according to bensoussan (1996), the keys to a company’s future are not found in forecasts, predictions or media gurus, but through patiently, carefully and strategically turning a company’s knowledge into competitive intelligence”. she identifies the components of ci as available data and expert judgment, and calls for intelligence to be “future-oriented, accurate, objective, relevant, useful, and timely”. in other words, each drives the other. as sho wn earlier in table 3, although there are significant differences in the focus and activities of km and ci, they “have similar goals and are natural extensions of one another (e.g., manage information overload and timely/targeted information delivery, provide tools for data analysis, identify subject matter experts, enable collaboration)” (meta group, 1998). davenport (1999) even goes so far as to take the stance that ci can be viewed as a branch or subset of km. figure 3: the kmci relationship. (source: katherine shelfer, drexel university, 2004) the study conducted by breeding (2000) at shell services international (sii) shows how ci activities at ssi have been impacted by the extensive use of km. it is demonstrated that 32 using the ci/ km system gives more time to higher value-added tasks such as simulation, strategy. 7. conclusion as discussed above, km and ci are distinct by being both complementary and synergistic. at their core, both fields are concerned with gaining competitive advantage from better applications of information or knowledge. knowledge may perhaps be the only remaining and one of the most critical sources of competitive advantage available to an organization in the 21st century. this is true; more so, as previously available traditional resources may no longer offer any significant competitive advantage. to remain competitive, organizations must create and use new knowledge. ho wever, the current practices in knowledge acquisition, utilization, and management are mostly limited to capturing, recycling, and deploying the existing information, and making it available on a technology platform. km and ci are in this regard two important strategies or practices through which organizations could use effective knowledge to improve organizational effectiveness, improve productivity, improve decision making, and especially, obtain a sustainable competitive advantage. even if it is difficult to simplify the relationship between ci and km (johnson, 1999), it is obvious that the two approaches complement each other. km and ci are two parts of the same whole because both are designed to apply enterprise knowledge of the internal and external environment for long term competitive advantage. the synergy between km and ci indicates that greater convergence between the two approaches (parker and nitse, 2011). references bagshaw, m. (2000)” why knowledge management is here to stay”, industrial and commercial training, 32(5), 179-183. becker, g. s. (1964)” human capital”, new york: columbia university press. barney, j. (1991) “firm resources and sustained competitive advantage,” journal of management 17(1): 99-120. barney, j. (1991) "organizational culture: can it be a source of sustained competitive advantage?" academy of management review 11.3 (1986b): 656-65. 1986 bensoussan, b. and c. hall. (1996)” the state of competitive intelligence in australia” [online]; www.scipaust.org.au/1996_survey_result_su mmary. breedings,b. (2000) “ci and km convergence: a case study at shell services international”, competitive intelligence review, 11(4) 1224. civi, e.(2000) “kno wledge management as a competitive asset: a review”. marketing intelligence and planning, 18(4), 166–174. conner, k. r., and prahalad, c. k. (1996)”a resource-based theory of the firm: knowledge versus opportunism”. organization science, 7: 477-501. davenport, t.h., de long, d.w., and beers, m.c., [1998], successful knowledge management projects, sloan management review, (77)2 winter, pp 43 – 57 davenport, t. (1994). saving it's soul: humancentered information management. har vard business review, 72(2), 119-131. davenport, t., delong, d.w and beers, m.c (1998) “ successful knowledge management projects”, sloan management review, vol.39, n°2? 43-57. davenport t. h. (1999)”knowledge management and the broader firm: strategy, advantage, and performance in knowledge management” handbook (eds. liebowitz, j.), boca raton, fla.: crc press. davis, m. (2004)” using business intelligence for competitive advantage”, available at: www.knowledgepoint.com.au/business_intel ligence/articles/bi_md001b.htm. deeds, d.l. and c. hill. 1996. strategic alliances and the rate of new product development: an empirical study of entrepreneurial biotechnology firms. journal of business venturing 11: 41-55. drucker, p (1994), theory of the business, harvard business review, septemberoctober, pp 95-
106, boston, m ass, usa. fuld and co (2002). intelligence software : the global evolution fuld & co cambridge, (online) gilad b. and gilad t. (1985)” a systems approach to business intelligence”, business intelligence horizons, vol.28 n°5,65-70 gottschalk p.(1999) "use of it for knowledge management in law firms," 1999 the journal of information, law and technology (jilt), http://elj.warwick.ac.uk/jilt/993/gottschalk.html. 33 b.gupta, l. s. iyer, and j. e aronson, (2000) “knowledge management: practices and challenges”. industrial management and data systems, 100(1), 17–21. jafari et al.(2007) “knowledge management in iran aerospace industries: a study on critical factors”, aircraft engineering and aerospace technology, 79 (4), 375-389. johannessen, j. and olsen, b. (2003)” knowledge management and sustainable competitive advantages: the impact of dynamic contextual training”. international journal of information management, 23, 277–289. johnson, a.r. (1999) “you say competitive intelligence and knowledge management two parts of the same whole”. knowledge management magazine, 3(3). johnson, a.r. (2000)” competitive intelligence and competitor analysis as knowledge management applications. in j.w. cortada & j.a. woods (eds.), the knowledge management yearbook 2000-2001 (pp. 8597). woburn, ma: butterworth-heinemann. kahaner, l. (1996)” competitive intelligence: from black ops to boardrooms. how businesses gather, analyze, and use information to succeed in the global marketplace”. new york: simon & schuster. shelfer, k. (2004) "the intersection of knowledge management and competitive intelligence: smartcards and electronic commerce." knowledge management: lesson learned: what works and what doesn’t. eds. michael e. d. koenig and t. kanti srikantaiah. new jersey: information today, inc,. 419-42. keen, p. g. w. (1991)”shaping the future” boston: harvard business school press. king, a. w., & zeithaml, c. p. (2001). competencies and firm performance: examining the causal ambiguity paradox. strategic management journal, 22, 75–99. lado, a. a., & wilson, m. c. (1994). human resource systems and sustained competitive advantage: a compentency-based perspective. academy of management review, 19(4), 699–727. mertino, k., heisig, p. and vorbeck, j. (2003) “knowledge management: concepts and practices”, spring, new york, ny. mcinerney.c and koenig m. “synthesis lectures on information concepts, retrieval, and services”, january 2011, vol. 3, no. 1 , pages 1-96 meta group, inc (1998)”applying knowledge management to competitive intelligence” retrived may 2001 from: http//www2.megagroup.com/product/insight /aims_6_res.htm miller, j. 2000. millennium intelligence: understanding and conducting competitive intelligence in the digital age. new york: cyberage books. nahapiet, j. and ghoshal, s.(1998)”social capital, intellectual capital, and the organizational advantage”. academy of management review, 23: 242–266 nidumolu, s.r., subramani, a. and aldrich, a. (2001)” situated learning and the situated knowledge web: exploring the ground beneath knowledge management”, journal of management information systems 18(1), 115-150. nonaka. i (1994) “a dynamic theory of organizational knowledge creation,” organization science 5:1 february page 1437. nonaka, i and takeuchi, h (1995) “the knowledge creating company: how japanese companies create the dynamics of innovation “, new york: oxford university press, page. 284, ofek, e. and sar vary, m.(2001) “leveraging the customer base: creating competitive advantage through knowledge management”, management science , 47, 11 (nov), page 1141-56. olivier et al. (2003)”legal goodness for the collection of information in the competitive intelligence process in south africa», south africa journal, vol.5(4), december. parker,k.r and nitse, p.s(2011) “competitive intelligence gathering”, encyclopedia of knowledge management, information science reference, new york, 2011 :103111. prahalad, c.k. and hamel g. (1990) “the core competence of the corporation “, har vard business review, n° 3,79-91. prescott, j.e. and p.t. gibbons. (1992a). “the parallel process of competitive intelligence: why it exists and what we can do about it? competitive intelligence review, summer, 3, 2: 11-13. prescott, j.e. (1999). “debunking the academic abstinence myth of ci,” competitive intelligence magazine 2(4): 22-26. porter, m.e. (1985)” competitive advantage, creating and sustaining superior performance, new-york: free press 34 prescott, j. and g. bhardway. 1995. a survey of competitive intelligence practices. competitive intelligence review, 6,2: page 4-14. prescott, j.e., and bhardwaj, g. (1995) “competitive intelligence practices: a survey”, competitive intelligence review, vol. 6 no. 2, pp. 4-14.. prescott, j.e., and gibbons p.t.( 1996), “the seven seas of global competitive intelligence”, competitive intelligence review, vol. 7 no. 1, pp. s41-8. rubenfeld, j. (2001)” knowledge management for life: make the world a better place”. ubiquity, 2(41). williams, r. (2002)” applying km lessons to competitive intelligence: creating a userdriven competitive intelligence culture”. retrieved march 2003 from http:// old.apqc.org/free/ articles/diparticle.cfm?productid=1493 sammon, w.l., m.a. kurland, and r. spitalnic. (1984) “business competitor intelligence: methods for collecting organizing and using information”. new york: john wiley & sons. scip. (2000), society of competitive intelligence professionals. (online). http://www.scip.com. shelfer, k. (2004) "the intersection of knowledge management and competitive intelligence: smartcards and electronic commerce." knowledge management: lesson learned: what works and what doesn’t. eds. michael e. d. koenig and t. kanti srikantaiah. new jersey: information today, inc, 2004. 419-42 simon, n. and a. blixt. (1996)” navigating in a sea of change”. alexandria, va: society of competitive intelligence professionals. south, s.e. (1981) “competitive advantage: the cornerstone of strategic thinking,” journal of business strategy 1(4): 15-25. stanat r. (1990)” the intelligent corporation: creating a shared network for information and profit”, new york, amacom. teece, d. j. (1980)”economics of scope and the scope of the enterprise”, journal of economic behavior and organization, 1, pp. 223–247 teece dj. (1982) “towards an economic theory of the multiproduct firm”, journal of economic behavior and organization 3(1): 39–63. teece dj. (1986)” profiting from technological innovation”. research policy 15(6): 285– 305. williams, s. w. (2002)” making better business decisions: understanding and improving critical thinking and problem solving skills”, thousand oaks, ca: sage publications. wernerfelt, b., (1984” a resource-based view of the firm”, strategic management journal, 171-180 k. y wong,. & e. aspinwall. “characterizing knowledge management in the small business environment”. journal of knowledge management, 8(3), 44–61., pp. 123–135. 1993 williamson, o. e (1975)” markets and hierarchies: analysis and antitrust implications”, the free press, new york wong, y.k (2005) “critical success factors for implementing knowledge in small and medium enterprise”, industrial management and data systems, vol.105 n°3,261-279. vol6no2paper4 kss to cite this article: søilen, k.s. (2016) users’ perceptions of data as a service (daas). journal of intelligence studies in business. 6(2) 43-51. article url: https://ojs.hh.se/index.php/jisib/article/view/159 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index users’ perceptions of data as a service (daas) klaus solberg søilena adepartment of engineering, natural sciences and economics, faculty of marketing, halmstad university, halmstad, sweden; klasol@hh.se journal of intelligence studies in business please scroll down for article users’ perceptions of data as a service (daas) klaus solberg søilen department of engineering, natural sciences and economics, faculty of marketing, halmstad university, halmstad, sweden; klasol@hh.se received 3 august 2016; accepted 25 august 2016 abstract in this study, 190 market intelligence (mi), competitive intelligence (ci) and business intelligence (bi) professionals and experts were asked about data as a service (daas). findings show there were few limits or restrictions on what kind of data users could imagine buying or renting, if all types of data were available. data that is more sensitive—personal data and private data—will be difficult to buy, users think. company secrets and most data for business-to-business (b2b) industries is especially difficult to obtain. the major concerns for daas from a user perspective are confidentiality, quality, reliability, security and accessibility. besides, it is often pointed out by users that when everyone has much of the same data competition will increase. users want to see more on company metrics, less expensive, more secure and more flexible data solutions. the analysis reveals that the ethical dimension are a major concern as daas develops. an extensive discussion follows, which also addresses new points. keywords business intelligence as a service, daas, data governance, data steward, dbaas, ethics, intelligence as a service (iaas), management of data 1. introduction intelligence today is inseparable from information technology (it) systems, special software (business intelligence) and big data. now one can buy or rent data, and this is referred to as data as a service (daas). many suppliers only want users to see the actual intelligence or end analysis, not the raw data, as they are afraid that customers could sell it on or make their own analyses. like many analysts, daas providers are hesitant to describe their scientific method and calculations, hoping instead that users will accept their business models and trust them. daas is a cloud-assisted service that delivers data on demand through an application programming interface (api) (vu et al. 2012). daas can also be said to be the shifting philosophy of data ownership to data stewardship (rajesh et al., 2012, p. 26). daas was first used primarily in web mashups (rajesh et al., 2012). a mashup in this context is a web page, or web application that uses content from more than one source to create a single new service displayed in a single graphical interface. many early business intelligence companies are built on the same technology, like agent24 in sweden. daas can be seen as ready-made, or tailormade intelligence packages. the connection to intelligence is strong for vendors, for example in oracle. for them daas is “intelligence from external sources”, to create “action”, meant as something wider than decisions. daas can also be seen as a logical step from previous aas-products from infrastructure aas (amazon web services), platform aas, software aas (google email, google doc.) and database aas. for dbaas see curino et al., 2011 and seibold et al., 2012. database-as-a-service (dbaas) was brought forward as traditional relational database systems proved to be unable to efficiently manage big data datasets. it was first with cloud computing that the opportunity arose, especially with the model journal of intelligence studies in business vol. 6, no. 2 (2016) pp. 43-51 open access: freely available at: https://ojs.hh.se/ 44 known as dbaas (abourezq and idrissi, 2016). with dbaas one still owns the data. this is not so with daas. to have one’s own database feels safer that placing data in the cloud, so the question still remains open as to just how bright the future of daas is. when it comes to valuable information, consumers are particularly concerned about privacyprotection. the problem has been studied and a solution was suggested by canard and devigne (2016). there is also business intelligence as a service (chang, 2014). it offers data access through a web interface, where the implementation and details are hidden from users. the business processes are orchestrated in a simpler and faster manner (sano, 2014). what has created the right conditions for daas is the growing desire to seek competitive advantage from the use of big data and the challenge of managing increasingly complex and heterogeneous data landscapes (pringle et al., 2014, p. 29). daas is being brought forward by advances in cloud computing as it avoids the overly scaled computer infrastructure that includes not only dedicated space, but expensive hardware and software (sharma, 2015). users’ perceptions of business intelligence (bi) have been studied many times, for example by sabanovic and solberg søilen (2012) and by nyblom et al. (2012). no one has studied customers’ perceptions of daas empirically. it’s essential for suppliers to know how to package and sell different daas products. before that can happen suppliers need to know what potential customers think about daas. first they must understand what it is, and what its potential, challenges and future may be. for this an exploratory study is requested. for intelligence studies it is of interest to know how mi, ci and bi experts see daas today and how they see it developing in the future. another study should look at if mi, ci and bi experts see these questions differently from other analysts and it experts. state and military intelligence organizations have become efficient at sharing intelligence, especially since september 11th, and the appearance of the new global threat of islamic fundamentalist terrorism. these organizations are sharing and exchanging intelligence not only at national levels but also internationally. new and faster performing information technology in the form of networks (infrastructure), hard disks (storage) and devices (working stations) is making these interactions easier and more attractive. private organizations too are realizing the potential value in sharing intelligence even though the most common form of obtaining intelligence so far is to buy data from a third party, not sharing intelligence with competitors and third parties. in the future, we can imagine that private organizations will mark documents, reports and analyses that they want to sell to others and make them available on the web. companies who excel in intelligence work will be able to finance part of their own capabilities through the sales of their own intelligence reports, much like consultancy companies (such as kpmg) or journals (such as eiu) today. instead of conducting their own research—which is costly and demands special competencies— companies are more often looking to buy or rent that information. the most common product to sell is credit reports. the most common analysis is for target marketing, placing consumers into segments. companies who either sit on large amounts of data, like social media sites, or who send this data around, like ericsson and huawei, are eager to enter this new business segment. we hear companies talking about redefining their business models, like at ericsson, are now afraid that huawei will overrun them if they only focus on their core business. facebook, linkedin and twitter are all in the same business, making money by capitalizing on our personal data. what they sell—connections to friends, colleagues or anyone who cares to listen and follow us—is less important for these companies than the amount of traffic (user activities) they gather. their income is related to how well they package and present this data to advertisers. so far they have had significant success as users, like you and me, are telling them everything about ourselves in terms of what we search for, making segmentation easier and more accurate. as a consequence, they are becoming experts in getting us to “check-in” several times a day. on the surface it is all about friends, work or political debates, but as a business the data we leave can be packaged and sold. moreover, there is little information for the user about what is done with their data. in the market of market intelligence this kind of data is nothing new. for decades there 45 have been data brokers: companies who gather data in secret and sell it off, much without direct interaction with consumers. data brokers gather data from hundreds of millions of consumers, including data about characteristics, preferences, health and financial situation. they do not only gather data about home addresses and phone numbers, but also about what car they drive, how much and what they watch on tv and on the internet, and what sports they participate in. they sell products that identify financially vulnerable consumers divided into categories such as “rural and barely making it,” “ethnic second-city strugglers,” “retiring on empty: singles,” “tough start: young single parents,” and “credit crunched: city families” and score each person accordingly. data brokers have been systematically criticized for not disclosing their sources. examples of such companies today are acxiom, experian, and epsilon. from the point of view of a researcher producing science it is unthinkable not to disclose sources or to give a detailed description of the method for gathering data. the scientific article will simply not pass the review process. serious journalists also have some rules of thumb when it comes to the truth, like checking with two independent sources. the same issue of reliability and validity that we see among data brokers is also found in other industries, for example among consultancy companies and among survey companies. these organizations are not primarily focused on disclosing the truth, but instead on selling and profits. many survey companies, like novus in sweden, refuse to disclose their scientific method, viewing it as a trade secret. in a country like sweden, a hand full of survey companies set much of the political agenda, which again shapes political opinion as their findings and publications make the backbone of tv news and debates in the established newspapers. many survey companies pay respondents to fill in e-surveys as the response rate is otherwise too low. this development is increasing as internet users are less willing to take time to fill in questionnaires. thus we have a situation today were particular respondents who are attracted to e-surveys work for the money are overrepresented. as the method is not described and data are not shown, the reader never learns that respondents are not representative of the population, even though many companies have banned respondents from certain countries in western africa to avoid more blatant biases. the problem is that these surveys are likely to gain different answers from another group of respondents, which is referred to as a problem of reliability. there is no one to redo surveys and research. by the time the reports are out they are soon forgotten and replaced by new ones, but the damage to the democratic system is already done as politicians are quick to take on new results from the news and shape their policies accordingly. surveys are hardly ever called back and apologies due to surveys errors are never made by news organizations. this is the same problem we face with daas, as suppliers are selling and renting data without giving the customer the possibility to investigate the scientific method or the raw data and its calculations. this leads to higher chances of manipulation. 2. research questions among the research problems mentioned in the literature we find the question of what types of vendors are available for daas. ovum (2014) distinguishes among three types: large technology vendors like ibm, microsoft, oracle and sap with substantial experience in the management of data (1), full service advertising agencies, like dentsu/aagis media, havas, interpublic, publicisomnicon and wpp, who combine technological capabilities with business consulting (2) and data players like axciom, experian and neustar with a substantial track record in managing vast and varied data sets (3). companies see an interesting business model in combining business know-how with technological capabilities, as in the cooperation between qlik, hp and intel. this year the swedish bi company qlik was sold to thoma bravo for three billion usd. the question becomes: how do you best bundle data and software? to that end, what we do not find in the literature today is what users and customers exist for daas, what they are looking for and what they see as strengths and weaknesses with the products available today. intelligence professional of all kinds would be potential customers for daas, just as they represent a major group of customers for business intelligence products and are working with many of the same issues around quality of data and analysis. it would therefore be of 46 interest for researchers to contact mi, bi, and ci professionals to get their ideas. another research question of interest is: what kind of data sets and software do these customers want? daas addresses a number of long-standing concerns in the ci field. for example, daas could be said to be a response to those who think companies spend too much time and money building and maintaining their own systems and data. companies need to focus more time on creating value with the data instead, it is often said in boardrooms. as we have seen there is one major assumption in this equation: that the data daas provides and the analyses they perform are good. the daas providers are basically asking us to trust them, which from a critical point of view is impossible if they do not show their method, raw data or analyses. however many companies are ready to place that trust and many will receive intelligence that is good. given that the price is not too high daas will be attractive to certain groups of consumers or users. to identify and locate this group then becomes an important question. “garbage in garbage out” (gigo) is becoming a big problem for big data. big data can be divided into transaction data (erp, crm), interaction data (logs, social feeds, click streams) and observation data (internet of things such as sensors, rfid chips, atm machines). when we look at the large quantity of big data produced today, most comes from social media, e-commerce, internet of things and sensors. this includes youtube (1000 tb of new data per day), fb (600 tb), ebay (100 tb), and twitter (100 tb) (abourezq, manar and idrissi, abdellah (2016, p. 159). yet with all their computer power, amazon is still not able to tell me what book i will buy next. what daas vendors offer first is this data, gigo, not intelligence. what the customer wants, on the other hand, is the opposite: intelligence, or strategic and actionable information. this is a major challenge for suppliers in this industry. it’s not an impossible equation, but it’s clear that intelligence has little to do with the sheer quantity of data. if data brokers have been able to do it so can daas companies. the question is how. in many cases, another challenge is to get customers to accept to receive not the actual data itself the raw data but a graph or some output where that raw data is simply used. another challenge is to get buyers to accept the idea of renting – not owning – the data. so research should try to find out what types of buyers may accept these different terms and what they are willing to pay for it. for many customers daas will make sense. most businesses don’t have all that many trade secrets. they succeeded because they were first, built loyalty and delivered customer value, or simply because they never gave up. now they are looking for better demographic data. they can try to get it themselves, but it takes too much time and they are unsure about statistics. many of these companies will rent the data if it’s much cheaper. it will be good enough for a presentation at work. the next question then is how low the price must be given the drawbacks of daas listed above. from the supplier’s side the question becomes how they can produce products that are more cost efficient. there are obvious advantages in this business with economies of scale, but how does this business model look? suppliers will probably be tempted to explore lock-ins and develop sophisticated schemes for up-selling, a bit like apple does; if you have the hardware you can only access their data through their store. daas companies can offer you the hardware, the software and the data, and the total it provider. a possible advantage with this is that customers can move from one dataset to another more easily, as long as they move within the system. for some this will be fine. from the perspective of intelligence studies maybe intelligence as a service (iaas) is a more interesting domain to explore than data as a service (daas); an open web based service where intelligence is bought or exchanged. from a ci perspective a market with a few big vendors seem far less ideal. ideally we would like a marketplace for intelligence where everyone is a buyer and a seller, not least because every company has some intelligence to sell and there should be no middle men to take a profit or delay the process, but the development is not there yet. another problem with the term daas is that it can stand for two separate phenomenons, and also includes desktop as a service (daas) and to make things worse the latter meaning is, for the moment, more popular than the first. 47 table 1 research questions # questions dimension perspective 1 do you know what data as a service (daas) is? control question method 2 can you explain in your own words what daas is? control question method 3 what kind of data could you imagine buying/renting through daas? what to buy: customers’ needs based on offers business 4 what kind of data do you think it's difficult to buy/rent through daas? what not to buy: customers potential needs that cannot be fulfilled business 5 what are the biggest challenges you see with daas from an intelligence perspective? what weaknesses and challenges today: ci customers potential needs that cannot be fulfilled business 6 how would you like to see daas develop from an intelligence perspective? the ideal state, how customers would like it to be in the future: customers’ needs business another problem is what to do with stolen data, which is a market in itself. data breaches are sometimes referred to as hacking as a service (haas) (mcaffee). it can be individual hackers operating as lone cowboys or hackers engaged by companies or states. most popular are financial data; credit cards and information regarding users. this market is so large today that it has already been segmented and products priced. according to the mcaffee report a credit card and information about its user in the us will cost you 15 usd. the same in the eu costs 35 usd. the second most popular data are login access, followed by identities. there are thousands of hackers trying to get this intelligence from us right now through various techniques, everything from data fishing to old fashion theft. market intelligence and ci professionals have a constant demand for this kind of data. as a result, companies specialize in these murky waters, like kroll and its offspring, k2 intelligence. these companies work on both sides of the table, helping to advise how to protect data from attackers and gathering data by dubious means. thus the learning curve is just steeper. they do not solve the ethical dilemma, but hide it under a veil of secrecy. this is also the realm of private information warfare. daas is, by its very definition, a part of this world and we have to make ethical choices accordingly. we cannot tackle all of these research questions here, but must start somewhere from the bottom. based on the problems and research questions mentioned above we can define six questions for this study (table 1). q1 and q2 are control questions, to see if respondents know what daas is before their answers are used. q2 is a control that checks that the answer in q1 is true. q3 is a market question, finding out what types of data customers may want to acquire. q4 is the opposite question, what kind of data customers think it is difficult for daas providers to keep and sell. q5 asks about what customers see as weaknesses and challenges with daas today, and q6 is an open question about what customers think about daas in the future. these more exploratory questions should then open up to more advanced and specific studies in the future. 3. the method the population is defined as possible users of daas. the sample size is defined as a particularly strong group of possible users for daas, namely ci, bi and mi experts and professionals. five larger groups of users on linkedin were selected related to business intelligence, competitive intelligence, market intelligence and intelligence studies. these were from: 1. business intelligence professionals (bi, big data, analytics, iot), 2. veille stratégique, e 48 réputation et intelligence economique, 3. strategic and competitive intelligence professionals (scip), 4. competitive/market intelligence professionals and 5. journal of intelligence studies in business (jisib). for the four first groups the surveys ware posted as a “conversation” in the dataflow. for the last group the survey was sent as an in-mail to all users registered for the group. the five groups have 222,000 users, but many are the same so it can be estimated that there are no more than 150-200,000 unique users. the five groups in more detail, including their self-descriptions: 1. business intelligence professionals (bi, big data, analytics, iot) with 183,000 members (business intelligence professionals is the knowledge repository for bi, analytics, big data and mobile bi technologies), 2. veille stratégique, e-réputation et intelligence economique, 7,244 members (ce groupe rassemble tous les professionnels de la veille stratégique, veille concurrentielle, veille technologique, de l'e-réputation et du social media monitoring), 3. strategic and competitive intelligence professionals (scip), 25,139 members (strategic and competitive intelligence professionals (scip), formerly the society of competitive intelligence professionals, is a global nonprofit membership organization for everyone involved in the practice of competitive intelligence and its related areas. ) 4. competitive / market intelligence professionals, 6,167 members (this group is for people that were and/or are involved in ci/mi in their professional lives whether they're researching, analyzing or acting on intelligence.) 5. journal of intelligence studies in business (jisib), 721 members (jisib is a peer-reviewed, no-fee open access journal. the journal publishes articles on topics including market intelligence, marketing intelligence, strategic intelligence, business intelligence, competitive intelligence and scientific and technical intelligence, and their equivalent terms in other languages.) there are reasons to think that we would get the same result if we studied the same sample size again (reliability), even though these are questions to which the answers change with time as daas develops. the questions listed in table 1 correspond to the answers we are looking for (validity). as the research is primarily exploratory a qualitative method was chosen. at this stage we are more interested in understanding a phenomenon. the questionnaire was pretested and no weaknesses detected, so no changes were made to the final questionnaire. once launched, the initial response rates were very low, partly related to the fact that it was summer vacation but maybe more related to the fact that social media users have become more reluctant to answers surveys. the surveys were therefore sent out four times to each network during the next two months. at the end we obtained about 206 responses. out of these, 16 were removed because of incomplete or illogical answers. respondents, especially on e-surveys, tend to answer with or without knowing a topic. as we wanted experts and professionals, we started the survey with two control questions. we asked if the respondent knows what daas is (q1). if they did not no further answers were collected from that respondent. to be sure that the respondent answered correctly he or she was also asked to define what daas is (q2). if he or she did not answer correctly given a broad margin for interpretation, the rest of their answers were taken out of the analysis part. e-surveys are an easy way to gather data when it works, but it has become more problematic. respondents seem to be less interested in completing e-surveys as these become more frequent. chances are they do it quickly and without much reflection on actual questions. longer surveys are not completed. in many cases anonymous internet users are less sincere, are opinionated, promote their own interests, and do not answer questions directly. this may be related to the way the internet has developed. for our purpose it has meant that we have had to discard a large number of responses. in future research other methods should be explored, like interviews at conferences. 4. findings and analysis the analysis builds on 190 complete responses, summarized in table 2. 49 table 2 empirical findings questions answers brief analysis 1. do you know what data as a service (daas) is? 47.37% yes 21.05% no 31.58% don’t know there were few correct definitions, but about 50% give an explanation of what daas is that is more or less correct. it corresponds to the number of people who said they knew what it is. those who don’t know if they know, did not actually know. in other words respondents were honest on this point. we may assume their answers to the other questions were honest too. 2. can you explain in your own words what daas is? access to multiple data sets irrespective of the platform it is stored on, or the platform that you use for analysis, it is an access to a data warehouse through an interface, it is related to cloud computing, it might be about accessing huge amounts of data about a sector for example, paid access to data, it is a distribution model that disintermediates data from the platform/software allowing you to integrate it into your own web applications, data can be provided as on demand, a way to keep together, in a framework, the same data about a topic, pay to save our data in a safe place, provisioning of data via the cloud in a protected and affordable way to users that they can work with it on demand, data used as a service for decision making, its sharing of information, buying information from supplier, buzzword 3. what kind of data could you imagine buying through daas? market information, demographics, information about competitors, financial developments, market changes, specific products consumed each minute with a cross section of colors and geography, text, statistics, raw data of any kind, video, all data that is captured and stored digitally, documents, photos, records, videos, codes, programmes, economic, tourism, politics, company information and profiles, news and publication subscriptions, data from custom webscapes, geolocation & metadata enrichment, all kinds of quant data, social media data, any data that is collected by others; spend data, geographical data, company information, personal information, any kind of structured data, products prices, data related to the behavior of consumers, principally consumer data and multiple transaction data, analytics there were few limits or restrictions about what kind of data suppliers could imagine buying, if it was all available. 4. what kind of data do you think it's difficult to buy through daas? operational, qualitative information about b2b customer needs, or competitor intentions, more personal and private data, specific fine-tuned data, data not collected, like illicit drug use, anything that is not on the deep web, military, competitors’ plans, new planned products, secret info, humint, really valuable information that will give you an edge data that is more sensitive, personal and private will be difficult to buy, users think. company secrets and data for b2b will be especially scarce. 5. what are the biggest challenges you see with daas from an intelligence perspective? connectivity and performance of the various data sources, it has limited b2b applications since the quantity of information may be limited, secrecy of the companies, to create understanding/insight from data, data homogenization, overcoming privacy rights, updating patterns might be late of managed to be late by the acknowledged user, manipulation is also possible to generate false leads, knowing what to look for in your aggregated and combined data, counterintelligence = your activity is registered from which intel requirements can be inferred, data quality, the level of collecting, mapping, keeping and distributing, big data, bank of data, speed and accuracy, confidentiality, quality, reliability, security, accessibility, pricing, what happens when everyone has the same info? then competition will increase the major concerns from users’ perspectives are confidentiality, quality, reliability, security, and accessibility. besides, when everyone has much of same data competition will increase. 6. how would you like to see daas develop from an intelligence perspective? more information about b2b transactions and company metrics, cheaper, secure, flexible, first it is interesting to develop methods to create intelligence through the acquired data to help decision making. secondly the legislation should follow the development of daas to protect users and private data, more data mining oriented, more focus on field verification, object-based production / activitybased intelligence using resource description framework metadata models will better exploit daas, become more comprehensive, moving from renting to buying and owning data, develop connectivity based on formats between data to connect data silos and enrich the basis for analysis, more useful and timely info, more tailor made data, great flexibility from daas companies, nonstandard deliveries users want to see more on company metrics, less expensive, more secure and more flexible data. 50 in more detail, we find a number of concerns: how do you as user measure the value of the data you are thinking about buying or renting? by the time the company’s financial results are recorded it may be difficult to go back and see where the value added was created in the value chain. marketing departments may become lazy, preferring to rent the data instead of getting it themselves. field work will suffer. the risk is that marketers and other users forget about the craft of how to obtain good data and analyze it. thus chances are that those who present the figures become less critical and make wrong inferences. chances are users will defend daas not because it is better for the company, but because it makes their jobs easier. legal issues are a set of problems by themselves and already of great concern in some industries, like health care. in health care there already is some legislation in place as to how to handle private data, but it has proven difficult to enforce so far. as competitors subscribe to the same data they can expect to arrive at similar conclusions, even when these conclusions are wrong. thus we get a situation of higher competition but also a risk of systematic failure in analyses. the skills of how to produce good data and analysis are in jeopardy. with a few large daas providers, these skills will be placed in the hands of a few people. the chances of manipulation increase, as these statisticians and analyses are not checked by outsiders. big data itself is worrying as there is confusion about what it can do and what it cannot do. big data is good at sorting in existing data, such as when it comes up with the logarithm for a google search, but is poor at predicting the future, such as when amazon suggests what you may want to buy. the risk is that daas providers will not tell customers about the difference, promising too much of the data they are selling. the reason for this has to do with probability statistics, r.a. fischer and the math of small numbers (ellenberg, 2015). with plenty of data we can predict the course of an asteroid, but we can only predict the weather the next week or two and we have very little chance of predicting human behavior at all. as an example there is a very small chance that the nsa can find a terrorist by looking at our internet behavior. the chances are much greater that they will suspect innocent people. the same logic goes for commercial data. daas providers will make false predictions about who our customers are. 5. future studies in our discussion numerous research projects have been suggested, primarily related to the user perspective. it would be of interest to see if there are differences in different groups of users, where mi, ci and bi experts belong to one group. it may be that they see these questions differently from other analysts and it experts. what data do companies want to share? what data do companies not want to share? will there be a future amazon or fb of daas, one dominating company, one winner takes it all or a large group of suppliers? economies of scale and big data may suggest large players have an advantage. there are already some “super aggregators” among national signal intelligence agencies with the same reason, like the nsa. in the private side, oracle offers 7.5 trillion marketing data transactions delivered per month, 200 billion social data operations processed per hour. do customers accept only renting data, while not being able to download it? how short of a time do customers accept renting data for? in many cases renting data only means being allowed to read the data. this is different from traditional data delivery. how will customers react to this new packaging? how much are they willing to pay for it? these are some of the questions that future studies could address. 6. references abourezq, m. & idrissi, a. (2016). database-as-sservice for big data: an overview. international journal of advanced computer science and applications, 7(1), 157-177. canard, s., & devigne, j. (2016). highly privacuprotecting data sharing in a tree structure. the international journal of escience, 62, 119127. chang, v. (2014). the business intelligence as a service in the cloud. future generation computer systems, 37, 512-534. curino, c., jones, e. p., popa, r. a., malviya, n., wu, e., madden, s., & zeldovich, n. (2011). relational cloud: a database-as-a-service for the cloud. ellenberg, j. (2015). how not to be wrong. the power of mathematical thinking. penguin books, new york, ny macfarland, c., paget, r., & samani, f. (2016). “the hidden data economy”. mcaffee report. intel security. 19 pp. nyblom, m., behrami, j., nikkilä, t., & solberg søilen, k. (2012). an evaluation of business intelligence software systems in smes – a case study, journal of intelligence studies in business, 2, 51-57. 51 pringle, t., baer, t., & brown, g. (2014). dataas-a-service: the next step in as-a-service journey. ovum consulting report. 10 pp. rajesh, s., swapna, s., shylender, & reddy, p. (2012). data as a service in cloud computing. global journal of computing science and technology cloud & distribute, 12(11). di sano, m. (2014). business intelligence as a service: a new approach to manage business processes in the cloud. in wetice conference (wetice), 2014 ieee 23rd international (pp. 155-160). ieee. sabanovic, a. & solberg søilen, k. (2012). customers’ expectations and needs in the business intelligence software market, journal of intelligence studies in business, 2, 5-20 seibold, m., & kemper, a. (2012). database as a service. datenbank-spektrum, 12(1), 59-62. sharma, sugam (2015). evolution of as-a-service era in cloud. report. vu, q. h., pham, t. v., truong, h. l., dustdar, s., & asal, r. (2012, march). demods: a description model for data-as-a-service. in advanced information networking and applications (aina), 2012 ieee 26th international conference 605-612. business intelligence software 5 customers’ expectations and needs in the business intelligence software market adis sabanovic * and klaus solberg søilen * * * lund university, administration, box 117 se-221 00 lund, sweden * * halmstad university, department of business and engineering (set), box 823, 301 18 halmstad, sweden received 10 december 2009; received in revised form 19 february 2011; accepted 16 march 2012 abstract: this paper aims to find out what companies desire when choosing a business intelligence (bi) system. we look at what their needs are and what they expect and understand from this software system, which can make them work more efficient and gain better knowledge about the business they are in. a web questionnaire was used for 67 swedish companies from various industries. the results are summarized and analyzed in cross tables for comparison. a model called the pet-model of bi implementation was created as a result of the theoretical findings. the model is used to finalize the results and the conclusions of the paper. the paper provides an argument for and an analysis of what is expected from a valuable bi software solution. it provides relevant facts about companies’ bi usage habits, which again is a guideline for bi software product development. keywords: business intelligence, software, pet-model, customers’ expectations 1. introduction in the world of today the access to information is greater than ever. company leaders and other decision makers are trying to overcome this problem by investing in various sophisticated computerized solutions, also known as business available for free online at https://ojs.hh.se/ journal of intelligence studies in business 2 (2012) 5-20 https://ojs.hh.se/ 6 intelligence (bi) systems. the popularity of the term “business intelligence” or “bi” has increased rapidly in the last decade. bi is today a multifaceted term that refers to processes, techniques or tools to support the making of faster and better decisions (pirttimäki & hannula, 2003). bi systems do not only help decision makers to make better and more efficient decision but also helps the entire organization to improve return on investment (roi), gain new customers and suppliers, as well as employees, and increase overall satisfaction. eckerson (2004) points out that if one bi system is implemented throughout the entire company, there is a single version of truth which helps the company to avoid misunderstandings and get everyone going in the same direction. however, expectations of what a bi software is supposed to perform, or accomplish, is differently understood by the users. bi software is used as an effective reporting and analyzing tool to better understand a company’s organizational surroundings and environment, which gives managers basic data for decision making. by a way of quantitative research, this paper explores enterprises’ expectations and needs of bi software. 2. literature review bi tools are a part of a broader market sometimes referred to as business analytics, as illustrated in figure 1. the market for bi tools includes both standalone packaged software and embedded bi tools provided by database management software vendors (vesset and mcdonough, 2007). the bi tools market is divided into two market segments, query reporting analysis and advanced analytics. these are also the two areas business analytics software performance management tools and applications financial performance and strategy mgmt. applications (budgeting, planning, consolidation, profitability, mgmt./abc, scorecards) crm analytical applications (sales, customer service, contact center, marketing, website analytics, price optimization) bi tools: supply chain and service operations analytic applications workforce analytic application analytic spatial information management tools data warehouse platform (data warehouse mgmt. and generation) query reporting, analysis (includes dashboards) advanced analytics (includes data mining and statistics) figure 1 – classifications of bi software (vesset and mcdonough, 2007) 7 of bi tool applications that this paper is concerned with. in figure 1, these areas are illustrated with two dash-boarded rectangles. query reporting analysis (qra) software includes ad hoc query and multidimensional analysis tools as well as dashboards, scorecards and production reporting tools. these tools are designed specifically to support ad hoc data access and to report building by either it or business users. these do not include other applications or tools that may be used for report building (vesset and mcdonough, 2007). yet they are justified as multidimensional analysis tools which include both online analytical processing (olap) servers and client-side analysis tools, that provide a data management environment which is used for modeling business problems and analyzing business data. packaged data marts are also included in this function. these data marts are preconfigured software used for combining data transformation, management, and access in one single package and are usually presenting the results in various business models (vesset and mcdonough, 2007). the main occupation of advanced analytics software is data mining and statistics. technologies that are used are neural networks, rule induction, and clustering, among others, in order to discover relationships in data and then make hidden, not apparent or complex predictions for reporting and to do multidimensional analysis (vesset and mcdonough, 2007). in this sector there are technical, econometrical and other mathematical operations, which provide libraries with statistical algorithms in order to process and analyze the data. common functions are frequencies, cross-tabulations and chi square, but there can also be other specialized and sophisticated functions focusing on the functional area such as industrial design, clinical trial testing, exploratory data analysis, and highvolume and real-time statistical analysis (vesset and mcdonough, 2007). an analytical application, like business intelligence, is difficult to define and many professional programmers and users of bi tools will have their own definition when explaining the tool, the technology or the architecture. in this paper, the authors use a definition that will hopefully satisfy most of the analytical application industry’s “pundits”: “an analytic application consists of a series of logically integrated, interactive reports, including dashboards and scorecards, that enable a wide range of users to access, analyze, and act on integrated information in the context of the business processes and tasks that they manage in a given domain, such as sales, service, or operations.” (eckerson 2005, p. 5). generally an analytical application consists of elements which purpose it is to build a business logic, which will take the user through a series of interactive reports. there, it will be possible to access, analyze, and take necessary action to optimize the activities in a specific business domain. analytical applications are, therefore, not about randomly created reports that a user can upload from an “inbox” or from a “my reports” folder, but about the interactive and dynamic play where the user is given the possibility to utilize something, which is valuable for his or her company’s endurance (eckerson, 2005). the first part of a bi analytical application is called logical integration and is about stepping the user through different series of interactive reports and views of dimensional data, which will lead to the important point of action or to the request for more information. different users have different knowledge or know-how when it comes to usage of analytical applications. the navigational logic is important when a user wants to navigate through different reports on the “reports page” to effectively analyze data and make decisions. interactive dashboards and scorecards are used to inform the user of what metrics or data to examine. another logic of a bi oper ation al appli catio ns realtime data integrati on compon ent realtime decision making compon ent operation al data eve nts low latency store reports, alerts & messages figure 2 real-time bi processing components 8 analytical tool is therefore offering of recommendations (eckerson, 2005). the user, novice or professional, should be given the best possible overview of the data, to make sure that important information is not missed or neglected. the key to interactive reports is giving the user the opportunity to interactively search through the reports for additional information by simply “drilling” from a top-level view to a lower level. reports should be unfixed and possible to change into tables, charts, or other transactional data. some technologies worth mentioning, which are used for delivering interactive reports, are olap cubes, parameterized reports, linked static reports, advanced visualization techniques, dashboard or scorecards, and numeric searches (eckerson, 2005). various data and information from different sources should be put in analytical applications and then stored in one single warehouse where all data is processed and analyzed once again. large companies, like continental airlines, have different analytical applications running against one single enterprise data warehouse where all data, for example tracking flight process, fraud detection, or revenues management, are put through one large analytical procedure. integrating the information will help managers avoid problems when seeking one consistent version of the enterprise information (eckerson, 2005). different business areas (domains) such as sales, service, or manufacturing, have different information requirements and analytical applications are defined by those requirements. a sales analytical application may monitor a production line performance or other sales representatives and regions or it can examine the sales and contact history. it is the interconnection of these domains that must be used and placed within a logical model since several business areas represent the same company (eckerson, 2005). 3. types of business intelligence systems in a model-driven bi system, the information or intelligence is often presented thorough a series of different models. the user can access and modify financial, optimization and/or simulation models of various kinds (hedgebeth, 2007). the basic function of the model-driven bi system is the provision of quantitative models. in data-driven systems the basic functional level occupies search tools that access simple file systems (hedgebeth, 2007). here the user has access to and can modify real-time internal and external data. in communication-driven systems, different networking technologies drive decision-based collaboration activities. examples of these are video conferencing, groupware and computer bulletin board systems (bbs) (hedgebeth, 2007). via computer storage and processing, a document-driven retrieval is made. here, via a search engine, the user may access documents, policies, images, sounds, and scanned documents (hedgebeth, 2007). in knowledge-driven systems, trained and professional users with knowledge are used to solve various problems. intelligence from a web-based system is presented via a web browser and tcp or ip (internet protocol suite) (hedgebeth, 2007). another bi system that is not mentioned under the previous heading is called real-time business intelligence system. this system is about organization’s ability to react in time and become more alert and more responsive to various changing business conditions (white, 2003). in order to make effective decisions, accurate bi is required. the problem with accurate intelligence is that it takes time to collect and deliver it to the right users and it also takes time for the users to act on this information. as shown in the delay between a business event occurring, and the action being taken, this is when the value of the information is to be determined. the technology used to deploy a real-time bi application must aim to reduce a user’s reaction time if the information value is to be as high as possible (white, 2003). a real-time bi system consists of two operational components (figure 3). one is for data-integration and the other one is for decisionmaking. the data integration component captures business events from operational systems and then integrates them into the low-latency store. 9 figure 3 – latency in business intelligence decision making (hackerthorn, 2003) the decision-making component, on the other hand, supports real-time performance management and other real-time analysis and reports (white, 2003). as illustrated in figure 3, a business event’s road to become an action consists of three latency periods, data latency, analysis latency, and decision latency (hackerthorn, 2003). the result of the three latencies is called action time or action distance and the central objective of a real-time bi system is to reduce the action time as much as possible to respond to a business happening. if the problem is in data latency or the analysis latency, the time gap can be reduced by improving the technology used. if the problem is decision latency, then the latency depends on the user. therefore, the information that is provided to the user must be improved to solve the decision latency problem. another solution could also be an automatization of some bi processes that will automatically take action on behalf of the user (white, 2003). hackerthorn (2003) describes how decision latency may be reduced by applying three requirements to the system; alerting, information and guidance. hackerthorn (2003) finds that the system should be configured in a way, which alerts the user if some unusual business situation occurs. the system should be able to show situationalspecific business information in order for the user to get an understanding of the business environment he or she is working in. the user should also be guided by the system that suggests the most suitable action for the specific situation. another aspect in realizing the benefits when working with real-time bi is recognizing that the return on investment (roi) depends on two factors. the first is the time it takes to reduce an action and the second is the organizations ability to modify its business practice. figure illustrates that there is a point (exploration threshold) beyond which reducing the action time any further has no value to the business. the smaller the action time required, the bigger the information technology (it) costs are (white, 2003). figure 4 combined with show us that a shorter action time gives higher value to the intelligence, but it also increases the costs for the investment in the required information technology. after a certain time (at the break-even threshold) the costs for the information technology will become so low that roi becomes positive. action taken information delivered data stored business event v a lu e time action time or action distance 10 figure 4 – real-time bi; action time vs. it costs (white, 2003) 4. the different user-groups of bi different users necessitate different intelligence and a bi tool’s main priority should be to provide the right user with the right intelligence system, as shown in figure 5. on the bottom axis, different user groups can be identified with specific intelligence presentation requirements (on the vertical axis). executives tend to have little or no time to read long reports and are therefore only interested in fast figures or in “executive summaries”. these can be presented in scorecards or dashboards shown as key performance indicators (kpi). analyst or senior managers on the other hand prefer to work with advanced online analytical processes and explore different ways of making analysis. longer reports are more in the interest of department managers. they are interested in reading and analyzing compiled text reports such as, sales business metrics performance production times customer churn sales totals lead analysis click through relations budgets invoices shipping documents pick list executives kpi’s scorecards and dashboards analysts, senior managers department managers employee partners production reports management reports olap exploration figure 5 – different bi user needs in the hierarchy (solberg søilen, 2008) $ action time incremental it costs business benefits break-even threshold exploration threshold 11 analysis and budgets. this will give a basis for making correct decisions. workers on lower levels in the organization work more with tactical documents such as invoices, shipping and logistics. 5. categories of bi tools and enterprise expectation most companies today use a set of different bi tools, instead of focusing only on one. the reason for this may be that different users prefer different types of bi tools. the tools may differ from reporting, ad hoc queries and olap. bi tool vendors strive to meet all these requirements allowing organizations to standardize by using one single tool and on one single vendor (dm review and sourcemedia, inc., 2005). below, a list of some major categories of bi tools is presented (dm review and sourcemedia, inc., 2005): 1. production reporting tools: used by professional developers to create standard reports for groups, departments or the enterprise. 2. end-user query and reporting tools: used by end users to create reports for themselves or others and require no programming. 3. olap tools: enable end users to "slice and dice" data dimensionally to explore data from different perspectives and time periods. 4. dashboard/scorecard tools: enable end users to view critical performance data using graphical icons and drill down to analyze detailed data and reports if desired. 5. data mining tools: enable statisticians or business analysts to create statistical models of business activity. 6. planning and modeling tools: enable analysts and end-users to create business plans and simulations against bi data. planning ‘tools supply dashboards and scorecards with targets and thresholds for metrics. a research conducted in 2005 by better management (division of a sas institute inc. which does researches about business management issues around the world) showed that only nine percent of bi software users were always provided with all the necessary information from the bi software in order for them to make effective business decisions and only 45 percent of the users did sometimes get all the information they needed (miller, bräutigam, and gerlach, 2006). these numbers indicate that many corporate leaders have high expectations of a bi software before purchasing it, but the decision makers will less often rely on the information extracted from the software. what was instead demanded, or needed, by the companies, according to the survey, were the following (miller, bräutigam, & gerlach, 2006): 1. improved quality of information available to the companies. 2. access to relevant information in easy to-use reporting interfaces for ad hoc reporting. 3. assistance with interpreting and drawing conclusions from the information. 4. access to relevant information in standard reports. 5. an overview of which data is available for analysis. 6. a formal assessment of the companies’ information needs. 7. training on how to use bi tools. based on the theory presented in this paper, the authors have created a research model or plan that can improve production requirements. with the pet model of bi implementation, the idea is to create a plan or model that will cover most of the areas of bi and investigate them strategically. for an enhanced overview and for the sake of simplicity the model is divided into three main blocks (figure 6). every block consists of several areas of investigation and each area is included in the questionnaire in form of various questions specific for each area. the first block of the research model provides a profile of the investigated companies. the block consists of five areas of investigation; company size, company type, industry, and for the sake of validity and reliability of the research, a job level of the respondent and his or her job function in 12 figure 6 – pet model of bi implementation what is expected from a bi software? what is understood by a bi software? is bi used? top management dpt. managers division heads analysts developers experts consumers responsibilities for how long how often info. perfectiveness info. effectiveness info. quality info. relevance analytical apps. modifications scope of usage requests reports financing of bi org. structure separate units? conclusion drawing data overview training finance & accounting sales marketing forecasting budgeting & planning customer service human resources shipping/logistics manufacturing procurement expansion other in organization geographically what needs do bi fulfill? b lo c k 1 b lo c k 2 b lo c k 3 13 the company. the second block consists of two large areas of investigation, understandings and expectations. the uses of strategically formulated questions are aiming at finding out what companies understand and expect from a bi software. after observing how companies relate to bi and whether or not they use it, a third research block is created. this block consists of one main area of investigation; needs. this is the part of the research which requires the most work. the needs-area is segregated into five sub-areas, (specific needs-areas) which try to find out what kind of specific needs the companies have when using bi. examples of the specific needs-areas questions are: where in the organization is bi use? what is bi used for? how is bi used and for how long? who is using the bi? the needs-area is also taking into consideration those who do not use bi, trying to detect the reason for that and also to detect what can be done to make those companies use bi. a bi research plan can be embedded into the pet model on bi implementation so that the two are completing each other. from the purchase and employment layer the companies’ understandings and expectations can be extracted, and from the bottom task layer the companies’ needs can be extracted. the following research questions are analyzed: 1. what understandings do companies in sweden have about business intelligence software? for this question it is necessary to follow the respondents’ reactions in the early stages of the contacting process. it is of importance to notice the responses received from various companies when approaching them with the questionnaire. later, an effort in analyzing the answers from the purchase and employment layer in the pet model is made. 2. what are the swedish companies’ expectations of a business intelligence software? here, the main effort will be put in the analysis of the mean values. in this case, the purchase and employment layer in the pet model will be examined. 3. what needs do swedish companies have for a business intelligence software? the main effort in this question is again to an analysis of the mean values. in this case, the task layer in the pet model is examined. 4. how can the test system (“subsoft”) be improved to meet these expectations and needs? according to the survey, subsoft’s characteristics will be compared to those that are extracted from the questionnaire. 6. methodology today, many companies use an info@ e-mail address, which is often used as a “first contact” point for secondary information about a company when we are not sure who we need to contact. there is a possibility that the email will be forwarded to the right person. the risk with an info@ address is that the response time is long and in many cases there is no response at all (saunders, lewis and thornhill, 2007). for this reason, and for the reliability and validity of the research, it was important to find the right person in the company, who had insight about the company. the method used to collect “good” email addresses was to visit each company’s web page and look for specific information via the “contact” page. from 850 companies’ homepage addresses, 408 “good” addresses were found. the e-mail-collection gave a result of about 25 companies in each industry. the rest of the contacts were either info@ addresses or phone numbers. due to time restrictions, both info@ addresses and the phone numbers were neglected in the research. 6.1 data collection data can be collected in several ways, through observations, interviews and questionnaires (saunders et al, 2007). a positivistic philosophy with a deductive approach is used in this paper. a survey was conducted. the research strategy was a web based questionnaire. this allowed for quantitative data to be compared 14 in the book business intelligence competency centers, a team approach to maximazing competitive advantage written by miller, bräutigam and gerlach, (2006) there is an example of a web based questionnaire. this was used as a starting point and as a template of the first draft of the questionnaire, later to be modified. after completing the e-mail collection, a web questionnaire was created and published online. then an e-mail with an explanatory text and the link to the questionnaire was sent to all 408 contacts. the duration of the survey was set to 19 days. a limit, or goal, was set to between 100 – 120 responses. this limit was thought to provide a good base for empirical analysis. 23 emails of 408 were directly sent back with the notice that the contact person was not available or was on holiday, business trip, et cetera. 67 responses were received, generating a 16.4 percent response rate. according to braun hamilton (2003) a total response rate of an online survey is approximately 13.35 percent, but he points out that the response rate may vary from survey to survey depending on a variety of aspects. according to saunders (2007) a cover letter e-mail and a good design of the questionnaire will help to increase the response rate. for the questionnaire design, a windows application called “e-mail questionnaire”, created by compressweb company, was used. 7. data analyze and research findings from the 67 respondents of the survey, 11 different industries were represented. the industry that returned most answers was the manufacturing industry with 18 respondents followed by the consulting or professional services with ten and information technology industry with nine respondents. since the vast majority of industries returned a low number of responses, it was not possible to carry out any tests as to generalization of the industry as a factor. all answers combined are important for other tests though. for example, the value of an answer on each question can be measured and put in a table for comparison between different industries. since the manufacturing industry had the most respondents, it was used to exemplify how one can interpret and compare data from the survey. figure 7 gives an overview of the manufacturing industry’s bi system implementation. here, the first three foundations from the pet model are shown: bi system, motive, and purpose. as shown in figure 7 there is a total number (n) of 18 respondents from the manufacturing industry. in the bi system foundation, 15 are using excel, 1 is using oracle enterprise bi server (oebis) and 2 are using qlikview. in this industry, 83 percent of the 18 companies use microsoft excel for bi. this might not be the only bi system these companies use, but they do use it for some bi purposes. according to four of the companies (22 percent) the motive, independent from the previous foundations, is that they use their bi system in order to improve their strategic planning. 17 percent answered that they experience revenue and customer growth as 15 figure 7 – survey respondents represented from different industrie well as more efficient business processes. some answered do not know on the motive question and they are, therefore, not represented in the figure. in the purpose foundation, more than one alternative could be selected. the majority of the respondents answered that finance and accounting is the biggest reason for them to work with bi systems. thereafter, they use bi for manufacturing (44 percent) and sales (39 percent). in table 2 the same type of data is presented, but with all the industries combined. the statements in the “foundations” are also tested against each other and an average value has been produced. to start with, 15 of 67 respondents in the survey said that they do not use any kind of bi tool or system in their business or organization. 69 percent of all respondents say that they use microsoft excel when they work with bi. they might use excel as a permanent standard system in their organization or they might just use it for some occasional bi work. excel is used frequently throughout all the industries which took part in the survey. 13 percent of the respondents also say that the system they are using is not listed as an alternative in the questionnaire. the second most popular system in the list is qlikview. it was mostly used in the service and manufacturing industry. the motives that the companies had for using a bi system were especially high with regard to one statement: greater visibility into the business. 28 percent of the respondents say that a bi system is helping them to better understand their business and its environment. 18 percent say that a bi system is a helpful tool for strategic planning. it is not clear what specific tool these respondents use, but 38 of 67 respondents described their job level as manager 16 and there is a possibility that these managers use bi tools for strategic planning as well as a supportive tool in decision making. 13 percent of the respondents said that a bi system helps processes to become more efficient. some respondents states that they react faster to certain events and that the coordination among groups is better thanks to the bi system. in the discovery of how the respondents use their bi systems, there seem to be four major areas of usage. 17 percent said that they use bi systems in finance and accounting, 16 percent answered that they use it in sales, 11 percent said that the bi tool is a forecasting tool, and ten percent use bi tools for marketing. nine percent of 67 respondents use bi tools for budgeting and planning while only six percent use a bi system for supervision of the business through dashboards and scorecards. some users use bi tools for shipping and logistics as well as in the production and customer service. eight of nine respondents who said that manufacturing was their purpose for using bi tools came from the manufacturing industry. a low number of respondents use any kind of bi tools when expanding their business. in table 3 the employment of a bi system is presented. more than 30 percent of the respondents answered that reduced increase in decision-making speed was the main benefit they experienced. the second largest benefit was increased business user satisfaction. 18 percent of the respondents selected this. ten percent of the respondents said that increased usage of bi tools is a benefit, closely followed by those (nine percent) who said that better understanding of the value of bi is a benefit. 22 percent like to place a bi system as an integrated intelligence tool used by everyone in the organization. 13 percent believed that only trained professionals should use bi systems. all respondents are from the manufacturing industry and the banking industry. in the food or beverage industry and in the trade industry there is a belief that a top down placement is applicable, while in the consulting professional services industry the down up model was preferred. more that 30 percent had used their bi system between one to five years and approximately 30 percent has used the system for more than five years. a large minority had worked with bi for less than a year. large minority 17 in table 4 the three last foundations from the pet model: important functions, functional areas and analysis are presented for all the industries combined. when it comes to the important functions of a bi system a majority said that microsoft office integration is important. four out of nine respondents from the it industry say that this is the case. they also believed, together with the consulting professional services industry, that the fixed or standard reports function is important. online analytical processing (olap) was also a function appreciable in the it industry as well as in trade and manufacturing industry. nine percent of the respondents would like their bi system to make predictive analysis. a bi system’s functional area should, according to the respondents, be analytics and customer relations management. 13 percent of the respondents answered that these were the functional areas that their bi system was used for. business related consulting and helpdesks were important in pharmaceutical industry, food, and it industries. the analyses that the respondents in various industries believed to be important were mainly trend or scenario analysis and swot analysis. while the swot analysis was outspread evenly over the industries, the trend or scenario analysis had the most responses in the it and manufacturing industry. all four respondents from the bank or finance industry answered that trend or scenario analysis together with forecasting was the most important analysis. in ten percent of the respondent’s bi systems, and almost in every industry, cost analysis was used. statistical analysis was more often used in the health care industry, the food or beverage industry and in the consulting professional services industry. 8. main findings in order to answer the first research question for this paper: what understandings do companies in sweden receive by a business intelligence software? it must be said that when the questionnaire was sent out, there were companies who requested extra information about the “term” business intelligence. only after the extra information was presented to them, did some choose to participate in the survey. later it was found that 15 of 67 respondents did not use any bi system at all. this is an indication that the business intelligence-term is not known in some organizations. this also confirms the conjecture that bi is still in its early development stage for companies in general. we see in particular that there is a positive correlation between company size and knowledge and usage of bi systems. some of the alternatives in the questionnaire received a high response rate (over 25 percent). this signals that more than a quarter of the respondents had the same opinion on a number of questions. those alternatives that received a response rate over 25 percent were; increased decision speed (31 percent) and greater visibility into the business (28 percent). this 18 indicates that there is a common understanding of what bi software is. a conclusion is that the companies see a bi software as an instrument that will improve their decision-making speed and gain knowledge about the business environment they operate in. the second research question is about the companies’ expectations of a bi software. expectations are related to understanding because when a person understands how something works, in this case a bi system, the expectation is instinctively based upon that specific understanding. since expectations are also about performance and mean values, the overall expectations of how a bi software shall perform, according to this survey, are spread and divided. by looking at the answers more closely, divided by the pet model’s purchase and employment layer and by each industry, a mean value of each answer can be extracted (as presented in tables 3 4). besides the expectations that a bi system should improve decision-speed and give an insight in the business environment, the main expectation is that a bi system should perform as a finance and accounting system. in addition to that, sales, forecasting, and marketing functions are the expected tasks which a bi system should perform, according to the survey. based on the understandings and the expectations firms have of bi system, specific needs can be structured. throughout all industries there was one particular function or need that seemed to be of importance, a microsoft office integration function. there was a need for having a bi tool that could write fixed or standard reports. other needs, as the analytical function of a bi system as well as the customer relations management function, were also desired. as far as analyses are concerned, swot analysis and trend or scenario analysis were the most desirable ones. to illustrate what has been said and concluded in this chapter as well as to point out the most important of bi system understandings, expectations, and needs, the pet-model of bi implementation was developed (figure 7). figure 7 – pet model after the analysis system excel qlikview motive greater visibility into the business usage time 1 year to 5 years more than 5 years placement integrated important functions ms office integr. fix stndrd reports purpose finance acc. sales forecasting marketing benefits incre. dms incre. bus incr use of bi analysis trend/scenario swot analysis cost analysis functional area analytics cms purchase task employment 19 8.1 implications for the test software according to the findings in the research and as far as the test software cover the technical functions and areas of a bi system, “subsoft” can be improved in a number of ways. currently it consists of many functions similar to those found in excel such as spreadsheets and the possibility to create diagrams, calculate costs et cetera. but compared to a software like qlikview the test software is mostly a text-analytical software. there are no dashboards or scorecards. the greatest motive for purchasing a bi system according to the survey was to gain a greater visibility into the business. the sole purpose with the test software is based upon this idea. therefore, this is a positive finding confirming that the test software can be applicable in most industries. the three biggest purposes when using a bi system is finance & accounting, sales, and forecasting. on this point, subsoft has yet to be improved. although it contains some of these functions, such as forecasting analysis, further improvements need to be done. as shown in the analysis of the research the majority of respondents thought that a bi system should be placed where it is possible for everybody in the organization to use it. this is also another positive finding for subsoft, which allows any kind of user with specific rights to access the system. on the other hand the software does not support any function allowing integration with microsoft office. however, it does write fixed or standard reports as many of the respondents requested. subsoft is an analytical tool. this is also the functional area that got the highest mean value among the respondents. 9. contribution and future research many actors on the bi market can profit from the results of the research in this paper. many applicable facts about companies’ bi usage habits are uncovered. vendors may use the results to build or improve their software. the paper is an introduction to bi for new users and those who are planning to use bi in their organization. the empirical data collected in the survey contain more than one company profile. industry was used in this analysis as one company profile. if other profile figures are analyzed they could reveal valuable information about the relation between swedish companies and bi. the number of respondents is of importance when conducting surveys where generalizations are made. for this paper, there were 67 respondents in total and as many as 18 from one specific industry. in any industry there might be hundreds even thousands of companies even in a small country like sweden and a higher sample size would have helped to make better generalizations. perhaps longer survey duration would have helped to collect more responses. one idea with the questionnaires’ results was to test the significance levels between certain answers. for that to be possible, the questions should have been asked differently in the questionnaire. every question could have been ranked on a likert scale from one to five so that the real importance level could be measured and some significance levels calculated. references braun hamilton, m. 2003. online survey response rates and times, tercent, inc. / supersurvey. dm review and sourcemedia, inc. 2005. mywire. retrieved juni 10, 2008, from mywire dm review: standardazings on categories of bi tools: http://www.mywire.com/pubs/dmreview/20 05/09/01/987459?extid=10037&oliid=229 eckerson, w. 2004. best practices in business performance management; business and technical strategies, 101 communication, chatsworth, ca hackerthorn, r. 2003. minimizing action distance. the data administration newsletter (tdan.com), bolder technology inc., 1-4. hedgebeth, d. 2007. data-driven decision making for the enterprise: an overview of business intelligence applications. the journal of information and knowledge management systems , 414-420. miller, g. j., bräutigam, d. and gerlach, s. v. 2006. business intelligence competency centers, a team approach to maximazing competitive advantage, john whiley & sons, inc. hoboken, new jersey. http://www.mywire.com/pubs/dmreview/2005/09/01/987459?extid=10037&oliid=229 http://www.mywire.com/pubs/dmreview/2005/09/01/987459?extid=10037&oliid=229 20 pirttimäki, v. and hannula, m. 2003. “process models of business intelligence”, frontiers of e-business research, 250-260. saunders, m., lewis, p., and thornhill, a. 2007. research methods for business students. harlow: prentice hall. solberg søilen, k. 2008. management implementation of business intelligence systems. hammamet 14 16 february: 1st international conference on information system and economic intelligence siie’2008. vesset, d., and mcdonough, b. 2007. worldwide business intelligence tools 2006 vendor share. idc software market forecaster database , 1 (#207422e). white, c. 2003. building the real-time enterprise. seattle: the dataware warehouse institute. the evolution of competitive intelligence in china xinzhou xie * and xuehui jin ** * school of journalism and communication, peking university, beijing, 100871, china * and ** beijing science and technology information institute, beijing, china ** key laboratory of competitive intelligence and innovation evaluation, beijing academy of science and technology, beijing, 100048, china xzxie@pku.edu.cn received 20 may 2011; received in revised form 23 august 2011; accepted 21 december 2011 abstract: following landmark events during different historic periods, this paper divides the evolution of competitive intelligence (ci) in china into three main stages: ci introduction, ci localization and ci self-conscious marketization. studies of ci developments are made based on five main aspects of the overall ci industry in china, including their historical skeleton of development, achievements and problems identified. finally a forecast for the future development of ci in china is presented. keywords: competitive intelligence, china, society of competitive intelligence in china 1. introduction since 1978 china has been carrying out economic reforms and opening policies. as a result of the reforms chinese enterprises gradually became the host of market competition and enlarged enterprises’ right to autonomous management and decision making in a system of market competition. meanwhile domestic markets in china gradually became part of the global market and enterprises faced a more intense competition. the changing of the role and the intensifying competition created new conditions for the coming and developing of ci in china. in the past institutes of science and technology information in china were mainly serving the government at a national and local level. in addition the institutes were serving science and technology organizations. from mid 1980s they began to think about their function as transferring along with general social environmental change and put forward the idea that institutes of science and technology information shall serve enterprises and develop new space for development. the introduction of ci catered to this wish. in a word, chinese enterprises’ ci consciousness and needs were awakened under a drive for new social conditions and related policies. available for free online at https://ojs.hh.se/ journal of intelligence studies in business 1 (2011) 61-75 mailto:xzxie@pku.edu.cn https://ojs.hh.se/ 62 2. analysis on the stages of ci evolution in china ci is mainly composed of five aspects: ci academic research, ci enterprise application, ci market, ci education and training, ci laws and professional ethics. the former three are the dominating parts of ci and control the evolutionary speed of ci (figure 1). since significant events mainly take place in these three parts, we divided ci evolution into the following three stages: ci introduction, ci localization and ci marketization (figure 2). there are two old sayings in china: “racing each other is called competition, arguing face to face is called strife” and “know the enemy and know yourself, and you can fight a hundred battles with no danger of defeat”. the sayings proves to what extent competition and intelligence has existed as concepts in china since ancient times. modern ci aiming for the goal of serving enterprises and helping them create competitive advantages appeared from the 1980s and onwards. in 1980 xianpei yuan (changhuo bao et al., 2005) published the paper “the difference and correlation between intelligence and information”, published in no.1, of the science and technology information service. this was the first time intelligence appeared in chinese academic journals. in 1987 huaibao liu (qihao liao, 2005) published “discussion about competitive intelligence and its methods of information collection”, in no. 2 of knowledge of library and information science. in the article ci received its own chinese terminology, “ 竞 争 情 报 ”. from the early 1980s to mid 1990s institutes of science and technology information in different places in china, especially at the shanghai institute began to introduce overseas ci theories and practices into china and advocated ci research and services. the first team engaging in ci research and promotion was formed. their advocacy and activities were noticed by more and more chinese information service ci introduction ci localization ci marketization landmark events: in 1980 xianpei yuan introduced the concept of ci in china. in 1987 ci got its chinese terminology, “竞争 情报”。 landmark events: in 1994 scic (society of competitive intelligence) was founded. landmark events: in 2002 baidu, a famous it company at home and abroad, launched the first ci software, ecis. 1980-1993 1994-2001 2002-today academic activities enterprises application ci market ci education ci laws and professional ethics figure 1: five aspects of ci in china figure 2: stages of the evolution of ci in china 63 organizations and academics. thus, “introduction” is an appropriate definition of this first stage on ci in china. in 1994 the society of competitive intelligence in china (scic) was founded, as a professional organization in china. it marked that ci now took an organized and more regularized road and greatly pushed the development of ci in the country. ci got a relatively rapid development in the aspects of academic research and ci education and obtained some achievements in ci localization studies. however, ci practices and the ci market were not yet very active. at the end of the 20 th century a number of chinese information companies such as xuanxin co. ltd. and menglong co. ltd. tried to develop ci software, but their products were only used by themselves and their customers as an accessory to ci consultation. these attempts did not lead to any great response. then baidu, a famous it company in china and abroad, launched the ci software product ecis on the chinese market. this caused a strong reaction to ci and had a major effects. following baidu, many companies entered the ci market. at the same time autonomy, a british search giant, entered the chinese ci market. due to advertisements and promotions made by these companies, chinese enterprises became greatly inspired. on this stage the ci market in china was gradually formed and enterprises’ ci applications became more common than in the past. the ci academic circle was greatly encouraged by the flourish of the ci industry and saw various kinds of ci academic activities boom, including books, academic papers and ci conferences. 3. academic research 3.1 academic papers ci was first introduced in chinese academic circles in early and mid 1980s. academics kept their enthusiasm and gained achievements especially after scic was founded in 1994. before 1994 ci academic papers were rare and scattered. there were almost no ci papers in chinese authoritative databases. below we see statistics reflecting this new achievement, through two of the most authoritative databases, cnki and vip, using keywords retrieval and artificially eliminating irrelevant literature. from 1994 to 2009 academic papers on ci was 3019, keeping a steady annual rise, especially since the 2001 growth rate increased (figure 3). 3.2 scholars ci scholars were formed and developed as a result of the new active academic activities. they brought new thoughts into the chinese ci field through explorations, with academics figure 3: annual distribution of ci papers 64 such as changhuo bao (changhuo bao et al., 2006). he put forward the concept of human intelligence network, and xinzhou xie et al. systematically analyzed the operation modes and mechanism of cis (table1). table 1: ci scholars and main research directions two of the most prominent chinese ci researchers, professor bao and qin, recently retired. the chinese ci community was then facing a new era where the representatives, xinzhou xie and feng chen et al., became the more active scholars within this field in china. at the same time representatives for the new ci generation, yan li and xiaofei wu et al. established themselves. generally speaking, ci interest was still a bit weak and most scholars came from departments of library and information science or libraries at universities or institutes of information services in different provinces. the backgrounds of chinese ci academics were narrow. 3.3 core achievements of academic localization research six core topics were the focus of chinese ci academics (table2). core topic year quantity publications main authors competitive intelligence system (cis) and software early 1990s 2010 372 changhuo bao, xinzhou xie, fuyuan xu. competitive intelligence and knowledge management 2000-2010 130 tiehui qin, junping qiu. competitive technical intelligence 2006-2010 52 xinzhou xie, xiwen liu. human intelligence network 2003-2009 44 changhuo bao, xinzhou xie. national competitive intelligence 1989-2009 32 qihao liao, gang zhao. industry competitive intelligence 2006-2010 4 feng chen authors works (books) and papers research topics bao changhuo 13 works, 47 papers human intelligence network, competitive intelligence system xie xinzhou 15 works,19 papers human intelligence network, competitive intelligence system, competitive technical intelligence, competitive intelligence practices chen feng 1 work, 34 papers national competitive intelligence, industry competitive intelligence, strategy intelligence and competitive intelligence peng jingli 60 papers competitive intelligence practices, competitive technical intelligence wu xiaowei 31 papers human intelligence network, competitive intelligence system and software qin tiehui 25 papers competitive intelligence and knowledge management xu fuyuan 18 papers human intelligence network, competitive intelligence system, competitive intelligence practices li yan 17 papers competitive technical intelligence wang yuefen 13 papers competitive intelligence system and software 65 table 2: ci core topics and researchers 3.3.1 cis and ci software chinese researchers are now very interested in cis and information technologies relating to cis. they think cis is the foundation of ci, its organizational guarantee, and the symbol of a mature and modern ci field (changhuo bao et al., 2004). from figure 4 we see that research on cis has been carried out since the mid 1990s. in recent years chinese academics have paid close attention to ci. at the beginning chinese academics learned from foreign experts and introduced research on cis. then they tried their best to construct cis theory based on chinese enterprises’ actual situations. in 1992 the first cis program in china, “competition environment monitoring for shanghai automobile industry”, tried to copy the work flow for cis from american companies to chinese enterprises. in 1999 prof. bao et al. systematically studied cis’ basic structure, model, functions and operational mechanism and constructed the basic framework of cis integrating three cis sub-networks (information sub-network, organization sub-network and human subnetwork), three information sub-systems (information gathering system, information analysis system and information service system), one centre (enterprise competitive intelligence centre) and six functions (environment monitoring, market warning, technologies tracking, opponents analysis, decision-making and information security). these findings were published in research of model and operational mechanism of competitive intelligence system and supported by nnsfc (the national natural science foundation of china). the book “enterprise competitive intelligence system” compiled by prof. bao and prof. xie was published in 2002. the books pins down thoughts on ci and cis more systematically than before. this forms a theoretical foundation for cis research and development in china. in addition there appeared studies of ci software for information gathering, processing and analyzing. in early 1995 xiangyu tao (xiangyu tao et al., 1995) tried to construct a quick response system for competitive intelligence based on it. in 2003 keqiang yin (keqiang yin, 2003) developed a milestone ci software. it includes five main modules around a ci cycle, ci need identification, secondhand information collection, primary information collection, ci analysis and ci services. in 2006 wuhan university (chao sun et al., 2007) took responsibility for a program supported by nnsfc, “research on mechanism of enterprise competitive intelligence collection based on data mining”. it used advanced data mining techniques and developed an automatic classification system for enterprise competitive intelligence collection. at the beginning of the 21 st century ci software appeared on the chinese market. the number of papers increased, but their findings were seldom put into practice. 0 10 20 30 40 50 60 19 95 19 96 19 97 19 98 19 99 20 00 20 01 20 02 20 03 20 04 20 05 20 06 20 07 20 08 20 09 p a p e rs year figure 4: the curve of annual papers of cis and ci software 66 3.3.2 ci and knowledge management (km) in the information economy era ci and km are playing a more important role in business management. both have similarities in their research objects, methods and related technologies. that is the main reason why prof. guy d. kolb (li liu, 2007), secretary-general of scip, started to list research on the relationship between ci and km. prof. qiu and his students (junping qiu et al., 2005) discussed the correlation and difference between these two areas in 2000. prof. qin (tiehui qin et al., 2003) and prof. wang et al. (yufen wang, 2006) studied the problem how to realize the integration, including content and measures. from figure 4 we see the attention given to this problem. before 2008 the interest increased and in 2008 it reached its summit, then to experience a straight decline. we think the reason is that new research on the topic is lingering for the management level and that demand has become saturated. the problem is waiting for an in-depth theoretical and technological breakthrough. because both areas are important for chinese enterprises, ci academics in china will continue to pay attention to this problem on ci and km. 3.3.3 competitive technological intelligence (cti) before discussing this topic, we have to know something about the information service for science and technology in china. since 1956 institutes of science and technology information has been founded in several major chinese cities and an information service network has been formed in these cities. they have also engaged in public service of science and technology information. its study object is the same as we call cti, and in a certain sense the former is a predecessor of the later. their fundamental difference lies in their objects. the former is serving governments at all levels, the latter enterprises. the former is public service, the later commercial service. since the 1980s the practice of cti has appeared in some enterprises which focus on technology innovation, such as haier (wei fang et al., 2008) and bao gang (xiujuan liang et al., 2009), but it hasn’t caused much attention among chinese scholars. entering the early 21st century the chinese government stressed the importance of technology innovation for chinese economic and national development. from that time, especially in 2006, many ci scholars have paid attention to cti. although the history of cti research is short in china, the study on this topic is active and the level of research is relatively high. in 2000 prof. zhu and prof. a. proter (yan li et al., 2006) led the first cti program in china, called “study on monitor and analysis technology of high technology based on intelligent knowledge-mining” (a nnsfc program). following it came research such as technical innovation audit (jin chen et al., 2006), patent map (ping l., 2005) and cti methods framework (xianneng ke, 2008). their research caused a renewed interest for ci. the cti research boom increased in 2008 and 2010 with iticti (international conference on technological innovation and competitive technical intelligence) i and iticti ii organized by peking university and beijing academy of science and technology, attracting hundreds of people from universities, institutes of information service and companies from china and abroad. this produced hundreds of papers and gradually led to an p a p e rs year figure 5: curve of papers on the research of the relationship between ci and km 67 international reputation on ci. within less than five years, academic papers on cti published in magazines reached 52, and master thesis 3. compared to other ci topics, the scope and speed of cti research was striking. the above discussions suggest that cti will be an active research branch of ci scholarship in china. 3.3.4 human intelligence network in 1998 bao changhuo put forward the idea of human intelligence network for the first time in china, claiming that cis is composed of three subsystems: intelligence network, organization network and human network. these three networks are equally important for cis. in 2002 prof. bao et al. published two books about ci, “competitive intelligence solutions enterprise competitive intelligence system and skills” and “competitor analysis”. in 2005 chuangye yan, a ph.d at peking university, wrote his ph.d dissertation entitled “human network in competitive intelligence activities”. it was an in-depth theoretical exploration and a construction of a practical model of human network in competitive intelligence activities. it was the first ph.d dissertation to do research on human intelligence networks in china. from 2003 to 2009, papers about the topic reached 44. the overall trend of the research on human intelligence networks reached its peak in 2007. it then went down again. this indicates that academics still maintain an interest for the topic, but after completing basic research and exploration of human intelligence network, it is now in search of a breakthrough. otherwise the topic may stop to be published in scientific journals in china. 3.3.5 national competitive intelligence in early 1989 qihao liao and zuozhi zhang (qihao liao et al., 1989) wrote the paper, “anatomy of jetro’s overseas technological intelligence activities”. it claimed that jetro’s overseas intelligence activities were a state version of competitive intelligence. the concept of state run competitive intelligence or national competitive intelligence then appeared in the literature. in 2002 liao held a speech about this topic at the scic annual conference. from 2004 gang zhao (gang zhao, 2004) wrote several papers about this topic to advocate competitive intelligence at a national level. in 2008 xiang tao (xiang tao, 2008) compiled the book, “national competitive intelligence: what it is, why and how to do it”. it presents a careful explanation about the definition, importance and operational modes of national competitive intelligence. researchers then thought national competitive intelligence referred to the intelligence activities at the national level. from the definition above, there is an overlap between national competitive intelligence, generalized competitive intelligence, governmental competitive intelligence and industry competitive intelligence. a definition of the difference between these terms and others is suggested by klaus solberg søilen (klaus solberg søilen, 2005). but, because the above concepts are intercrossing and national competitive intelligence is difficult to grasp as a specialty most scholars in china have shown little interest in the topic. as a result we have seen papers about national competitive advantage decline to account for less than 0.01% of the total amount of ci papers (figure 6). research on national competitive intelligence is a useful attempt to enlarge the area of research and development of ci, but has so far not been successful. 3.3.6 industry competitive intelligence with rapid development of a global economic integration, industrial clusters have become an economic entity that governments actively cultivate. in 2008 the china institute of science and technology information set p a p e rs s year figure 6: curve for papers on national competitive intelligence 68 industry competitive intelligence as one of their research directions. for 3 years feng chen (yanning zheng et al., 2009) has been guiding colleagues and students in how to study its meaning, scope and characteristics. they divided ci into three levels from a macroto a micro-scale, corporate ci, industrial and national. their program was named “basic problems in theories and methods for industry an empirical study” (a nnsfc program). it included all their thoughts on the topic. after studying the background of industry ci, some of the literature turned towards the trend of thinking about enterprises not only as competing with each other but also as cooperating with each other. unfortunately chinese ci scholars in general are as of yet little concerned about this topic and research achievements in this area has been relatively weak. the number of academic papers on this problem is small and its research history short. 4. the practice of ci in chinese enterprises need for ci in enterprises is the basic drive of ci applications. the way of meeting ci needs generally includes two aspects: one selfsupplying, namely enterprises themselves carrying out ci; the other buying ci services from external ci companies or organizations, namely buyers establishing business relationship with suppliers to develop the ci market. there are two kinds of driving forces of ci practices in china: one comes from the external, including ci research organizations, government at all levels and ci companies; the other is self-reflecting on ci activities. 4.1 the combination of industry, officials and universities to accelerate ci applications 4.1.1 the background before the 1980s, due to the fact that china was living in a planned economy, chinese enterprises’ awareness of ci was weak, and ci practices were in a state of “hibernation”. in china universities and institutes of science and technology information encountered ci abroad for the first time. this caused great interest in ci in china. since the influence of these companies were limited, they strived for governmental support and began to penetrate the field of ci for themselves to encourage enterprises to focus more on competition. 4.1.2 major events 1. ci services specialized on public institutes of information services and universities: in 1992, as the first specialized ci service department directly working with enterprises in public institutes of information service in china was the “market research department” at shanghai institute of science and technology information. later the public institutes of information services and universities began to serve enterprises, with the “enterprises information service central” at the national library, “competitive intelligence and competitiveness research center” at peking university, and “key library of competitive intelligence and innovation evaluation” at beijing academy of science and technology. 2. ci projects funded by local governments: in 1995 there was a first ci demonstration project supported by local government in china. the beijing ci demonstration project was supported by the beijing municipal science & technology commission. it picked eight companies from eight industries to help them construct cis. this opened up for a new model to promote ci practices through a combination of industry, officials and universities. after that, respectively in 2000, 2004 and 2005, yunnan, shenzhen and hunan provinces successively started ci demonstration projects at the governmental level, involving hundreds of enterprises. these ci projects were organized to help local enterprises develop ci with the help of local institutes of science and technology information. in addition scic made efforts to introduce ci to chinese enterprises. the organization attracted many enterprises to become members and inform them about ci. in 2006 scic established a chinese competitive intelligence consulting and training center. the organization established cooperative relationship with many enterprises such as shanghai bao gang group corp., qingdao haier group, and beijing shougng group. 4.2 ci practices in enterprises 4.2.1 background in the 1980s and 1990s, with the coming of new chinese economic reforms and the opening up of the country’s economy especially the transfer from planned economy to market economy – the chinese government 69 asked enterprises to take part in more market competition in china and abroad. chinese enterprises had to depend more on themselves to survive and develop. this caused an increase in competition and meant they had to become more self-aware. this made chinese enterprises become more focused on information collection and analysis for market intelligence and competitor intelligence. many foreign companies such as ibm and sony entered the chinese market, bringing their own concepts of ci practices into china. at the same time academic organizations with their information institutions and the government encouraged chinese enterprises to meet this challenge. 4.2.2 ci practices in chinese enterprises in 1999 prof. xie and his students systematically surveyed the situation of ci practices among chinese enterprises. based on their surveys, they divided the level of chinese ci application into: 1. having no ci workflow and network; 2. being in the process of constructing and forming; 3. having a regularized ci organization and network; and 4. having a ci workflow institutionalized and having world-wide ci networks. the nationwide questionnaire survey done in 1999 shows the development level of ci in chinese enterprises (figure 7). from the figure we see that most companies, 53.47%, found themselves at level [2]. 27.78% of the companies found themselves at level [1], 18.75% at level [3] and none at level [4]. this data suggests that by 1999 most chinese enterprises were in the forming status. the level of ci was not high. with the rapid development of it and the enhancement of enterprises’ “informationalization”, acquiring information was now easier than in the past. on the other hand the information explosion made enterprises decision-making more difficult. after about ten years (2009), we visited and reinvestigated 93 companies with 87 valid questionnaires. the situations of industrial and regional distribution of ci implementation can be seen in figures 8-10. due to limited time, the regional distribution of the companies involved in the survey was insufficient. the samples are mainly limited to beijing and shanghai. beijing and shanghai have the most companies among chinese cities, and they are more developed economically than other chinese cities so far. 70 respondents were mostly mangers or ci staff in the companies. in order to grasp the basic situation of ci in their companies and to make sure that the respondents completely understood what ci is (what was measured), we explained the subject before they answered our questionnaire. we also made a survey about the degree of attention these companies pay to ci by asking the respondents: according to your own experience, do you think ci is indispensable before you make important decisions? (you can pick answer “strongly agree”, “agree”, “less agree”, “disagree” or “strongly disagree”). figure 8: ci implementation according to industrial sector involved in questionnaire survey 30% 29% 15% 6% 6% 4% 4% 4% 2% information transmission, computer service and software manufacturing commercial service petrochemical others service business transportation, warehousing and postal finance sports, culture and entertainment 59% 15% 8% 4% 2%2% 2% 2% 2% 2% 2% beijing shanghai jiangsu guangdong fujiang zhejiang hainai hubei liaoning xianggang jiangxi 56% 23% 21% large enterprises midle enterprises small enterprises figure 9: ci implementation according regional distribution figure 10: ci implementation according to company size 71 the results are seen in figure 11. in china many companies thought ci was equal to market investigation. for that reason ci was often undertaken by the market or sales department in their company (xie et al., 2001). from figure 8 we find that the awareness of ci has improved and the percent that thinks ci is indispensable for decision-making account for more than half of those surveyed (strongly agree is 5.74%, agree 56.22%). on the basis of previous divisions of ci involvement, we divided the development level of ci into: 1. no ci work at all; 2. having ci work, but no ci department; 3. formal ci department and network being planned; 4. having formal ci department and network; 5. ci institutionalized. according to the survey we found that more than half of the chinese companies dealt with ci. the sum of the levels of [1], [2] and [3] accounted for 65.52% (10.95%+17.24%+37.93%), but most companies are in the position of forming or about to form formal ci functions ([3] accounted for 17.93%). comparing this with the survey from 1999 we see that the level of ci practice in china has made significant progress. but overall the level of ci practice in china is still not very high and it has still not matured. 16.09% of chinese companies were completely unfamiliar with the ci function. strongly agree agree less agree disagree strongly disagree figure 11: chinese enterprises’ attitude towards ci figure 12: ci development level in chinese enterprises in 2009 16.09% 18.39% 37.93% 17.24% 10.35% 0.00% 5.00% 10.00% 15.00% 20.00% 25.00% 30.00% 35.00% 40.00% [1] [2] [3] [4] [5] 72 5. the ci market in china the ci market is composed of three aspects: ci consulting, ci training and ci software. there is no absolute boundary between the above ci markets. many ci companies engage in two or three of these businesses. as an emerging market, the ci market is not in any way mature. according to our comprehensive study on the topic, we divided growth into three periods: sprouting period, growth period and bottleneck period (figure 13). 5.1 the sprouting period (1994-2001) in the late 1970s and early 1980s information consulting appeared in china and in the early 1990s reached a relatively large development level. by the end of 1991 information consulting organizations reached 236. some of them provide consulting services for enterprise strategy. in china ci services were originally undertaken by information institutes, universities, ci societies and the local government. with the ci need in enterprises increasing companies such as information consulting suppliers and information technology providers became aware of the business opportunity. in 1992 the shanghai institute of science and technology information organized a ci seminar for the first time. ci training in china then took the first step. in 1996 beijing normal university began to provide “ci further education” for enterprise staffs. several ci consulting companies such as wanfang co. ltd., beijing competitive intelligence center, beijing huamen co. ltd. and beijing huanxin co. ltd. appeared. in the same period ci websites such as china.com and humen.com appeared. in 1999 and 2001 beijing huanxin co. ltd. and menglong co. ltd. developed ci software, but didn’t strongly promote it. for that reason there was little social response. there were some ci providers in the chinese market, but their number could be counted on one hand. 5.2 the growth period (2002-2007) in 2001 china joined wto, and the chinese market was further opened to the outside world. this made the outside competitive environment that chinese companies faced more complex and ci demand increased. in addition scholars, information institutes, universities and local governments made efforts to introduce ci to enterprises. in 2003 ci professional qualification such as “information analyst” and “competitive intelligence analyst” appeared in china. this marked the arrival of the era of ci professionalization in china. in 2004 scic established the “china competitive intelligence consultation and training center” and began to give ci training as an independent training program. the number of people to take part in ci training reached about 3000 in china each year during that period. the number of companies and organizations to engage in ci services reached about 1000 (mingjin xu, 2008). during that time websites for ci training and communication were active. some ci websites such as sinoci.com.cn and zoomchina.com were particularly popular. a famous it company in china, baidu, entered into the ci software market in 2002. following baidu, more than 20 companies including uk autonomy entered the chinese ci market. in 2004 the sales of ci related software reached more than 30 million rmb, a more than 80% increase compared to 2003 (fan wu, 2005). the ci market was now in a flourishing period, but many companies especially ci software developers were more like copycats following baidu. the boom of the ci market was due to sprouting period (1994-2001) growth period (2002-2007) bottleneck period (2008 -) figure 13: the growth of the ci market 73 a leading effect, not to new product development. this indicated an instability in the development of the chinese ci market and opened for its decline, in the period to come. 5.3 bottleneck period (2008 ) after a short-lived prosperity, in 2006 many ci software companies such as baidu co. ltd. and tianxiahulian co. ltd. dropped out of ci software market. in the meantime people began to cast doubt on ci performance. chunfeng wang (chunfeng wang, 2006) published online the article “is competitive intelligence the emperor’s new clothes?”. these signals hinted to the instability of the ci market in china. in 2008 ci software developers moved to other industries, switched to other it business sectors or went silent. following the decline in the ci software market, in 2009 the ci training market also began to decline and some ci training organizations disappeared. former ci websites such as huanmen.com and zoomchina.com were closed. but there were also new ci websites appearing such as chinacir.com.cn and zitview.com. linking the above survey on chinese ci practice with the recent situation of the ci market in china, we have made an analysis about the reason for the coming bottleneck period. it’s still unlikely that the chinese ci market will be shrinking further when one considers today’s ci demand. instead the level of ci services in china today is now too limited to meet the demand. so it’s crucial for chinese ci companies to develop and update their products and services. 6. ci education with scic founded in 1994, ci education in china appeared. in 1995 china science and technology university formally enrolled graduate students for a master’s degree in ci. in 2000 china institute of science and technology information, national defense science and technology information center and peking university united to form a ph.d. in ci. at present there are 23 universities engaged in ci professional education, and there is an elaborated system of college professionals offering ci education on the undergraduate, master and doctor level. 7. establishing ci laws and regulations and a professional ethics since ci was born in china in the 1980s, professionals have advocating collecting intelligence through legal methods. due to the nature of competition, decisionmaking, value and secrecy, ci activities must be in compliance with the “rules of the game” in the market. in china there are some laws related to ci such as the law of the peoples republic of china against unfair competition, unfair competition prevention, the trade secret protection act and copyright law of the peoples republic of china. these laws are restraining ci practices, but do not limit or regulate the ci industry as such. many professionals think it is a pity that laws specialized for ci don’t exist in china. ci ethics in china is very slow area to develop and china does still not encourage any authoritative sets of ci ethics. we think the basic reason for this is that in china ci still do not play an important role for the economic development and strategy support. the scale of ci practices is limited and still underdeveloped. the support and attention given to this area from the government is not sufficient. government guidance is important for any task in a country such as china, with a strong collectivist tradition. 8. conclusions generally speaking, all aspects of ci have entered a critical phase in china. we think the future of ci development will be connected to the following aspects: 8.1 ci theory with further reforms in the market system in china, the competition that chinese enterprises will be facing will increase. the business environment will become more complex and intense. in recent years china achieved great advances in technological innovation. this has improved the position for chinese companies and the general economic and national development. with further development and professionalization of ci, ci management will become more important. at the same time this is also a weak link. we think the future direction of ci academic research in china will be focused on the following five aspects: a ci that goes in the direction of more complex competition such as dynamic and cooperative competition, cis, 74 cti, the research of integration with km and ci and ci management. 8.2 methods and technologies for ci analytical methods and technologies used for ci is mainly introduced in china from abroad, and has been lacking in innovation. it seems method and technology is the weak point of ci research. strengthening ci innovation in this aspect is key to developing ci as a science for academics around the world, maybe especially in china. 8.3 ci practices according to our surveys, in 1999 and 2009 about ci practices in china, ci applications in chinese enterprises is still performed at a medium level in the organization, gathering information and conducting market surveys. at the same time in figure 13 we saw that ci practices in china is gradually developing towards a higher level of sophistication. 8.4 ci markets the ci market in china is facing a period of decline. the situation is not clearly optimistic. we think the basic reason is that the value of ci has not been developed in depth. as a consequence people don’t know enough about ci and even doubt its value. the other basic reason is that the ci functions have in a way hidden other areas of interest such as information systems, knowledge management system, decision support system and business intelligence system. the ci role is often performed by employees without a clear ci tag, such as salesmen, r&d personnel, even managers. this has created much confusion as to what ci really is. from this perspective it would be better if a new and broader term could be found that reflected the values of all of these activities. 8.5 cultivation of ci talent it is difficult to see how someone can be an expert on ci without having in-depth knowledge of other areas. future development of ci talent mentioned above is therefore inseparable from the cultivation of interdisciplinary talent. 8.6 ci laws and ci work ethics due to the underdevelopment of ci practices and the ci market, the construction of ci laws and the forming of a ci work ethics will be a longer process than could otherwise have been expected. reference changhuo, b., gang z., yan l., ying h. 2005. competitive intelligence grow up reviewwritten for the 10 th anniversary of scic. journal of the china society for scientific and technical information, 24(1): 3-19. qihao l. 2008. the origin of competitive intelligence. competitive intelligence, winter issue. changhuo b., yan l., xiuling w. 2006. human intelligence network. information studies: theory & application, 29(2): 129141. changhuo, b., ying, h. and gang, z. 2004. research on developing competitive intelligence system. new technology of library and information service (1): 76-80. chuangye, y. 2005. the research of human intelligence network in competitive intelligence. peking: peking university. xiangyu t., songzhen l., liren g. 1995. the thought of establishment of china’s quick response system of competitive intelligence. information science and technology (4): 34-38. zhao s., yufeng z. analysis of a model of ci computer system. 2011. journal of the china society for scientific and technical information 20(1): 39-45. keqiang, y. 2003. analysis and design of competitive intelligence software. peking: peking university. li l. 2007. the integration of competitive intelligence and knowledge management. chongqing: southwestern university. junping q., yang z., rui z. 2005. on competitive intelligence system and knowledge management system. library and information service (9): 31-35. tiehui q., wenfang s., chuangye y. 2003. on the relationship between competitive intelligence and knowledge management library and information service (11): 2832. yuefen w., peng s., xinhao w., changhuo b. 2006. application of knowledge map in intelligence analysis. library and information service, 50(12): 83-87. wei f., bo s. 2008. analysis of the research on competitive intelligence and knowledge management. journal of information (10): 72-74. xiujuan l., yawei y. 2009. review of research on national competitive intelligence. information and documentation services (6): 18-21. 75 yan l., xinli z., zhongying q. 2006. analysis of the status of competitive technical intelligence. journal of the china society for scientific and technical information 25(2): 242-253. jin c., fangzhen y. 2006. a research on spre technological innovational audit model and its application. research & development mangement 18(5): 9-14. ping l., jing z., changwen q. 2005. facture of patent technology maps and its demonstration: citing laser information storage technology as an example. chinese journal of management, 2(5): 555-558. xianneng k. 2008, the construction of the analysis method frame of competitive technology intelligence based on innovation process. beijing: graduate university of chinese academy of sciences. qihao, l and zuozhi, z. 1989. anatomy of jetro’s overseas technological intelligence activities. journal of the china society for scientific and technical information 1989, 8(4): 81-83. gang z. 2004. establishing national ci system: object and principle. journal of the china society for scientific and technical information, 23(3): 367-371. gang z. 2004. china need build the national competitive intelligence system. digest of management science (2): 6-8. xiang t. 2008, national competitive intelligence: what it is, why and how to do it?, shanghai: shanghai scientific & technical press. solberg søilen, k. 2005. introduction to public and private intelligence. lund: studentliteratur. yanning z., feng c., xiaoyuan z. 2009. findings from a site investigation into the program of promoting competitive intelligence application to enterpriese of hunan province of china. journal of the china society for scientific and technical information, 28(1): 155-160. xinzhou, x., na, l. and shaoqi, h. 2011. investigation and analysis of the enterprise informatization and competitive intelligence of china (ⅰ). journal of the china society for scientific and technical information, 20(3): 295-302. xinzhou, x., na, l. and shaoqi, h. 2001. investigation and analysis of the enterprise informatization and competitive intelligence of china (ⅱ). journal of the china society for scientific and technical information, 20(4): 435-442. zuozhi, z. 2007. the memorabilia of competitive intelligence in china from 2000 to 2005. available online at url: http://www.istis.sh.cn. mingjin xu. 2008. research on the operating actuality, problem and countermeasure of the chinese enterprise competitive intelligence intelligence work. library and information (5): 86-90. fan wu. 2005. competitive intelligence in not a “chicken ribs”. software world (1): 4647. http://www.istis.sh.cn/ vol8no3paper1lopezrobles et al to cite this article: lópez-robles, j.r.,otegi-olaso, j.r., arcos, r. gamboarosales, n.k. and gamboa-rosales, h. (2018) mapping the structure and evolution of jisib: a biblipmetric analysis of articles published in the journal of intelligence studies in business between 2011 and 2017. journal of intelligence studies in business. 8 (3) 9-21. article url: https://ojs.hh.se/index.php/jisib/article/view/325 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index mapping the structure and evolution of jisib: a bibliometric analysis of articles published in the journal of intelligence studies in business between 2011 and 2017 josé ricardo lópez-roblesa*, jose ramón otegi-olasoa, rubén arcosb, nadia karina gamboa-rosalesc, hamurabi gamboa-rosalesc auniversity of the basque country, department of graphic design and engineering projects, bilbao, spain; bking juan carlos university, department of communication sciences and sociology, madrid, spain; cautonomous university of zacatecas, academic unit of electric engineering, zacatecas, mexico *jrlopez005@ikasle.ehu.eus journal of intelligence studies in business please scroll down for article mapping the structure and evolution of jisib: a bibliometric analysis of articles published in the journal of intelligence studies in business between 2011 and 2017 josé ricardo lópez-roblesa*, jose ramón otegi-olasoa, rubén arcosb, nadia karina gamboarosalesc, and hamurabi gamboa-rosalesc a university of the basque country, department of graphic design and engineering projects, bilbao, spain; b king juan carlos university, department of communication sciences and sociology, madrid, spain; c autonomous university of zacatecas, academic unit of electric engineering, zacatecas, mexico corresponding author (*): jrlopez005@ikasle.ehu.eus received 18 october 2018 accepted 27 december 2018 abstract today, organizations are facing technological, economic and social challenges that require the intelligent use of data, information and knowledge. to this end, organizations are developing capabilities around intelligence. from the organizational point of view, intelligence in business is a relatively new field study, so it is convenient to know and understand what the main themes are and their evolution in order to facilitate their integration. taking this into account, the current research conducts a conceptual and structural analysis of the journal of intelligence studies in business (jisib). jisib is one of the few academic journals devoted purely to publishing articles about business intelligence, collective intelligence, competitive intelligence, economic intelligence, market intelligence, marketing intelligence, scientific and technical intelligence, strategic intelligence, and their equivalent terms in other languages. this analysis is carried out by quantifying the main bibliometric performance indicators, identifying the main authors and evaluating the development of the main themes within it using scimat as a bibliometric analysis software. to this purpose, the documents published in jisib from 2011 to 2017 were retrieved from two different sources: the jisib official web page and the web of science. in this way, the bibliometric performance analysis evaluates the impact of the scientific output based on publications and their citations, while science mapping illustrates the intellectual structure of the journal and the evolution of the main research themes. bearing in mind that jisib provides an open platform for the publication of original research articles, opinion articles, book reviews and conference proceedings about the intelligence field, this research allows to understand its structure and evolution and all the themes associated with it. it provides a framework to support intelligence researchers and professionals in the development and direction of future research by identifying emerging, transversal, core and declining themes. finally, this study includes a performance analysis of jisib. keywords business intelligence, competitive intelligence, conceptual evolution map, coword analysis, science mapping analysis 1. introduction in an age of information, organizations face the challenge of improving their competitiveness and agility through the intelligent use of data and information in the research, development and innovation process. this makes it possible journal of intelligence studies in business vol. 8, no. 3 (2018) pp. 9-21 open access: freely available at: https://ojs.hh.se/ 10 to predict situations, improve decision-making processes, increase profitability and thereby the success of organizations, mainly. both companies and educational organizations seek to respond to this challenge through the effective development of areas of knowledge such as: competitive intelligence, business intelligence, market intelligence, scientific and technical intelligence, collective intelligence and geoeconomics. nevertheless, in comparison with other fields of knowledge, intelligence in business is relatively novel, so there are not many ways in which academics and professionals can improve and share their advances and proposals. the concept of intelligence has its origins in the military and national security fields, through the processes of adaptation that organizations develop to respond to the information use challenges that they face today. it was not until 1958 when luhn defined business intelligence as the ability to apprehend the interrelationships of presented facts in such a way to guide action towards a desired goal (luhn, 1958). this definition can be considered to be one of the first in the intelligence field, because it mentions the systematic process by which the organization collects data and organizes them in the form of useful information to later analyze them and convert them into intelligence, providing the necessary criteria for the decision making process. however, the term business intelligence is more often used for internal or transactional aspects of an organization, giving space for the use of competitive intelligence in a broader, external framework. in this way, prescott and gibbons said that competitive intelligence is a formalized, yet continuously evolving, process by which the management team assesses the evolution of its industry and the capabilities and behavior of its current and potential competitors to assist in maintaining or developing a competitive advantage (prescott and gibbons, 1993; prescott and bharadwaj, 1995). bearing this in mind, it is possible to observe that the intelligence is implemented in different areas of the organization, which means that the approach given to it varies according to the people who develop it or the area where it is developed. this has given rise to different intelligence terminology, within which can be highlighted the following: business intelligence (gilad and gilad, 1985; søilen, 2017), collective intelligence (devouard, 2011; sheremetov and rocha-mier, 2004; shimbel, 1975), competitive intelligence (calof and dishman, 2007; davenport and cronin, 1994; du toit, 2003; du toit and sewdass, 2014; james, 2014; tuta et al., 2014), economic intelligence (larivet, 2009; menychtas et al., 2014; perrine, 2004; seiglie et al., 2008; smith, 1953), market intelligence (maltz and kohli, 1996; navarro-garcia et al., 2016), marketing intelligence (de' rossi, 2005; kelley, 1965; zhou and lai, 2009), science and technology intelligence (castellanos and torres, 2010; chang et al., 2007; de coster et al., 2013; mccormick et al., 2015; mortara et al., 2009), among others, such as financial intelligence, public intelligence, and competitor intelligence. nowadays, there are few scientific journals focused exclusively on the publication of intelligence articles which the practitioners of intelligence can use to share and further develop their knowledge. one of the most recognized and specialized sources in this field is the journal of intelligence studies in business (jisib), which is an open publication journal, indexed in the main scientific databases and that gathers contributions from many authors of international prestige. considering the heterogeneity, novelty and evolution of this field, intelligence professionals are interested in evaluating the evolution of the main themes and the relationship between them, in order to identify opportunities and challenges in the future. in this regard, authors such as du toit (du toit, 2015) and søilen (søilen, 2013; søilen, 2015; søilen, 2016) have carried out research to identify trends in the intelligence literature by analyzing publications, journals and authors. the objective of this article is to identify and analyze the main themes in the field of intelligence used in peer-reviewed articles published in jisib from 2011 to 2017 and its performance through the use of bibliometric techniques and tools (cobo et al., 2011b). finally, this paper is organized as follows: section 2 introduces the methodology (including the bibliometric analysis tool) and the data set. section 3 and section 4 present the bibliometric and science mapping analyses, respectively. section 5 shows the conclusions and future research lines. 2. methodology and dataset scientific journals represent one of the main knowledge sources today, so their analysis is of interest to academic, scientific and business communities (bjork et al., 2009; dewatripont et al., 2006). within the research aimed at 11 evaluating the performance of scientific journals, three main approaches can be identified: (i) bibliometric analysis based on performance indicators, (ii) thematic analysis, and (iii) research methods and techniques. in this contribution, a complete bibliometric analysis based on performance indicators and a thematic analysis of the journal of intelligence studies in business (jisib) has been carried out (batagelj and cerinšek, 2013; börner et al., 2003; gutiérrez-salcedo et al., 2017). the performance analysis is based on bibliometric indicators that measure the production of different actors, and the international impact achieved. the most cited articles (moral-munoz et al., 2016) in the field are identified using the h-classic approach (de la flor-martinez et al., 2016; martínez et al., 2014), which is based on the well-known hindex (hirsch, 2005). in general terms, the hclassic uses the h-index in order to establish the threshold cut, that is, the number of highly cited documents that correspond with the most cited paper. a longitudinal conceptual science mapping analysis and a strategic diagram based on a cowords network are developed by means of the software tool scimat (cobo et al., 2012). this thematic analysis is based on a four-stage approach: (i) research themes detection, (ii) visualizing research themes and thematic network, (iii) discovery of thematic areas and (iv) performance analysis. to do this the research themes are set out in a strategic diagram and thematic evolution map (figure 1). the first is a two-dimensions map divided in four areas according to their relevance (centrality and density rank values) where the themes are represented as a sphere and its volume is proportional to the number of documents associated with the theme (cobo et al., 2011a): a. motor themes (upper right quadrant – q1): the themes within this quadrant are relevant to the structure and develop the research field. b. highly developed and isolated themes (upper left quadrant – q2): the themes within this quadrant are relevant but are not important enough to be considered more than a very specialized or peripheral activity for the research field. c. emerging or declining themes (lower left quadrant – q3): the themes within this quadrant are weak, but this weakness can be understood as emerging or disappearing themes. d. basic and transversal themes (lower right quadrant – q4): the themes figure 1 strategic diagram (a) and thematic evolution (b) structure. the structure of the strategic diagram (a) and thematic evolution (b) used to describe the evolution of the themes related to intelligence and the field). the strategic diagram is dived into four sections: motor themes, highly developed and isolated themes, emerging and declining themes and basic and transversal themes, according to the centrality and density of the themes. the thematic evolution shows the evolution of these themes in the period defined. this figure groups these themes into thematic areas (color areas). 12 within this quadrant are not welldeveloped, but are relevant for the research field. finally, the second diagram is a longitudinal framework, which allows us to analyze and track the evolution of a research field throughout consecutive time periods. in addition, a performance analysis of a thematic area using the main bibliometric indicators was developed. this analysis focused on the documents published in the journal of intelligence studies in business (jisib). the publications and their citations included in this analysis were collected on may 1st, 2018. the publications belonging to the intelligence research field were retrieved from two different sources: jisib (official web page) and web of science. the publications were manually downloaded and included in the knowledge base. the publications available on the web of science were retrieved using the following advance query: is=("2001-015x”). these publications were compared with the publications obtained from the official website to guarantee that the publications are consistent in both sources. finally, the knowledge base was further refined and limited to articles, proceedings, opinion and reviews published in english. this process retrieved a total of 92 publications from 2011 to 2017. according to methodology used for this research (cobo et al., 2011a), to evaluate the evolution and to avoid smoothing the data, the best option was to choose comparable periods in terms of duration and characteristics. in the case of the journal jisib, the entire time period analyzed was divided in seven comparable periods: period 1: 2011, period 2: 2012, period 3: 2013, period 4: 2014, period 5: 2015, period 6: 2016 and period 7: 2017. the analysis provides a good input to the strategic diagrams and thematic evolution map (co-word analysis) to detect the main themes. 3. performance of the bibliometric analysis of jisib to understand how the jisib has progressed in terms of publications, citations and relevance, its performance was evaluated through the analysis of the main bibliometric indicators: publications, citations, most cited articles, most cited authors and h-index. for this purpose, the bibliometric performance analysis was structured in two parts. firstly, all the publications and their figure 2 distribution of publications and citations by year and period (2011-2017). this figure shows the distribution of publications and citations included in jisib per year. the bars represent the publications by year and are related to the left axis. the continuous lines represent the citations corresponding to each year (nominal and accumulated) and are related to the right axis. 13 citations were evaluated with the objective of testing and evaluating the scientific development. secondly, the main authors and publications were analyzed to assess the impact of these in the field of research. table 1 top 10 most productive authors (2011-2017). when a tie is recorded between authors all are listed in alphabetical order. pub = publications. n=92. authors pub % søilen, k. s. 16 17.39 rodríguez salvador, m. 6 6.52 calof, j. 4 4.35 du toit, a. s. a., erickson, g. s., quoniam, l. and rothberg, h. n. 3 13.04 baaziz, a., barnea, a., bisson, c., bleoju, g., capatina, a., dousset, b., el haddadi, a., hoppe, m., oubrich, m., paletta, f. c., richards, g., vriens, d. and xinzhou, x. 2 28.26 table 2 top 10 most cited authors (2011-2017). this table is completed with the information of each author in terms of production. when a tie is recorded between authors all are listed in alphabetical order. c = citations. % is given out of n=479. docs = documents. author c % docs % søilen, k. s. 83 17.33 16 17.39 adamala, s. 56 11.69 1 1.09 cidrin, l. 56 11.69 1 1.09 du toit, a. s. a. 45 9.39 3 3.26 carayannis, e. 29 6.05 1 1.09 kabir, n. 29 6.05 1 1.09 hoppe, m. 23 4.80 2 6.52 rodríguez salvador, m. 23 4.80 6 2.17 calof, j. 15 3.13 4 4.35 oubrich, m. 15 3.13 2 2.17 3.1 performance and impact indicators the distribution of publications and citations included in jisib per year is shown in figure 2. from the first publication in december 2011, the number of publications remains constant, with the exception of 2015, when there was a slight decrease. it is important to highlight that during the last years there has been a constant increase in the number of publications, which can be understood as a growing interest in the intelligence and consolidation of the journal. in addition, it is important to highlight that jisib is one of the few active intelligence journals indexed in the most important academic and scientific sources (web of science and scopus), an aspect that has allowed it to grow in terms of publications and adherents. considering these results and the previous analysis of the state of the art, it is possible to expect that the positive trend will continue. however, it is important to note that in recent years there was a false negative trend in the number of citations. according to wang there is a window period between the publication of an article and the moment when it begins to be cited, ranging from 3 to 7 years (wang, 2013). furthermore, it must be borne in mind that the evolution of the citations also depends on where journals are indexed and in how many sources they are indexed. 3.2 most productive and cited authors to complete the bibliometric performance analysis of the journal of intelligence studies in business (jisib) and to assess the main actors in the development of this field of knowledge, the most productive and cited authors are shown in table 1 and table 2, respectively. in both tables a tie was recorded between different authors, so all are listed in alphabetical order. it is important to highlight that all most productive authors are among the most cited authors during the evaluated period. furthermore, the authors' correspondence in terms of country of origin are: sweden, france, iran, south africa, usa, canada, mexico, brazil and spain. figure 3 jisib h-index publications (2011-2017). the distribution of the most cited publications and their citations according to the h-index and h-classics. the bars represent the publications by year and are related to the left axis. the points represent the citations corresponding to each year (nominal) and are related to the right axis. 14 table 3 h-classics of jisib (2011-2017). this table shows the citation classic papers identified by means of the h-classics concept. these publications are considered the main reference base within the journal. percentage of citations is indicated out of n=479. rank title #citations (%) 1 key success factors in business intelligence (adamala and cidrin, 2011) 56 (11.69) 2 big data, tacit knowledge and organizational competitiveness (kabir and carayannis, 2013) 29 (6.05) 3 comparative study of competitive intelligence practices between two retail banks in brazil and south africa (du toit, 2013) 18 (3.76) 4 competitive intelligence research: an investigation of trends in the literature (du toit, 2015) 14 (2.92) 5 intelligence as a discipline, not just a practice (hoppe, 2015) 14 (2.92) 6 competitive intelligence and knowledge creation outward insights from an empirical survey (oubrich, 2011) 14 (2.92) 7 competitive intelligence in the south african pharmaceutical industry (fatti, 2013) 13 (2.71) 8 competitive intelligence and information technology adoption of smes in turkey: diagnosing current performance and identifying barriers (wright et al., 2013) 13 (2.71) 9 a place for intelligence studies as a scientific discipline (søilen, 2015) 12 (2.51) 10 the relationship between strategic planning and company performance – a chinese perspective (jenster and søilen, 2013) 12 (2.51) 11 a risk and benefits behavioral model to assess intentions to adopt big data (esteves and curto, 2013) 12 (2.51) 12 information design for “weak signal” detection and processing in economic intelligence: a case study on health resources (sidhom and lambert, 2011) 12 (2.51) the main other journals related to intelligence in business are: marketing intelligence & planning, south african journal of information management, european journal of marketing, aslib proceedings and interdisciplinary journal of contemporary research in business. 3.3 citation classics to understand the productivity and impact of a group of publications a summary analysis of hindex and h-classics is presented (de la flormartinez et al., 2016). the jisib has an h-index value of 12. this means that relevant publications have more than twelve citations. the results of the publications retrieved for each period are shown in figure 3. according to figure 3, the relevant publications are concentrated in 2013, 2011 and 2015. this coincides with the fact that 2013 and 2011 are also the most frequently cited years. table 4 authors with the highest number of publications and their citations according to the h-classics (2011-2017). name citations % n=219 documents % n=12 du toit, a. s. a. 45 20.55 3 25.00 søilen, k. s. 24 10.96 2 16.67 adamala, s. 56 25.57 1 8.33 alistair duffy, c. b. 13 5.94 1 8.33 carayannis, e. 29 13.24 1 8.33 cidrin, l. 56 25.57 1 8.33 curto, j. 12 5.48 1 8.33 esteves, j. 12 5.48 1 8.33 fatti, a. 13 5.94 1 8.33 hoppe, m. 14 6.39 1 8.33 jenster, p. 12 5.48 1 8.33 kabir, n. 29 13.24 1 8.33 lambert, p. 12 5.48 1 8.33 oubrich, m. 14 6.39 1 8.33 sidhom, s. 12 5.48 1 8.33 wright, s. 13 5.94 1 8.33 15 table 3 shows the “citation classic” papers identified by means of the h-classics concept. the authors with the highest number of publications and their citations are shown in table 4.to compliment the results described above, the evolution of jisib is analyzed below, using scimat. 4. science mapping analysis of jisib following the methodology described above, an overview of the science mapping and the relations between core themes in jisib is provided. this section is organized in two sections: (i) analysis of the content of the publications and (ii) a thematic evolution map. 4.1 analysis of the content of the articles published in connection with the previous sections, the research themes were set out in a strategic diagram, in order to analyze the main themes published in jisib in the seven periods defined. first period (2011): four research themes can be identified (figure 4). three themes can be highlighted as key themes (motor theme and basic and transversal themes) of the knowledge field: competitive-intelligence, data-warehouse and competitive-technical-intelligence. the significant features of the motor themes identified in this period and their main research areas are below: • competitive-intelligence: competitive intelligence system, economic intelligence, text mining, weak signal, real-time business intelligence, semantic network and continuous evolution • competitive-technical-intelligence: blue ocean strategy and knowledge transfer second period (2012): continuing with the analysis, four themes are identified in figure 5. three themes can be highlighted as key themes of the knowledge field: businessintelligence, document-warehouse and competitive-intelligence. the first two themes identified as key themes are new in the analysis and the last one changed quadrant. the significant features of the motor themes identified in this period and their main research areas are below: • business-intelligence: customer expectative, visualization, strategic early warning system, pet model, pricing strategies, security issues and figure 5 strategic diagram for 2011. this figure sets out the research themes in four categories according to their relevance. these themes are related to intelligence within jisib for a specific period of time. the four categories are: themes included in quadrant q1 (motor themes), themes included in quadrant q2 (highly developed and isolated themes), themes included in quadrant q3 (emerging or declining themes) and themes included in quadrant q4 (basic and transversal themes). figure 4 strategic diagram for 2012. this figure sets out the research themes in four categories according to their relevance. these themes are related to intelligence within jisib for a specific period of time. the four categories are: themes included in quadrant q1 (motor themes), themes included in quadrant q2 (highly developed and isolated themes), themes included in quadrant q3 (emerging or declining themes) and themes included in quadrant q4 (basic and transversal themes). 16 software (design, production and evaluation) • document-warehouse: multiversion documents and multidimensional analysis third period (2013): according to the strategic diagram showed in figure 6, six themes research themes were identified and four of these are considered key themes knowledgemanagement, big-data, business-intelligence and competitive-intelligence. in this period two new key themes appear and maintain business-intelligence and competitiveintelligence. the significant features of the motor themes identified in this period and their main research areas are below: • knowledge-management: knowledge activism, knowledge creation, knowledge strategy, organizational change, strategy, tacit knowledge, analytical conversation and big data strategy • business-intelligence: data management, business analytics software and cloud computing • big-data: organizational knowledge, risk management and data benefits fourth period (2014): according to the strategic diagram shown in figure 7, five research themes can be identified for this period and the following themes could be considered key themes: competitive-technical-intelligence, business-intelligence and competitiveintelligence. in this period, one new main research theme was identified but the motor themes just include one theme. the significant features of the motor themes identified in this period and their main research areas are below: • competitive-technical-intelligence: evaluating intelligence, intelligence impact, patent analysis, technical intelligence, citation analysis and cti impact fifth period (2015): seven themes were identified in this period (figure 8). four themes can be highlighted as key themes: social-network, business-intelligence, erpsystem and competitive-intelligence. in this period two new key themes appear and others are maintained: business-intelligence and competitive-intelligence. the significant features of the motor themes identified in this period and their main research areas are below: figure 6 strategic diagram for 2013. this figure sets out the research themes in four categories according to their relevance. these themes are related to intelligence within jisib for a specific period of time. the four categories are: themes included in quadrant q1 (motor themes), themes included in quadrant q2 (highly developed and isolated themes), themes included in quadrant q3 (emerging or declining themes) and themes included in quadrant q4 (basic and transversal themes). figure 7 strategic diagram for 2014. this figure sets out the research themes in four categories according to their relevance. these themes are related to intelligence within jisib for a specific period of time. the four categories are: themes included in quadrant q1 (motor themes), themes included in quadrant q2 (highly developed and isolated themes), themes included in quadrant q3 (emerging or declining themes) and themes included in quadrant q4 (basic and transversal themes). 17 • social-network: enterprise 2.0, information systems, networking organization, social computing, social learning, social medial, social organization, strategic management, competitive advantage and computer supported collaboration • business-intelligence: enterprise resource planning, e-word of mouth, internet discussion, unstructured data and custom relation management sixth period (2016): according to the strategic diagram shown in figure 9, ten themes can be identified and six of them are considered key themes: strategic-intelligence, researchagenda, data-governance, business-strategy, business-intelligence and enterprise-systems. in this period five new key themes appear and one is maintained: business-intelligence. the significant features of the motor themes identified in this period and their main research areas are below: • strategic-intelligence: disruptive intelligence, open innovation, perspective, technology management and technology brokers • research-agenda: hhrr management, intelligence studies, market intelligence, predictive analytics, talent management, competitive advantage and employee engagement • data-governance: intelligence as a service, data management and ethics • strategy: organizational performance, organizational level competencies and organization systems research seventh period (2017): according to the strategic diagram showed in figure 10, ten themes are identified and six of them are considered key themes for the knowledge field: open-innovation, business-intelligenceprojects, technology-intelligence, strategicintelligence, decision-making and socialmedia. in this period five new key themes appear and one is maintained: strategicintelligence. the significant features of the motor themes identified in this period and their main research areas are below: • open-innovation: organizational performance, knowledge, big data, big data analytics, emerging technology and competitive intelligence • technology-intelligence: technology monitoring, patent bibliometrics, patent indicators, patent information, patent statics and strategy • bi-projects: key success factors, bi success and data saturation figure 8 strategic diagram for 2015. this figure sets out the research themes in four categories according to their relevance. these themes are related to intelligence within jisib for a specific period of time. the four categories are: themes included in quadrant q1 (motor themes), themes included in quadrant q2 (highly developed and isolated themes), themes included in quadrant q3 (emerging or declining themes) and themes included in quadrant q4 (basic and transversal themes). figure 9 strategic diagram for 2016. this figure sets out the research themes in four categories according to their relevance. these themes are related to intelligence within jisib for a specific period of time. the four categories are: themes included in quadrant q1 (motor themes), themes included in quadrant q2 (highly developed and isolated themes), themes included in quadrant q3 (emerging or declining themes) and themes included in quadrant q4 (basic and transversal themes). 18 • strategic intelligence: knowledge discovery, balanced scorecard, corporate performance management and corporate strategic management it is important to highlight that businessintelligence, competitive-intelligence and strategic-intelligence are considered key themes in most of the periods, and the rest of themes are closely linked to patents, technology, innovation, information management and social networks. 4.2 conceptual evolution map in light of these pictures, figure 11 shows the pattern of development within the knowledge area throughout the periods analyzed and the relationships among research themes. the characteristics of the line define the quality of the relation. in the jisib thematic evolution map three kinds of main thematic areas can be identified: strategic intelligence, competitive intelligence and business intelligence. these thematic areas consolidate the main themes and research areas covered in jisib. in relation to the evolution of the jisib, competitive intelligence (green area) is the most strongly representative research thematic area in the period evaluated. this thematic area has 52 documents and 319 citations. the intellectual structure is composed mainly by motor themes and basic and transversal themes in all periods evaluated (q1: 6 themes; q2: 4 themes; q3: 3 themes; q4: 6 themes). business intelligence (red area) is the second thematic area within the thematic evolution map. this thematic area has 24 documents and 127 citations. the intellectual structure is composed mainly of motor themes in all periods evaluated (q1: 6 themes; q2: 1 themes; q3: 2 themes; q4: 4 themes). strategic management (blue area) is the last representative thematic area within the thematic evolution map in terms of production. this thematic area has 16 documents and 39 citations. the intellectual structure is composed mainly of motor themes and highly developed and isolated themes (q1: 6 themes; q2: 6 themes; q3: 1 themes; q4: 1 themes). finally, business intelligence, competitive intelligence and strategic intelligence could be considered the most representative intelligence terms developed in jisib. it is important to highlight that other intelligence terms are also identified in the thematic areas and these support the growth of this research field and complement each other's development. 5. conclusions this research presents the first bibliometric analysis of the journal of intelligence studies in business (jisib). it covers 92 original research articles and it identifies the main themes and related research areas developed from 2011 to 2017. in bibliometric performance terms, the amount of literature covered by jisib shows a noticeable increase in the last years. this increase coincides with the growth of the research field in other knowledge areas, such as computer and information, business management, marketing and education. considering phenomena external to jisib but related to the concept of intelligence such as big data, smart industry and regional intelligence, it is expected that their use will be synergistic for the growth of this field of knowledge. another significant aspect of bibliometric analysis is the fact that the main authors in terms of production and citations are also referent in other knowledge fields. it reconfirms the growing interest around intelligence and its multiple approaches. based on the results of the bibliometric analysis, the main themes used in the jisib literature are the following: business intelligence, big data, competitive intelligence, information management, social network figure 10 strategic diagram for 2017. this figure sets out the research themes in four categories according to their relevance. these themes are related to intelligence within jisib for a specific period of time. the four categories are: themes included in quadrant q1 (motor themes), themes included in quadrant q2 (highly developed and isolated themes), themes included in quadrant q3 (emerging or declining themes) and themes included in quadrant q4 (basic and transversal themes). 19 analysis, innovation, technology intelligence, strategic intelligence and intelligence maturity models. furthermore, the jisib evolution map reveals that it has two different main approaches. the first is about competitive intelligence (competitive intelligence system, knowledge management, competitive advantage, innovation, knowledge strategy, organizational change, decision making and strategic planning) and the second is close to business intelligence (reporting and visualization technologies, software evolution, security issues, data warehouse, data management, analytics, cloud computing, olap, processing, architectures, algorithms and web 2.0). finally, it is important to highlight that this analysis allows for the identification of common themes that can be used to reach the research lines related to jisib's aim and objectives. in this way, the following themes could attract the interest of the academic, scientific and business communities: social media and networks, internet, artificial intelligence, machine learning, open innovation and collaborative intelligence. in addition, these research lines should be focused on all kind of organization, particularly small and medium-sized enterprises, which by volume and capabilities can serve as a driving force for the consolidation of this area of knowledge. finally, it is important to highlight that the main research themes are aligned with jisib’s objectives and its community but these could not be confirmed as trends in the intelligence field study. a further research opportunity could be to compare the main research themes in the intelligence journals and intelligence literature. moreover, it could include a detailed analysis of the authors and research groups and their research themes. 6. acknowledgments the authors j. r. lópez-robles, n. k. gamboarosales and h. gamboa-rosales acknowledge the support by the conacyt-consejo nacional de ciencia y tecnología (mexico) and dgri-dirección general de relaciones exteriores (méxico) to carry out this study. 7. references batagelj, v., and cerinšek, m. (2013). on bibliographic networks. scientometrics, 96(3), 845-864. figure 11 jisib conceptual evolution map (2011-2017). this figure shows the pattern of development within the knowledge areas throughout the periods analyzed and the relationship between each research theme. furthermore, the characteristics of the line define the quality of the relation. in jisib, conceptual evolution can identify three kinds of main thematic areas: business intelligence, competitive intelligence and strategic intelligence. these thematic areas form the main themes and research areas covered in jisib. 20 bjork, b.-c., roos, a., and lauri, m. (2009). scientific journal publishing: yearly volume and open access availability. information research: an international electronic journal, 14(1). börner, k., chen, c., and boyack, k. w. (2003). visualizing knowledge domains. annual review of information science and technology, 37(1), 179-255. calof, j., and dishman, p. (2007). competitive intelligence and the global sme. cheltenham: edward elgar publishing ltd. castellanos, o. f., and torres, l. m. (2010). technology intelligence: methods and capabilities for generation of knowledge and decision making. new york: ieee. cobo, m. j., lopez-herrera, a. g., herreraviedma, e., and herrera, f. (2011a). an approach for detecting, quantifying, and visualizing the evolution of a research field: a practical application to the fuzzy sets theory field. journal of informetrics, 5(1), 146-166. cobo, m. j., lopez-herrera, a. g., herreraviedma, e., and herrera, f. (2011b). science mapping software tools: review, analysis, and cooperative study among tools. journal of the american society for information science and technology, 62(7), 1382-1402. cobo, m. j., lopez-herrera, a. g., herreraviedma, e., and herrera, f. (2012). scimat: a new science mapping analysis software tool. journal of the american society for information science and technology, 63(8), 1609-1630. chang, h., gausemeier, j., ihmels, s., wenzelmann, c., and iaeng. (2007). technology intelligence with bibliometrics imecs 2007: international multiconference of engineers and computer scientists, vols i and ii (pp. 796-+). hong kong: int assoc engineers-iaeng. davenport, e., and cronin, b. (1994). competitive intelligence and social advantage. library trends, 43(2), 239-252. de' rossi, s. (2005). marketing intelligence system to forecast telecommunications competitive landscape. in a. zanasi (ed.), text mining and its applications to intelligence, crm and knowledge management (vol. 2, pp. 219-225). southampton: wit press/computational mechanics publications. de coster, r., phillips, s., szopa, a., karwowski, w., and depablos, p. o. (2013). technology intelligence systems in industry and academic networks. hersey: igi global. de la flor-martinez, m., galindo-moreno, p., sanchez-fernandez, e., piattelli, a., cobo, m. j., and herrera-viedma, e. (2016). h-classic: a new method to identify classic articles in implant dentistry, periodontics, and oral surgery. clinical oral implants research, 27(10), 1317-1330. devouard, f. (2011). collective intelligence and business enterprise 2.0. lausanne: epfl press. dewatripont, m., ginsburgh, v., legros, p., walckiers, a., devroey, j.-p., dujardin, m., ivaldi, m. (2006). study on the economic and technical evolution of the scientific publication markets in europe. du toit, a. s. a. (2003). competitive intelligence in the knowledge economy: what is in it for south african manufacturing enterprises? international journal of information management, 23(2), 111-120. du toit, a. s. a., and sewdass, n. (2014). competitive intelligence (ci) in morocco. african journal of library archives and information science, 24(1), 3-13. du toit, a. s. a. (2015). competitive intelligence research: an investigation of trends in the literature. journal of intelligence studies in business, 5(2), 14-21. gilad, b., and gilad, t. (1985). a systemsapproach to business intelligence. business horizons, 28(5), 65-70. gutiérrez-salcedo, m., martínez, m. a., moralmunoz, j. a., herrera-viedma, e., and cobo, m. j. (2017). some bibliometric procedures for analyzing and evaluating research fields. applied intelligence, 1-13. hirsch, j. e. (2005). an index to quantify an individual's scientific research output. proceedings of the national academy of sciences of the united states of america, 102(46), 16569. james, d. (2014). 3d ics in the real world 2014 25th annual semi advanced semiconductor manufacturing conference (pp. 113-119). new york: ieee. kelley, w. t. (1965). marketing intelligence for top management. journal of marketing, 29(4), 19-24. 21 larivet, s. (2009). economic intelligence in small and medium businesses in france: a survey. vasteras-eskilstina: malardalen univ sweden. luhn, h. p. (1958). a business intelligence system. ibm journal of research and development, 2(4), 314-319. maltz, e., and kohli, a. k. (1996). market intelligence dissemination across functional boundaries. journal of marketing research, 33(1), 47-61. martínez, m. a., herrera, m., lópez-gijón, j., and herrera-viedma, e. (2014). h-classics: characterizing the concept of citation classics through h-index. scientometrics, 98(3), 19711983. mccormick, k., creeth, r., mutchler, s., azevedo, a., and santos, m. f. (2015). 3rd order analytics demand planning: a collaboration of bi and predictive analytics tools. hersey: igi global. menychtas, a., vogel, j., giessmann, a., gatzioura, a., gomez, s. g., moulos, v., varvarigou, t. (2014). 4caast marketplace: an advanced business environment for trading cloud services. future generation computer systems-the international journal of grid computing and escience, 41, 104-120. moral-munoz, j. a., cobo, m. j., chiclana, f., collop, a., and herrera-viedma, e. (2016). analyzing highly cited papers in intelligent transportation systems. ieee transactions on intelligent transportation systems, 17(4), 993-1001. mortara, l., kerr, c. i. v., phaal, r., and probert, d. r. (2009). technology intelligence practice in uk technology-based companies. international journal of technology management, 48(1), 115-135. navarro-garcia, a., peris-oritz, m., and barrerabarrera, r. (2016). market intelligence effect on perceived psychic distance, strategic behaviours and export performance in industrial smes. journal of business & industrial marketing, 31(3), 365-380. perrine, s. (2004). economic intelligence: how to process useful information? orlando: int inst informatics & systemics. prescott, j. e., and gibbons, p. t. (1993). global competitive intelligence: an overview. global perspectives on competitive intelligence. alexandria, va: society of competitive intelligence professionals, 66. prescott, j. e., and bharadwaj, g. (1995). competitive intelligence practices: a survey. competitive intelligence review, 6 (2), pp. 414. seiglie, c., coissard, s., and echinard, y. (2008). economic intelligence and national security. in j. fontanel and m. chatterji (eds.), war, peace and security (vol. 6, pp. 235-248). bingley: emerald group publishing limited. sheremetov, l., and rocha-mier, l. (2004). collective intelligence as a framework for supply chain management. new york: ieee. shimbel, a. (1975). collective intelligence. general systems, 20, 205-208. smith, a. h. (1953). economic intelligence work in a bank. journal of documentation, 9(1), 4247. søilen, k. s. (2013). an overview of articles on competitive intelligence in jcim and cir. journal of intelligence studies in business, 3(1). søilen, k.s. (2015) a place for intelligence studies as a scientific discipline. journal of intelligence studies in business. vol 5, no 3. pages 35-46. søilen, k.s. (2016) a research agenda for intelligence studies in business. journal of intelligence studies in business. vol 6, no 1. pages 21-36. søilen, k. s. (2017). business intelligence, big data and theory. journal of intelligence studies in business, 7(1), 4-4. tuta, m., zara, i. a., orzan, g., purcarea, v. l., and orzan, o. a. (2014). competitive intelligence an enhancement to business intelligence. economic computation and economic cybernetics studies and research, 48(2), 151-161. wang, j. (2013). citation time window choice for research impact evaluation. scientometrics, 94(3), 851-872. zhou, f., and lai, k. k. (2009). marketing intelligence on customer experiential values: an structural equation model approach. los alamitos: ieee computer soc. vol6no3paper3 capatina et al to cite this article: capatina a., bleoju, g., yamazaki, k. and nistor, r. (2016) cross-cultural strategic intelligence solutions for leveraging open innovation opportunities. journal of intelligence studies in business. 6 (3) 27-38. article url: https://ojs.hh.se/index.php/jisib/article/view/177 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index cross-cultural strategic intelligence solutions for leveraging open innovation opportunities alexandru capatinaa*, gianita bleojua, kiyohiro yamazakib and rozalia nistora adunarea de jos university of galati, romania; bchukyo university, nagoya, japan; *acapatana@ugal.ro journal of intelligence studies in business please scroll down for article cross-cultural strategic intelligence solutions for leveraging open innovation opportunities alexandru capatinaa*, gianita bleojua, kiyohiro yamazakib and rozalia nistora adunarea de jos university of galati, romania; bchukyo university, nagoya, japan *corresponding author: acapatana@ugal.ro received 26 october 2016; accepted 25 november 2016 abstract although the concept of open innovation has become widely discussed by scholars and practitioners, few cross-cultural studies focus on the assessment of companies’ behaviours towards “not invented here” and “not sold here” syndromes. the purpose of this paper is to investigate the profiles of japanese and romanian companies operating in two fields, it and manufacturing, from the open innovation perspective. the goal of this study is therefore to provide comprehensive empirical evidence for the adoption of inbound and outbound open innovation activities in the companies from these two target countries. data from a sample of japanese companies and romanian companies were used to test two hypotheses on open innovation behaviour, in the context of a cross-cultural comparative approach. the results show that technology isolationists are more frequently found among the romanian companies (especially in the manufacturing field), than the japanese companies, which can be explained by the fact that japanese firms are mainly based on leading innovative technologies, while romanian firms are early adopters of the advanced technologies, due to the economic circumstances. japanese companies included in the sample are defined as technology fountains, followed by technology brokers, proving their appetite for outbound open innovation. in this context, strategic intelligence solutions, once performed in collaborative culture environments, will lead to the improvement of the partners’ managerial competences and will act as enablers for competitive positioning, proving the added-value of the acquired know-how through open innovation practices. keywords disruptive intelligence, japan, open innovation, romania, strategic intelligence, technology brokers, technology fountains, technology isolationists, technology sponges 1. introduction cross-cultural strategic intelligence configuration, designed to enhance open innovation benefits, challenges managerial skills to reframe and upgrade rooted companies’ high tech patterns of cooperation, through refining drivers of associating cultural diversity and open innovation. furthermore, the cross cultural-open innovation hybrid approach requires efforts toward building new managerial capability to anchor specific coordination mechanisms, enabling the best matching of strategic intelligence configuration and high-tech partnership outcomes. this cross-cultural research is mainly focused on the assessment of the correlations between japanese and romanian companies’ profiles from an open innovation perspective and the field in which these companies are operating. the four clusters of firms, in the context of their involvement in innovationbased activities are represented by the technology isolationists (characterized by high levels of both “not invented here” and “not sold journal of intelligence studies in business vol. 6, no. 3 (2016) pp. 27-38 open access: freely available at: https://ojs.hh.se/ 28 here” syndromes), technology fountains (characterized by high levels of “not invented here” syndrome and low levels of “not sold here” syndrome), technology sponges (characterized by low levels of “not invented here” syndrome and high levels of “not sold here” syndrome) and technology brokers (characterized by low levels of both “not invented here” and “not sold here” syndromes) (lichtenthaler et al., 2011). the research question refers to the fact that the existence of correlations between the companies’ profiles (technology fountains, technology sponges, technology brokers and technology isolationists) and the field in which they are operating (it, manufacturing) depends on the target country to which they belong (japan and romania). erickson and rothberg (2013) suggest that decision-makers should be aware that a balance between knowledge sharing and protection is compulsory, giving particular attention to industry-by-industry conditions, demanding more or less protection when innovation is a high priority. as a result, they must be able to decide when to develop and share proprietary knowledge assets widely (outbound open innovation) and when not to (inbound open innovation). in their opinion, the propensity to outbound innovation increases the competitive intelligence risks. the open innovation’s approach by means of cross-cultural strategic intelligence allows the mutual adjustment of intra-firm managerial procedures, based on cultural differences harmonization and will enable collaborative learning based upon shared perspectives and lists of opportunities to target. the successful valorization of open innovation opportunities based upon cross-cultural strategic intelligence is setting new equilibria between short and long term firm interests. it allows superior understanding and early opportunities recognition/capturing and insures a better competitiveness differentiator for strategic behaviour profiling. the cross-cultural partnerships between japanese and romanian high-tech companies addresses the main issues of emergent markets’ scanning: finding the right answer to the strategic challenge (fighting or engaging in disruption) and preventing blind spots in gathering disruptive intelligence (vriens and søilen, 2014). this paper is organised as follows: in the first section, dedicated to the comparative analyses reflecting the features of open innovation within japan and romania, we highlighted the issues referring to the ways in which open innovation is perceived by the business environments from the two target countries; the second section is a description of our research methodology and tools; in the third section, we presented the main findings of the correlation study, using the facilities provided by spss software; in the last section, we presented the conclusions, the limitations of our study, its practical implications and the directions in the future research agenda. 2. theoretical background despite the interest in open innovation, a comprehensive review of academic publications in the area does not seem to exist (elmquist et al., 2009). open innovation describes an emergent model of innovation in which firms draw on research and development that may lie outside their own boundaries, revealing the fact that valuable ideas can come from inside or outside the company and can go to market from inside or outside the company as well (chesbrough et al., 2008). inbound open innovation refers to the internal use of external knowledge, while outbound open innovation refers to the external exploitation of internal knowledge. two practitioners in this field distinguish between three knowledge processes (knowledge exploration, retention, and exploitation) that can be performed either internally or externally (lichtenthaler, 2009). the main objectives pursued by open innovation strategies are the following: gaining access to new knowledge, multiplication of own technologies, learning from knowledge transfer, controlling technological trajectories, external exploitation as a core business model and exerting control over the market environment (kutvonen, 2011). the open innovation approach overcomes managerial difficulties to understand the dynamics of innovation, through balancing both disruptive and sustaining innovation (paap and katz, 2004). the open innovation approach is compatible with disruptive business-model behaviour, in the following circumstances (markides, 2006): when companies enter into a new market, where strong competitors have first-mover advantages and when they attempts to scale up an innovative product to make it attractive to the mass market. building upon cross-cultural and open innovation approaches, disruptive innovation emerges from a successful combination of 29 several smaller ideas based on observing the world differently (assink, 2006). the concept of open innovation embraces the strategic intent behind the use of both internal and external resources and is defined as the dynamic capability to manage technology both within and outside firms (suh and kim, 2012). the investigation of the reasons for which companies open up their innovation processes is a central issue in this field (huizingh, 2011). both offensive reasons (e.g., stimulating business development) and defensive ones (e.g., decreasing costs and risks) are emphasized. two empirical studies conducted in this way proved that offensive reasons were more important than defensive reasons (chesbrough and crowther, 2006; van de vrande et al., 2009). trends such as outsourcing, agility and flexibility had already forced companies to reconsider their strategies and processes in other areas and to become network organizations, which integrate open innovation into their business model (gassmann, 2006). a regularly updated technology focused-strategic intelligence process, which presents multiple technologies as options on a technology radar, leads to increased opportunity awareness of external high-potential technologies (veugelers et al., 2010). the future of intelligence studies in business continues to lie primarily with its symbiosis with new technology (søilen, 2016). the openness of the outside-in process in r&d management is of crucial importance for achieving high direct and indirect innovation output effects (inauen and schenker-wicki, 2011). from a strategic perspective, open innovation needs executive level commitment, as this is generally the most important obstacle that companies face in trying to adopt it (sloane, 2011). research undertaken in uk manufacturing firms reveals the lack of firms’ openness to their external environment, reflecting organizational myopia and indicating that managers may overemphasize internal sources and under emphasize external sources (keld and salter, 2006). the results of a survey undertaken in spain emphasizes that open innovators are smaller and less r&d intensive than semi-open ones, although larger and more r&d intensive than closed innovators (bargegil, 2010). another study developed in china has shown how firms' open innovation practices influence the national systems of innovation and how the policy-makers’ decisions can foster and speed up open innovation practices (wang and zhou, 2012). generally, open innovation doesn’t adversely affect competitive advantage, but the companies whose advantage is driven by barriers to entry, skills in innovation and anticipating customer needs, or that rely on proprietary product designs, can face difficulties in the long term (reed et al., 2012). the main findings of a survey focused on the measurement of open innovation outputs support the expectations that the ability to build inter-organizational relationships in a knowledge-rich environment increase the efficacy of inbound open innovation for gaining superior financial performance (sisodiya et al., 2013). moreover, open innovation activities strengthen the positive effects of dynamic innovation capabilities on disruptive innovation (cheng and chen, 2013). regarding innovation measurement, companies are still looking for adequate indicators that monitor the investments and the effects of open versus closed innovation approaches. in this way, there is interesting research that provides relevant answers as to how the adoption of open innovation practices is linked to financial performances of companies (michelino et al., 2014). 3. peculiarities of open innovation in the target countries involved in crosscultural research: japan and romania open innovation is in essence a cross-cultural phenomenon, involving dynamic processes of knowledge creation, diffusion and use (del giudice et al., 2012). innovative firms are more successful in international business, putting them into contact with alternative business cultures and open innovation contexts and making them more able to compete internationally (filippetti et al., 2011). the literature related to open innovation reveals minimal empirical evidence on cross-cultural surveys focused on the assessment of companies’ cultural profiles in the context of open innovation practices. a previous crosscultural survey developed in four countries (japan, romania, tunisia and turkey) emphasized the distribution of the companies’ profiles in four clusters (technology isolationists, technology fountains, technology sponges and technology brokers), but its main limitations refer to the significant gaps in the 30 distribution of companies on different sectors within the national samples and the lack of correlation tests between specific variables (yamazaki et al., 2012). according to christensen (2016, p .12), “in the period 1970-1980, japan was quite successful in generating disruptive and market-creating innovations. however, disruptive and market-creating innovations have been disappearing over the last 25 years, because the focus has changed from marketcreation to efficiency. the problem is not innovation but management style to support new ideas”. the open innovation approach in japanese firms is highly related to their capacity to incorporate promising disruptive technologies from inside and outside, in line with their program entitled impulsing paradigm change through disruptive technologies (impact). open innovation, characterized by using not only in-house but also external r&d resources (chesbrough, 2003), is perceived as a sustainable competitive advantage by the japanese companies. according to many opinions, japan’s system of innovation is mainly driven by large corporations, but external collaboration in r&d has been developed and promoted at a large scale in the last decade. capturing opportunities for managing internally, all r&d resources became a trend for japanese high-tech companies. the intelligent positioning of japanese high-tech firms resides on two pillars: searching for future growth potential through open innovation, and installing itself into new markets through globalization (motohashi, 2011). the innovation network corporation of japan (incj) insures a long-term partnership between the japanese government and major high-tech corporations. incj encourages open innovation, providing patterns for how to strategically move technology and expertise beyond the boundaries of existing organizational structures. one of the most important roles played by incj is to conduct targeted research in order to facilitate successful collaborative innovations in an open context (lippitz, 2012). the long-term cooperation between hightech firms is already specific and can be considered to be a pattern for japanese firms; smes became aware of the fact that technology plays an important role in their business models and they found solutions to support open innovation. making sense of contractual incompleteness, pertinent analyses related to japanese smes regarding open innovation, focuses on the real challenge to unambiguously deal with foreseeable contingences: whether open cooperation can be constructed, whether cooperation among organizations can be formed, who bears costs for constructing collaboration, and whether mutual trust can be formed (idota et al., 2012). a recent survey conducted in japan proposes and tests a model of innovation process management used to clarify the managerial strategies required to achieve it in japanese enterprises (ota et al., 2013). the authors found specific practices and capabilities that were statistically significant in japan's manufacturing companies. the importance of structured process in the japanese manufacturing sector was confirmed, comprising scanning, idea occurrence, strategy formulation, resource procurement, implementation and value creation. the results of a survey conducted on 180 european companies show that inbound open innovation is more commonly used than outbound open innovation, which can be explained by insufficiencies in the market or the organization, confirming its role as a complement for internal r&d (schroll and mild, 2011). the firms operating in emerging economies need not necessarily rely on entrepreneurial behaviour to sustain business growth, although involvement in open innovation may enhance business performance (chaston and scott, 2012). the emerging countries with weak capabilities, in both firms and national systems of innovation, have the opportunity to employ the open innovation approach in order to accelerate their technological learning and development (wang et al., 2012). in this context, the integration in the european union has changed the managerial mentalities within romanian companies, which previously assigned less importance to r&d activities. however, a significant lag between open innovation and technology transfer is still reminiscent in the romanian business culture (borcea and fuica, 2012). regarding the propensity of emerging economies to engage in successful crosscultural partnerships with developed countries, consistent evidence relies upon rethinking the core causality of making poorly stimulated innovation policy and fragile sme organizational capabilities. 31 re-contextualization should focus on understanding new causal factors, which best fit the socio-economic context and organizational capabilities, in order to overcome obvious technological gaps between developed countries versus emergent ones (karo and kattel, 2011). the performances related to romania's innovation system remains are smaller, when compared to other eu countries. positioned in a cohort of ‘catching–up’ countries, romania’s economic background is characterized by a positive economic trend, mainly based on low cost labour and low value-added exports; the big problem and challenge, at the same time, is represented by the low level of innovation infrastructure, at an early development stage. pro inno europe highlights that romanian innovative companies are less than a fifth of the country’s total number of active firms. the profile of a romanian innovative is the following: sme, operating in the software industry, in internet and new media. the low level of public funding for innovation (only 10% of innovative firms receive funding), correlates to very low levels of innovation expenditures (in most cases, they don't exceed 3% of innovative firms’ turnovers) explain the reality in romania’s innovative business landscape. although significant progress has been made in order to foster the weak innovation culture in the country, further measures are needed to increase the application of r&d results by business and to turn innovation into a driver of national competitiveness. a recent study focused on the perspectives of the romanian sme sector in the context of innovation and knowledge creation (purcarea et al., 2013). it emphasizes a learning orientation related to innovation, using best practices within the organization and networking with external partners as internal sources for learning, whereas in terms of external support for learning, smes consider changes that take place in the market, changes in technology and the input from experts and consultants. many romanian entrepreneurs, endowed with disruptive innovation potential, are not able to perform optimally, as there is a lack of access to relevant market information for attracting investment flows, which can finance their innovations. 4. research methodology in order to achieve the research goal, we designed and developed a questionnaire as the main research tool focused on data collection, in which 20 questions (items) were grouped in four categories, corresponding to the four types of open innovation cultures (figure 1). the five items focused on technology fountains reveal a low attractiveness for external technology sourcing and implicitly a high degree of independence of technology to different providers, associated with a high interest for commercialization strategy of the company’s internally developed technologies, without concern for losing control over them. the five items focused on technology sponges emphasize an improvement of the internal innovation process by means of acquiring technology from external sources as a result of strategic intelligence mechanisms, correlated with internal agreements which don’t allow the ip transfer to other companies. the five items focused on technology brokers reveal the situations in which companies proceed to external technology acquisitions in order to the improve the r&d process and internal technology selling in order to provide additional revenue. the five items focused on technology isolationists highlight the situations in which companies benefit from the technologies developed internally and retain full control of their intellectual property, preventing other organizations from making a profit from their technologies. figure 1 four clusters of companies’ profiles in the context of open innovation. adapted from lichtenthaler et al., 2011. we sent the questionnaire to a convenience sample formed of japanese and romanian companies from the fields of manufacturing and it. questionnaires were transferred to the selected participants through electronic mail system, including our commitment to respect the confidentiality and anonymity of the answers. each questionnaire’s results were 32 processed by means of an automatic coding scheme in spss software, in order to avoid data input errors. finally, 80 returned questionnaires per country were stored in a spss database, after eliminating the incomplete answers. the structure of the sample was the same in the two target countries: 40 companies from the manufacturing field, as well as 40 companies from the it field. consequently, two hypotheses were proposed to be tested by means of appropriate statistical methods. h1: in the case of japanese companies included in the sample, their profiles (technology fountains, technology sponges, technology brokers and technology isolationists) are positively related to the field in which they are operating (it or manufacturing). in this situation, the independent variable is represented by the japanese companies’ profiles, while the field in which these companies are operating reflects the dependent variable. h2: in the case of romanian companies included in the sample, their profiles (technology fountains, technology sponges, technology brokers and technology isolationists) are positively related to the field in which they are operating (it or manufacturing). in this situation, the independent variable is represented by the romanian companies’ profiles, while the field in which these companies are operating reflects the dependent variable. the statistical methods that we used in order to test the hypotheses are chi-square, pearson's r and spearman coefficients of correlation. the chi-square test is applied in order to determine whether there is a significant difference between the expected frequencies and the observed frequencies in one or more categories. the use of the chisquare test involves the design of two hypotheses: the null hypothesis states that there is no significant difference between the expected and observed frequencies, while the alternative hypothesis states they are different. the level of significance (the point at which we can say with 95% confidence that the difference is not due to chance alone) is set at 0.05. the pearson's r correlation coefficient is a useful descriptor of the degree of linear association between two variables, having two key properties of magnitude and direction. when it is near zero, there is no correlation, but as it exceeds -0.1 or 0.1 there is a negative or positive relationship, respectively, between the variables; if they are close to 1 or +1, there is a strong negative or positive relationship between the variables. the sign of the spearman correlation coefficient indicates the direction of association between the independent variable and the dependent variable. if the dependent variable tends to increase when the independent variable increases, the spearman correlation coefficient is positive; otherwise, the spearman correlation coefficient is negative. a spearman correlation coefficient near zero indicates that there is no tendency for the dependent variable to either increase or decrease when the independent variable increases. 5. findings and discussions the use of the descriptive statistics methods, on the one hand, and the illustration of the indepth analyses of the research results, on the other hand, involved the distribution of the respondents’ answers in two contingency tables, reflecting the correlations between companies’ profiles and the fields where they operate, in the case of each target country. the distribution of research results corresponding to the first hypothesis involved the design of a contingency table with double entry, which allows the classification of the observed frequencies (table 1). table 1 contingency table associated with the first hypothesis test (h1). cross-tabulation results field total it manufacturing japanese companies’ profiles technology fountain 11 16 27 technology sponge 10 6 16 technology broker 15 9 24 technology isolationist 4 9 13 total 40 40 80 33 table 2 first hypothesis tested by the chi-squared method. indicator value degrees of freedom asymptotic significance pearson chi-square 5.349 3 0.148 likelihood ratio 5.432 3 0.143 linear-by-linear association 0.010 1 0.919 number of valid cases 80 table 3 first hypothesis test by means of pearson’s r and spearman correlation coefficients. a not assuming the null hypothesis, b using the asymptotic standard error assuming the null hypothesis, c based on normal approximation. int = interval, ord = ordinal. symmetric measures value asymptotic std. error a approx. tb approx. sig. c int. by int. pearson’s r -0.011 0.112 -0.101 0.920 ord. by ord. spearman correlation -0.020 0.114 -0.174 0.862 number of valid cases 80 table 4 contingency table associated with the second hypothesis test (h2). cross-tabulation results field total it manufacturing romanian companies’ profiles technology fountain 7 6 13 technology sponge 11 12 23 technology broker 16 5 21 technology isolationist 6 17 23 total 40 40 80 as we can observe from table 1, the majority of the japanese companies included in the sample are identified as technology fountains, followed by technology brokers, proving other empirical findings which emphasize the adoption at a large scale of open innovation in japanese high-tech companies. by taking into consideration the field in which these companies are operating, we can observe that technology fountains and technology isolationists are more common in manufacturing, while technology sponges and technology brokers are more common in the it field. we can state that the results are relevant to the reality of the japanese economy, in the context in which all the players from the business environment are aware of the opportunities to boost technology, in order to promote open innovation. the systematic approach of open innovation led japanese companies to gain permanently sustainable advantages, being able to successfully expand internationally. the results correspond to the test of the first hypothesis. the results of the cross-tabulation process using the respondents’ answers stored in the spss database are revealed in tables 2 and 3. in this case, the value associated to the asymptotic significance (0.148) is higher than the level of significance (0.05) and the pearson chi-square value (5.349) is lower than the chisquared value corresponding to the statistics table (7.82), with three degrees of freedom; consequently, the hypothesis is rejected, so the profiles of the japanese companies included in the sample are not influenced by the field in which they are operating (it or manufacturing). table 5 second hypothesis evaluated by means of a chi-squared test. indicator value degrees of freedom asymptotic significance pearson’s chi-square 11.143 3 0.011 likelihood ratio 11.662 3 0.009 linear-by-linear association 1.588 1 0.208 number of valid cases 80 table 6 first hypothesis test by means of pearson’s r and spearman correlation coefficients. int = interval, ord = ordinal. symmetric measures value asymptotic std. error approx. t approx. sig. int. by int. pearson’s r 0.142 0.110 1.265 0.210 ord. by ord. spearman correlation 0.146 0.113 1.303 0.197 number of valid cases 80 the results of the first hypothesis test process are also validated by pearson’s r and spearman correlation coefficients (table 3), because their values (-0.011, respectively 0.020) are negative, but situated near zero, emphasizing the lack of correlation between the independent variable (japanese companies’ profiles) and dependent variable (the field in which the companies are operating). we view the pearson's r and spearman correlation coefficients as useful descriptors of the degree of linear association between the variables related to the research conceptual model, as they revealed the lack of correlation between the variables. the distribution of research results corresponding to the second hypothesis involved the design of a new contingency table with double entry, which allows the classification of the observed frequencies (table 4). the in-depth analysis of the research results outlines the fact that, in the case of the romanian companies included in the sample, their profiles correspond mostly to technology sponges and technology isolationists, unlike the companies from japan, focused to a great extent to the other two profiles. moreover, we can observe high discrepancies in what concerns the distribution of the companies’ profiles in the technology broker and technology isolationists clusters; in the first case, the majority of firms belong to the it field, while in the second case, the majority of firms belong to the manufacturing field. these findings can be explained by taking into consideration the fast development of the romanian it and software services industry, as a result of open innovation adoption; in the situation of romanian manufacturers, we still perceive a resistance towards open innovation, reflected in a high number of technology isolationists, which can be associated with a reduced appetite for risk. the results corresponding to the test of the second hypothesis, after the configuration of the cross-tabulation process using the respondents’ answers stored in the spss database, are shown in tables 5 and 6. in this particular situation, the value of the asymptotic significance (0.011) is lower than the level of significance (0.05) and the pearson’s chi-squared value (11.143) is higher than the chi-squared value corresponding to the statistics table (7.82), with three degrees of freedom; the hypothesis is accepted, so the profiles of the romanian companies from an open innovation perspective are positively related to the field in which they are operating (it or manufacturing). the results of the second hypothesis test process are also validated by pearson’s r and spearman correlation coefficients (table 6), because their values (0.142 and 0.146, 35 respectively) are positive, emphasizing the fact that the dependent variable (the field in which the romanian companies are operating) tends to increase when the independent variable increases (the number of romanian companies’ profiles in a certain cluster). another assumption is that there is a monotonic relationship between the independent and dependent variables, determined by the existence of relevant gaps in the distribution of romanian companies’ profiles in the technology broker and technology isolationist clusters, as well as minimal differences in the case of the other two clusters. 6. conclusions, managerial implications and future research agenda tracking high tech innovation partnerships’ practices of cross-cultural collaboration, while being aware of open innovation opportunities for capture, it’s compelling to assume causally contrasting elements are challenging for setting the leveraging role of coming strategic intelligence configurations. nevertheless, the current research efforts to test theory building in searching for pertinent constructs to validate the above hybrid approach, are upgrading previous coherent relevant insights, exploring partnership coordination mechanisms—capable of overcoming cultural dissonance—while capitalizing upon open innovation opportunities. as main challenge is culturally specific, we assert that strategic intelligence solutions—as part of managerial communalities—should be designed and deployed through the hybrid organization’s internal environment adjustment, focus on cooperation perspective and not on “fixing the gaps” perspective, which is more consistent with open innovation principles. we understand that by managerial communality the cross-cultural coordination mechanism (agreed between partners)—which is considered a strategic intelligence solution— can take advantage of the cultural differences, as opposed to minimizing the gap. the above considerations also support that open innovation approach is matching the emergent new managerial models, such as “harmocracy.” the principles of both of these are common. the educated collaborative practices are evolving toward enlightened management, capable of channeling the valorisation of open innovation opportunities through a communion of scope strategy, expectations, strategic scope and results. the results provided by the hypothesis analyses are representative of the development stages of the two target countries. japan is one of the highly developed countries, while romania is still in transition towards a competitive economy. moreover, they are coherent with the actual stage of the global economy, affected by the effects of the financial and economic crisis (with important consequences in the field of business efficiency, operating cost cuts and revenue increases). thus, from an innovation perspective, both countries are characterized by appreciatively similar distributions of the companies from the research sample in the “technology brokers” cluster. this is proof that the financial and economic crisis forced companies, regardless of their country, to reduce operating costs (with the adoption of innovative technologies being a solution) and to increase revenue regardless of their nature. in romania, the companies from the it field are more aware of the benefits of open innovation than the companies from manufacturing, as they are part of an industry less affected by the crisis. a significant number of companies included in the technology sponges cluster can be found in both target countries (approx. 20% from the japanese sample and 29% from the romanian sample). the fields in which the companies act is not relevant for the behaviour in these countries, as there are firms with important financial resources which don’t pay attention on the short term to the opportunities related to revenues increases. only the evolution of the macroeconomic factors will or will not support such a behaviour. the situation of the companies included in the final two clusters, technology fountains and technology isolationists, is the opposite. in japan, fountain-type behaviour is more diffuse, being characteristic of a developed economy based on leading technologies. in romania, there are more isolationists, especially in the manufacturing field, as a consequence of the fact that gathering competitive advantages is possible only by means of an isolationist behaviour regarding selling or acquiring advanced technologies. the cross-cultural partnerships between japanese and romanian companies should be built upon two pillars: transfer of disruptive technologies in an open innovation context and romanian high-tech companies’ capability to learn from japanese high-tech companies’ 36 knowledge and anticipative capability. anchoring disruptive intelligence in a crosscultural context enlightens strategic trajectories towards opportunities to create entirely new markets. the first vulnerability to highlight is the level of accuracy in terms of predictability in the case of an obvious gap in the development stage model of the country and open innovation profiling behaviour. a better differentiator could be identified by setting output variables of open innovation to: the number of patents of each sector, intra-sectorial synergies, and the span and degree of globalization captured opportunities of each sector, for example. a qualitative approach of crisis consequences must be performed. in this way, we advance the hypothesis that open innovation and cost shrinking correlation is debatable, as it is obvious that open innovation becomes the solution for emergence from the economic crisis. we are also aware that open innovation is generating high transaction costs and it is requiring specific managerial coordination and limited transferable organizational practices: it is emerging in a new generation of managerial models, with more appropriate practices, which insure the alignment of open innovation opportunities with strategic behaviour profiling. it is hard to imagine how it will change the behaviours of the it and manufacturing firms from these two countries towards innovation. if short-term change is predictable, as our research reflects, on the long term the behaviour of these companies will face factors such as advancements in it evolution as well as the development of the economies of the two countries. due to these issues, a longitudinal research project will be conducted after two to three years in order to verify the pertinence of the hypotheses tested above. at this point, we will be available to assess other types of behaviour towards innovation, which weren’t emphasized and formalized in this research. we encourage future cross-cultural research in order to investigate more deeply the links between open innovation practices in different countries. in particular, we will try to build a collaborative research network by addressing invitations to researchers interested in approaching this topic to attend a crosscultural survey. empirical, comparative and co-relational analyses of behaviours towards open innovation in various countries could be one way of discovering which open innovation practices influence the national systems of innovation. 7. references assink, m. (2006). inhibitors of disruptive innovation capability: a conceptual model. european journal of innovation management, 9(2), 215-233. barge-gil, a. (2010). open, semi-open and closed innovators: towards an explanation of degree of openness. industry and innovation, 17(6), 577-607. borcea, a., & fuica, r. (2012). does romania have a chance to join the innovation driven economy?. entrepreneurship-gender, geographies and social context. chaston, i., & scott, g. j. (2012). entrepreneurship and open innovation in an emerging economy. management decision, 50(7), 1161-1177. cheng, c. c., & chen, j. s. (2013). breakthrough innovation: the roles of dynamic innovation capabilities and open innovation activities. journal of business & industrial marketing, 28(5), 444-454. chesbrough, h. w. (2006). open innovation: the new imperative for creating and profiting from technology. harvard business press. chesbrough, h., & crowther, a. k. (2006). beyond high tech: early adopters of open innovation in other industries. r&d management, 36(3), 229-236. christensen c., m. (2016), in: innovation 100 committee report, who is responsible for creating innovation in companies? http://www.meti.go.jp/english/press/2016/pdf/ 0226_03b.pdf del giudice, m., carayannis, e. g., & della peruta, m. r. (2011). cross-cultural knowledge management: fostering innovation and collaboration inside the multicultural enterprise (vol. 11). springer science & business media. elmquist, m., fredberg, t., & ollila, s. (2009). exploring the field of open innovation. european journal of innovation management, 12(3), 326-345. erickson, g. s., & rothberg, h. n. (2013, january). competitive intelligence threats and innovation environments. in ispim conference proceedings. the international society for professional innovation management (ispim). filippetti, a., frenz, m., & ietto-gillies, g. (2011). are innovation and internationalization related? an analysis of european countries. industry and innovation, 18(5), 437-459. 37 gassmann, o. (2006). opening up the innovation process: towards an agenda. r&d management, 36(3), 223-228. hoegl, m., lichtenthaler, u., & muethel, m. (2011). is your company ready for open innovation?. mit sloan management review, 53(1), 45. huizingh, e. k. (2011). open innovation: state of the art and future perspectives. technovation, 31(1), 2-9. idota, h., bunno, t., & tsuji, m. (2012). open innovation strategy of japanese smes: from viewpoint of ict use and innovative technology. international telecommunications society (its). inauen, m., & schenker-wicki, a. (2011). the impact of outside-in open innovation on innovation performance. european journal of innovation management, 14(4), 496-520. karo, e., & kattel, r. (2011). should “open innovation” change innovation policy thinking in catching-up economies? considerations for policy analyses. innovation: the european journal of social science research, 24(1-2), 173-198. kutvonen, a. (2011). strategic application of outbound open innovation.european journal of innovation management, 14(4), 460-474. laursen, k., & salter, a. (2006). open for innovation: the role of openness in explaining innovation performance among uk manufacturing firms. strategic management journal, 27(2), 131-150. lichtenthaler, u., & lichtenthaler, e. (2009). a capability-based framework for open innovation: complementing absorptive capacity. journal of management studies, 46(8), 1315-1338. lippitz, m. (2012). exploring the innovation network corporation of japan (incj). innovation excellence, 14. markides, c. (2006). disruptive innovation: in need of better theory. journal of product innovation management, 23(1), 19-25. michelino, f., caputo, m., cammarano, a., & lamberti, e. (2014). inbound and outbound open innovation: organization and performances. journal of technology management & innovation, 9(3), 65-82. motohashi, k. (2011). innovation policy challenges for japan-an open and global strategy. asie. visions, 45. ota, m., hazama, y., & samson, d. (2013). japanese innovation processes.international journal of operations & production management, 33(3), 275-295. paap, j., & katz, r. (2004). anticipating disruptive innovation. research-technology management, 47(5), 13-22. purcarea, i., del mar benavides espinosa, m., & apetrei, a. (2013). innovation and knowledge creation: perspectives on the smes sector. management decision, 51(5), 10961107. reed, r., storrud-barnes, s., & jessup, l. (2012). how open innovation affects the drivers of competitive advantage: trading the benefits of ip creation and ownership for free invention. management decision, 50(1), 5873. schroll, a., & mild, a. (2011). open innovation modes and the role of internal r&d: an empirical study on open innovation adoption in europe. european journal of innovation management, 14(4), 475-495. sisodiya, s. r., johnson, j. l., & grégoire, y. (2013). inbound open innovation for enhanced performance: enablers and opportunities. industrial marketing management, 42(5), 836-849. sloane, p. (2011). the brave new world of open innovation. strategic direction,27(5), 3-4. søilen, k. s. (2016). a research agenda for intelligence studies in business. journal of intelligence studies in business, 6(1), 21-36. suh, y., & kim, m. s. (2012). effects of sme collaboration on r&d in the service sector in open innovation. innovation, 14(3), 349-362. van de vrande, v., de jong, j. p., vanhaverbeke, w., & de rochemont, m. (2009). open innovation in smes: trends, motives and management challenges. technovation, 29(6), 423-437. vanhaverbeke, w., chesbrough, h. w., & west, j. (eds.). (2008). open innovation: researching a new paradigm. oxford university press. veugelers, m., bury, j., & viaene, s. (2010). linking technology intelligence to open innovation. technological forecasting and social change, 77(2), 335-343. vriens, d., & søilen, k. s. (2014). disruptive intelligence-how to gather information to deal with disruptive innovations. journal of intelligence studies in business, 4(3). wang, y., & zhou, z. (2012). can open innovation approach be applied by latecomer firms in emerging countries?. journal of knowledgebased innovation in china, 4(3), 163-173. wang, y., vanhaverbeke, w., & roijakkers, n. (2012). exploring the impact of open innovation on national systems of innovation—a theoretical analysis. technological forecasting and social change, 79(3), 419-428. yamazaki, k., capatina, a., bouzaabia, r., & kocoglu, i. (2012). cross-cultural issues related to open innovation in high-tech companies from japan, romania, tunisia and 38 turkey. review of international comparative management, 13(4), 561-573. vol8no1paper1fourati-jamoussi_etal to cite this article: fourati-jamoussi, f., niamba, c.n. and duquennoy, j. (2018) an e va lu a tion o f com pe titi ve an d te chn o lo gica l in te lligen ce too ls: a clu ster an a lysis of users’ perceptions. journal of intelligence studies in business. 8 (1) 5-15. article url: https://ojs.hh.se/index.php/jisib/article/view /282 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index an evaluation of competitive and technological i n t e l li g e n c e t o o l s : a c l u s t e r a n a l ys i s o f u s e r s ’ p e r c e p t i o n s fatma fourati-jamoussia*, claude-narcisse niambaa and julien duquennoya ainteract research unit up 2018.c102, unilasalle, beauvais montsaint-aignan, france; *fatma.fourati@unilasalle.fr journal of intelligence studies in business please scroll down for article an evaluation of competitive and technological intelligence tools: a cluster analysis of users’ perceptions fatma fourati-jamoussia*, claude-narcisse niambaa and julien duquennoya a interact research unit up 2018.c102, unilasalle, beauvais mont-saint-aignan, france corresponding author (*): fatma.fourati@unilasalle.fr accepted 17 march 2018 abstract the purpose of this article is to discuss and evaluate the use of competitive and technological intelligence (cti) tools by students to help designers of these tools get the best efficiency out of a monitoring process. this article introduces an application of the cluster analysis method and the competitive and technological intelligence literature. in order to evaluate the use of cti tools, we deal with two evaluation models: task-technology fit (ttf) and the technology acceptance model (tam). a survey was sent to users of cti tools addressed to engineering students and the most pertinent replies were examined. the responses were analyzed by using the statistical software spad. results showed a typology from the various profiles of users of this technology by using the method of classification. we note different perceptions between student users. although this study remains focused on the individual perspective, it requires more examination about the organizational impact of the use of cti tools. the identification of the different user profiles was done by using a cluster analysis. for the designers of cti tools these results highlight the importance of user perception, suggesting designers take into account the perception of all user types. as these tools develop, more and more companies will be looking for skills of future engineers for monitoring and management of strategic information. that’s why practical courses in cti are taught to the students in order to take into account the companies’ needs. keywords competitive and technological intelligence, cluster analysis, ttf model, tam model, user perception 1. introduction generation y students need to understand why we use information gathering tools and how these tools have evolved since their emergence. what sense can be given to the quality of information found on the web? are they able to judge the quality of the monitoring tools used and the information found? what do they need today in an engineering school? these questions prompted us to think about teaching a module entitled economic and strategic intelligence at unilasalle where we present the tools of competitive intelligence, technological intelligence, marketing intelligence and e-reputation (fouratijamoussi, 2015). we have applied these types of surveillance (french veille) to a problem related to the fields of study of our students. we have three specialties in engineering training: agriculture, food and health and geology. our approach seeks to answer two key research questions: 1. how can engineering students make a choice between different monitoring tools to collect, process and disseminate information? journal of intelligence studies in business vol. 8, no. 1 (2018) pp. 5-15 open access: freely available at: https://ojs.hh.se/ 6 2. what are the different perceptions between students using monitoring tools? to answer these questions, we propose in the second section the conceptual background about some cluster analysis applications, cluster analysis methodology, cluster analysis with spad and we define the two processes of “competitive intelligence” and “technological intelligence”. in a third section, we propose the approach of our study and the research method. in the fourth section, we present our results on the monitoring tools developed within unilasalle and cluster users’ perceptions of these tools. conclusions are drawn in the fifth section. 2. conceptual background 2.1 cluster analysis applications anderberg (1973, 2014) presented all various applications of cluster analysis, the topics covered from variables and scales to measures of association among variables and data units. he discussed the conceptual problems in cluster analysis and presented many major areas of application. these are: “the life sciences: the object of the analysis method is to develop complete taxonomies to delimit the subspecies of a distinct but varied species (for example, plants or animals); the medical sciences: the cluster may be a disease, patient (or their disease profiles) and laboratory tests; the behavioral and social sciences: the objects of analysis covered training method, factors of human performance, organizations, students, courses in school, teaching methodologies or techniques. factor analysis is a competitor to cluster analysis in these applications. the earth sciences: the object of these applications is to soils, countries, or regions of the world; the engineering sciences: the application has been relatively unused in this field. the information, policy and decision sciences: the applications to documents, the political units, products, markets, sales, programs, research and development projects.” (p. 5-6) a cluster analysis is considered to be a tool of classification, most frequently used in marketing research (punj and stewart, 1983). 2.2 cluster analysis methodology “cluster analysis is the art of findings groups in data” (p. 1), the classification of similar objects or perceptions into groups is an important human activity (kaufman and rousseeuw, 2009). berkhin (2006) defined clustering as a division of data into groups of similar objects, it is related to many disciplines and plays an important role in a broad range of applications that deal with large database with many attributes. clustering must not be confused with classification. in clustering, we must first develop a quantitative scale on which to measure the similarity between objects and secondly an algorithm for sorting objects into groups (johnson and wichern, 1998). in classification, we first separate a known number of groups and then assign new observations to one of these group according to the measurements. to carry out a cluster analysis, a wide variety of clustering algorithms is available: hierarchical techniques and nonhierarchical techniques. “hierarchical clustering techniques proceed by either a series of successive mergers (agglomerative hierarchical methods) or a series of successive divisions (divisive hierarchical methods). agglomerative hierarchical methods start with the individual objects. thus, there are initially as many clusters as objects. the most similar objects are first grouped, and these initial groups are merged according to their similarities. divisive hierarchical methods work in the opposite direction. an initial single group of objects is divided into subgroups such that the objects in one subgroup are ‘far from’ the objects in the other. these subgroups are then further divided into similar subgroups; the process continues until there are many subgroups as objects – that is, until each object forms a group” (johnson and wichern, 1998). 7 “the results of both agglomerative and divisive methods may be displayed in the form of a two-dimensional diagram known as a dendrogram. the dendrogram illustrates the mergers or divisions that have been made at successive level and looks like a tree” (johnson and wichern, 1998). this is why it’s sometimes called the “hierarchical tree”. “nonhierarchical clustering techniques are design to group items into a collection of 𝑘 clusters. the number of clusters, 𝑘, is specified before starting the clustering procedure. however, hierarchical clustering techniques are the most popular. in the following sections, we will deal with one particular agglomerative hierarchical procedure, say the ward’s hierarchical clustering method. in this method, a variance criterion is used to decide on which individuals or which clusters should be fused at each stage in the procedure. to implement this method, it’s necessary to find, at each step, the pair of individuals or clusters that leads to a minimum decrease in total between-cluster variance after merging. in other words, two items whose merging results in the smallest decrease in between-cluster variance are joined. the results of ward’s method can be displayed as a dendrogram which is often used to identify the best groups of clusters: those in which the between-cluster variance is high whereas the within-cluster variance is low. the vertical axis of the dendrogram gives the values of the between-cluster variance decrease at which the mergers occur” (johnson and wichern, 1998). beyond the identification of the best groups of clusters, it is important to know how the clusters could be described, in other words which variables are concerned by the observed similarities (johnson and wichern, 1998). 2.3 cluster analysis with spad v.8 spad is a useful statistical software used to deal with multivariate data analysis techniques such as hierarchical clustering. an exploratory factor analysis (principal component analysis or multiple correspondence analysis) is always conducted prior to a cluster analysis. the aim is to extract the meaningful dimensions in the dataset and then describe the objects that will be classified into groups by using the dimensions, which are also called factors. in fact, there are two types of attributes involved in the data to be clustered: metric and nonmetric. if the data are metric then a principal component analysis is used, if not, a multiple correspondence analysis is used. spad offers the opportunity to reduce the dimensions in the data and then use the scores from the suitable exploratory factor analysis to perform the ward’s hierarchical clustering method. after performing the clustering, the analyst is involved in two main steps: step 1: choosing the best groupings of individuals by using a visual cutting of the dendrogram. the “branches” of the dendrogram are cut with horizontal lines where the consecutive nodes are distant. in other words, the dendrogram is cut where its branches are very long. it’s good to have an idea of the best groupings even if those groupings are not necessarily stable. in practice, there are two or three possible cuttings. it is up to the user to choose one of them. step 2: description of the clusters from a chosen grouping. the significant variables are used to characterize the individuals from each cluster. that description is done when the groupings are “consolidated”. for instance, each individual is assigned to the cluster whose centroid is nearest (johnson and wichern, 1998). spad also offers the opportunity to work with a hybrid clustering technique when the size of the dataset, especially the number of individuals, is very important (more than several thousand individuals). a nonhierarchical clustering technique, such as the “𝐾-means” technique (everitt, 1998), is applied to the dataset prior to the hierarchical clustering technique. 2.4 the process of competitive and technological intelligence “competitive intelligence” (jakobiak, 1998; herring, 1998; kahaner, 1998; ruach and santi, 2001) is regarded as a specialized branch 8 of “business intelligence” (giald and giald, 1988; sakys and butleris, 2011). solberg soilen (2015) proposed the classification of intelligence studies to help place different forms of intelligence and show how they related to each other. the first concept aims to collect and analyze data on specific and generic competitive environments, it is also defined by bel hadj et al. (2016) as “a voluntary process whereby a company can begin to scan and absorb information from its socioeconomic environment in order to minimize the risks associated with the uncertainty and locate available opportunities” (pateyron, 1998). while the second focuses on the current competitors and can analyze areas such as potential acquisitions-mergers and evaluate specific country risks (lesca and caron fasan, 2006). bel hadj et al. (2016) highlighted the literature that examines competitive intelligence in relation to its integration with company strategy (porter, 1999), knowledge management (jacob and patriat, 2002), collective learning and cooperation (salles, 2006), business opportunities (marmuse, 1996) and entrepreneurial orientation (bel hadj et al., 2014). du toit (2015) listed the terms and the number of articles selected for the period between 1995 and 2014 to show the evolution of terms using the database abi/inform: competitive intelligence (75%), business intelligence (13%), marketing intelligence (8%), strategic intelligence (1%), technological intelligence (1%) and competitor intelligence (1%). he showed also the main journals that published a high percentage of competitive intelligence articles and only two journals: journal of intelligence studies in business and marketing intelligence & planning that focused exclusively on the publication of intelligence types. competitive intelligence serves to identify, monitor competitors and decrypt their strategy. technological intelligence is to follow a technical and scientific domain in time and to monitor developments (www.ie.bercy.gouv.fr). salvador et al. (2014) presented a patent analysis on additive manufacturing and showed the work of calof and smith (2010) that “consider that competitive technical intelligence (cti) and strategic technological foresight (stf) are fields with similar objectives and techniques. while the authors define cti as a practice that provides business sensitive information on external scientific or technological traits, opportunities or developments that have the potential to affect a company’s competitive position. stf according to them is a collaborative tool that draws upon the talents of many individuals (not only from the technology domain) and is an important source for technical and business intelligence.” the articles published in the journal of intelligence studies in business since 2011 were focused on developing and testing models to evaluate business intelligence systems and software. following these studies, new problems have emerged: to study the differentiation of business intelligence vendors (solberg soilen and hasslinger, 2012), to reformulate the ci problem identify competitors (touchgraph, xerfi, netvibes, sindup…) identify information sources of competitors monitor sources during the project period processing information analyze information summary of strategic information (ci note) figure 1 teaching the competitive intelligence (ci) methodology 9 classify business intelligence software based on their functionalities and performance (amara et al. 2012; nyblom et al. 2012; abzaltynova and williams, 2013), and to show the perception of business intelligence tools by professionals and students using two models of information systems literature (fouratijamoussi and niamba, 2016). this literature review has enabled the definition of a competitive and technological intelligence plan (figure 1 and 2). these two methodologies of cti were applied by all students when they reformulated and responded to their watch problems (for example: extraction of pea protein; create new food products such as ice cream and energy cake; future of renewable energies and rare metals) to apply this ci methodology, the students collected information from the competitive environment of the firm selected, they used general and monitoring tools to identify information sources of competitors, then monitor them over time (period of the watch project). finally, they organized and analyzed all information treated to understand the strategic development of all competitors. the ti methodology consists of establishing the goal of the project, then organizing a collection of patent information by using databases: espacenet and patentscope designed by the inpi (institut national de la propriété intellectuelle) and the wipo (world intellectual property organization). the students need to identify the main countries, international patent classifications (ipcs), applicants, and inventors. to exploit and analyze all pertinent patents, they used the keyword-based patent analysis (salvador el al. 2014) that represents an important method used to determine technology trends, discover technological opportunities and predict new technological advances. this method is based on patent keyword frequencies between them (choi et al. 2012). 3. the methodology and the research model 3.1 data collection the study concentrated on a certain number of variables stemming from the literature in information systems, which join the problem of the evaluation of the cti tools used within the framework of the process of strategic intelligence. a survey was built in the field of the conception of the cti tools (fouratijamoussi, 2014). through this study, we tried to show the use of the watch tools and their applications. the survey was built with the aim to operationalize the variables of the theoretical model as well as to profile the users who answered this survey. it was designed and diffused to unilasalle students after applying cti methodologies presented above. our database is composed of 265 responses for clustering the users’ monitoring tools. these respondents were from three specialties: i) agriculture; ii) food and health; iii) geology. 3.2 logic of the study to evaluate and compare the user profiles, the selected criteria were taken from the theoretical fusion of these two models: technology / task fit (goodhue and thompson, 1995) and technology acceptance (davis, 1989; venkatesh et al., 2003) as part of the literature on the evaluation of information systems (figure 3). model i: “task/technology fit” aims to evaluate the user perception towards the used system. it is defined by the degree of correspondence between the functional needs relative to the task and the technical features offered by the information technology. it was explained by four criteria (b, c, d, e): search by keywords on patent database (espacenet, patentscope) identifying relevent keywords and ipc visualization of patents following the selected search criteria comparison of search results with different tools processing information using evolution graphs analyze evolution graphs identify technology and innovation trends (ti note) figure 2 teaching the technology intelligence (ti) methodology 10 a. cti tools used: is not shown in the model but in the survey. these tools are classified into three categories (presented in table 2). b. functionalities of cti tools: were the capacities of the system to help individuals or a group, determined by the type of system used (benbasat and nault, 1990; wierenga and van bruggen, 2000). the tasks presented in the questionnaire were: search information, store, process and extract a large quantity of information, resolve the semantic and syntactic problems. c. data quality: measured the correspondence between needs and the available data, it also measured the exactness of these available data by using cti tools and the quality of data at a level of detail suitable for the tasks. d. data compatibility: between the various sources of data. e. capacity of learning: the ability of students to use these watch tools. f. the intensity or frequency of use: it was a subjective appreciation of the increase or the decrease in the degree of use. the intensity depended on the integration of the business intelligence system (grublješič and jaklič, 2014) and on the strategy adopted by the company (presented in the survey). model ii: the acceptance of cti tools is inspired from the “technology acceptance model” of davis’86, this model was explained by: a. ease of use of the cti tools (davis, 1989): measured the degree of faith of a user in the effort to supply in order to use the system. to measure the ease of use, we referred to the measuring instrument of davis (1989) which consists of six items, proven valid and reliable by doll and torkzadeh (1998). b. perceived utility of the cti tools: this element was not directly measurable. this notion came from microeconomic analysis: it was the measure of the use value of hardware or software for a user. it measured at the same time the impact of cti tools on productivity and quality. the perceived utility was defined by the degree of improvement of the performances expected from the use of the system (davis, 1989). c. satisfaction of the cti tools user: it was the degree of continuity of use by the individual. it was a positive faith of the individual perception which showed the value of cti tools. this variable was considered as a dimension of success of cti tools (seddon, 1997). it could influence the intention, but it was also a consequence of the use (delone and mclean, 2003) of the utility and the ease of use perceived. qd comp fonc peo u pu sat int app task-technology fit (ttf) technology adoption model (tam) legend: fonc: functionalities of monitoring tools peou: perceived ease of use qd: quality of data pu: perceived utility comp: compatibility of sources sat: user satisfaction app: capacity of learning int: intention of use figure 3 research model of cti tools used 11 d. intention of cti tools use: the manager can accept a system but decides when he uses it or plans to use it in the process of decision-making. the intention of a user to use a system adopted by the organization as well as its satisfaction by this use depended on the utility and on the ease of use perceived from the system. 4. results analysis descriptive statistics have been used in order to show population characteristics. we have used the statistical software spad v.8 to treat the data. 35.8% of respondents were male and 64.2% were female. 98.5% of respondents were between the ages of 20-25 years, 1.5% were between the ages 26-30 years. finally, our sample of users comes from three fields of studies: 50.2% from agriculture and 23% from food and health and 26.8% from geology (table 1). table 1 demographic profile of respondents (n=265) characteristic descriptor distribution (%) gender male 35.8 female 64.2 age 20-25 years 98.5 26-30 years 1.5 field of studies agriculture 50.2 food and health 23.0 geology 26.8 according to table 2, about 42.6% of respondents used general tools such as search engines and other free tools (google search, google alert, websites), while 35.8% used monitoring tools like databases of patents or sector studies (search engines, touchgaph, xerfi, espacenet, patentscope), and finally 21.5% used platforms to monitor the competitive environment, the e-reputation brands and social networks (geological databases, netvibes, sindup, alerti, mention, talkwalker). around 50.5% of respondents didn’t frequently use monitoring tools, 48.3% used them sometimes or often, and 1.1% always used them. using the task-technology fit (ttf) model leads to 14 variables with scale values. the ward’s hierarchical clustering technique shows that the sample of students could be split in two opposite groups before the research of the stable groupings (figure 4): the first one with 67% of students and the second one with 33% of them. table 2 respondents’ tools usage and characteristics characteristic descriptor distribution (%) tools search engines and websites 42.6 search engines and patent databases 35.8 specialized monitoring tools 21.5 usage frequency never 6.0 rarely 44.5 sometimes 35.5 often 12.8 always 1.1 the search for stability of groupings leads to two clusters whose frequencies are respectively 60% and 40%, instead of 67% and 33%. each individual is represented in a scatter plot of principal component scores by a point which is the number of the cluster it belongs to (figure 5). each cluster mean (centroid) is also classification hiérar chi que directe ( sur facteurs) 412 398 469 417 464 439 419 451 447 403 441 466 369 473 461 429 196 92 456 468 462 472 477 413 478 471 41 453 459 448 475 458 470 474 436 452 467 480 437 397 151 450 465 404 435 449 380 479 457 476 33% 67% 2 figure 4 dendrogram of similarities between 265 students according to the ttf model 12 represented by a point whose size indicates the proportion of individuals in the cluster. the categorical data (gender, field of studies, tools, usage frequency) used in the description of the groups show otherwise that the first group of 60% of respondents is mainly composed of students from the specialty “geology” who often used cti specialized tools. the characteristics of these students from group 1, according to cti tools’ perception, are shown below: the available data are either suitable for their needs or helpful for their tasks; they claim to have greater capacities of learning by using cti tools; they mostly agree with the functionalities of monitoring tools; on the other hand, it is not easy for them to find useful tools for their daily work. the characteristics of the students from group 2, according to the cti tools’ perception are certainly antagonistic, but it can be noted that the individuals who belong this second group are students from the specialty “agriculture” who never used search engines and websites. the technology adoption model (tam) leads to 25 variables with scale values. two groups of students or three groups are highlight by the cuttings of the displayed dendrogram (figure 6). in the following paragraph, the cluster description in three groups is made in order to take into account the presence of a small group of 33 students with particular characteristics. the reallocation figure 5 positioning of the two clusters in a scatter plot of principal component scores. classification hiérar chi que directe ( sur facteurs) 446 434 445 463 426 437 476 408 470 469 457 472 196 456 461 82 451 427 393 479 462 419 402 474 409 465 478 430 460 92 65 438 202 475 480 442 3 473 454 477 468 450 129 471 448 458 143 244 213 464 0.09 0.10 0.10 0.100.100.100.100.10 0.110.110.11 0.110.110.11 0.120.12 0.120.12 0.130.13 0.13 0.140.15 0.150.15 0.15 0.150.17 0.18 0.19 0.19 0.200.200.21 0.220.220.23 0.280.290.32 0.32 0.37 0.400.41 0.43 0.59 0.90 2.68 4.56 40% 60% 2 9% 40% 51% 3 figure 6 dendrogram of similarities between 265 students according to the tam model. 13 step for the grouping stability search indicates three clusters whose observed frequencies are 126, 106 and 33. categorical data are also used in the description of these clusters. general statements and characteristics of respondents in each group are: group 1: often use cti specialized tools, interest shown for cti tools (utility, ease of use, ease of learning, satisfaction and intention to use in the future). group 2: rarely use general tools, little interest. group 3: never use general cti tools, rare interest in monitoring tools. the dispersion of classes described above can be visualized on the scatter plot of principal component scores (figure 7). it shows how differentiated the clusters are. the individuals are represented on the plane by identifying them by their group number. the centroids are also represented by points whose size is proportional to the size of the clusters. 5. conclusions regarding the managerial implication, the first technology-task fit model showed two groups from those who used cti tools, ranging from source identification to the dissemination of information. we can see that the profile of the first group of users can be part of an advance monitoring unit. the second group of users were latecomers in adopting this technology. finding the monitoring tools not flexible, this implies the dissatisfaction with the quality of service offered by this technology may be due to limited use. three groups were identified in the second technology adoption model, the first group is aware of the perceived usefulness of these monitoring tools and the second is considered as intermediate because they used general tools that showed their limits to achieve a watch type. the third is not satisfied completely as first users of a watch platform as part of a monitoring project. the difficulty lies in the appropriation of these tools by students and their adaptation to the selected cti projects. we deduced that a cti tool implementation in a company is accompanied by organizational change, sometimes cultural, which tasktechnology fit and tools adoption impact were not negligible. this would explain, in part, why these tools can have both success and failure in the watch projects. the implementation of this monitoring system has shown the pervasive role of students/agents/analysts in the organization and coordination of steps in this process, from receipt of the request to the dissemination of results using different monitoring tools according to their needs of information and watch types (competitive, technological, marketing). our article provides evidence that competitive and technological intelligence (eveille: see the definition of “e-veille” in lexique de gestion et de management sous la direction de j.p. denis, a.c. martinet et a. silem, 9ème édition, dunod, 2016.) was most taught to be applied to business cases for purely pedagogic education using the free and commercial watch figure 7 positioning of the three clusters in a scatter plot of principal component scores. 14 tools (netvibes, touchgraph, google, xerfi, espacenet, patentscope, sindup) to achieve these methodologies. finally, the monitoring of open and closed data can be a full search. this study showed us how to use a cluster analysis method to identify the groups of students who differ in attitude, perception and utility of the monitoring tools by putting them in situations of watching problematic. all these indicators are important to measure in subsequent works the adequacy between the functionalities of these tools and the quality of the data and the compatibility of the sources, as well as the acceptance of the monitoring tools by engineering students. this study ensures the furthering of existing models to classify business intelligence software based on their functionalities and performance (amara et al. 2012; nyblom et al. 2012; abzaltynova and williams, 2013) and to show the perception of business intelligence tools by professionals and students using two models of information systems literature (fourati-jamoussi and niamba, 2016). we have focused our attention on the perception of future engineering students coming from different specialties to meet several objectives: i) observe the learning and discovery process of cti tools by students; ii) adapt our teaching to the needs of student profiles, and iii) help these students to understand and develop individual and collective skills (able to implement a competitive and technological intelligence system). we will increase the number of respondents for future studies to prove the significance of all variables. 6. references abzaltynova, z. and williams, j. (2013). developments in business intelligence software. journal of intelligence studies in business, (ii): 40-54. amara, y., solberg soilen, k. and vriens, d. (2012). using the ssav model to evaluate business intelligence software. journal of intelligence studies in business, (iii): 29-40. anderberg, m. r. (1973). cluster analysis for applications. new york: academic press, 372pp. anderberg, m. r. (2014).cluster analysis for applications: probability and mathematical statistics. a series of monographs and textbooks. new york: academic press, books.google.com. bel hadj, t. and and aouadi, s. (2014). effects of corporate economic intelligence on international competitiveness of tunisian firms. knowledge horizons-economics. 6 (1): 113-121. bel hadj, t., ghodbane, a. and aouadi, s. (2016). the relationship between ‘competitive intelligence’ and the internationalization of north african smes. competition & change. 20 (v) : 326-336. benbasat, i. and nault, b. r. (1990). an evaluation of empirical research in managerial support systems. decision support systems, 6 (iii): 203-226. berkhin, p. (2006). a survey of clustering data mining techniques, grouping multidimensional data, springer, 25-71. calof, j., and smith, j. (2010). the integrative domain of foresight and competitive intelligence and its impact on r&d management. r&d management. 40 (1): 3139. doi:10.1111/j.1467-9310.2009.00579.x choi, s., park, h., kang, d., lee, j. and kim, k. (2012). a sao-based text mining approach to building a technology tree for technology planning. expert systems with applications. 39: 11443–11455. davis, f. d. (1989). perceived usefulness, perceived ease of use, and user acceptance of information technologies. mis quarterly, 13 (iii): 319-340. delone, w. h. and mclean, e. r. (2003). the delone and mclean model of information success: a ten-year update. journal of management information systems, 19 (iv): 930. doll, w. j. and torkzadeh, g. (1998). developing a multidimensional measure of system-use in an organizational context. information and management, 33 (iv): 171-185. du toit, a. s. a. (2015). competitive intelligence research: an investigation of trends in the literature. journal of intelligence studies in business, 5 (ii): 14-21. everitt b. s. (1998). dictionary of statistics. cambridge university press, london. fourati-jamoussi, f. (2014). veille stratégique: l’évaluation de l’utilisation des agents intelligents. presses académiques 15 francophones, isbn 978-3-8381-4777-2, 448p. fourati-jamoussi, f. (2015). e-reputation: a case study of organic cosmetics in social media. in: 2015 6th international conference on information systems and economic intelligence, ieee, pp 125–132. fourati-jamoussi, f. and niamba, c. n. (2016). an evaluation of business intelligence tools: a cluster analysis of users’ perceptions. journal of intelligence studies in business. 6 (1): 37-47. giald, b. and giald, t. (1988). the business intelligence system, a new tool for competitive advantage, new york: amacom. goodhue, d. l. and thompson r. l. (1995). tasktechnology fit and individual performance. mis quarterly, 19 (ii): 213-236. grublješič, t. and jaklič, j. (2014). customer oriented management practices leading to bis embeddedness. online journal of applied knowledge management, 2 (i):11-27. herring, j. p. (1998). what is intelligence analysis?. competitive intelligence magazine, 1(ii).(current september 1, 2003). jacob, r. and pariat, l. (2002). gestion des connaissances et compétitivité des entreprises. réseaux. 3 (ii): 4. jakobiak, f. (1998). l’intelligence économique en pratique. paris: editions d’organisation, 307 p. johnson, r. a. and wichern, d. w. (1998). applied multivariate statistical analysis. prentice hall, new jersey. kahaner, l. (1998). competitive intelligence: how to gather, analyze and use information to move your business to the top, touchstone. kaufman l. and rousseeuw p. j. (2009). finding groups in data: an introduction to cluster analysis. a john wiley and sons, inc, isbn 978-0-470-31748-8, 368 p. lesca, n. and caron-fasan, m. l. (2006). veille anticipative, une autre approche de l’intelligence économique. lavoisier, paris. mckercher b. (2008). segment transformation in urban tourism, tourism management, 29 (vi): 1215-1225. mooi, e. and sarstedt, m. (2011). cluster analysis, in a concise guide to market research, springer berlin heidelberg, isbn 978-3-642-12540-9, 237-284. nyblom, m., behrami, j., nikkilä, t. and solberg soilen, k. (2012). an evaluation of business intelligence software systems in smes-a case study, journal of intelligence studies in business, (ii): 51-57. pateyron, e. (1998). la veille stratégique. paris: economica, 1998, 212 p. porter, m. e. (1999). la concurrence selon porter. paris: editions village mondial. punj, g. and stewart, d. w. (1983). cluster analysis in marketing research: review and suggestions for application, journal of marketing research. 20 (ii): 134-148. ruach, d. and santi, p. (2001). competitive intelligence adds value: five intelligence attitudes, european management journal, 19 (v): 552-559. sakys, v. and butleris, r. (2011). business intelligence tools and technology for the analysis of university studies management. transformations in business and economics, 10 (ii): 125-136. salles, m. (2006). stratégies des pme et intelligence économique: une méthode d’analyse du besoin 2 éme edition. paris: economica. salvador, m. r., zamudio, p. c., carrasco, a. s. a., benítez, e. o., bautista, b. a. (2014). strategic foresight: determining patent trends in additive manufacturing. journal of intelligence studies in business, 4 (iii): 42-62. seddon, p. b. (1997). a respecification and extension of the delone and mclean model of is success. information systems research, 8 (iii): 240-253. solberg soilen, k. (2015). a place for intelligence studies as a scientific discipline, journal of intelligence studies in business, 5 (iii): 34-46. solberg soilen, k. and hasslinger, a. (2012). factors shaping vendor differentiation in the business intelligence software industry. journal of intelligence studies in business, (iii): 48 54. venkatesh, v., morris, m. g., davis, g. b. and davis, f. d. (2003). user acceptance of information technology: toward a unified view. mis quarterly, 27 (iii): 425-478. wierenga, b. and van bruggen, g.h. (2000). marketing management support systems: principles, tools and implementation. international series in quantitative marketing. kluwer academic publishers. vol8no1paper3oubrich_etal to cite this article: oubrich, m., hakmaoui, a., bierwolf, r. and haddani, m. (2018) de ve lo pm en t of a com pe titi ve in telligen ce m a tu rity m od el: in si gh ts fro m moroccan companies. journal of intelligence studies in business. 8 (1) 25-36. article url: https://ojs.hh.se/index.php/jisib/article/view/284 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index development of a competitive intelligence m a t u r i t y m o d e l : i n s i g h t s f r o m mo r o c c a n c o m p a n i e s mourad oubricha*, abdelati hakmaouia, robert bierwolfb and mouna haddanic aciems research, morocco; bieee-tems; cmarco telecom, morocco *oubrich.mourad@ciems.ma journal of intelligence studies in business please scroll down for article development of a competitive intelligence maturity model: insights from moroccan companies mourad oubricha*, abdelati hakmaouia, robert bierwolfb and mouna haddanic aciems research, morocco; bieee-tems; cmarco telecom, morocco corresponding author (*): oubrich.mourad@ciems.ma accepted 2 march 2018 abstract this paper aims to assess the maturity level of competitive intelligence (ci) in moroccan companies, so as to improve theirs practices, and to justify their investment in competitive intelligence. to do so, we have identified the maturity model based on a comprehensive review of recent literature. the objectives of this paper are threefold: (1) to determine the major purposes of a ci maturity model (cimm), (2) to identify the types of ci dimensions and levels of maturity, (3) to evaluate moroccan companies in terms of ci practice. our approach is to develop a conceptual framework of the ci maturity model that articulates (1) dimensions of ci, and (2) maturity levels of ci. we note that little attention has been given in previous research to how ci is actually conducted in moroccan companies. for this purpose, an empirical study was conducted. the results discuss various perspectives and insights from a competitive intelligence maturity model point of view in the moroccan context. the results show that the majority of the moroccan companies are in an early stage of the ci levels, where the ci practice is only to employ environment scanning and the competition in the business environment is not intense. we also note the absence of ci structure at this level. most of these moroccan companies are not able to cope with changes in the business environment. the ci systems and processes are released on an irregular basis. this study is the first to investigate the competitive intelligence maturity model (cimm) in the moroccan context. the findings of this research show that there are six ci dimensions (ci culture of an organization; ci deliverables; ci sourcing; ci cycle; ci investment in terms of resources; ci users and ci application) that should be taken into account in ci implementation with regard to the ci level (early, mid, world class). keywords competitive intelligence, maturity model, information, competitive advantage, moroccan companies 1. introduction according to du toit (2003), enterprises today operate in a global market in an increasingly turbulent and volatile environment and must withstand competitive pressures both from other producers or suppliers and from new technologies and products/services, otherwise they will be disrupted. corporate management therefore needs input from competitive information and has to manage and utilize this information. competitive intelligence (ci) pulls together data and information from a very large and strategic view, allowing a company to predict or to forecast what is going to happen in its competitive environment (bose, 2007). journal of intelligence studies in business vol. 8, no. 1 (2018) pp. 25-36 open access: freely available at: https://ojs.hh.se/ 26 despite the increasing interest in ci, two critical gaps emerge in the literature. first, there are few empirical works assessing the maturity of a firm’s competitive intelligence activities. most literature addressing this issue has been focused on the measurement of competitive intelligence in the context of the developed markets of the usa, canada and europe (wright & calof, 2006; gainor & bouthillier, 2014; bose, 2007). the objectives of this paper are twofold. first, a description of the current knowledge regarding the maturity model of ci is derived from the literature. second, the paper makes a contribution to the currently empirical knowledge on the topic, particularly in the moroccan context. the central question that will be addressed is: what are the dimensions of ci involved in the assessment of a ci maturity model? this paper is organized as follows: in the first section, we present the state of the art regarding competitive intelligence and maturity models. then, in the second section, we describe the research methodology. in the third section, we discuss the main results and the important lessons learned from the empirical study. 2. background the literature reviewed for this study includes recent literature on competitive intelligence and ci maturity models. 2.1 competitive intelligence the term competitive intelligence (ci) has been around for about 50 years (luh, 1958; wilensky, 1967). over time, the definition for ci has broadened to include not only organizational and business processes, but also technological processes. for the purpose of this research, and according to gainor & bouthillier (2014), ci is described as the collection, analysis and dissemination of publicly available, ethically and legally obtained relevant information as a means of producing actionable knowledge. actionable knowledge is then a basis for the improvement of corporate decision-making and action. the overall goal of ci is to identify and act upon signals, events and discernible patterns, which can inform and enhance the organization’s decision-making activities (wright et al. 2009). bose (2008) said that the most common benefit of ci is its ability to build information profiles that helps a company to identify its competitor’s strengths, weaknesses, strategies, objectives, market positioning and likely reaction patterns. these information profiles include data needed to effectively identify, classify and track competitors and their behavior. in fact, the assessment of ci is considered an important issue. several scholars have called for research into how ci might be assessed. according to the literature (gainor & bouthillier, 2014; heppes & du toit, 2009), the maturity model can be used to assess the relevance of ci within an organization. the conceptual challenges assessing ci are: understanding what is being assessed, the reliability and validity of the maturity model selected, and how to critically evaluate the maturity of ci. 2.2 maturity models in this section, we will discuss the basic building blocks of maturity models. interestingly, albliwi et al. (2014) mentioned that there is a lack of consensus on the definition of a maturity model, and most of the definitions have only described the capability levels, behaviors and the objectives of the model. accordingly, due to the lack of an accepted general definition, it is necessary to have a closer look at maturity models from three perspectives (wendler, 2012): • an understanding of basic terms like maturity and capability • purpose, application, and benefits • structure and components for becker et al. (2009), a maturity model consists of a sequence of maturity levels for a class of objects. it represents an anticipated, desired, or typical evolution path of these objects shaped as discrete stages. the basic idea behind the maturity model is that higher levels of maturity indicate increased capabilities in managing the specific domain or process with better competitiveness and thus increasing your chance of sustained success. however, if all players are equally benchmarked of course there is no edge or advantage anymore, but then the process becomes imperative just to hold your position among your peers (rapaccin et al, 2013), the concept of maturity models is increasingly being applied within the field of information systems (is), both as an approach for organizational development and as a means 27 of organizational assessment (mettler & rohner, 2009). in fact, we can find many maturity models in the relevant literature. one of the most influential maturity models is the capabilitymaturity model (cmm), proposed in november 1986 by the software engineering institute at carnegie mellon and subsequently evolved into the capability maturity model integration (cmmi). the cmmi is based on knowledge acquired from software-process assessments and extensive feedback from both industry and government (paulk et al, 1993). since then, the maturity model has been expanded into other contexts. moreover, maturity models have been applied to several domains such as business process management (röglinger, pöppelbuß, & becker, 2012), business intelligence (raber, winter and wortmann, 2012), knowledge management (serna m, 2012), supply chain management (lockamy & mccormack, 2004) and social media (geyer & krumay, 2015). table 1 maturity model methodologies. maturity model methodology steps source 1. initial decisions 2. sources analysis 3. strategy for development 4. model design 5. draft model development 6. draft model validation 7. model consolidation salviano et al. (2009) 1. identify problem and motivate 2. define objectives of a solution 3. design and development 4. demonstration 5. evaluation 6. communication peffers et al.(2007) 1. scope 2. design 3. populate 4. test 5. deploy and maintain bruin et al. (2005) 1. comparison with existing maturity models 2. iterative procedure 3. evaluation 4. multi-methodological procedure 5. identification of problem relevance 6. problem definition 7. targeted publication of results hevner et al. (2004) whilst maturity models are high in number and broad in application, there is little documentation on how to develop a maturity model that is theoretically sound, rigorously tested and widely accepted (bruin et al., 2005). in this vein, bruin et al., (2005) proposed, in order to overcome this problem, six phases to develop a maturity model: scope, design, populate, test, deploy and maintain. becker et al. (2009) adopted hevner et al. (2004) design guidelines to formulate the maturity model framework that consists of seven phases: comparison with existing maturity models, iterative procedure, evaluation, multi-methodological procedure, identification of problem relevance, problem definition, targeted publication of results. peffers et al. (2007) proposed a design science process model, which essentially creates a methodology for following the seven guidelines. this process methodology involves six key steps: identify the problem and motivate, define objectives of a solution, design and development, demonstration, evaluation, communication. other authors have attempted to define sequential steps to guide the development of a maturity model. table 1 summarizes the main activities described in each methodology. de bruin et al. (2005) point out that the development of a maturity model depends on the purpose for which a model may be applied including whether the resulting maturity assessment is descriptive, prescriptive or comparative in nature. if a model is purely descriptive, the application of the model would be seen as a single point encounter with no provision for improving maturity or providing relationships to performance. a prescriptive model, on the other hand, provides emphasis on the domain relationships to business performance. finally, a comparative model enables benchmarking across industries or regions. a model of this nature would be able to compare similar practices across organizations in order to benchmark maturity within disparate industries. 2.3 maturity models for ci despite the vast number of applications in different management domains, to the best of our knowledge, no maturity models to assess the capabilities of ci has been developed yet. this paper aims to fill this gap. for these reasons, the maturity model for ci respects the design principles proposed by hevner et al. (2004) in their framework. in the same vein, tej adidam et al. (2012) distinguished three levels of ci maturity: primitive level, intermediate level and advanced level. the first step of the hevner et al. (2004) approach is to review, compare and contrast the existing maturity models in ci. from the 28 literature, we note that heppes & du toit (2009) developed the only ci maturity model. gainor & bouthillier (2014) mentioned that the assessment of ci would need to capture ci usage, the outputs in relation to decisionmaking and decision outcomes. to this end, we propose, according to our literature review, to assess ci practices from eight dimensions that are presented in table 3. table 2 ci maturity model. authors dimensions levels industry heppes & du toit (2009) • deliverables and capabilities • analytical products • relationship with management • sources of information • personnel • skills & training • early stage ci • mid-level ci capability • world-class ci capability retail bank table 3 ci dimensions. ci dimensions source cidim1. ci strategy and culture comai et al (2005), bose (2007), heppes & du toit (2009), oubrich (2011) cidim2. ci relationship with management heppes & du toit (2009) cidim3. ci structure calof (2002), comai et al (2005), bose (2007), heppes & du toit (2009) cidim4. ci resources comai et al (2005), bose (2007), heppes & du toit (2009) cidim5. ci system calof (2002), comai et al (2005), bose (2007), heppes & du toit (2009), oubrich (2011) cidim6. ci deliverables and capabilities heppes & du toit (2009) cidim7. ci analytical products and ci use bose (2007), heppes & du toit (2009) cidim8. ci impact bose (2007), heppes & du toit (2009), seng yap & abdul rashid (2011), oubrich (2011) 3. empirical study 3.1 research methodology we think that ci is still in an embryonic stage in morocco but is widely thought by those in the business to be growing rapidly. however, there are practically no empirical research papers at hand. this paper aims to offer an insight into the assessment of ci and by doing so, to remedy the lack, we noted, of research in the ci field. an empirical research study was developed in order to assess ci in moroccan companies, in terms of the eight dimensions and three levels of maturity (listed on tables 2 and 3). 3.2 data collection ciems research launched between september 2015 and december 2016, the first barometer on ci in morocco, and e-mail, followed by direct contact were used to invite the firms to join our ci research program. the questionnaire was sent to the sample with the objective of evaluating ci in moroccan companies, in terms of the eight dimensions and three levels of maturity. 150 questionnaires were sent, resulting in 57 usable responses (38%). the industry split was information technologies and telecommunications (12.5%), agriculture and fishing industry (8.9%), finance, banking and insurance (8.9%), media and communication (3.6%), construction industry (3.6%), transport and logistic (1.8%), manufacturing industry (1.8%), oil and gas industry (1.8%), with sales reported in excess of 3 million mad by 75%. more than 40% of respondents have a position 29 as senior/middle management, and 10.7% are at director level. moreover, 69.40% of the respondents have experience in ci between 1 and 5 years, and the rest of the respondents, which represent 30.60% have experience in ci for more than 6 years. this shows that ci in morocco is a young field as mentioned earlier. 4. data analysis and interpretation on looking back on the research question posed at the start of this study, it is possible to find the following results and analysis, which show the most common responses from the morocco companies in terms of ci practice assessment in the eight dimensions. 4.1 ci strategy and culture the perceived need for a ci strategy is determined by the intensity of competition in the market serviced by the company. if there are no competitors in the domestic market, there may be no point in wasting resources on ci. the companies that embrace ci are those which experience the most intense competition or where the competitive environment is changing rapidly. the overall goal of ci therefore is to identify and act upon signals, events and discernable patterns, which can inform and enhance the organization’s decision-making activities (wright el al, 2009). in this same vein, ci strategy assessment will depend on the level at which companies respond to change in their business environment and ci practices. according to oubrich (2009), we can distinguish between two types of ci strategy: defensive and offensive. ci defensive strategy includes mainly scanning environment and protection assets; meanwhile ci offensive strategy includes an influence approach. as for the future, there is no doubt that competitive pressure will continue to intensify in all markets. this means that the companies will have to shift their ci strategy from defensive to offensive. the findings of our study revealed that moroccan firms practiced ci at many different levels with regard to the nature and extent of the competition (very intense, intense, not intense). however, when the competition is not intense, the practice of ci is limited to scanning the environment rather than assets protection or influence. as the competition becomes fierce and more aggressive, companies should empower themselves with an offensive ci strategy. 4.2 ci relationship with management the purpose of this dimension is to gain an understanding of the ci activities that take place within organizations and how they are supported by management. according to pellissier and kruger (2011), there is a growing proportion of managers using ci in their strategic planning and decision-making. based on the results obtained, we found that the top management linked ci to protect their intangible assets (24.76%), detection of opportunities and threats (25.52%), coordination of activities (23%) and coordination of strategies (23.08%). moreover, ci helped them to stay informed about the internal and external environment (24.66%), production of new knowledge (23.70%), making better decisions (24.6%) and sale goals (23.81%). finally, the use of ci can lead to innovation (24.48%) and competitive advantages (25.17%). there is also an agreement that ci is clearly widespread across all management levels, as table 4 shows. table 4 management level of respondents. management level % of respondents top management 26.66 strategy department 16.45 marketing department 15.79 r&d department 11.18 commercial department 9.21 finance and administrative department 8.55 sale department 6.58 logistic and distribution department 5.26 export department 1.32 4.3 ci structure the ci system is often influenced by the degree of its formalization. it can be described as a formalized structure when it is governed by rules and procedures (cohen, 2004). the results of this study show that more than half of moroccan companies surveyed admit to having a formalized structure. the structure of their ci system differs depending on the degree of progress of scanning. so, the more the ci structure is developed, the more the ci approach becomes offensive. indeed, the empirical study revealed that moroccan companies with 1 to 5 years of 30 experience in ci, are satisfied with their ci structure. beyond 10 years of experience in ci, the company adopts a proactive ci approach for purposes of influence and lobbying. according to the empirical data, it should be noted that whatever approach is adopted, most companies only hire people with a higher education degree in order to develop their ci structure (80% have a masters’ degree). 4.4 ci resources watchers (martinet and marti, 1996), trackers (lesca, 1997), observers (jakobiak, 1998), and analysts (knauf, 2005), are people in charge of the collection, analysis and dissemination of information to turn it into intelligence in order to have better decisions and actions (bulinge, agostinelli, 2005). therefore, ci professional should have different types of additional skills (salvetat, 2001) such as mastering techniques of acquisition and validation of information sources and analysis, complementary skills related to the management of it tools, and openness and interpersonal skills (gilad, 1986). this survey reveals that the majority of the ci professionals surveyed hold a higher education diploma, most frequently a masters’ or phd. in addition, more than half occupy a managerial function, which reflects that moroccan companies increasingly recognize the level of skills of ci professional. 4.5 ci system hassid et al. (1997) indicate that information collection involves gathering information, identifying available formal and informal sources and analyzing the practical conditions of access and the technical arrangements for better collection. effective environmental scanning must be integrated into several formal and informal sources, both internal and external. formal sources or open sources are those where there is hard support that include the following categories: press, media, books, databases, and patents. informal sources or closed sources mainly reside in contacts with people such as customers, suppliers, competitors, laboratories, and trade fairs. this type of source often requires the mobilization of a multidisciplinary network of human resources inside and outside the company to communicate competitive information (gilad, 1995). the survey reveals that the majority of ci professionals interviewed integrate the web into their scanning panel. the scanning from the ground includes trade show, seminars, and meetings with suppliers. the trend confirmed by this survey is the diversity and complementarity of information channels (web and ground information). 4.6 ci deliverables and capabilities levet (2001), shows that diffusion and dissemination of information to the people involved is an essential step in the ci cycle of martinet and marti, (2001). dumas (2008) proposes a typology of three products of environmental scanning that intended to stimulate reflection and to help decisionmaking. it distinguishes between alert signals (warning alerts), one-off deliverables (briefing notes, scanning reports) and regular deliverables (newsletter, actors mapping). the ci professional should choose the most appropriate support and diffusion of information, and the frequency between a realtime diffusion of information. they should also analyze delayed information dissemination. our study shows that moroccan companies are willing to disseminate information. indeed, email alerts are the best-used channel, followed by newsletters. the companies also rank the presentation and scanning report highly. the findings in this study indicate that the information is not significantly processed by the moroccan structures, and it is still related to punctual consumption. this explains the early stage of the ci practice in the moroccan context. 4.7 ci analytical products and ci use one the most challenging tasks of ci use and ci analytical product methods for the professional is to analyze the information in the dynamic and competitive context as information changes and updates frequently. some research observed that analysis is critical to ci use and ci analytical product methods as it generates some kind of intelligence for the firm (calof and dishman, 2008). tej adidam et al., (2009) make sure that the critical part of the ci process (mainly ci use and ci analytical product methods) is the basis of this analysis and dissemination of intelligence to the relevant firms’ users. therefore, the relevance and quality of this analysis is very important to make effective 31 decisions. it is understood that this relevance and quality are different among ci early level, ci mid-level and ci world-class level (heppes & du toit 2009, tej adidam et al., 2012). we can state that the highest level is the sophisticated analytical techniques, which in turn generate better intelligence output (dishman and calof, 2008) and lead to better ci performance. in line with this, our empirical study shows that where information is transformed into knowledge more efficiently and effectively, companies move ahead to the world class ci practice, and the more they tend to use ci methods such as crosscheck analysis, competition, value chain analysis. however, for the early stage of ci, the companies still use the general methods (such as mckinsy matrix, patent analysis, pestel analysis) to generate intelligence. the mid-level is better developed than the early stage in terms of ci maturity, because they use both general and specific methods (such as value chain analysis and competition analysis). table 5 : ci analytical product methods (in terms of number of occurrences). 4.8 ci impact ci attitudes impact managerial ci and goal setting. different levels and modes (inactive or passive, reactive or proactive; el sawy, 1985; jain, 1984) of ci attitudes have important implications for organizations. this is demonstrated in the fact that while some managers obtain ci passively (what we called the early stage ci level), others (mid-ci level and world class ci level) engage in an active search for ci. opportunities or threats can arise from many different market sectors. managers with a ci high level tend, in a strategic vision, to be engaged in a proactive ci scanning. they rigorously try to scrutinize situational variables and seek opportunities from the market. more specifically, they are engaged to be successful, to control the environment, and to be innovative and create knowledge, have a strong motivation to conduct frequent and regular scanning for ci. between these two kinds of ci attitudes, we identified some managers who are tending to be in the world-class level but still acting only in a tactical way. our findings show clearly that managers in the early ci level are more oriented towards protecting their assets (24.79%), coordinating activities and detecting opportunities and threats in the market. table 6 early ci level data (in terms of number of occurrences). early ci level protect intangible assets detection of opportunities and threats coordination of activities top management 24.79 25.52 23.00 strategy department 15.70 16.55 16.00 marketing department 15.70 15.17 13.00 rd department 11.57 11.03 10.00 commercial department 9.09 9.66 10.00 finance and administrative department 9.92 8.97 11.00 sale department 6.61 6.90 8.00 logistic and distribution department 5.79 5.52 8.00 export department 0.83 0.69 1.00 100.00 100.00 100.00 early level mid-level world class mckinsy matrix 100 value chaine analysis 98 cross-check analysis 37 patente analysis 97 competition analysis 95 competition analysis 33 pestel analysis, 96 swot 93 financial analysis 30 bcg matrix 90 partner analysis 91 value chaine analysis 27 scenario analysis 88 resources and competence analysis 91 scenario analysis 23 resources and competence analysis 74 cross-check analysis 88 partner analysis 21 cross-check analysis 70 pestel analysis, 75 swot 19 financial analysis 67 scenario analysis 72 pestel analysis, 19 swot 65 bcg matrix 70 resources and competence analysis 19 partner analysis 58 financial analysis 67 bcg matrix 16 value chaine analysis 58 patente analysis 57 mckinsy matrix 14 competition analysis 56 mckinsy matrix 42 patente analysis 13 32 table 7 : mid ci level data (in terms of number of occurrences). mid ci level coordination of strategies stay informed about internal and external environments top management 23.08 24.66 strategy department 16.92 16.44 marketing department 14.62 15.75 rd department 11.54 11.64 commercial department 10.00 9.59 finance and administrative department 9.23 8.90 sale department 7.69 6.85 logistic and distribution department 6.15 5.48 export department 0.77 0.68 in the mid ci level, managers have more behaviors that are active in regards to the market and try to move from a passive ci level to a proactive ci level. the world-class ci level shows the importance of a proactive strategy. indeed, the top management, and the strategy and the marketing departments emphasize that ci models help to make better decisions (33%), more innovation (35%) and influence (29%) on the products, services and the activities to generate more sales (25%). in this world class ci level, managers agreed that the ultimate goal is also to create a competitive advantage (37%). 5. conclusion presently, we are unaware of any significant literature about how to define and develop a ci maturity model. the initial research published in aslib proceedings, vol. 61 iss: 1 (du toit & heppes, 2009), discussed the possible conceptual frameworks. based on du toit & heppes, (2009) and the findings of our research, we should look at a variety of different characteristics of a company in order to determine the ci maturity model of an organization. the main dimensions of ci evaluated in this research, are presented as follows: 1ci culture of an organization 2ci deliverables 3ci sourcing 4ci cycle 5ci investment in terms of resources 6ci users and ci application table 9 shows what this ci maturity model looks like, and the increasing levels of maturity. a company progresses from the early stage (basic level) towards the world-class (high level), by increasing its competitive maturity in the eight areas defined above. as a company does so, it also finds that it enjoys an increasing competitiveness and thus increasing influence in a given market. table 9 gives a summary of what one might expect to find for each of the eight evaluation areas (ci dimensions) at each of the different ci levels of maturity. by examining a company’s ci maturity level, dimensions of improvement can be identified that will help companies to move to the next step and increase competitiveness. it becomes a straightforward exercise to evaluate the organization and to identify areas for improvement. table 8 world class ci level data (in terms of number of occurrences) world class ci level making better decision innovation influence generate sale competitive advantage production of new knowledge top management 33 35 29 25 37 32 strategy department 22 23 17 16 24 22 marketing department 21 22 16 15 23 21 rd department 16 17 12 12 17 16 commercial department 13 14 11 10 14 12 finance and administrative department 13 13 13 12 13 13 sale department 9 10 9 7 10 10 logistic and distribution department 8 8 7 8 8 8 export department 1 1 1 0 1 1 33 table 9 ci maturity model. ci dimension early stage ci mid-level ci capability world-class ci capability ci strategy and culture the competition in the business environment is not intense ci practice is only about environment scanning absence of ci structure not able to cope with changes in the business environment the competition in the business environment is intense ci practices are about environment scanning and asset protection absence of ci structure able to cope with changes in the business environment the competition in the business environment is very intense ci practices are about environment scanning, asset protection, and influence existence of ci structure able to drive the change in the business environment ci relationship with management ci output is used by marketing or sale and commercial departments ci output is used by export department ci output is used by top management or strategy department ci structure the age of a ci unit within organization is between 0-5 years scanning environment activity exists ci team has less education (most with less than bachelor degree) and less years of experience the age of ci unit within organization is between 6-10 years scanning environment and protection asset activities exist ci team is composed of people who have bachelor's degrees and fewer years of experience environment scanning, assets protection, and influence activities in existence for more than 10 years ci team has advanced degrees (mainly masters or phd) and several years of experience ci resources ci human resources have less education (most with less than bachelor degree), often lower-level managers ci human resources are composed of people who have bachelor's degrees, often senior/middle managers ci human resources are composed of people who have masters or phd degrees, often top managers ci system few information gathering sources utilized annually several information gathering sources utilized monthly several information gathering sources utilized daily ci deliverables and capabilities the ci process output released annually the ci process output released monthly the ci process output released daily ci analytical products and ci use few analytical product methods and ci deliverables utilized annually several analytical product methods and ci deliverables utilized monthly several analytical product methods and ci deliverables utilized daily ci impact ci impacts operational side of an organization, mainly protection of their assets, coordination of their activities, information about the change in the environment. ci impacts tactical side of an organization, mainly access to new markets, coordination of their strategies. ci impacts strategic side of an organization, mainly allowing companies to make better decisions, create new knowledge on their products, services and processes. we successively analyze the limits of this research in the theory, methodology and the results obtained. from a theoretical point of view, this research raises some key questions related to the use of maturity models as a framework for understanding our research problem. however, the maturity models did not describe the processes themselves; they describe the characteristics of good processes, thus providing guidelines for companies developing their own sets of processes. according to our empirical study, ci in morocco is still a relatively young practice, therefore, it is very hard to assess the companies concerning levels of the maturity models described in this paper, and that is why our sample was very small. the size of this sample was insufficient for the research purpose, and did not allow us to draw generalized conclusions, but it can be considered representative of all moroccan companies. in the same vein, as most companies did not respond to our questionnaire for confidentiality reasons, there was no real strategy for the choice of companies. the findings of this paper indicate that further research related to competitive intelligence maturity models can be conducted. for instance, future research should be undertaken through in-depth case studies. then, it will be worthwhile to generalize the results of the study to other companies to finally develop a holistic maturity model that takes into account the characteristics of each company. this study is the first to investigate ci in morocco. it was quantitative in nature, and further research is needed to better understand 34 the current state of ci in morocco and explore possible relationships between ci maturity levels and firm performance in the moroccan context. 6. references albliwi, s.a. et al, (2014), critical literature review on maturity models for business process excellence, proceedings of the 2014 ieee ieem. bateman, t.s, crant, j.m. (1993), "the proactive component of organizational behavior: a measure and correlates", journal of organizational behavior, vol. 14, pp. 103-18. beal, r.m. (2000), "competing effectively: environmental scanning, competitive strategy, and organizational performance in small manufacturing firms", journal of small business management, vol. 38, pp. 27-47. becker, j., knackstedt, r., and pöppelbuß, j. (2009), "developing maturity models for it management – a procedure model and its application", business & information systems engineering, 1(3), pp. 213222. bose r. (2007), "competitive intelligence process and tools for intelligence analysis", industrial management & data systems, vol. 108 no. 4, 2008 pp. 510-528 bose, r. (2008), "competitive intelligence process and tools for intelligence analysis", industrial management & data systems, vol. 108 no. 4. bulinge, f. and agostinelli, s. (2005), l’analyse d’information : d’un modèle individuel à une culture collective,, r3i, p. 1-18. bulinge, f. (2013), "analyse d’information et construction de connaissance : une théorie de l’intelligence informationnelle appliquée au renseignement et à l’intelligence économique", hdr, université de poitiers. calof, j., dishman, l, (2008), "competitive intelligence: a multiphasic precedent to marketing strategy", european journal of marketing, vol. 42 iss: 7/8, pp.766 – 785 calof , j.l. and wright, s. (2008), "competitive intelligence a practitioner, academic and inter-disciplinary perspective", european journal of marketing, 42(7/8), 717-730 carr, j.c, lopez, t.b. (2007), "examining market orientation as both culture and conduct: modeling the relationships between market orientation and employee responses", journal of marketing theory & practice, vol. 15 no. 2, pp. 113-25. cervera, a., molla, a. and sanchez, m. (2001), "antecedents and consequences of market orientation in public organizations", european journal of marketing, vol. 35 nos 11/12, pp. 1259-86. cohen, c. (2004), veille et intelligence stratégiques, hermes science publication, lavoisier, collection management, finance et gestion, 2004 covin, j.g, covin, t.j. (1990), "competitive aggressiveness, environmental context, and small firm performance", entrepreneurship theory and practice, summer, pp. 35-50. de bruin, t., freeze, r., kulkarni, u., and rosemann, m. (2005), "understanding the main phases of developing a maturity assessment model", in acis 2005 proceedings. de bruin t., rosemann m., freeze r., kulkarni u. (2005), "understanding the main phases of developing a maturity assessment model". proceedings of the australasian conference on information systems (acis), sydney. du toit, a.s.a. (2003), "competitive intelligence in the knowledge economy : what is in it for south african manufacturing enterprises? " international journal of information management 23 (2003) 111–120 el sawy, o.a. (1985), "personal information systems for strategic scanning in turbulent environments: can the ceo go on-line? ", mis quarterly, march, pp. 53-60. entrialgo, m., fernandez, e. and vazquez, c.j. (2000), "characteristics of managers as determinants of entrepreneurial orientation: some spanish evidence", enterprise & innovation management studies, vol. 1 no. 2, pp. 187-205 gainor, r; bouthillier, f. (2014), "an evaluation framework for outcome and impact measures", 77th asis&t annual meeting, october 31 november 5, 2014, seattle, wa, usa. geyer, s & krumay, b. (2015), "development of a social media maturity model – a grounded theory approach", 48th hawaii international conference on system sciences. gilad, b. (1995), "do we matter? ", competitive intelligence review, june. 35 gilad, t. (1986), "business intelligence : the quiet revolution", mit, sloan management review, pp. 53-61, 1986 heppes, d. & du toit, a. (2009), "level of maturity of the competitive intelligence function: case study of a retail bank in south africa", aslib proceedings: new information perspectives 61(1), 48–66 hevner, a et al., (2004), "design science in information systems research", mis quarterly (28:1), pp. 75-105. hevner, a.r., march, s. t., park, j., and ram, s.,(2004), "design science in information systems research", mis quarterly. 28(1), pp. 75–105. jain, s.c. (1984), "environmental scanning in us corporations", long range planning, vol. 17, pp. 117-28. jakobiak, f. (1998), l'intelligence économique en pratique, éd. d'organisation, 1998 knauf, a., (2005), "l’interaction acteur – système d’information au cœur de la dynamique d’un dispositif d’intelligence territoriale", revue isdm (journal of information science for decision making), n°22. knauf, a, (2005), "l’interaction acteur – système d’information au cœur de la dynamique d’un dispositif d’intelligence territoriale". in revue isdm (journal of information science for decision making), n°22. levet, j.l. (2001), "l’intelligence économique : mode de pensée, mode d'action”, economica african small business owners", european journal of work & organizational psychology, vol. 14 no. 3, pp. 315-44. lesca, h. (1997), veille stratégique : concepts et démarche de mise en place dans l'entreprise, distnb, paris. lockamy, a & mccormack, k (2004), "the development of a supply chain management process maturity model using the concepts of business process orientation", supply chain management: an international journal, volume 9, number 4, pp. 272-278. locke, e.a, latham, g.p. (1990), a theory of goal setting and task performance, prentice-hall, englewood cliffs, nj. martinet b., marti, y.m.(2001), l'intelligence économique, comment donner de la valeur concurrentielle à l'information, paris, editions d’organisation, isbn 978-2-708-12511-7 mcclelland, d.c. (1987a), "characteristics of successful entrepreneurs", journal of creative behavior, vol. 21 no. 3, pp. 219-33. mcclelland, d.c. (1987b), human motivation, cambridge university press, cambridge. mcdonald, r.e, madhavaram, s. (2007), "what firms learn depends on what firms know : the implications of prior knowledge for market orientation", marketing management journal, vol. 17 no. 1, pp. 171-83. mettler, t. and p. rohner (2009), "situational maturity models as instrumental artifacts for organizational design", desrist'09, may 78, malvern, pa, usa. 24). pittsburgh, pa: software engineering institute. paulk, m.c., curtis, b., chrissis, m.b., & weber, c.v. (1993), the capability maturity model for software, version 1.1 (no. cmu/sei-93-tr peffers, k., tuunanen, t., rothenberger, m., & chatterjee, s. (2007), "a design science research methodology for information systems research". journal of management information systems, 24(3), 45–77. pellissier, r., kruger, j.-p (2011), "a study of strategic intelligence as a strategic management tool in the long-term insurance industry in south africa", european business review, vol. 23 no. 6. raber, d., winter, r., wortmann, f., (2012), "using quantitative analyses to construct a capability maturity model for business intelligence", 45th hawaii international conference on system sciences. rapaccini, m., saccani, n., pezzotta, g., burger,t., and ganz,w., (2013), "service development in product-service systems: a maturity model", the service industries journal, vol. 33, nos. 3–4, 300–319 ro¨glinger, m., po¨ppelbuß, j., and becker , j., (2012), "maturity models in business process management", business process management journal, vol. 18 no. 2, pp. 328-346 sagie, a, elizur, d., (1999), "achievement motive and entrepreneurial orientation : a structrual analysis", journal of organizational behavior, vol. 20 no. 3, pp. 375-87. salvetat, d., (2001), "les pratiques d’intelligence économique et leurs déterminants : le cas des entreprises de hautes technologies en europe", phd dissertation, université de montpellier 1. 36 salvetat d. (2008), "pratiques d’intelligence économiques : entre structuration et dé structuration. le cas des entreprises européennes de hautes technologies", systèmes d’information et management, 13, 3, p43. serna m, e., (2012), "maturity model of knowledge management in the interpretativist perspective", international journal of information management. swierczek, f.w, thanh ha, t. (2003), "motivation, entrepreneurship and the performance of smes in vietnam, journal of enterprising culture", vol. 11 no. 1, pp. 47-68. tej adidam et al., (2009), "cross-cultural competitive intelligence strategies", marketing intelligence & planning 27(5):666680 tej adidam, p, et al., (2012), "competitive intelligence and firm's performance in emerging markets: an exploratory study in india", journal of business & industrial marketing 27(3):242-254 · thomas, j.b., clark, s.m. and giola, d.a. (1993), "strategic sensemaking and organizational performance: linkages among scanning, interpretation, action, and outcomes", academy of management journal, vol. 36 no. 2, pp. 239-70. wendler, r (2012), "the maturity of maturity model research: a systematic mapping study", information and software technology, 54, 1317–1339 wilensky, h., (1967), organizational intelligence: knowledge and policy in government and industry, new york: basic books. wright, s., eid, e.r., & fleisher, c.s. (2009). "competitive intelligence in practice: empirical evidence from the uk retail banking sector", journal of marketing management, 25(9/10), 941-964 wright, r. eid, fleisher (2009), "competitive intelligence in practice: empirical evidence from the uk retail banking sector", journal of marketing management, vol. 25, no. 9-10, pp. 941-964. page 4 editors note vol 6 no 1 editor’s note vol 6, no 1 (2016) the width and scope of intelligence studies in business if the last issue of jisib was a special issue where the discipline was reflecting on itself, then this issues shows some of the width and scope of the field. the conceptual article by nienaber and sewdass presents a relatively new concept of workforce intelligence, and links it to competitive advantage by way of predictive analytics. the article by solberg søilen is an attempt to lay out a broad scientific agenda for the area of intelligence studies in business. empirical findings come from a survey, but in the discussion the author argues for why the study should define itself as much broader than what the survey data implies, breaking out of the current dominating scientific paradigm. the article by fourati-jamoussi and niamba is an updated evaluation of business intelligence tools, a frequently reoccurring topic. however, this time it is not a simple evaluation of existing software, but an evaluation by users to help designers of business intelligence tools get the best efficiency out of a monitoring process. the article by calof is an evaluation of government sponsored competitive intelligence for regional and sectoral economic development in canada. the article concludes that it is possible to calculate positive economic impacts from these activities. rodríguez salvador and hernandez de menéndez come back to a field that has become a specialty for rodríguez salvador: scientific and industrial intelligence based on scientometric patent analysis. this time she looks at bio-additive manufacturing using advanced data mining software and interviews with experts. as always, we would above all like to thank the authors for their contributions to this issue of jisib. on behalf of the editorial board, sincerely yours, prof. dr. klaus solberg søilen halmstad university, sweden editor-in-chief copyright © 2016 jisib, halmstad university. all rights reserved. journal of intelligence studies in business vol. 6, no 1 (2016) p. 4 open access: freely available at: https://ojs.hh.se/ jisib-vol-12_nr-3(2022).pdf journal of intelligence studies in business vol. 12 no. 3 (2022) open access: freely available at: https://ojs.hh.se/ pp. 4–5 ai-driven competitive intelligence: enhancing business strategy and decision making in the world of business, the importance of competitive intelligence cannot be overdone. as companies compete for market share and seek to gain an edge over their competitors, understanding the market and their competition becomes increasingly critical. as artipotential to impact competitive intelligence grows. companies can use ai to automate data collection and analysis, allowing them (krakowski et al.2022). ai can also be used to analyze competitors’ online activities, includand search engine rankings. this allows companies to stay up-to-date with their competition and respond quickly to changes in the market. in this issue, authors will explore the role of competitive intelligence in an ai world, examine practitioners’ thoughts on technological advances and the educational needs of their intelligence on the hiring process. the use of is becoming increasingly popular in competitive intelligence. these technologies can be used to automate data collection, analysis, cient and accurate. there is also a discussion intelligence in education research, the effect of marketing intelligence adoption on enhancintelligent trading strategies, including interacting trading strategies based on an agentbased approach. as technological advances continue to change the competitive intelligence landscape, practitioners must keep up with the latest developments to remain effective. they must also ensure that their successors are prepared to succeed in an increasingly technology-driven world. this requires ongoing education and training in areas such as data analysis, ai, and machine learning. ai is also changing the hiring process, allowing companies to use data-driven approaches to identify and recruit the best candidates. ai can be used to analyze resumes, evaluate candidate responses to interview questions, and even predict a candidate’s future job performance. this allows companies to make more informed hiring decisions and reduce the risk of hiring the wrong person for the job. marketing intelligence can also play a critiin the case of banks, marketing intelligence can be used to identify new opportunities for growth and optimize their marketing efforts to reach the right customers. this can help banks petitive advantage in the market. are also becoming more intelligent. an agentbased approach involves using ai to create a model of the market and simulate how different trading strategies would perform in that market. this allows traders to identify the most effective strategies and improve their trading performance. in conclusion, the impact of ai on the busigrow. competitive intelligence, in particular, practitioners must stay up-to-date with the latest technological developments and ensure that their successors are prepared for an increasingly technology-driven world (cekuls, 2022). ai is also impacting the hiring process, education research, marketing intelligence, and trading strategies, highlighting the need for ongoing education and training in these and other areas (stroumpoulis et al, 2022). by embracing these technological advances, editor’s note vol 12. no. 3 (2022) 5 companies can gain a competitive advantage and improve their overall performance in the market. references cekuls, a. (2022). expand the scope of competitive intelligence. journal of intelligence studies in business, 12(1), pp. 4–5. and big data analytics in smart tourism: a resource-based view approach. wit transactions on ecology and the environment, 256, 2022, pp. 99–108. krakowski, s., luger, j., raisch, s. (2022) es of competitive advantage. strategic management journal, 2022. on behalf of the editorial board, prof. dr. andrejs cekuls university of latvia, latvia jisib-vol-12_nr-2(2022).pdf 51 applying patent analysis with competitive technical intelligence: the case of plastics marisela rodríguez salvador and mario alberto tello bañuelos instituto tecnológico y de estudios superiores de monterrey (itesm), campus monterrey, eugenio garza sada 2501, monterrey, mexico marisrod@itesm.mx received 15 march 2012; received in revised form 30 april 2012; accepted 30 april 2012 abstract: this article presents a methodology that integrates patent analysis in a study of competitive technical intelligence. our approach was applied in the area of plastics. we identified areas of research, leading companies and technology trends. keywords: competitive technical intelligence, innovations, patent analysis, plastics, thermoplastic elastomers 1. introduction the oil crisis of 1974 influenced the increase in consumption of plastics, especially in the automotive industry. plastics have allowed to decrease the weight of automobiles, which have had a significant impact for example on savings in fuel consumption per kilometer. among the polymers used to reduce the weight of automobiles are polyesters, polypropylene, polyvinyl chlorides, polyurethanes, polyethylene, abs (acrylonitrile-butadiene), nylon (feldman, 2008). within this area the level of technological development is very fast so it is required to be available for free online at https://ojs.hh.se/ journal of intelligence studies in business 2 (2012) 51-58 https://ojs.hh.se/ 52 continually on the lookout for events arising in the environment, for example, development of new technologies, materials, etc. this is the case of thermoplastic elastomers, which are characterized by having the elastic behavior of rubber and thermoplastic processing. in fact it has become the fastest growing segment of the polymer industry, so they are considered a great business opportunity (kear, 2003). in mexico, in the city of monterrey (state of nuevo leon) the main campus of the instituto tecnológico y de estudios superiores de monterrey (itesm) is located. within this institute the unit of competitive technical intelligence (center of quality and manufacturing) provides training, consultancy and research in that area. in 2011 a collaborative project between a mexican company and the itesm, campus monterrey, was implemented. initially this project was linked to that company, which was interested in the area of thermoplastic elastomers. at the beginning of the project, the topic was focused on alternative monomers to styrene, butadiene and/or isoprene, preferably from renewable sources. the general statistical results of that topic, based on the software matheo patent’s results, were presented to the company. after that a strong reorganization from the headquarters of the company was made and this company was closed. we decided to continue with our methodology and to undertake a general study on plastic, considering patent analysis in the topics of thermoplastic elastomers and styrene, butadiene and isoprene. the main goal was to identify technology trends that could allow to determine opportunities, including the identification of leading companies and their main areas of research. 2. competitive technical intelligence and patent analysis competitive intelligence is rooted in three areas: governmental intelligence agencies, management studies and market research (michaeli, 2006, cited by schwarz 2007). while it is true that competitive intelligence had its beginnings in the 70s, it was until 1980 when michael porter laid the foundations of this discipline in his book competitive strategy: techniques for analyzing industries and competitors. this discipline denotes an apparent novelty in latin america, but is widely used by major multinational companies, in 2001, according downham et al, cited by medina lugo (2008), over 82% of companies with revenues in excess of usd $10 000 million had an intelligence system, while 60% of those earning over usd $1 billion also had some practices of intelligence. in the mid’s 80’s in the united states the strategic and competitive intelligence professionals, scip, was established. the organization is a leading professional association dedicated to the study of competitive intelligence in the world. according to scip homepage (2011), competitive intelligence is "the process of monitoring the competitive environment and analyze the findings in the context of the problems specific to each company in order to provide support in decisionmaking." in this context we shall define competitive technical intelligence (cti), as the process focused on monitoring the competitive and technological environment of an organization, that supports decisions, especially those related to market, innovation, product design, and research and development (r & d). cti is carried out in organizations of all sizes through a continuous and systematic process that involves legal and ethical collection of information, analysis relevant conclusions, and the collection and controlled dissemination of useful results. by means of this process it’s possible to identify opportunities and threats in the environment for strategic planning processes (adapted from the scip, 2011). cti is applicable to various types and sizes of organizations to determine business opportunities, information on specific products and services from competitors, threats, etc. innovation can be achieved by cti. innovation is commonly defined as the beginning of an idea in relation to a product or process that is new for a specific company. however, innovation is the successful exploitation of new ideas: it therefore requires of two conditions: the novelty and use (alegre, chiva & lapiedra, 2009). in this context patent data are an important source of competitive intelligence that companies can use to gain strategic advantage (shih, liu & hsu, 2010). for several years patents have been considered as indicators of technological progress. through patent analysis it is possible to identify among 53 others issues: areas of technological specialization, company profiles, institutions involved in research, technological activity by countries and collaborative networks (rodríguez, 2003). moreover, the usefulness of patents has been demonstrated as a support of strategic planning for products and processes (lozano, 2003). in order to carry out the analysis of large volumes of information the field of scientometrics represents a valuable alternative. this is defined as the set of studies to quantify the process of written communication, the nature and evolution of scientific disciplines / technologies by counting and analysis of various characteristics of the communication (amat, 1994 cited by rodríguez 2003). also using analysis of co-occurrence (cooccurrence of words), with advanced techniques such as mapping technology it is possible to identify the behavior of business or technology areas in a specific field and period of time, and thereby identify opportunities and threats to innovation. patent information can be found in different databases, some of them are: uspto patent database full text and images, united states esp@cenet database of epo (european patent office) google patent patent database from uspto patentscope database of international patent applications wipo (wipo) depatisnet database of german patent ajp database of the japan patent office dwpi derwent world patents index patent database from thomson reuters the use of specialized software makes patent analysis easier. one of the most recognized software in the field of patents is matheo patent from france. through this program is possible to access uspto and espacenet databases and monitor technology. we applied this software in plastics, including thermoplastic elastomers. in this area the level of technological development is very fast because of events arising in the environment including, development of new technologies, materials, etc. 3. the case of study thermoplastic elastomers (tpes) are a class of polymers within their design limits, they behave like thermoset rubber but above its melting point or softening temperature, they could be processed by thermoplastic methods with the advantage that unlike thermoset rubber, tpes can be easily reworked and remodeled. the ability to transform these materials with thermoplastic methods allows freedom of design and manufacturing that thermoset rubber does not offer (rtp, 2011). all tpes are composed of amorphous and crystalline domains. some of them are mixtures or alloys of crystalline and amorphous polymers; some are block copolymers comprising blocks of crystalline and amorphous domains along the same polymer chain. it is important to mention that the crystalline domains provide to tpes the character thermoplastic and amorphous domains give them the elastomeric character (rtp, 2011). the crystalline domains are usually known as the phase "hard" and the amorphous domain as phase "soft." although both phases contributes to the general properties of a physical and mechanical tpe, some key properties may be associated with one stage or another which guides the selection or design of a compound of tpe. as we have established before tpes can be processed as thermoplastics imitating the performance of thermoset rubbers, for this reason tpes have become the category of plastics with the most growth during the last 10 years (grande, 2008). among the main drivers of market growth of tpes are: simplified processing with fewer manufacturing steps, virtual elimination of scrap, considerably shorter cycles, lower power consumption, and lower costs per volume due to the low density of most tpes (drobny, 2007). the faster processing and low rates wastes have made tpes a niche market that continually expand in markets such as automotive, medical and consumer products (grande, 2008). in this respect, we applied patent analysis in a competitive technical intelligence process as a method to monitor the technology. 4. integration approach based on the competitive intelligence methodology proposed by escorsa & rodríguez (2000), a synergic model was designed, as shown in figure 1. 54 figure 1. method of competitive technical intelligence with patent analysis. the objective was to identify trends through patent analysis within thermoplastic elastomers area. in the subsequent paragraphs, we present a brief explanation of the development of each step, including insight obtained from the implementation of the method proposed above. 5. the methodology even though this study refers to plastics, including market information, it is important to mention that the patent analysis was focused in thermoplastic elastomers along with styrene, butadiene and isoprene. this study covers two approaches: the market approach and the technological approach one. the market approach covers market information related to chemical industry and their key companies participating in the plastic segment. on the other hand, the technological approach refers to patent analysis of in thermoplastic elastomers along with styrene, butadiene and isoprene. it also covers statistical patent data regarding plastics and thermoplastic elastomers. a. planning in this step was established the objective, time and resources. matheo patent was applied to develop the patent analysis. b. selection and gathering of information in this study, first a general search was conducted on the topic of plastics in order to get an idea of the number of patents published in recent years. this general search was carried out by uspto with the purpose of getting a high enough number of patents, to have an idea related to the progress in this field. espacenet required much more time in the process of downloading (more than 20 hours). this can complicate the analysis process. the period selected was 2000-2012. the result was a total of 5446 patents, 6535 inventors, 2519 applicants, 445 ipc 4 digits (international patent classification) and 6132 ipc (full digits). the chronology of the patents, identified is shown in figure 2. figure 2. chronology of patents issued about plastics, 2000-2012. source: data from uspto and matheo patent. a general search for thermoplastic elastomers was made with the same purpose using the uspto database and taking into account the 2000-2012 period of time. the result was a total of 1531 patents, 2038 inventors, 2519 applicants, 223 ipc 4 digits and 1948 ipc full digits. the chronology of the patents is shown in figure 3. figure 3. chronology of patents issued about tpes, 2000-2012. source: data from espacenet and matheo patent. 55 subsequently, we made a research of patents on thermoplastic elastomers and styrene, butadiene and isoprene. the espacenet database did not require a lot of time for downloading for this search. using the database in the period 20002012 the result was a total of 477 patents, 811 inventors, 352 applicants, 68 ipc 4 digits and 507 ipc full digits. the main ipc (4 digits) obtained was c08l which refers to compositions of macromolecular compounds. however, in order to apply a deep analysis of the main applicants, a group was created from the applicants with the highest amount of patents (top 5). this group was integrated by the following organizations: michelin soc tech michelin rech tech mitsuboshi belting ltd toray du pont kk polyone corp according to this group, there are different ipc 4 digits related to all applicants, where ipc c08l has the highest amount of patents. the ipc refers to compositions of macromolecular compounds. regarding the ipc of full digits, all applicants are involved in the following, as shown in figure 4. figure 4. description of ipc full digits related to applicants involved. source: data from espacenet and matheo patent. a search regarding the keywords styrene, butadiene and isoprene in the abstract of the patents was then made. as a result we observed that the keyword styrene was related to 50 patents, butadiene to 15 patents and isoprene to 21 patents. moreover, all of these keywords were related among them to the following ipc (4 digits), as shown in figure 5. figure 5. description of ipc 4 digits related to keywords styrene, butadiene and isoprene. source: data from espacenet and matheo patent. c. analysis information i. market approach the global market for chemical products grew by 7.6% in 2010 to reach a value of usd $ 706,312.5 million. the compound annual growth rate of the market in 2006-2010 was 3.3% (datamonitor, 2011). this market is characterized by low product differentiation; the barriers to market entry are in addition the necessary capital to establish facilities and strict regulations that increase rivalry. in figure 6, we can see the influential five forces on this problem. figure 6. five forces driving the global market of chemical products. source: datamonitor, global specialty chemical (2011) 56 in the chemical industry there are several companies involved in the plastics sector, leading companies globally in this category are: basf the dow chemical company ineos lyondellbasell industries under this approach, information regarding the previous companies was gathered in order to apply the analysis of porter’s five forces, as shown in figure 7. figure 7. five forces of the main competitors driving the market of plastics. according to figure 7, there is a strong rivalry between the companies in the plastics industry; the economies of scale contribute with the growth of the multinationals in this industry, followed by a considerable capacity of buyer power. the forces concerning the entry of new firms and the supplier power are considered moderate, as greater product differentiation between firms is required. in addition, there is a small threat of substitute products. moreover, all of the companies analyzed have a strong activity in the area of polymers through their subsidiaries or business segments. ii. technology approach the main applicants as well as the keywords: styrene, butadiene and isoprene; are linked to the ipc c08l (compositions of macromolecular compounds). based on this ipc analysis, four trends were identified. these trends are detailed with information related to the main applicants involved, amount of patents, abstract of some relevant patents, as follows: trend 1: compositions of block copolymers containing at least one sequence of a polymer obtained by reactions only involving carbon-to-carbon unsaturated bonds; compositions of derivatives of such polymers: of vinyl aromatic monomers and conjugated dienes. figure 8. description of elements related to trend 1. trend 2: compositions of homopolymers or copolymers of unsaturated aliphatic hydrocarbons having only one carbon-to-carbon double bond; compositions of derivatives of such polymers, as illustrated in table below: 57 figure 9. description of elements related to trend 2. trend 3: compositions of oils, fats or waxes; compositions of derivatives thereof, as illustrated in table next: figure 10. description of elements related to trend 3. trend 4: compositions of polyesters obtained by reactions forming a carboxylic ester link in the main chain; compositions of derivatives of such polymers. figure 11. description of elements related to trend 4. 58 6. conclusions through the patent analysis it was possible to identify the main actors in the subject matter, as well as their areas of research. the trends were identified according the ipc c08l; this ipc was related to the main applicants (michelin soc tech, michelin rech tech, mitsuboshi belting ltd, toray du pont kk, polyone corp) and the keywords: styrene, butadiene and isoprene. our proposal provides results from both points of view of technology and the market; the results obtained can contribute in the future to identify opportunities. the method can be applied to any subject that considers patents as a source of strategic information. the proposed method considers a global analysis on the plastics industry, covering both market information and the leading companies. the analysis of porter’s five forces were incorporated into the stage of the analysis with good results. references alegre, j.; chiva, r.; lapiedra, r. (2009) measuring innovation in long product development cycle industries: an insight in biotechnology. technology analysis & strategic management. vol. 21, (4), 535–546 datamonitor. (2011). global specialty chemicals. datamonitor industry profile. drobny, j. g. (2007). handbook of thermoplastic elastomers. norwich, new york, united states of america: william andrew publishing. escorsa, p., & rodríguez, m. (2000). la inteligencia tecnológica en la organización empresarial: instrumento para la toma de decisiones. revista de la escuela de economía y negocios, ii(4). feldman, d. (2008). polymer history. design monomers and polymers, 1-15. grande, j. (2008). tpes move up the performance scale. plastics technology, 5373. kear, k. (2003). developments in thermoplastics elastomers. rapra review reports, xiv(10). lozano, i. (2003). el análisis de patentes en el mundo de la inteligencia tecnológica competitiva. puzzle(8). lugo medina, j. n. (2008). modelo de evaluación de tecnología basado en la conjunción de análisis de patentes y roadmapping (tesis de maestría). monterrey: itesm. rodríguez, m. (2003). análisis de patentes en la inteligencia competitiva y tecnológica: el caso de los materiales avanzados. puzzle, 4-9. rtp. (2011). retrieved november 2011 from http://www.rtpcompany.com/products/elastom er/index.htm schwarz, j. (2007). competitive intelligence: a field for futurists? future research quaterly. scip. (2011). about scip. retrieved january 2011 from strategic and competitive intelligence professionals: http://www.scip.org/content.cfm?itemnumber= 2214&navitemnumber=492 shih, m.-j., liu, d.-r., & hsu, m.-l. (2010). discovering competitive intelligence by mining changes in patent trends. expert systems with applications, xxxvii(4). issn: 2001-015x v o l 4 , n o 2 ( 2 0 1 4 ) c o n t e n t s christophe bisson exploring competitive intelligence practices of french local public agricultural organisations pp. 5-29 o p i n i o n s e c t i o n najibeh abbasi rostami integration of business intelligence and knowledge management – a literature review pp. 30-40 pierre memheld intelligence analysis and cognitive biases: an illustrative case study pp. 41-50 abdelkader baaziz, luc quoniam patents used by npe as an open information system in web 2.0 – two mini case studies pp. 51-60 klaus solberg søilen a survey of users’ perspectives and preferences as to the value of jisib a spot-check pp. 61-66 ~ 2 journal contact: mailing address: jisib halmstad university box 823 301 18 halmstad sweden principal contact: prof. dr. klaus solberg søilen school of business and engineering (sbe) email: klaus.solberg_soilen@hh.se copyright © 2014 jisib, halmstad university. all rights reserved. 3 e d i t o r i a l t e a m founding editors prof. henri dou (france), goupe escem prof. per jenster (china), nimi honorary editors prof. john e. prescott (usa), university of pittsburgh prof. bernard dousset (france), toulouse university editor-in-chief dr. klaus solberg søilen (sweden), halmstad university regional associated editors america: prof. g. scott erickson (usa), ithaca college europe: prof. sahbi sidhom (france), nancy university asia: prof. xie xinzhou (china), beijing university africa: prof. adeline du toit (south africa), university of johannesburg t h e e d i t o r i a l b o a r d : dr. mark xu, university of portsmouth, uk dr. subir ranjan das, university of petroleum & energy studies, india associate professor dirk vriens, radboud university, netherlands professor karim baina, école nationale supérieure d'informatique et d'analyse des systèmes (ensias), morocco professor uwe hannig, fachhochschule ludwigshafen am rhein, germany dr. klaus solberg søilen, halmstad university, school of business and engineering, sweden dr. eduardo flores bermudez, bayer schering pharma ag, germany professor kingo mchombu, university of namibia, namibia professor adeline du tout, university of johannesburg, south africa professor pere escorsa, school of industrial engineering of terrassa, politechnical university of catalonia, spain associate professor per frankelius, örebro university, sweden professor malek ghenima, l'université de la manouba, tunisia professor blaise cronin, indiana university, united states dr. john e. prescott, university of pittsburgh, united states dr. michael l neugarten, the college of management, rishon lezion, israel professor mika hannula, tampere university of technology, finnland professor kamel smaili, université nany 2, france professor henri jean-marie dou, atelis competitive intelligence work room of the groupe escem, france professor bernard dousset, toulouse university, france professor g. scott erickson, ithaca college, united states professor sahbi sidom, université nancy 2, france professor xinzhou xie, beijing science and technology information institute, china associate professor jonathan calof, telfer school of management at university of ottawa, canada professor per v. jenster, nordic international management institute, china professor alfredo passos, fundação getulio vargas, brazil professor brigitte gay, esc-toulouse, france professor sophie larivet, ecole supérieure du commerce extérieur (esce), paris, france t h e m a n a g e r i a l b o a r d : way chen, china institute of competitive intelligence (cici) raíner e michaeli, director institute for competitive intelligence gmbh, germany philippe a. clerc, director of ci, innovation & it department at the assembly of the french chambers of commerce and industry, france alessandro comai, director of miniera sl, project leader in world-class ci function, spain pascal frion, director acrie competitive intelligence network, france hans hedin, hedin intelligence & strategy consultancy, sweden javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/49') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/18') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/20') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/19') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/21') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/3') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/22') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/23') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/24') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/25') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/26') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/27') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/28') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/6') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/29') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/17') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/16') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/4') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/7') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/8') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/9') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/10') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/12') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/31') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/13') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/14') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/15') 4 journal of intelligence studies in business halmstad, november 10 2014 e d i t o r i a l n o t e v o l 4 , n o 2 ( 2 0 1 4 ) like in the previous issue we have admitted a large number of opinion pieces, first of all in the form of case studies but also reviews and a survey. it is quite fitting that we present two articles with cases as case studies have been requested in a recent surveys from users of the journal. the first article by christophe bisson shows ci practices at a french regional chamber of agricultura with four departemental chambers of agricultura linked to it. a survey was used to detect seven typological strands (gathering, attitude, technology support, it systems, use, location and identification). the paper finds that current practices are ineffective, inefficient and far from attaining goals for collective intelligence gathering. the second article by najibeh abbasi rostami is a literature review of the bi and km fields. in a previous issue we have discussed the relationship between ci and km. rostami presents the differences in the form of a number of models and summaries found in the existing literature. the articles conclude, not unexpectedly, that the literature clearly shows that a proper integration of the two functions are beneficial to organizations. more interesting the review also concludes that studies are needed to show how cultural aspects affect this dichotomy. the third article, the second opinion piece, is a case study by pierre memheld. the article illustrates a critical ci lesson through the use of a case presenting two major tire manufacturers troubled by a price war. the article argue that intelligence failures can be caused by particular biases which may be culture related. the fourth article by abdelkader baaziz and luc quoniam is a discussion around “patent trolls” and non practicing entities (npe). the article is illustrated with two examples, or mini cases, from the pharmaceutical industry in two emerging countries. the article shows how the use of web 2.0 technologies makes it easier to extract useful intelligence from patents. the last article by klaus solberg søilen entitled “a survey of users’ perspectives and preferences as to the value of jisib a spot-check” show what users want from the journal jisib. it concludes that more cases studies are requested, but it gives no credit to those who think there is too much or too little technology related material as opinions on this issue are balanced. a number of minor suggestions are presented and the survey shows that the question of editing language is not settled. as always we would first of all like to thank the authors for their contributions to this issue of jisib. on behalf of the editorial board, sincerely yours, prof. dr. klaus solberg søilen editor-in-chief halmstad university i box 823 i s-301 18 halmstad, sweden i tel: +46 35-16 71 00 18 a new evaluation model of erp system success abdesamad zouine 1 pierre fenies 2 1 crcgm université d’auvergne, france 2 ceros, paris x nanterre, france email: zouine.abdessamad@gmail.com received march 10, accepted may 12 2015 abstract: this article presents a literature review about the success evaluation in the information system, and proposes a new evaluation success model suited to the erp software. in the first part we present approaches, frameworks and models of the evaluation success previously used and empirically validated by researchers in the is field. then, we present our evaluation success model, highlighting its three main theoretical foundations: mathematical theory of communication, diffusion of innovation theory and adaptive structuration theory in the one hand, and we expose the main construct of this model named the esf (evaluation success factors) on the other hand. these factors are classified in three categories: technological, environmental and organizational evaluation factors. this work analyses articles published in the last decade about the success evaluation and delineates ten esf’s widely used to evaluate the success of the erp system project. keywords: erp system, success, evaluation approaches, evaluation success factors. available for free online at https://ojs.hh.se/ journal of intelligence studies in business vol 5, no 1 (2015) 18-39 mailto:zouine.abdessamad@gmail.com https://ojs.hh.se/ 19 1introduction the beginning of the 90’s was characterized by the emergence of erp system, considered as one of the most important information systems software and the most expensive information technology project. the investment in this kind of project is under increasing scrutiny and pressure to justify their value and contribution to the performance, quality, and competitiveness of organizations (gable et al., 2003). currently, and after approximately two decades, all the largest business companies are now equipped with the erp system in order to follow the environment change and business development. the integration of this project is considered as one of the most important challenges for the top management, project manager, erp consultant and vendor at different levels of the organization. the erp integration requires large investment, and it is associated with many problems in the implementation phase (markus and tanis, 2000). despite the substantial investments made by organizations, its success had been minor (davenport, 1998; davis, 1989a; gable et al., 2003; sedera and gable, 2010). in the literature review, many theoretical researches attempt to develop models to evaluate the information systems success. however, these models are not entirely appropriate for measuring erp system success (gable et al., 2003) for many reasons such as the specificities of the erp system, its characteristics, and the complexity of implementation process. organizations must support and manage the change introduced by the erp system, because its integration needs an important reorganization and transformation in the business process, at both strategic and technical level. in many cases, this resistance is considered as a major risk of erp project implementation. before the evaluation of the erp system, a framework has to be fixed and take into consideration the characteristics of the system. however, the context should dictate the appropriate specification and application of the erp system (delone and mclean, 2003, 1992). although, many success variables are proposed by researchers to evaluate the erp success and attempt to explain the causal and the process model adapted to propose their constructs and measurement variables. this question about the causal and process model has been discussed in the literature about the is evaluation. the process model suggests that an is is first created, containing various features, which can be characterized as exhibiting various degrees of system and information quality. in contrast, a causal model studies the covariance of the success dimensions to determinate if there exist a causal relationship among them (delone and mclean, 2003). to evaluate their information systems, organizations require appropriate methods and tools; (irani, 2002; uwizeyemungu and raymond, 2010) propose a new qualitative method for the ex-post evaluation of erp system based on one hand on the organizational performance, and on the other hand on the automationed, informational and transformational effects that result from the integration and the use of the system. their approach is based on a process model that takes into account at the same time practitioners’ dimension of evaluation, and researchers’ conception of evaluation that also can take two faces: qualitative or quantitative approaches of information system evaluation (irani and love, 2008). this phenomenon of is evaluation is complicated and multifaceted; it must be examined from many perspectives (song and letch, 2012) and take into account different stakeholders involvement (irani and love, 2008; irani et al., 2014; stefanou, c.j., 2001). according to the erp evaluation success, a new framework of ex-ante evaluation was proposed by (stefanou, c.j., 2001) to evaluate the erp system. this framework includes in the same time behavioral, technological and organizational perspective to evaluate the erp software which is considered as a complex system (irani, 2002; stefanou, c.j., 2001). this step of success evaluation could be classified in the pre-implementation phase of the erp integration process. it takes into account the selection process of the appropriate erp software and all variables and criteria to select the most suitable one. the process of selection based on the one hand on both financial and non-financial approach and on the other hand it combines qualitative and quantitative measures (stefanou, c.j., 2001). relating to life-cycle product, the evolution of erp integration process follows three phases: preimplementation, implementation and postimplementation. however, in this study, we include both ex-ante and ex-post evaluation in to erp success evaluation model because the evaluation is considered as a process that involves all esf (evaluation success factors) throughout the erp life-cycle. this research paper will start with a presentation of the literature review about the different frameworks, models and approaches discussed by searchers in the is evaluation success (davis, 1989b; delone and mclean, 2003, 1992; gable et al., 2003; ifinedo and nahar, 2006; irani and love, 2008; kaplan and norton, 1992; rosemann and wiese, 1999; seddon, 1997; tsai et al., 2006) then, it will expose theoretical foundations based on three main theories: firstly, the mathematical theory of communication (weaver and shannon, 1949) used by delone and mclean to develop their model about information success to explain the three levels that must be taken into account to evaluate is success (technical level, semantic level and effectiveness level). secondly, the diffusion of innovations theory (rogers, 1983) mobilized by (bradford and florin, 2003) to explain the role of the diffusion of innovation on the erp implementation success that will be used to involve and classify three principal factors in the conceptual 20 model: technological; organizational and environmental. thirdly, the giddens’ theory of structuration (1984) to explain the interaction between the variables (factors) and the performance in three levels: individual workgroup and organizational performance. in the second part, we expose our conceptual model and highlight the principal evaluation success factors identified in both theoretical models and empirical studies. after that, we will explain how these esf’s are classified taking into account the theoretical background in order to justify our conceptual perception. 2literature review about approaches, models and frameworks of erp success this part focuses on the literature review on the research in is success to summarize both theoretical backgrounds and empirical studies. the presentation will be chronologically respected in terms of frameworks, models and approaches developed in the is field. then, we will focus our attention on erp as the main subject of this study. a review of different measurement approaches about the erp success evaluation will be discussed to highlighting the importance of the measure in the information system and particularly the erp software. 2-1frameworks of erp evaluation success: developing a framework is the first step in the evaluation success that must be appropriate to the features of the information system (chand et al., 2005; irani et al., 2014; stefanou, c.j., 2001; uwizeyemungu and raymond, 2010) many frameworks have been proposed taking into account several phases and dimensions of evaluation system success: strategic, tactical and operational levels. generally, the framework explains eight categories: theoretical foundation, research approach, the object of analysis, unit of analysis, evaluation perspective, data gathering, data analysis and the methodology type (urbach and smolnik, 2008). 2-1-1 the ccp framework: a ccp proposition could be considered as an important framework to assess the success of erp system because this framework integrates three major dimensions of evaluation: content, context and process (irani and love, 2008; irani, 2002; song and letch, 2012). this new approach of evaluation answers three main questions: firstly, what is being measured (content) based on a socio-technological paradigm? secondly, why and who of is evaluation to be considered (context)? and thirdly how will it be undertaken?. many instruments could be used to answer this question like, cost benefits, roi (return on investment), user satisfaction that could be classified as an objective or subjective evaluation approach. this framework has been developed by (irani and love, 2008; irani, 2002) to assist the managers and the decision makers in the process of the benefits evaluation of the it/is. they argue that there is not a good framework for assessing the impact of is in the organization performance in the literature review and they added that there is no good framework for selecting the appropriate tools for is investment. for these reasons, they try to propose a ccp framework to assess the cost and benefits of is based on three constructs: content, context and process. but we conclude after analyzing this framework that it is too large and general to be applicable to assess the success evaluation of the erp system. 2-1-2stefanou’s framework: another framework for the evaluation of the erp system is developed by (stefanou, c.j., 2001). it focuses on the pre-implementation phase. this framework named “ex-ante evaluation of erp” assesses the selection process of erp system and takes into account the complexity and the features of the erp system. both financial and non-financial approaches for erp evaluation have been included in this framework. the financial approach is a traditional one used by the professionals to evaluate their is success based on some financial indicators such as: return on investment, return on sales, cash flow, sales growth, inventory turnover, inventory level, operating income, asset utilization, capital budgeting, market share and shareholder value (tsai et al., 2006). in contrast, in the case of erp project, these financial indicators are not always reliable to assess the erp impact because the benefits and the costs are not precisely identifiable, and they are not easily quantifiable (stefanou, c.j., 2001). the second approach adopted by some researchers to evaluate the erp success is based on a qualitative or subjective method that takes into consideration the intangible benefits such as: individual impact, learning and growth, consumer satisfaction, and the work group impact (gable et al., 2003). 21 stefanou’s framework consists of four phases: the first one considers the business vision as a point of starting for erp integration. the second phase examines the business needs and the capabilities of the company to support and fit with the erp system. the third phase requires the estimation of the costs and benefits for erp system integration. the last phase refers to the analysis of issues involved in erp operation, maintenance and evolution. table 1: the potential costs and benefits associated with erp life-cycle phases. (stefanou, c.j., 2001) phases of erp life cycle estimation of potential tangible and intangible costs, benefits and risk involved in each phase phase 1: business vision risk associated with non-clarification of business vision and blurred business goals phase 2a: comparing needs versus capabilities and constraints phase 2b: erp selection technological, organizational, human resources and financial capabilities and inefficiencies. commitment to continuous change costs/ benefits/risks associated with all-in-one or best-of-breed software options costs/benefits associated with issues costs involved in the selection process phase 3: implementation project replacing of legacy systems consulting fees users training implementation approaches implementation partners completion time phase 4: operation, maintenance and evolution continuous re-engineering software upgrades additional functionality benefits from erp maturity both operational and strategic erp users satisfaction partner/customers satisfaction business vision erp selection erp implementation erp operation/ maintenance/ evolution capabilities/ constraints evaluation of cost, benefits, risks: strategic-operational. estimation of roi/value/business case of erp phase 1 requirements phase 2 phase 3 phase 4 figure 1: major phases of erp life-cycle (stefanou, c.j., 2001) analysis 22 depending on the life-cycle approach developed above, a new proposition based on supply chain could be used to understand the different erp project stakeholders. this approach of erp success includes all the partners that operate in the integration process. this supply chain of the erp success is based on three principal parts: firstly, the organization that considered as a client or customer; secondly the software vendor (vanilla erp); thirdly the company of consulting or the integrator. the collaboration between all the different partners in the value chain is necessary. this alliance is one of the strategic benefits of the erp implementation (shang and seddon, 2002). in this supply chain, the product is the erp software, the consumer is the organization that will integrate it, and the external partners are the companies specialized in the erp integration. but the question that arises here is: which are the parts that contribute in the success or the failure of the erp system project? analyzing this question from a scm approach which considers the erp as a product will be significant to determine the contribution of every partner in the erp success. the quality of the product is one of the most important esf in the project; in this case the quality of the product means the quality of erp system. many measures are proposed to assess this quality such as: response time, convenience of access, realization of user requirements, correction of errors, security of data and models, integration of system, flexibility of the system, system efficiency, database contents, data currency, system accuracy and data accuracy (delone and mclean, 1992). both vendor and consultant quality in terms of competencies is positively related to the erp success (ifinedo and nahar, 2006). some researchers consider this factor as an exogenous factor required in the erp process success because all the partners came from the external environment. in the literature review about the erp success evaluation, many studies include the vendor and consultant quality as an independent variable in their models to assess the erp success (bernroider et al., 2014; ifinedo and nahar, 2006; tsai et al., 2012; wang et al., 2008; zhu et al., 2010). some researchers found a significant and positive correlation between the vcq (vendor/consultant quality) and the success of the erp system and they argue that it is important to take into account the competencies both strategic and technical of the partners in erp system integration. the technical and knowledge transfers to the organization by the vendor and consultants are necessary to enhance the efficiency and the effectiveness of the erp system in all phases of the project integration. for example, after the process of erp system selection, the vendor transfers all the information about functionalities of the system, degree of customization, the functional coverage and other information supports to help the organization in the selection process. combining both vendor and consultant in one factor is necessary because they are considered as an external source of expertise to the organization. (ifinedo and nahar, 2006; sedera and gable, 2010) found that vendor and consultant quality built a single factor “knowledge management competencies”. the company that integrates an information system faces several starting conditions, according to competitive position, industry, financial position, size and structure (markus and tanis, 2000). however, these conditions may not be sufficient to explain clearly the success or the failure of the erp system, but they have two principal impacts on enterprise system experience. firstly, the strategic goals and plan may not be adapted to the erp system specificities, this strategic alignment or fit will may be a problem for the organization in some cases. secondly, the customization of the system could be necessary in many cases, that it means, starting conditions may not stay the same over the erp experience (markus and tanis, 2000). erp supplier (erp editor) erp integrator (consulting company) organization (client or consumer) erp success figure 2: process of the erp success 23 2-1-3soh and markus framework: the ultimate goal of (markus and tanis, 2000; soh and markus, 1995) works is to create a new framework that enables a better understanding of the concept of ess (enterprise system success). answering these questions: how companies can succeed the integration of this technology? and what can be done to improve the chance of success? authors define the success outcome as a multidimensional concept, a dynamic concept, and a relative one (to the concept of “optimal success”, representing the best an organization can hope to achieve with enterprise system). p. 184. the success can be defined by (markus and tanis, 2000) in terms of implementation project, or in terms of business results. the first definition answers the question: did the company succeed in getting the system up and running within some reasonable budget and schedule? the second answers the question: did the company succeed in realizing its business goals for the project? based on the mergence process theories because (markus and tanis, 2000) consider that these theories combine both goals and actions with external forces and chance. they build their framework on a particular emergent process theory designed by (soh and markus, 1995) to explain how the enterprise system as a technology creates business value in organizations. 2-2models of erp system success measurement many models have been developed to evaluate the systems and technology’s success (davis, 1989b; delone and mclean, 2003, 1992; gable et al., 2003; ifinedo and nahar, 2006; sedera and gable, 2010; shang and seddon, 2002). these models have been validated empirically by many studies in information system. the results show that many case studies are investigated by applying the delone & mclean is success model by using a structural equation modeling method (dörr et al., 2013). however, these models assess the success in three levels of impact. the first one is an individual impact (davis, 1989a) that sheds light on the users’ behaviors. the second level is the group impact (gable et al., 2003; sedera and gable, 2010) interesting on the workgroup and its influence on the performance, and the third one is an organizational impact (delone and mclean, 1992). although one model could assess more than one level of impact, for example, delone and mclean model take into account two levels of impact, individual and organizational performance. (gable et al., 2003; ifinedo and nahar, 2006; sedera and gable, 2010) in their models about the erp measurement success, they take into account three levels of impact, individual impact, workgroup impact and organizational impact to assess the success of erp system. and finally davis in his model of the technology acceptance model tam, takes into account one level; the individual impact to assess the user perception and behavior. 2-2-1technology acceptance model tam (davis, 1989) this model has been widely used in the information system and considered as one of the main theoretical foundations (king and he, 2006). tam has proven to be one of the most powerful models to explain user technology acceptance and users’ behavior (wu et al., 2011). davis claims that the technology usage is determined by two factors, perceived usefulness and perceived ease of use, this individual impact is the main object of technology acceptance model. many studies apply this model to understand the behavior and attitude of erp system users and assess the satisfaction as a result of system use, the measurement of this satisfaction toward erp system use is cse computer self-efficacy (bradford and florin, 2003; kwahk and lee, 2008; scott and walczak, 2009). davis attempts to show that the user acceptance has been an impediment to the system information success; he considers that the user acceptance is the principal factor determining the success or failure of an information system project. for this reason, he investigates about why users accept or not an information technology and how users are influenced the it use process appropriate/inappro priate use the competitive process competitive position competitive dynamics it impacts organizational performance the it conversion process it expenditure it management/ conversion activities it assets figure 3: soh and markus framework (1995) 24 by the system features. to answer this question davis develops his model based on fishbein and ajzen’s (1975) (davis, 1989b) theory from psychology to explain the users’ attitudes and behaviors toward the information system use. to explain the system use, davis’ investigation focuses on two main constructs, perceived usefulness and ease of use, which are theorized to be considered as determinants of system use (davis, 1989a). the first construct is defined as “the degree to which a person believes that using a particular system would enhance his or her job performance”. the second construct is defined as “the degree to which a person believes that using a particular system would be free of effort”. the theoretical foundations for these two constructs were based on three main theories. firstly, the self-efficacy from social cognitive theory (bandura, 1999). self-efficacy is considered as the foundation of human agency. the perceived selfefficacy occupies a pivotal role in social cognitive theory because its effects action are not only direct, but through its impact on other classes of determinants as well (bandura, 1999). this concept of self-efficacy has a causal relationship with motivation, performance and job satisfaction. based on bandura’s (1982) studies, (davis, 1989b) explains both self-efficacy judgment and the outcome judgments, and claims that the “outcome judgment” variable is similar to perceived of usefulness. the second theory used by davis is the adoption of innovations theory from (rogers, 1983). davis outlines that the adoption of innovations suggests a prominent role for perceived ease of use. in the same vein, in their meta-analysis about the innovation characteristics and innovation adoption, implementation (tornatzky and klein, 1982) found that three innovation characteristics (compatibility, relative advantage, and complexity) had the most consistent significant relationships to innovation adoption. the third theory is the cost-benefit paradigm from behavioral decision theory. it is relevant to perceived usefulness and ease of use (davis, 1989b). person choice among various decision-making strategies in terms of cognitive trade-off between the effort required employing the strategy and the quality of resulting decision, the distinction between subjective decision making performance and effort is similar to the distinction between the perceived usefulness and perceived ease of use (davis, 1989b). system perceived usefulness perceived ease of use attitude toward using actual system use figure 5: technology acceptance model (davis, 1989; p: 481) 25 davis develops and validates new scales for two main variables, perceived usefulness and perceived ease of use, which are hypothesized to be the determinants of user acceptance technology. based on two studies and 152 users as a sample of study, he developed items that were pretested for content validity and then tested for reliability and construct validity. in both studies, he finds that usefulness had a significantly greater correlation with usage behavior than did ease of use, and claims that the perceived ease of use is considered as an antecedent to perceived usefulness. however, after identifying two principal variables that impact the tam construct: subjective norms and the mandatory use context. the updated of tam named tam 2 includes subjective norm as additional predictor of intention in the context of mandatory system use (venkatesh and davis, 2000). 2-2-2delone and mclean success model: d&m model is the most cited model in information system success (kronbichler et al., 2010; sedera and gable, 2010) it is one of the most famous models adopted by researchers to assess the success of information system in the last two decades. (seddon, 1997) in his article named respecification and extension of d&m model of is, criticized this model about the inclusion of both causation and process interpretations, which lead to the confusion meanings that decrease the value of the model (seddon, 1997). delone and mclean have up-dated their model based on these critics (delone and mclean, 2003). despite, this update of their model, the first version stays the most adopted and most cited in the literature review in is success. the strength of d&m model resides in his theoretical foundation based on both shannon & weaver communication theory and mason’s communication systems approach (mason, 1978; weaver and shannon, 1949). they claim that the information is considered as an output of an information system that can be measured at three principal levels: technical, semantic and effectiveness level, referring to the mathematical theory of communication (weaver and shannon, 1949) and its levels to analyze the message as a result of communication system. defining and measuring the output of any system is always difficult, especially if the output is rather intangible. information as an output is represented in symbolic form, this concept of signs is central to both information and communication; it is considered as the key link in the way one system affects another and thus involves the system’s context as well as the sign its self (mason, 1978). weaver classifies the problems of communication into three hierarchical levels a b and c: level a. how accurately can the symbols of communication be transmitted? (the technical problem). level b. how precisely do the transmitted symbols convey the desired meaning? (the semantic problem). level c. how effectively does the received meaning affect conduct in the desired way? (the effectiveness problem). system quality information quality user satisfaction use individual impact organizational impact figure 6: d&m is success model (delone & mclean, 1992) 26 d&m explain the concept of impact levels from communication theory and consider the serial nature of information as a form of communication. the information system is considered here as a sender that creates information which will be communicated to the recipient; this latter will be influenced by the content of this information. following mason’s scheme above (figure 7), the information system is considered as a production tool; the information is the product and the recipient is the user which is influenced by the content and quality of information. in the same vein d&m based on this approach they developed in their model two levels of influence or impact (individual and organizational). in this sense, they add that the flow of information throughout the production process to the use of information has an influence on individual and/or organizational performance. based on these theoretical backgrounds, d&m developed six distinct categories or aspects of information system that become the constructs of their model, these constructs are: system quality (sq), information quality (iq), use, user satisfaction, individual impact, and organizational impact. these variables are the most adopted to assess the success of an information system in the last two decades. however, the problem is the model construction that attempts to combine both causal and process explanations of is success (seddon, 1997). the result of combining both variance and process model is that many boxes and arrows can have both a variance and an event in a process of interpretation, giving a sense of different parts of the model will cause slippage from one meaning for a box or arrow to another (seddon, 1997), this later claims that the major difficulties with d&m model can be demonstrated by focusing attention on the use as a construct. this box in (figure 6) can take three possible meanings: as a variable that proxies for the benefits from use, as the dependent variable in a variant model of future is use and thirdly as an event in a process leading to individual or organizational impact. in the figure 8, seddon shows the meaning of the categories in delone & mclean model of is success, and explains the combination of three models: shanon and weaver (1949) technical level level semantic effectiveness or influence level production product mason (1978) receipt influence on recipient influence on system use system quality information quality categories of i/s success user satisfaction individual impact organization al impact figure 7: categories of is success (delone & mclean, 1992; p: 62) system quality information quality benefits from use implied by user satisfaction benefits from use implied by is use benefits from use for individuals benefits from use for organazations figure 8: the meaning of the categories in d&m’s model of is success; seddon, 1997; p: 244 27 a variance model of is success, where the system quality and information quality are considered as an independent variables, and the dependent variables are the is use and user satisfaction. the second model is a variance model of is use as a behavior, that can take a second meaning for is use the third model is a process model, where is use is considered as an event necessarily precedes the following constructs: user satisfaction, individual impact and organizational impact. (seddon, 1997). beyond the combination of both causation and process dimensions to explain the construction and the confusion in the meaning of the d&m model (seddon, 1997) other considerations would take place such as the level taken into account to explain the success of an information system and the performance impacts. the is evaluation success is not limited to the internal factors as claimed by d&m in their model based on shannon and weaver theory. for example the erp system quality is not only a causal variable leading to success, but also can be considered as a result of other external factors such as organizational, innovation and environmental factors (bradford and florin, 2003; ifinedo, 2011; sedera and gable, 2010). to answer for some critics considered troublesome, (delone and mclean, 2003) argue that their model is based on both process and causal considerations, the six dimensions of the model are interrelated rather than independent. based on a process considered the first event of their model begins by creating an is containing various specifies, the second event is the use of the system and its outputs. the final step is the impact result of this use on both individual and organizational performance. however, based on a causal dimension d&m explain the covariance between the independent and dependent variables to determine if there exists or not a causal relationship among the success dimensions. combining taxonomy and success, this model was to help in the understanding of the possible causal interrelationships among the six dimensions of success. despite the critics, d&m is success model stays one of the most adopted models in the information system field for two main reasons: its theoretical foundation and its empirical validation. but the question that arises is: is the evaluation process of the is success based only on d&m model? could it be possible to combine two theoretical models to assess the is success? what are the principal constructs of the combined model? what are the principal determinants of the erp system success? what are the theoretical foundations of this model? and what are the significant magnitudes of each factor in the model? 2-3 evaluation approaches many researchers tried to understand the relationship between the it investments and the performance, emphasizing five main approaches to evaluate the it projects (bellaaj, 2010). these approaches are: figure 9: evaluation approaches of is/it evaluation approach based on the economic theory (brynjolfsson, n.d.): the main goal of this approach is to understand the variance between the it investment and the organizational productivity based on some economic criteria. evaluation approach based on social psychology (davis, 1989a, 1989b; venkatesh et al., 2003): beyond the economic approach, this one integrates the human factors as a determinant in the evaluation process of the it investment and impact. evaluation approaches evaluation approach based on the economic theory evaluation approach based on social psychology evaluation approach based on processes evaluation approach based on the competitive analysis evaluation approach based on the strategic alignment 28 evaluation approach based on the competitive analysis: this approach is developed by (porter and millar, 1985) explains how the technology affects all business. authors’ outline that the information technology must be understood more than simple computers, it must be conceived of broadly to encompass the information that business create and use as well as a wide spectrum of increasingly convergent and linked technology that process the information, in their perception of the it they adopt the concept of the value chain to explain the competitive advantages gained from the it investments. evaluation approach based on the strategic alignment: this approach is developed by (henderson and venkatraman, 1993), it is widely used by the researchers in the information system to understand two main concepts; the first one is the fit between the information technology goals and the strategic objectives of the organization; the second is the functional integration (integration between business and functional domains). this approach suggests that the it strategy must be coherent with the corporate strategy in order to improve the organizational performance. evaluation approach based on processes: a new conception of the is success evaluation has been introduced by this approach based on emergent process theory developed by (markus and tanis, 2000; soh and markus, 1995). this approach highlights the inability of the economic model to evaluate the is success, and proposes à new vision of evaluation based not only on the input evaluation (it investment evaluation), but based also on the use and the impacts of the it, under a creative process value. three main approaches could be considered to evaluate the erp system success; the first one is based on the financial criteria of performance (nicolaou and bhattacharya, 2006) to evaluate the erp benefits (tangible benefits), the second approach is based on the non-financial approach to assess the intangible benefits of erp system, and the last one is a mixed approach, for example to evaluate the erp system, many perspectives of measurement must be taken into account such as the behavioral perspective (user acceptance), the strategic perspective (strategic alignment between organizational goals and erp), the economic perspective (cost, fees..) and the technological perspective (organizational fit and erp system integration). these four dimensions of erp assessment were treated separately in the literature review about the erp system success measurement. in this section, we will present two examples of evaluation approaches that synthesize the different evaluation perspectives mentioned above. firstly we will propose an ahp approach to assess the erp performance measures (tsai et al., 2006). secondly, we will present the balanced scorecard approach adopted largely by many searchers to evaluate the erp system benefits (chand et al., 2005; rosemann and wiese, 1999; velcu, 2010). 2-3-1ahp approach of erp performance assessment: the ahp approach (analytic hierarchy process approach) consists in assessing the relative importance weights of erp performance measurement; it can be used to select the main performance indicators of erp system, and explains the contribution of erp system in the organizational performance (tsai et al., 2006). this approach is applied to decision-making problems to select the best and appropriate solution according to the importance of each alternative. in the case of erp system two stages were presented by (tsai et al., 2006) to assess the relative weights of erp performance measurement. the first one consists of listing all the erp performance measurement and evaluating their importance. the second stage focuses on constructing an ahp analysis framework and achieving the relative importance weights of 80 erp performance measures by using a questionnaire with 7-point likert-type scale (1=extremely unimportant, 7=extremely important). this approach focuses the post-implementation erp stage. based on d&m model 1992, this approach proposes a new taxonomy of performance measurement: the quality category, and the impact category of measurement. the quality concerns the erp system, the information, system use and user satisfaction, the impact category concerns both individual and organizational levels. the result of this study shows that a company can select specific performance measurements according to three principal factors: goals of its erp system, their needs and the specific context of the company. this means that every company must construct its key measurement performance taking into account the three main factors mentioned above. 2-3-2balanced scorecard approach of erp performance measurement: this approach is developed by (kaplan and norton, 1992) to understand better and classify the performance measurements of the organization. they claim that the balanced scorecard allows managers to analyze the business performance from four main perspectives, financial perspective, internal business perspective, innovation/learning perspective and finally the customer perspective. this bsc framework is widely used in management science in different disciplines to assess the organizational performance. however, our attention focuses on the use of this approach to assess the performance introduced by the erp system. some researchers were interested in this question about assessing the erp system performance from a bsc approach (rosemann and wiese, 1999; velcu, 2010). they 29 explain how the bsc approach can be used to evaluate the business performance introduced by the erp implementation on both operational and strategic levels. the aim objet of using the bsc approach is to explain the performance benefits that organizations gain from erp system. this explanation follows four perspectives as defended by (kaplan and norton, 1992). after analyzing these perspectives, their application on the erp system context appeared feasible and interesting to understand the performance beyond its traditional financial approach. the figure 9 explains how the erp system contributes to the business performance from four different angles. this application of the bsc sheds some light on the understanding of three levels of erp impact on the performance, the operational level, the tactical level and the strategic level. these levels provide a framework for analyzing benefits based on organizational strategy and erp system goals throughout the erp life-cycle. 3theoretical foundations: firstly, we will present our conceptual model that is based on both theoretical and empirical background. this framework will be considered as a model of erp system success evaluation that combine a causal and process considerations to assess the success of erp project in three levels of performance: individual performance, work group performance and organizational performance (ifinedo and nahar, 2006; ifinedo, 2011; ifinedo et al., 2010; myers et al., 1997). the levels of analysis taken into account in this model were based on three theories: the first theory is the mathematical theory of communication as used by delone and mclean in there is success model to analyze the system quality and its impact on the information quality on the one hand and the impact of the information quality in users effectiveness on the other hand; the second theory is the innovation diffusion theory used to analyze and classify the different factors in three main boxes: innovation factors, organizational factors and environmental factors; and finally the structuration theory to analyze the contribution of the erp technology in the organizational performance. 3-1mathematical theory of communication the mathematical theory of communication (mason, 1978; weaver and shannon, 1949) explains the interaction between three factors: the information system, the information as a product and the impact of the information on the individual and organizational performance. this approach is used by (delone and mclean, 1992) in their model of success to develop sex constructs considered as the •what are the best practices intruduced by the erp system and how they contribute to improve the business value •how the erp system improve the internal process by introducing a new busness process reengineering •what are the main criteria for assessing the user performance, user satisfaction, perceived ease of use and perceived usefulness of the erp system •what are the appropriate indicators to measure the financial performance introduced by the erp system financial perspective costumer perspective innovation and learning perspective internal perspective figure 10: bsc perspectives for erp performance evaluation 30 main variable to assess the success of the information system. 3-2innovation diffusion theory based on the innovation diffusion theory, mainly the paradigm of variables determining the adoption of innovation (rogers, 1983), three main factors appeared: innovation/technological factors, environmental factors and organization factors. in this taxonomy, each one of these factors can be explained in the erp system context. these factors are extremely important in the erp adoption phase, and they must be integrated in the process of the erp system success (no success without technology adoption firstly). (rogers, 1983) defines the constructs that constitute the perceived attributes of innovation in his paradigm of variables determining the adoption of technology as following: compatibility: “compatibility is the degree to which an innovation is perceived as consistent with the existing values, past experiences, and needs of potential adopters. an idea that is more compatible is less uncertain to the potential adopter. an innovation can be compatible or incompatible (1) with sociocultural values and beliefs, (2) with previously introduced ideas, or (3) with client needs for innovations”. rogers, p: 223. complexity “is the degree to which an innovation is perceived as relatively difficult to understand and use” rogers, p: 231 relative advantage “is the degree to which an innovation is perceived as being better than the idea it supersedes the relative advantage of an innovation, as perceived by members of a social system, is positively related to its rate of adoption”. rogers, p 231 trialability (system testing: during the final stages of erp implementation, the project team should consider the inclusion of testing exercises as well as simulation before the system “goes live” (al-mashari et al., 2003; finney and corbett, 2007)) “is the degree to which an innovation may be experimented with on a limited basis” rogers, p: 231 observability “is the degree to which the results of an innovation are visible to others? the observability of an innovation, as perceived by members of a social system, is positively related to its rate of adoption”. rogers, p: 231. all these constructs take place for determining the erp system adoption as a new technological innovation introduced by the organization to improve its performance and achieve some strategic and operational goals. taking into consideration these variables is an important step in the erp system success process because we consider that there is no success outside the adoption of technology. when all the different stakeholders realize the usefulness and the perceived attributes of the erp system, the erp system adoption perceived attributes of erp system relative advantage compatibility complexity trialability (system testing) observability type of innovation decision (erp implementation strategy decision) communication channels (communication among stakeholders) nature of the social system (legacy system) extent of change agent’s promotion efforts (management change) figure 11: adopted from the paradigm of variables determining the adoption of innovation (m. rogers, 1983 p: 233) 31 success and the quality of system begin to take place. once adopted, the technology should bring productivity, efficiency, and satisfaction to individuals and organizations (desanctis and poole, 1994). main theoretical perspectives on technology and performance characteristics of each perspective examples of theoretical approaches mathematical theory of communication focus on both the information system and the information as an output in one hand, and explain their impact on the individual and organizational performance in the other. ( a process model) (mason, 1978); (weaver and shannon, 1949) (see figure, 7) innovation diffusion theory focus on the technology adoption and use (a causal model) paradigm of variables determining the adoption of innovation m. rogers, 1983 (see figure, 10) (venkatesh et al., 2003) structuration theory focus on the interactions between actors and technology (a mixed model), and explain how the technology should bring productivity, efficiency, and satisfaction to individuals and organizations acp (adaptive structuration theory) approach (desanctis and poole, 1994).(see figure, 11) 3-3structuration theory (ast approach) structuration theory associated with giddens’ institutional theory of social evaluation has been largely applied to understand and explain organizational adoption of technologies (desanctis and poole, 1994). we focus our attention only on the ast proposed by desanctis and poole, 1994 to explain how the technology brings productivity, efficacy and satisfaction to both individuals and organizations. this approach which is based on the technology school was applied and explained by desanctis and poole, 1994 in their adaptive structuration theory approach. the asp is considered as a framework for studying variation in organization change and illustrating the impacts of advanced technologies on organizations. it was tested on a gdss (group decision support system) to answer the questions about how the technology affects people and organizations that use it, and how it improves workgroup performance. we consider this ast approach as an extension of the paradigm of variables determining the adoption of technology (see figure 11), because the adoption of technology is an important step in the appropriation process leading to improve the performance in three main levels (individual, group and organizational performance). (desanctis and poole, 1994) outline the importance played by organizational members in the process to choose the most appropriate technology. table 2: theoretical perspectives 32 3-4evaluation success factors of the erp system: 4journal authors geographic area sample size evaluation phases of erp system sector respondents function evaluation success factors esf’s journal of research and practice in information technology (shih and huang, 2009) asia 165 erp project private end erp users *top management support *erp system quality *system integration *erp fit journal of computing in civil engineering (chung et al., 2008) asia 281 erp project private end erp users *top management support *vendor and consultant quality *information quality *erp system quality international conference on information systems (gable et al., 2003) australia 310 erp project public end erp users *individual implication *information quality *erp system quality journal of information technology management (ifinedo and nahar, 2006) asia 62 erp project private user/ consultant/ manager *vendor and consultant quality *work group implication *individual implication *information quality *erp system quality structure of technology: sophistication /efficiency organizational environment decision outcomes: efficiency/quality /performance social interaction knowledge and experience with the system figure 12: adapted from the ast constructs (desanctis&poole, 1994; p: 123) 33 int. j. production economics (ram et al., 2013b) (ram et al., 2013a) (a) australia 217 implementat ion private all levels of erp users *training and education *business process reengineering *project management *system integration *erp fit computers in human behavior (ifinedo et al., 2010) europe 109 postimplementati on private all levels of erp users *vendor and consultant quality *work group implication *individual implication *information quality *erp system quality information & management (law and ngai, 2007) asia 96 erp project private all levels of erp users *business process reengineering social and behavioral sciences (candra, 2012) asia 46 implementat ion private all levels of erp users *individual implication *erp system quality *information quality international journal of information management (zhu et al., 2010) asia 65 postimplementati on private cio's/ managers *top management support *vendor and consultant quality *project management *system integration *erp fit information & management (hong and kim, 2002) asia 105 implementat ion private erp project managers *business process reengineering information & management (velcu, 2010) europe 88 implementat ion private cio/ceo/cf o *business process reengineering * project management computers in industry (ehie and madsen, 2005) usa 36 implementat ion private all levels of erp users *top management support *vendor and consultant quality *business process reengineering *project management information& management (bernroi der, 2008) usa 209 postimplementati on private all levels of erp users *business process reengineering *information quality the journal of strategic information system (sedera and gable, 2010) asia 310 erp project private all levels of erp users *vendor and consultant quality *individual implication *erp system quality international journal of (bradfor d and usa 51 implementat ion private erp managers *top management support 34 accounting information systems florin, 2003) *training and education *business process reengineering *system integration *erp fit journal of manufacturin g systems (chou and hong, 2013) asia 117 implementat ion private erp users *vendor and consultant quality *individual implication information quality *information quality *erp system quality the journal of systems and software (ifinedo, 2011) europe 109 erp project private erp users *individual implication information quality *information quality *erp system quality international journal of project management (ram et al., 2013a) (ram et al., 2013b) (b) australia 209 postimplementati on private senior erp managers *training and education *business process reengineering *project management *system integration *erp fit the journal of systems and software (wang et al., 2008) asia 90 implementat ion private cio’s *vendor and consultant quality *top management support *project management *information quality computers in human behavior (yoon, 2009) asia 152 private erp senior managers *information quality international journal of human computer studies (choi et al., 2007) asia 223 learning educatio n students *training and education *erp system quality information& management (scott and walczak, 2009) usa 234 learning educatio n students *top management support *vendor and consultant quality computers in human behavior (amoako gyampa h, 2007) usa 278 implementat ion private end users *erp system quality decision support systems (wang and chen, 2006) asia 122 erp project private erp/it managers *system integration *erp fit international journal of production economics (chien et al., 2007) asia 139 erp project private senior erp managers *project management 35 information& management (tsai et al., 2012) asia 278 implementat ion private erp users *vendor and consultant quality *individual implication *erp system quality information& management (kwahk and lee, 2008) asia 273 postimplementati on private erp users *top management support *erp system quality decision support systems (chou and chang, 2008) asia 166 erp project private erp users *organizational factors computers in human behavior (grant et al., 2013) usa 122 implementat ion private erp users *organizational factors *system integration *erp fit information& management (sun et al., 2009) asia 138 erp project private erp users *erp system quality international journal of project management (bernroi der et al., 2014) europe 209 implementat ion private erp users *top management support *vendor and consultant quality *training and education *business process reengineering *system integration *erp fit the service industries journal (lapiedr a et al., 2011) europe 134 implementat ion private erp users *vendor and consultant quality 4-1evaluation erp system success model: organizational factors: *top management support *project management *individual implication * work group implication technological/innova tion factors: *bpr *erp fit *system integration *system configuration and customization environmental factors: *vendor competencies *consultant competencies *training and education *knowledge transfers information/data quality erp system quality individual performan ce group performan ce organizational performance benefits e r p s u c c e ss 36 5discussion and implications research implications: this study provides both theoretical backgrounds and empirical contribution to understand the factors that impact the erp project success, this impact was measured in three levels of performance, individual, group and organization. thus, this study proposes a new taxonomy of the evaluation success factors and explains the erp system success process using a strong theoretical foundations, mathematical theory of communication, diffusion innovation theory and ast (adaptive structuration theory). the theoretical model developed in this work explains the erp system success from two main dimensions, a causal dimension and a process dimension. the first one highlights the variables that contribute on the erp system adoption and use, based on diffusions of innovations theory (rogers, 1984). the second sheds the light on the process of the erp system success through the explanation of interaction between organizational, individual and technological variables based on the one hand on the mathematical theory of communication to explain how the system quality output impacts the individual and organizational performance (mason, 1978; weaver and shannon, 1949), and on the other hand on the ast (desanctis and poole, 1994) to explain the interaction between the human actors (erp users) and the technology, and how this later leads to improve the efficiency, quality and performance. however, we exposed the main frameworks, approaches and models interested on the erp system success and measurement in the literature. thereby, we explained the feasibility and the fit of each one of these theoretical backgrounds to be applied to evaluate the success of the erp system project including the specificities and implementation phases of the software. the theoretical model developed in this study is appropriated to the erp system; it takes into account the features of both implementation and use of the erp system. because, the erp system is considered as a project including different stakeholders, organization involvement, user involvement, vendor and consultant involvement, it success depends on the collaboration between all the organization partners. thus, the model explains how the organizational, technological and environmental critical factors contribute to the erp system adoption and use, which considered as a synonymous of the erp system quality. then, the model shows the quality output represented by data and information quality, and how this later affects the performance and the efficiency. the definition of the success adopted in this model reveals that the success is considered as a correspondence and an interaction (lyytinen and hirschheim, 1987), 1987). the correspondence highlights the fit between the erp system and the organization objectives that leads to improve the organizational performance. the interaction success represents the positive user attitudes toward the erp system, which contribute to improve both individual and workgroup performance. managerial implications: this research work provides a new tool to practitioners enabling them a better understanding of the erp system success project. information system managers, top management and erp users need to understand the implication of their actions in the success process and how they contribute in the performance improvement. thus, this work seeks to highlight the vendor and consultants contributions to perform the erp project. to face more than three quarters of unsuccessful erp project, organizations need to be able to evaluate their information system projects. this need leads us to investigate this question by developing a new model that explain the relationships between the erp partners on the one hand and propose the main evaluation factors to assess the erp project success. 6conclusion this attempt to develop a new model of erp system success evaluation is motivated by the need of companies to justify and understand their investments in this kind of information technology project. erp system project should not be considered only as a top management project but an organizational project that integrates all the actors and stakeholders, for this reason in our model of erp system success evaluation we take into consideration the role of all partners and actors for different level of analysis and different phases of erp project integration. three categories of evaluation factors were proposed: organizational factors, environmental factors and technology factors. these factors are crucial to evaluate the success of the erp system project; they contribute considerably to understand the process of the erp system success. organizations should give more attention to these factors to succeed their information system project and to get a high quality system, accepted and used by employees. as highlighted in our model the success should be evaluated from three main levels of analysis: individual level, group level and organizational level. this model combines two principal conceptions of the success concept, the first one coming from the delone & maclean model to understand the main variables of the erp system success and give more importance to the technological aspect based on the quality system as the principal starting point of the success process. however, tam model give more importance to the human factor in the technology success based on the acceptance and use as two main criteria of the system success. but, nether on nor the other outline the external factors that contribute to the success of this project, it seems that these exogenous factors are important in the erp system project acceptance as a new technology introduced by organizations. theoretical basis of these factors derived from the diffusion of innovation theory (rogers, 1983) that 37 outlines the importance of the environmental, technological and organizational factors in the technology adoption. this work proposes a set of tools to evaluate the erp project success, many approaches models and framework were proposed to understand the evaluation success process. summarizing works previously presented in the literature review about the success evaluation of the erp system project. the next step for our work is to validate empirically our model. references al-mashari, m., al-mudimigh, a., zairi, m., 2003. enterprise resource planning: a taxonomy of critical factors. european journal of operational research 146, 352–364. amoako-gyampah, k., 2007. perceived usefulness, user involvement and behavioral intention: an empirical study of erp implementation. computers in human behavior 23, 1232–1248. bandura, a., 1999. social cognitive theory: an agentic perspective. asian journal of social psychology 2, 21–41. bellaaj, m., 2010. technologies de l’information et performance organisationnelle : différentes approches d’évaluation. (manuscrit). bernroider, e.w.n., 2008. it governance for enterprise resource planning supported by the delone–mclean model of information systems success. information & management 45, 257– 269. bernroider, e.w.n., wong, c.w.y., lai, k., 2014. from dynamic capabilities to erp enabled business improvements: the mediating effect of the implementation project. international journal of project management 32, 350–362. bradford, m., florin, j., 2003. examining the role of innovation diffusion factors on the implementation success of enterprise resource planning systems. international journal of accounting information systems 4, 205–225. brynjolfsson e. et hitt l. (1996), “paradox lost? firm-level evidence on the returns to information systems spending”, management science, 42, 541-558 candra, s., 2012. erp implementation success and knowledge capability. procedia social and behavioral sciences 65, 141–149. chand, d., hachey, g., hunton, j., owhoso, v., vasudevan, s., 2005. a balanced scorecard based framework for assessing the strategic impacts of erp systems. computers in industry 56, 558– 572. chien, s.-w., hu, c., reimers, k., lin, j.-s., 2007. the influence of centrifugal and centripetal forces on erp project success in small and medium-sized enterprises in china and taiwan. international journal of production economics 107, 380–396. choi, d.h., kim, j., kim, s.h., 2007. erp training with a web-based electronic learning system: the flow theory perspective. international journal of human-computer studies 65, 223–243. chou, j.-s., hong, j.-h., 2013. assessing the impact of quality determinants and user characteristics on successful enterprise resource planning project implementation. journal of manufacturing systems 32, 792–800. chou, s.-w., chang, y.-c., 2008. the implementation factors that influence the erp (enterprise resource planning) benefits. decision support systems 46, 149–157. chung, b.y., j. skibniewski, m., c. lucas jr, h., kwak, y.h., 2008. analyzing enterprise resource planning system implementation success factors in the engineering–construction industry. journal of computing in civil engineering 22, 373–382. davenport, t.., 1998. putting the enterprise into the enterprise system. harvard business review 76, 121–131. davis, f.d., 1989a. perceived usefulness, perceived ease of use, and user acceptance of information technology. mis quarterly 13, 318–340. davis, f.d., 1989b. user acceptance of computer technology: a comparison of two theoretical models. management science 35, 982–1003. delone, w.h., mclean, e.r., 1992. information systems success: the quest for the dependent variable. information systems research 3, 6.–95. delone, w.h., mclean, e.r., 2003. the delone and mclean model of information systems success: a ten-year update. the d e lone an d m c lean mo d e l of infor m a ti on sy st e m succe ss 9 journal of management information systems 19, 9–30. desanctis, g., poole, m.s., 1994. capturing the complexity in advanced technology use: adaptive structuration theory. organization science 15, 121–147. dörr, s., walther, s., eymann, t., 2013. information systems success a quantitative literature review and comparison. presented at the 11th international conference on wirtschaftsinformatik, germany. ehie, i.c., madsen, m., 2005. identifying critical issues in enterprise resource planning (erp) implementation. computers in industry 56, 545– 557. finney, s., corbett, m., 2007. erp implementation: a compilation and analysis of critical success factors. business process management journal 13, 329–347. gable, g.g., sedera, d., chan, t., 2003. enterprise systems success: a measurement model, in: proceedings of the 24th international conference on information systems association for information systems. presented at the proceedings of the 24th international conference on information systems association for information systems, seattle, washington, pp. 576–591. grant, d., hwang, y., tu, q., 2013. an empirical investigation of six levels of enterprise resource planning integration. computers in human behavior 29, 2123–2133. 38 henderson, j.c., venkatraman, n., 1993. strategic alignement: leveraging information technology for transforming organizations. ibm system journal 38, 472–484. hong, k.-k., kim, y.-g., 2002. the critical success factors for erp implementation: an organizational fit perspective. information & management 40, 25–40. ifinedo, p., 2011. examining the influences of external expertise and in-house computer/it knowledge on erp system success. journal of systems and software 84, 2065–2078. ifinedo, p., nahar, n., 2006. quality, impact and success of erp systems: a study involving some firms in the nordic-baltic region. journal of information technology impact 6, 19–46. ifinedo, p., rapp, b., ifinedo, a., sundberg, k., 2010. relationships among erp postimplementation success constructs: an analysis at the organizational level. computers in human behavior 26, 1136–1148. irani, z., 2002. information systems evaluation: navigating through the problem domain. information & management 40, 11–24. irani, z., love, p.e.d., 2008. evaluating information systems public and private sector. elsevier. irani, z., sharif, a., kamal, m.m., love, p.e.d., 2014. visualising a knowledge mapping of information systems investment evaluation. expert systems with applications 41, 105–125. kaplan, r.s., norton, d.p., 1992. the balanced scorecard – measures that drive business perfomance. harvard business review januaryfebruary, 71–79. king, w.r., he, j., 2006. a meta-analysis of the technology acceptance model. information & management 43, 740–755. kronbichler, s.a., ostermann, h., staudinger, r., 2010. a comparison of erp-success measurment approaches. journal of information systems and technologie management 7, 281–310. kwahk, k.-y., lee, j.-n., 2008. the role of readiness for change in erp implementation: theoretical bases and empirical validation. information & management 45, 474–481. lapiedra, r., alegre, j., chiva, r., 2011. the importance of management innovation and consultant services on erp implementation success. the service industries journal 31, 1907– 1917. law, c.c.h., ngai, e.w.t., 2007. erp systems adoption: an exploratory study of the organizational factors and impacts of erp success. information & management 44, 418– 432. lyytinen, k., hirschheim, r., 1987. information systems failures a survey and classification of the empirical literature. oxford surveys in information technology 4, 257–309. markus, m.l., tanis, c., 2000. the enterprise system experience from adoption to success. mason, r.o., 1978. measuring information output: a communication systems approach. information & management 1, 219–234. myers, b.l., kappelman, l.a., prybutok, v.r., 1997. a comprehensive model fo assessing the quality and productivity of the information system function: toward a theory fo information systems assessment. information recources management journal 10, 6–25. nicolaou, a.i., bhattacharya, s., 2006. organizational performance effects of erp systems usage: the impact of postimplementation changes. international journal of accounting information systems 7, 18–35. porter, m., millar, v., 1985. how information gives you competitive advantage. harvard business review 149–160. ram, j., corkindale, d., wu, m.-l., 2013a. implementation critical success factors (csfs) for erp: do they contribute to implementation success and post-implementation performance? international journal of production economics 144, 157–174. ram, j., wu, m.-l., tagg, r., 2013b. competitive advantage from erp projects: examining the role of key implementation drivers. international journal of project management. rogers, e.m., 1983. diffusion of innovations, 3rd ed. free press, united states of america. rosemann, m., wiese, j., 1999. measuring the performance of erp software – a balanced scorecard approach, in: proc. 10th australasian conference on information systems. presented at the proc. 10th australasian conference on information systems, pp. 773–784. scott, j.e., walczak, s., 2009. cognitive engagement with a multimedia erp training tool: assessing computer self-efficacy and technology acceptance. information & management 46, 221– 232. seddon, p., 1997. a respecification and extension of the delone and mclean model of is success. information systems research 8, 240–253. sedera, d., gable, g.g., 2010. knowledge management competence for enterprise system success. the journal of strategic information systems 19, 296–306. shang, s., seddon, b.p., 2002. assessing and managing the benefits of enterprise systems: the business manager’s perspective. information systems journal 12, 271–299. shih, y.-y., huang, s.-s., 2009. the actual usage of erp systems: an extended technology acceptance perspective. journal of research and practice in information technology 41, 263–276. soh, c., markus, m.l., 1995. how it creates business value: a process theory synthesis, in: proc. international conference on information systems. presented at the proc. international conference on information systems. song, x., letch, n., 2012. research on it/is evaluation: a25 year review. the electronic 39 journal information systems evaluation 15, 276– 287. stefanou, c.j., c., 2001. a framework for the exante evaluation of erp software. european journal of information systems 204–2015. sun, y., bhattacherjee, a., ma, q., 2009. extending technology usage to work settings: the role of perceived work compatibility in erp implementation. information & management 46, 351–356. tornatzky, l.g., klein, k.j., 1982. innovation characteristics and innovation adoptionimplementation: a meta-analysis of findings. ieee transactions on engineering management 29, 28–43. tsai, w.-h., hsu, p.-y., cheng, j.m.-s., 2006. an ahp approach to assessing the relative importance weights of erp performance measures. international journal of management & enterprise development 3, 351–375.tsai, w.-h., lee, p.-l., shen, y.-s., lin, h.-l., 2012. a comprehensive study of the relationship between enterprise resource planning selection criteria and enterprise resource planning system success. information & management 49, 36–46. urbach, n., smolnik, s., 2008. a methodological examination of empirical research on information systems success: 2003 to 2007. presented at the proceedings of the fourteenth americas conference on information systems, toronto canada. uwizeyemungu, s., raymond, l., 2010. linking the effects of erp to organizational performance: development and initial validation of an evaluation method. information systems management 27, 25–41. velcu, o., 2010. strategic alignment of erp implementation stages: an empirical investigation. information & management 47, 158–166. venkatesh, v., davis, f.d., 2000. a theoretical extension of the technology acceptance model: four longitudinal field studies. management science 46, 186–204. venkatesh, v., morris, m.g., davis, g.b., davis, f.d., 2003. user acceptance of information technology: toward a unified view1. mis quarterly 27, 425–478. wang, e.t.g., chen, j.h.f., 2006. the influence of governance equilibrium on erp project success. decision support systems 41, 708–727. wang, e.t.g., shih, s.-p., jiang, j.j., klein, g., 2008. the consistency among facilitating factors and erp implementation success: a holistic view of fit. journal of systems and software 81, 1609– 1621. weaver, w., shannon, c., 1949. the mathematical theorie of communication. wu, k., zhao, y., zhu, q., tan, x., zheng, h., 2011. a meta-analysis of the impact of trust on technology acceptance model: investigation of moderating influence of subject and context type. international journal of information management 31, 572–581. yoon, c., 2009. the effects of organizational citizenship behaviors on erp system success. computers in human behavior 25, 421–428. zhu, y., li, y., wang, w., chen, j., 2010. what leads to post-implementation success of erp? an empirical study of the chinese retail industry. international journal of information management 30, 265–276. vol8no2paper5 to cite this article: yulianto, m., girsang, a.s. and rumagit, r.y. (2018) business intelligence for social media interaction in the travel industry. journal of intelligence studies in business. 8 (2) 77-84. article url: https://ojs.hh.se/index.php/jisib/article/view/311 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index business intelligence for social media interaction in the travel industry in indonesia michael yuliantoa, abba suganda girsanga* and reinert yosua rumagita acomputer science department, binus graduate program-master of computer science, bina nusantara university, jakarta, indonesia; *agirsang@binus.edu journal of intelligence studies in business please scroll down for article business intelligence for social media interaction in the travel industry in indonesia michael yuliantoa, abba suganda girsanga* and reinert yosua rumagita a computer science department, binus graduate program-master of computer science, bina nusantara university, jakarta, indonesia 1148 corresponding author (*): mailto:agirsang@binus.edu received 14 may 2018 accepted 25 july 2018 abstract electronic ticket (eticket) provider services are growing fast in indonesia, making the competition between companies increasingly intense. moreover, most of them have the same service or feature for serving their customers. to get back the feedback of their customers, many companies use social media (facebook and twitter) for marketing activity or communicating directly with their customers. the development of current technology allows the company to take data from social media. thus, many companies take social media data for analyses. this study proposed developing a data warehouse to analyze data in social media such as likes, comments, and sentiment. since the sentiment is not provided directly from social media data, this study uses lexicon based classification to categorize the sentiment of users’ comments. this data warehouse provides business intelligence to see the performance of the company based on their social media data. the data warehouse is built using three travel companies in indonesia. as a result, this data warehouse provides the comparison of the performance based on the social media data. keywords business intelligence, lexicon based classification, sentiment analysis, social media 1. introduction the development of air transportation and airlines in indonesia is increasing. this is marked by the growing number of airlines that have sprung up by offering both domestic and international travel routes that make the competition more competitive. with competitive competition, many airlines offer promotions that can be an attraction for consumers. this is certainly a great opportunity for business people to use information technology. the development of telecommunication and computer technology led to changes in the pattern of instant purchasing, online reservations, and the ticketing process, which in the aviation world is often called the online system or electronic ticketing (atmadjati, 2012). in indonesia electronic ticketing providers are becoming more common, so competition is increasing. because business competition requires price matching, companies must compete to attract consumers as much as possible in order to survive. many companies use media for marketing. this includes social media, like facebook and twitter. with social media, customers can easily contact the company (customer service). businesses start looking at such technologies as effective mechanisms to interact more with their customers (ali abdallah alalwan, et al. 2017). social media has become the largest data source of public opinion (shuyuan deng, 2017). journal of intelligence studies in business vol. 8, no. 2 (2018) pp. 77-84 open access: freely available at: https://ojs.hh.se/ 78 indonesia has the fourth most facebook users in the world. therefore, this study focuses on the relationship of social media use, namely facebook and twitter, to see the interaction between companies and consumers. data that exist in social media can help us to do the analysis to help companies get feedback from consumers. the data that can be retrieved include "like, comment, and share" information. sentiment analysis can be used to process comments in order to get feedback on the nature of the comment, good or bad (he, zha, & li, 2013). poor comments can be used as advice and input for the company in the future (saragih & girsang, 2017). in this study, using existing data in social media facebook and twitter is expected to create business intelligence that can help analyze travel business companies in indonesia with social media data interaction. 2. conceptual background in this chapter, we examine the concept and characteristics of business intelligence and sentiment analysis using lexicon based classification. 2.1 business intelligence business information and business analysis in the context of business processes are the key that leads to decision-making and actions that lead to improved business performance. business intelligence can be defined as “a set of mathematical models and analytical methodologies used to exploit the data available to produce information and knowledge useful for complex decision-making processes” (vercellis,2006, williams, s., and williams, n, 2006). advantages of business intelligence: • effective decisions: business intelligence applications allow users to use more reliable information and knowledge. the result is a decision maker can make better decisions and match goals with the help of business intelligence. • timely decision: dynamic, where decisions can be taken quickly. the result obtained by the organization is that the organization will have the ability to react continuously in accordance with the movements of competitors and to change when there are important new market circumstances. • increase profits: business intelligence can help business clients to evaluate customer value and desire for shortterm profits and to use the knowledge used to differentiate between profitable customers and non-profitable customers. • reduced costs: reducing the investment needed to use sales, business intelligence can be used to assist in evaluating the organization's costs. • develop customer relationship management (crm): this is essentially a business intelligence application that applies customer information collection analysis to provide responsible customer service responsibilities that have been developed. • reduce the risk: applying the business intelligence method to enter data can develop a credit risk analysis, looking at the analysis of consumer activity, producers, and reliability can provide insight into how to shorten the supply chain 2.2 sentiment analysis sentiment analysis or opinion mining is a process of understanding, extracting and processing textual data automatically to get sentiment information contained in an opinion sentence. sentiment analysis is done to view opinions or opinion tendency of a problem or object by someone. sentiment analysis can be distinguished based on the data source, some of the level that is often used in research sentiment analysis is sentiment analysis at document level and sentiment analysis at sentence level (bo,p et al. 2002) the lexicon-based approach depends on the words in the opinion (sentiment), specifically words that usually expresses a positive sentiment or negative sentiment. words that describe the desired state (e.g. great, good) have positive polarity, whereas the words describing the unwanted state have negative polarity (e.g. bad, horrible). one common approach used in performing sentiment analysis is using a dictionary based approach. because this research is based on indonesia, the dictionary will use indonesian words. figure 1 is a positive dictionary and figure 2 is a negative dictionary. 3. methodology 79 research conducted begins based on the interest of the writer about the data that exist on social media. therefore, through this research, the author wants to create a data warehouse for social media data in order to perform analyses related to social media interactions. these include an analysis of how actively the company replies or communicates with its customers on social media such as facebook or twitter. 3.1 crawling data data retrieval is done from selected social media platforms such as facebook and twitter via the social media api available on each platform. data retrieval is done periodically by crawlers. the data is taken every wednesday and saturday. this is done because the data provided by the twitter api only retrieves data up to seven days old. for example, data retrieved on october 18, 2017 from twitter can only go back as early as october 11, 2017. data before that date cannot be retrieved. from the data that was regularly taken by the crawler, was stored on in the form of excel files. the types of data stored on each social media platform are different: • facebook: post, comment, reply, like • twitter: tweet, retweet, mention crawling data in this research uses rstudio, for crawling facebook the library rfacebook was used and for twitter, twitterr was used. 3.1.1 crawling facebook in this research, will use three months of data, from september 2017 to december 2017 from three companies. the pseudocode used to get data using rfacebook in rstudio was: load rfacebook connect to facebook api using fboauth get paget from official facebook page using function getpage get all post in page use getpost get like and comment from post (post$likes & post$comments) get like and reply from comment using getcommentreplies export to csv format 3.1.2 crawling twitter twitterr uses the twitter api to get the data. because of this, there is a seven day limitation from the day we request data. the pseudocode to get the data using twitterr in rstudio was: load twitterr connect to twitter api using setup_twitter_oauth search @from twitter@ example from:traveloka search “@” example @traveloka search “to” tweet example to:traveloka export to csv format 3.2 sentiment analysis 3.2.1 preprocessing preprocessing data data comments from facebook and twitter social media is done by preprocessing before sentiment analysis. figure 4 shows the preprocessing stages. the first step is case folding. case folding is the process of converting words into lowercase. the purpose of turning words into lowercase is to eliminate case sensitive errors. the next step is to filter the sentence. written words are figure 1 positive dictionary. figure 2 negative dictionary. figure 3 methodology 80 punctuation, number, and website address. the process of separating sentences into individual words is usually called tokenization. the easiest way to turn a sentence into words is to separate them with spaces. stemming is the process of converting words into basic words. 3.2.2 lexicon based algorithm the lexicon algorithm converts data via a function that will process every sentence in the data source. figure 5 is the pseudocode for the sentiment analysis using the lexicon based algorithm (chopra and bhatia, 2016). 1. enter the text as input. 2. divide this paragraph into tokens and store the words in an array list. 3. select the first word from array list. 4. fetch the words of database in second array named as database array. 5. check whether selected paragraph word matched with each word of database array. (i) if match found (a) find the sentiment of word from database whether it is positive/negative or neutral. (b) find the exact position of word in the paragraph. (c) highlight the word according to their sentiment; make it green if it is positive, red if it is negative and blue if it is neutral. (d) calculate the score of sentence. (e) store the results in database. (ii) else match not found (a) select next word from the array (b) go to step 5. 6. display the result to the user. 7. plot the graph according to the results. figure 5 pseudocode for the sentiment analysis using the lexicon based algorithm. 4. results result from the methodology above are shown in figure 6. there are two table facts and five dimension tables. the two fact tables are: the fact company activity and fact user activity. the five dimension tables are: dim user, dim sentiment, dim company, dim media social, and dim time. dashboard admin activity consists of four reports (figure 7). the first report is the report of admin activity trends during the month, the second report provides an overview of the activities undertaken by the admin, the third report is a report of activity per day while the latter is an hourly activity. uniquely by using the business intelligence program tableau all existing reports can affect each other, for example when we click on the first report graph on the line traveloka and september all reports on this page will show facebook traveloka data in september. dashboard user activity consists of five reports (figure 8). the first report is the report of user activity trends during the month, the second report is sentiment analysis report, the third report is the most active user in social media, the fourth is user activity by day and the last is an activity report by hour. with this dashboard we can analyze who is active during the month or day or time we choose in the dashboard. on the dashboard the activity of the companies assesed can be seen. facebook social media shows that the company pegi pegi is the most active compared to other companies. in september it was found that pegi-pegi made a ocial media strategy change, which can be seen in october with a rise of almost 368.81%. the company, ticket, had the lowest activity. in this company there is even a decline in october and december. on twitter, traveloka has the most activity compared to other companies. traveloka has more than 1,000 activities per month. other companies have almost 10 times less activity than traveloka. pegi-pegi and ticket had an figure 4 preprocessing stages. 81 increase in november and december. in november there was a decrease in activity. figure 9 summarizes the company activity on social media. the most frequent facebook activity by companies is reply to comments from customers. this was most frequently done by traveloka, followed by pegi-pegi and ticket. at pegi-pegi the most most common activity was liking comments from its customers. figure 10 shows activity by hour. the companies’ facebook and twitter activity peaked at 16:00-16:59. traveloka’s activity peaked at 19.00 19.59 while pegi-pegi was most active at 16.00 16.59 and ticket was most active at 12.00 12.59 (figure 11). research conducted during four months of social media data collection on facebook and twitter, obtained 28,445 comments and figure 6 star schema. figure 7 dashboard company activity. 82 2,379,107 liked statuses by the users (figure 12). this figure is very high, and reflects how enthusiastic the users with activities performed by the company. on social media facebook, traveloka has more enthusiastic users than the other two companies, this is evidenced by the existence of 1,386,318 user activity data points, of which 942,769 activities occurred in october. when viewed in more detail, pegi-pegi has more active users than traveloka in the last two months (november and december). from 28,445 comments, traveloka has the most negative sentiment with an average of 14.26% negative, 34.51% positive sentiment and 51.23% neutral sentiment on twitter. tickets have the best positive analytical sentiment with a value of 44.05%, compared with negative sentiment which is only 14.10% and a neutral value of 41.85%. figure 13 shows the results of the lexicon-based sentiment analysis. the last four months’ data got the names of users who most actively made comments or liked a status or comment. in every form of social media there were users who engaged in more than 100 activities in the last 4 months (figure 14). on traveloka, the top ten people engaging had an average activity of 200 interactions, while pegi-pegi had an average of 168 activities and ticket has the lowest average of 84. 5. recommendiation from the dashboard analysis various recommendations for companies studied were obtained. 5.1 traveloka on facebook social media needs to be improved again because from november there was a significant decline (23%) compared to the previous month. at 19.00 19.59 the activities of the traveloka are recommended to have more human resources in order to help solve customer problems. figure 8 dashboard user activity. figure 9 summary company activity. figure 10 detail company activity. 83 5.2 ticket on facebook, social media needs to be improved. in september there were 94 activities, but this declined considerably to 74 activities in december. on twitter, engagement should be improved again as compared to traveloka, as the activity of ticket is lagging behind. for twitter we suggest human resources should be available in the early hours, as in december at 00.00 07.00 there are only seven activities, compared with user activity on ticket’s twitter feed of as much as 85 activities. 5.3 pegi-pegi for twitter, we suggest increased human resources in early hours. in december at 00.00 07.00 there were 55 activities only compared with user activity on twitter pegi pegi as many as 244 activities. 6. conclusion based on the results of the research, there are several conclusions. by using business intelligence conducted in this research, traveloka has the most interaction in social media, as compared with pegi-pegi and ticket.com. this research provides some suggestions for the development of business intelligence for social media interaction. the classification accuracy can be further improved by using algorithms and machine learning such as naive baise classification and in the future data could also be analyzed to include emoticons for more complete information from facebook. figure 11 detail company activity in hour. figure 12 summary user activity. figure 13 sentiment analysis. 84 7. references adriani, m., asian, j., nazief, b., tahaghoghi, s. m., & williams, h. e. (2007). stemming indonesian: a confix-stripping approach. journal acm transactions on asian language information processing (talip). alalwan, a. a., rana, n. p., dwivedi, y. k., & algharabatc, r. (2017). social media in marketing: a review and analysis of the existing literature. telematics and informatics, 1177-1190. atmadjati, a. (2012). era maskapai saat ini. yogyakarta: leutika prio. barlow, j., & maul, d. (2000). emotional value: creating strong bonds with your customers. san francisco: berrett-koehler pub-lishers, inc. bo, p., lee, l., & vaithyanathan, s. (2002). thumbs up? sentiment classification using machine learning techniques. emnlp. budiwati, s. d., & setiawan, n. n. (2018). experiment on building sundanese lexical database based on wordnet. journal of physics: conference series. chopra, f. k., & bhatia, r. (2016). sentiment analyzing by dictionary based approach. international journal of computer applications, 32-34. deng, s., sinha, a. p., & zhao, h. (2017). adapting sentiment lexicons to domainspecific social media texts. decision support systems, 65-76. girsang, a. s., & prakoso, c. w. (2017). data warehouse development for customer wifi access service at a telecommunication company. international journal on communications antenna and propagation. he, w., zha, s., & li, l. (2013). social media competitive analysis and text mining: a case study in the pizza industry. internasional journal of information management, 462-472. moro, s., rita, p., & vala, b. (2016). predicting social media performance metrics and evaluation of the impact on brand building: a data mining approach. journal of business research, 3341-3351. ray, p., & chakrabarti, a. (2017). twitter sentiment analysis for product review using lexicon method. international conference on data management, analytics and innovation (icdmai), 211-216. saragih, m. h., & girsang, a. s. (2017). sentiment analysis of customer engagement on social media in transport online. sustainable information engineering and technology (siet), 24-29. vercellis, c. (2009). business intelligence: data mining and optimization for decision making. politecnico di milano: wiley. williams, s., & williams, n. (2006). the profit impact of business intelligence. san francisco: morgan kaufmann. figure 14 most active users. establishment and application of competitive intelligence system in mobile devices anass el haddadi *,**, bernard dousset * and ilham berrada ** * irit umr 5505, university of toulouse iii 118, route de narbonne, f-31062 toulouse cedex 9, france haddadi@irit.fr, dousset@irit.fr ** ensias, al bironi team, university of med v-souissi, b.p. 713 agdal – rabat, morocco iberrada@ensias.ma received 25 may 2011; received in revised form 22 august 2011; accepted 11 december 2011 abstract: the strategy concept has changed dramatically: from a long range planning to strategic planning then to strategic responsiveness. this response implies moving from a concept of change to a concept of continuous evolution. in our context, the competitive intelligence system presented aims to improve decision‐making in all aspects of business life, particularly for offensive and innovative decisions. in the paper we present xplor everywhere, our competitive intelligence system based on a multidimensional analysis model for mobile devices. the objective of this system is to capture the information environment in all dimensions of a decision problem, with the exploitation of information by analyzing the evolution of their interactions. keywords: competitive intelligence, competitive intelligence systems, xplor everywhere, business intelligence, continuous evolution available for free online at https://ojs.hh.se/ journal of intelligence studies in business 1 (2011) 87-96 mailto:dousset@irit.fr https://ojs.hh.se/ 88 1. introduction companies today are faced with external risk factors linked with an increased competition in markets that are extremely dynamic and unpredictable. this is caused by new competitors, mergers and acquisition, sharp price cuts, rapid changes in consumption patterns and weak brands. in this dynamical condition the competitive intelligence system (cis) and business intelligence (bi) software becomes a main component when companies develop their strategies. today information technology is considered as a simple support for organizations, but in a strategic way it promises to contribute to a sustainable competitive advantage. for five decades the concept of a strategy has changed dramatically from being a long range planning tool to become strategic planning and thereafter ending up as strategic responsiveness. by embracing the responsiveness concept a company can be flexible and constantly evolve. a competitive intelligence system (salles, 2002) aims to improve decision‐making in all aspects of business life, in particular for offensive and innovative decisions. to face all the challenges that appear in a dynamic industry, competitive intelligence platforms are designed to provide online services. competitive intelligence (ci) can be seen as both a process and a product (haags, 2006). as a process, ci is the set of legal and ethical methods that a company uses to harness information that helps them to achieve international success. as a product, ci can be considered as an information system for analyzing data concerning competitors’ activities collected from public and private sources, what is also referred to as business intelligence. the results of the analysis can provide knowledge regarding the current and future behavior of competitors, suppliers, customers, technologies, acquisitions, markets, products and services, and the general business environment. when collecting data for analysis sources as newspaper articles, corporate publications, websites, patent filings, specialized databases, information at trade shows and blogs can be used. the issue concerning ci is how to build a cis (ci as a product) and model analysis (ci as a process). our contribution in this paper is to propose an information system adapted to the needs of a ci process. the system’s mission is to provide a methodological reference for collecting, treating and analyzing information. also an analysis of the information environment in all of its dimensions will be made. the rest of the paper is structured as follows: in section two we identify the analytical models of ci, with support from the medesiie model and the site model. in section three we explain information system adapted to the ci approach. section four presents our multidimensional analysis model for ci and section five presents the architecture of a cis. finally in section six a summary and evaluation of the method will be found. 2. the analytical models of ci through the different characteristics of ci, we identify four dimensions in the definition of an analytical model. the four dimensions are as follows: 1. the environmental dimension for a company which includes elements that may influence the strategy of a company. the environment is characterized by partners, competitors, markets and customers. 2. the human dimension which include those who are involved in the ci process, whether internal or external to the company. the human dimension is characterized by networks of collaboration, interaction and communication between different actors. 3. the strategic dimension corresponds to different models of analysis for the company, from identifying objectives to the decision and the definition of actions. 4. the technological dimension brings together all the methods, tools and techniques used in the ci process; information retrieval, collection, treatment and dissemination of information. the inclusion of one or more of these dimensions can result in various models used for the analysis (conceptual or practical) of ci. we selected two academic models built on these dimensions: medesiie model and site model. 2.1 medesiie model the medesiie model is a method for defining a information system for ci. the ci approach proposed in the project medesiie is devoted entirely to the needs analysis of small and medium-sized enterprises (sme) in ci. medesiie consider a cis as a representation of the enterprise’s knowledge. the conceptual architecture of this system is based on the definition given by seligman, wijers & sol (1989) regarding the design of cis. salles, 2003 describe a cis with four components; the way of thinking, the way of modeling, the way of organizing and the way of supporting. medesiie suggests a model to describe the company, its strategy, its environment, its needs under/within the ci and its products and services (salles, 2003). there are different types of models that the medesiie model describes. it could be a business model, that is described according to its different functions, for example production, economy / market linkages, financial and innovation / information 89 system. each function is itself composed of a set of sub‐management functions. a strategic model is represented by a set of strategic choices and areas of development such as a search of independence and business growth. an environment model is described initially by the business functions and the relationships it develops in the environment. the surrounding context includes the spatial geometry of markets, technology, competition, the financial system, supply conditions, the regulatory framework, environmental policy and geopolitics. a model of needs provides a framework for the collection of requirements and their formalization, analysis and validation. the expressed needs are represented by a set of units’ needed. the model unit requirement is described in terms of three dimensions. one, the control level of decisions for which the units are expressed (value: operational, tactical or strategic). two, the phase of the decision‐ making process associated with the unit and three, its informational content (identification of its value and function). the last example of medesiie’s models is a model of products/ services. any supply of decision making bearing the environment of a company is a prototyping tool made according to the collected needs, the cost defined, reached and powered to evaluate the effects a priori. 2.2 site model the site model includes different models of ci, proposed by the research team site‐loria. these models are based on the linking of three spaces: the space of decision problems, the space of the informational problems and the space of mediations. the three spaces are connected through exchanges between the two types of actors, the decision‐maker and the watchman. teamwork is important, thus the inclusion of the user in the information systems is important. they propose models to define the different actors, their interactions and their positioning in the ci process. we have retained the following three models: equate (explore query analysis annotated), mepd (model for the explanation of a decision problem) and wisp (watcher‐information‐search‐ problem). the equate model represents a situation of information retrieval which implies the following cognitive phases (david & thiery, 2002): exploring the word of information querying the information base analysis of the information base annotation based on individual preferences the mepd model defines different steps for a decision making problem that is based on (bouaka, 2004): modeling the decision making by its identity, personality traits, cognitive style and experience. modeling the environment by the immediate environment with customers, providers and competitors and the global environment with for example social-, economicaland political aspects. modeling of organization, by environment, its signal, the assumptions that the decision‐maker can infer the detection of signals collected. the wisp model, associated with the threedimensional mepd, is incorporating the same point of views (kislin, 2007). the three dimensions are as follows: 1. an analytical dimension that includes understanding the demand‐stake‐context, the definition of informational indicators, the operations of analysis and creation of knowledge can be achieved by studying the stored elements. 2. a methodological dimension is incorporated at two levels. the first level regards the skills of transaction of the decision problem in the information problem. the second level regards strategies by which the information is identified and knowledge is acquired. 3. an operational dimension to define the selection of an action plan and implement the various stages of resolution for the methodology associated with the model wisp. 3. information systems adapted to the ci approach for romagni and wild (1998) the definition of an information system adapted to the ci approach is an organized set of procedures, at any time, to give decision makers a representation of a company in its environment and market. the ci function provides information to assist in executive functions, management and decision‐making. it must facilitate decisions to automate a number of actions or providing decision makers with the necessary information for decision‐making. it must also coordinate the processing of information, store sustainably information and improve data processing the creation of information directly applicable for decision makers. the majority of current information systems are inadequate to manage the dynamic markets. they are mostly designed for stable and controlled environments and are built on vertical and complex organizational patterns. these types of information systems do not meet the needs of a ci process. it is therefore essential to develop information system that enables organizations to better manage information and provide a base for coordination of actions between different actors. this coordination is supported by the following motivations: 90 figure 1: transaction from a hierarchical structure to a functional global information infrastructure -the goals of the ci approach are interrelated and cannot be led separately -the need for information sharing between different actors -the sharing of knowledge gained during a process -the organization of the company in a cross‐ functional manner. due to the above mentioned motivations it’s important to move from a vertical architecture of information systems to a cross‐architecture which allows the information to reach the management overall. the cross‐architecture is based on a modular and scalable architecture structured around the projects of a company. the global information infrastructure will enable us to: reduce the number of vertical coordination by reducing management layers improve environmental monitoring opening‐up of cross‐communication achieve relationships based on complementary businesses, and make a better adaptation to market dynamics. according to the report of cigref “competitive intelligence and strategy” (2004) a portal of information management is currently the best tool to implement the concept and the culture of ci through a network. this portal is built around a software solution called here ci. the advantages of this type of information system are: project management monitoring information sharing custom-made interface collection that is more accurate and targeted processing, analysis, storage dissemination the coupling between the needs are identified in a process of ci which include different collaborative techniques from business intelligence such as workflow, groupware, data warehousing, data mining, text mining and visualization. this optimizes each step in ci process. (figure 2). it summarizes all of these techniques for each step in the ci process. the collection phase is usually through the use of databases, internet, search agents and search engine. the steps of processing can be supported by visualization tools, statistical analysis and data warehouses. the diffusion step may rely on for example push‐pull agents and emails. figure 2: the various techniques of ci 91 4. xplor: a multidimensional analysis model for ci our contribution consists of a proposal for an information system adapted to the needs of a ci approach as define above. the objective of this system is to provide a reference methodology in order to collect, process and analyze information. our system will observe and analyze the information of a decision problem in all dimensions. the approach combines two methods: knowledge discovering in text (kdt) and environmental scanning. figure 3: coupling of environmental scanning and kdt (ghalamallah, 2009) the model described is based on two main models: 1. a multidimensional representation of documents which can transfer qualitative data into quantitative. the objective of this model is to get a unified view of the documents collected. 2. a function model which aims to provide a set of generic and combinatory functions to build a different kinds of indicators needed for analysis. the cis proposed should manage the sharing of information between the different actors involved. the objective is to define a space of communication and information dissemination to provide a platform for collaboration and cooperation between different stakeholders. for this we define a user model adapted to each user profile. 4.1 planning activity the first activity of the proposed processes is planning. it is established from the informational problem defined by the users. the objective of this activity is to describe the process of guiding analysis. table 1: question 5w-1h (ghalamallah, 2009) we define this step by the method 5w‐1h: “what, why, who, when, where, how”. jakobiak (2006) developed a systemic approach for the creation of a ci project based on the 5w‐1h method (table 1). the principle of the 5w‐1h is based on following circumstances, the person, the fact, the place, the means and reasons, the manner and the time. in this way a company can provide a detailed analysis plan for the ci project. figure 4 : lifecycle of xplor model 92 we adapt this principle to describe the information needed and to guide the exploratory analysis. originally, the proposal for the question how was to describe the procedures and actions to realize when the project is implemented. in the context of our process, the question how will describe the indicators to be implemented to meet the raised informational problems. the products of the planning steps are: table 2: the products of the planning step in the planning phase an informational problem is described. this problem will be identified by the definition of its subject analysis. once the subject is defined, the user must identify the themes of analysis, plan analysis operations and identify the involved actors. the validation of the themes of analysis leads the user to define two key activities for each topic, such as source of information and a definition of analysis indicators. to enable an analysis, it’s necessary to identify sources of information. the activity of indentifying consists in listing any formal and informal sources that may contain important information about the subject for the study (el haddadi, dousset, berrada & loubier, 2010). 4.2 indicators for analysis the objective of this activity is to define indicators to be calculated and assessed. these indicators are intended to summarize and interpret the information environment of the analysis. at this level of activity we must introduce the different indicators related to the theme. each indicator was analyzed in order to identify target attributes, their granularity, their values and their relation. the aim of this decomposition is to clarify and describe the objects manipulated during processing to meet the indicator requirements. each object of this decomposition will guide us through the various activities of the proposed process. once all sub‐activities associated with the activity of planning are completed and validated, the results will be stored for later use. we define an information need by grade of n where a need n is defined as follows: n = < sa, obja, inda, acta, atta> -sa : is the overall context of the need for analysis a, -obja = < obj1, obj2, …, objm >, represents the objectives set for the subject sa. -inda = {< obji, < indi1, indi2, …, indin >>}, represents the indicators associated with each objective. -acta = {< indij, < actij1, actij2, …, actijp >>}, represents the actors identified for indicators set for a goal. -atta = {< actijk, < attijk1, attijk2, …, attijkq >>}, represent the attributes specified each actors. we define a hierarchy of concepts associated with the decomposition of indicators (figure 5). once all sub activities associated with the activity of planning are completed and validated, the result will be stored for later use. 4.3 multidimensional representation of documents the objectives of this structure are to study the evolution of interactions between variables and make figure 5: hierarchy of concepts associated with the specification requirements 93 projections in the future which is essential for making strategic decisions. our proposal is to define a unique structure of intermediate data between raw information and knowledge derived in the form of a generic data warehouse. the multidimensional structure is based on a three dimensional modeling. this allows defining dependency relationships between different elements of the mining structured corpus, body of variables, with the inclusion of timing, that is the time variable (figure 6). figure 6: example of dependency within threedimensional material and the temporal element for a corpus of documents whose structure extraction is: structureglobal extrac= < n° doc, date, author, journal,country, keywords, organism > we propose to build a three dimensional matrix which will define the dependency relationships that exist between the variables of the body by systematically incorporating the time variable. principle: our goal is to identify the dependent relationships that exist in the body between the different variables of the study. these relationships are defined by a co‐occurrence matrix. these matrixes indicate the simultaneous presence of the terms of two qualitative variables in a document. we adopt these matrixes by adding a third variable. the first two variables are qualitative associated with a multidimensional corpus. the third variable is always the time associated with the corpus, for example date and year. thus, the co‐ occurrence matrix is to indicate the presence of these three variables in a document (three‐dimensional structure). we call this matrix a cube. figure 7: data cube the cube can describe existing relationships in a corpus period. we identify two types of cubes: 1. a symmetric matrix: if we consider the simultaneous terms of a single variable and the time variable in a document the cube becomes symmetric. 2. a asymmetrical matrix: where we consider the presence of two distinct variables and the time variable in a document the cube becomes asymmetric. a corpus whose formal structure extraction is defined as: structureglobal extrac = < chp1g extrac , …, chpig extrac , …, chpjg extra >, chpig extrac corresponds to the element i of the structure. we define the types of three‐dimensional matrixes between elements of the structure as in table 3. table 3: type of matrix 94 we define the corpus associated with the multidimensional cube as: the structure of the multidimensional corpus (3d) scm3d defined as: scm3d = {< dimi, dimij, dimt, nbdoc ijt >} the multidimensional corpus cm3d defined as: cm3d = {< attx i , atty ij , attz ijt , atto ijt >} with: attx i ∈ di the set of attributes {att1 i , …, attp i } in dimension i « dimi », atty ij ∈ dj the set of attributes {att1 j , …, attq j } in dimension j associated with the dimension i i «dimij », attz ijt ∈ dt the set of attributes {att1 t , …, attr t } in dimension time « dimt », atto ijt ∈ nbd the set of attributes {att1 nb , …, attl nb } the number of documents in the three dimensions appear simultaneously. atto ijt = di x dj x dt [attx i , atty ij , attz ijt ] et atto ijt >= 1 5. xplor everywhere : competitive intelligence system for mobile xplor everywhere is a ci platform that performs global strategic analysis on aggregate or factual entries from online bibliographic databases, cdrom, internet or any other computerized source. through descriptive and statistics exploratory methods of data, xplor everywhere display in a very short time new strategic knowledge such as the identity of the actors, their reputation, their relationships, their sites of action, their mobility, emerging issues and concepts, terminology and promising fields. figure 8: xplor everywhere intelligence process 5.1 system architecture as shown in figure 8, strategic analysis and surveillance are the basic methodology of the process of information fusion in the xplor ci platform. the architecture of our platform consists of four main services as shown in figure 9: 95 figure 9: xplor everywhere architecture 1. monitoring service: a request is generated on a data source like a scientific database, patents database, rss and blogs to collect data depending on client’s needs. the collected data form the corpus. 2. homogenization and structuring service: diversity of data sources leads to heterogeneous data, format and language must be restructured. at the end, this service defines a unified view of documents in the corpus. 3. reporting service: reporting is the service responsible for presenting the analysis results to the decision‐makers according to the push strategy with iphone service (el haddadi, dousset & berrada, 2010), sms service, and e‐mail service or pull strategy with web site services. 4. security administration service: orthogonal to all three mentioned services, this service controls data access and ensures the preservation of privacy during the treatments (hatim, el haddadi, el bakkali, dousset & berrada, 2010). 5.2 reporting service the reporting is the last, important service to be accomplished in the ci process. on this level we propose four types of services, the phone service, the sms service, the web site service and the e‐mail service. with these different services, it is possible to access strategic information anywhere. in order to ease the navigability of the strategic information, we intend to integrate specific visualization techniques to each type of request like evolutionary histograms, geographical charts, social networks, profile networks, semantic networks and international networks (figure 10): figure 10: reporting service of xplor everywhere it is possible to navigate among three different types of networks. the social networks are based on relationships among the different authors, inventors, research teams, companies and the evolution of their relations. the semantic networks contain relationships among keywords in a domain and the evolution of research topics. the international networks are built on international collaboration between countries. 6. conclusion in this paper, we present a competitive intelligence system tool based on a multidimensional analysis model. a lot of strategic information comes from the relationship between and relevance of knowledge extracted, which often depends on consideration of data evolution and their interactions. in this paper we have defined a model for these relationship forms. our cis is dedicated to cover all stages of discovery, extraction and data management: without forgetting the criteria by which we get to handle any type of information, both formal and informal. with xplor and xplor everywhere, which are still mdeos but potentially soon to be commercialized, we completed an entire reporting service, including the aspect of mobility (smartphone application). with the system it’s possible to view updated information as we gain access to strategic database servers in real‐ time and daily feeds by observers. with this application it is now easy to enter information at trade shows, after customer visits or meetings. our plan for future studies is to continue our experiments on different types of relationships in order to propose a unified model to better generate and organize knowledge for companies. 96 references bouaka, n. 2 0 0 4 . développement d’un modèle pour l’explication d’un problème décisionnel : un outil d’aide à la décision dans un contexte d’intelligence economique. thèse de doctorat de l’université nancy 2. el haddadi, a., dousset, b., berrada, i., & loubier, i. 2010. les multi‐sources dans un contexte d’intelligence economique, egc, p a1‐125 a1‐ 136. el haddadi, dousset, b., & berrada, i. 2010. xplor everywhere – a tool for competitive intelligence on the web and mobile, vsst. 25‐29 octobre, toulouse france. d a v i d , a . & thiery, o. 2002. application of “equa2te” architecture. economic intelligence. ghalamallah, i.. 2009. proposition d’un modèle d’analyse exploratoire multidimensionnelle dans un contexte d’intelligence economique,doctorat de l’université de toulouse, 18 décembre. gilad, b. 2008. the future of competitive intelligence, contest for the profession’s soul, competitive intelligence magazine, 11(5), 22. haags, s. 2006. management information systems for the information age, mcgraw‐hill ryerson. hatim, h., el haddadi, a., el bakkali, h., dousset, b. & berrada, i. 2010. “approche générique de contrôle d’accés aux donénes et aux traitements dans une plate‐forme d’intelligence économique“, colloque veille stratégique et technologique. jakobiak, f. 2006. l'intelligence économique: la comprendre, l'implanter, l'utiliser. les éditions d’organisation. kislin, p.h. 2007. modélisation du problème informationnel du veilleur dans la démarche d’intelligence économique. thèse de doctorat de l’université nancy 2, france. rapport cigref. 2004. club informatique des grandes entreprises françaises, intelligence économique et stratégique. rapport cigref. romagni, p., wild, v. 1998. l'intelligence économique au service de l'entreprise, ou l'information comme outil de gestion. les presses du management. salles, m. 2002a. projet medesiie : méthode medesiie de définition du besoin en intelligence économique des pme, touluse: université toulouse i. salles, m. 2003b. modélisation des situations de décision dans une méthode d'ingénierie du besoin en i.e, conférence iera, intelligence economique : recherches et applications, nancy, france. salles, m. 2005c. de l'analyse du besoin des pme en ie à l'intelligence territoriale. colloque européen d'intelligence economique, poitiers futuroscope, escem poitiers, p. 414‐427, poitiers, france. seligman p.s., wijers g.m., sol h.g. 1989. analyzing the structure of i.s. methodologies, an alternative approach, in proceedings of the conference in information systems, the netherlands. vedder r. g., vanecek m. t., guynes c. s. and cappel j. j. 1999. ceo and cio perspectives on competitive intelligence, communications of the acm, 42, 8. 21 interactive methods for graph exploration eloïse loubier i.r.i.t. (institut de recherche en informatique de toulouse), 118, route de narbonne, 31062 toulouse cedex 9 received 15 december 2010; received in revised form 25 february 2011; accepted 20 march 2012 abstract: in a strategic watch context, visualization of relational data allows transformation, coding and visualization of great data quantities. access to interactive, adjustable functionalities by the user would facilitate the domination and the precision of the analysis. from this point of view, the visugraph tool allows visualization and exploration of relational data, by the way of applicable and controllable methods of analysis. the main interactive visugraph functionalities are presented and illustrated, revealing their importance in graph exploration. the user is the heart of the tool; he or she fully controls the representation and directs the analysis according to own needs. keywords: grap exploration, strategic watch, visualization, business intelligence 1. introduction complex and bulky data sources do not facilitate relations identification and relevant tendencies. for the majority of users, useful and exploitable information search constitutes a long and tiresome process. it requires many efforts for data processing specialists who are charged to treat the requests and to generate the ad hoc reports/ratios. in a strategic watch context, analysts must be able to explore large volumes of data in an interactive way. they should be able to study tendencies, to test various approaches and especially to isolate invaluable information bringing a competitive advantage. relational data visualization allows transformation, coding and effective chart of great data volumes. this technique offers to the user a clear and readable representation of information, initially difficult of access. analysis methods of relevant data allowing exploration of the data complete this representation. thus, the base of any proposal of visualization of relational data tool supposes an interest in the three following fundamental aspects: nature of the data represented, way in which the components of the graph are exploited to transcribe these data, available for free online at https://ojs.hh.se/ journal of intelligence studies in business 2 (2012) 21-31 https://ojs.hh.se/ 22 perception of these components by the user. the visualization objective is not simply limited to product pre-set charts, which cannot be changed by the user. indeed, an important criterion for a good visualization tool is the possibility for the user to control the representation in order to include/understand the information space and to interact with the system. visualization on this point is the concern of the field of man-machine interaction. in this article, the author presents a model of interactive visualization of relational data, named visugraph (loubier and dousset 2008). communication with the user and the system is the main interest of concern in this context as a proposal of a tool of assistance to the analysis of relational data. this information analysis approach is based on visualization interfaces. it allows data exploration by rich charts and interaction modes adapted to analyst tasks. visualization’s components and navigation help the analyst and more particularly “the watcher”, taking part in the technology’s development for a framework of economic, strategic and competitive intelligence. under the control of an expert, who chooses a suitable mode of representation (“semiologyand esthetics” rules), relational data are represented in graph form. the visualization purpose is to give a precise idea of the data and their relations. the objective is to propose an information representation allowing identification, analysis and restitution of the strategic structures. this system makes it possible to detect different connections and to analyse at a specific time the actors of a field and the concepts which they use. this tool is supplemented by processes of interactive graph analysis, which make it possible for the user to control his or her representation. in this article, we insist on visugraph tool’s interactive functionalities and particularly on the targeted and comparative study of nodes. initially, the stakes of data and in particular of cognition visualization are presented, as well as principal application scopes. in a second phase, the relational data visualization methodology proposed in the context of visugraph is exposed. the access of traditional analysis methods makes it possible to isolate particular nodes and obtain paramount information which enriches and facilitates the graphic analysis. a concrete example illustrates the effectiveness of such a tool for visualization. this example makes it possible to analyze complex interactions networks, the actors/fields and evolution by the analyses of graph structure. it is possible to detect the various tendencies, the strong signals and the weak signals. 2. stakes of the visualization of data since about fifteen years, under the impulse of researchers like card, mackinlay and shneiderman (1999), spence (2000) or ware (2000), information visualization has become a research orientation with gravitas. many contributions tried to approach available represented formalizations to restore the spacetime processes (langran 1993; gayte et al. 1997; frank, rapper and cheylan 2001). recently geographers and cartographers were also interested with these questions (passover 2007; josselin and fabrikant 2003). “the principle of information visualization is to use the power of the computer tools to represent effectively, from a cognitive point of view, abstract data which do not have necessarily usual physical representations. these techniques, which aim’ at amplifying cognition via perception, aim in particular to facilitate the discovery and the creation of ideas starting from masses of data difficult to apprehend from the quantity or the complexity of the information which they contain. ” (fekete and lecolinet 2006). many techniques of information visualization have been proposed over the fifteen last years, as is shown in the work to identify 6 leading causes of cognition amplification by visualization (card, mackinlay and shneiderman 1999): reduction of the cognitive resources mobilized by the user to process and analyze the data (interaction raised with the user, perception carried out in parallel and accessibility to a great quantity of information), simplification of information search (many data in a small space, regrouping of data for example by criteria), increasing structures detection possibilities (relations between significant data, regroupings, strategic positions and centrality), “perceptual inference” using visual perception (problems appear using a visual representation), 23 monitoring of the events (changes of structures, appearance or movement in the reasons and regroupings), means of handling data (interactive navigation). thus, visualization must make it possible to discover, to propose explanations or to take decisions. these actions can be done based on specific reasons (clusters, tendencies and emergences) or on the whole of elements or on isolated elements. visualization technologies make it possible to effectively communicate information via cognitive charts. this kind of representation facilitates the discovery of knowledge by the way of charts resulting from the analysis of a corpus (balmisse 2005). many techniques of data visualization were proposed to date in various applications such as clinical data study (shahar and cheng 1999), geographical data (maceachren et al. 1998), hydrometric data (kramer and jozsa 1998), personal data (such as those contained in a medical file) (liking et al. 1996) and at various ends such as significant tendencies research (harbour and al 2000), exploration of programs traces (renieris and reiss 1999), data analysis of logs (hochheiser and schneiderman 2002), temporal abstractions representation (shahar and cheng 2000) or the visualization of temporal association rules (rainsford and roddick 2000). analysis of relational information evolution is mainly based on the visualization of dynamic graphs. many researchers developed display systems of networks (di battista et al. 1999), by taking into account a cartography of connectivity related to the internet, the networks of phone calls, the networks of quotation as well as the progressive visualization of the evolutionary fields of knowledge. we study the evolution of research themes, information visualization, according to kapusova (2004), who combines aspects of scientific visualization, man-machine interfaces (human-computer interfaces), excavation of data (mining dated), imagery and graphs. for (fekete and lecolinet 2006) information visualization was detached from three related fields: the manmachine interaction, the analysis statistics and cartography, but also scientific visualization. thus, the distinction must be made between the visualization which refers to the process which leads to a chart and the interactive information chart which milked the means of interactions which use information charts. the user’s role in the tools for data visualization is a subject of major concern (grinstein 1996; fayyad, grinstein and wierse 2002). thus interactive visualization of relational data brings to the user an artificial substrate which transcribes a great amount of information. it makes function of support to its knowledge and its intuition to enable him or her to discover new relations, to help with decision making and to allow anticipation, as well as for the evolution of these data. in visual excavation of data, the interaction materializes the loop of feedback between the user and the visual aids (keim and kriegel 1996). a majority of visualization tools offer the access to powerful statistical methods of analysis but these methods are not really interactive and users can only seldom direct the totality of the chart. 3. methodology visugraph is a data visualization tool. it is developed in java (loubier and dousset 2008). the list of alliances is regarded as a document population. two actors represented graphically in the form of nodes are considered concurrent if they are present in the same alliance (there can be more than two actors per alliance). the whole of these co-occurrences is counted in a square matrix crossing, two to two, as far as the actors are concerned. the data are represented in a graph simple g characterized by two units: a unit v = {v1,v2,…,vn} whose elements are called tops, and a unit e = {e1,e2,…,em}, left the unit of the parts with two elements of v, which are called edges. g will be noted g = (v, e). g is a graph not directed (there is no distinction between (u, v) and (v, u) for u and v in v) and as simple (there is no loop (v, v) in e and there exists more than one bond between two nodes). recourse to visual artifices makes it possible to represent information as well as possible, by the means of a particular semiology on the level of tops form and colors used. in visugraph, data are represented in circle form where size is proportional to the value of the metric. bonds are represented by segments binding two nodes, coded according to color. a. interactivity on semiology graphic visualization comprehension is based on construction rules of a symbolic system. study of the signs and their significance is called semiology. it is also based on a codified use of the writings and on general aesthetic principles. bertin (1970) is regarded as the initiator in term of cartography of information. he is interested in construction of visualization by graphic symbols. 24 graphic semiology is based on: significance of the drawings, choice of legends, symbols, icons, methodology to transmit a visual message. semiology quality goes with the possibility for the user to be able to control it fully. with regard to the variation of color, value is a variation of luminous intensity of darkest to the most clear, or conversely. it translates an order relation and differences (quantitative relation). however, our capacity to be recognized is much more limited than our aptitude to be appreciated: on the one hand, differential sensitivity of the eye to luminous energy is not directly proportional to the intensity of flow. the appreciation of the ranges is lower in clear colors than in the beds, in addition, our differential chromatic sensitivity is not uniform and specific to each one. the tops and the edges being balanced, initially, the color makes it possible to code the value of the metric of each element of the graphs. the tops/edges of stronger metrics will be colored by strong intensity and conversely. the user can accentuate contrasts of colors used. thus, for coding by the edges color, a measurable rule is placed at the disposal of the user in order to enable him or her to attenuate or increase the intensity of the color. it is the same for labelling of the data which size and intensity can be regulated, thus making it possible to fully control the importance of this information. indeed big size and strong intensity make visualization less readable than if they are of small size and homogeneous color with the prime coat of the representation. in the following figure, five tops are extracted from a total graph. the initial police force used here as an example is based on small size and low intensity, in order not to deteriorate the legibility of the graph. the graph of the medium results comes from the increase in the value of the rules of graduation and of the intensity of the police force and the bonds between them, but also of the size of the police force. the graph of right-hand side results from an increase even more important in the values of these rules. figure 1: interactivity on the semiology of the graph. b. attraction and répulsion forces the base of any graph analysis is based on the clearness and the legibility of the representation. in the case of a no-planar graph, the number of edges crossings can quickly make the graph illegible and complicate its interpretation. much work was carried with powerful algorithms of directed placement by the means of forces (fdp: “force directed placement”) (tutte 1963; eades 1984; kamada and kawai 1989; fruchterman and reingold 1991). the algorithm fdp proposed in visugraph is based on fruchterman and reingold’s (1991) work and makes it possible for the user to intervene on the application of the forces, by increasing or decreasing them by the skew of two scales, the attraction force or of repulsion. the attraction force between the tops can be proportional to the force of the bond between them. the attraction force between two tops υi and υj is given by: (1) 25 the factor k is calculated according to a drawing surface and of the tops number. duv is the distance between u and v in the drawing. corresponds to the scale value for the attraction divided by two. it is used to define the attraction degree between two tops. k makes it possible to represent every edge in the representation window and not out of it. l represents the window length, l the width and nbtops corresponds to the number of visible tops of the graph. (2) if the tops u, v are not connected by an edge then ƒa (u, v) = 0. repulsion force between two tops u, v is defined by: (3) corresponds to the value of the scale corresponding to the repulsion, allowing to interact on the repulsion; it makes it possible to define the repulsion degree between two tops u and v. thus, the higher the attraction threshold chosen by the user, the more the dependent tops attract themselves, supporting the total drawing of the graph structure to the detriment of inter-nodes relations. in the same way, the more the repulsion threshold is raised, the more the structure is widened, the non-dependent tops are pushed back and those united by an edge are more distinguished, allowing us to obtain more burst structure. the combination of the parameter setting of these two forces leads to a more readable representation, as shown in the figure 2, where the graph (1) is a planar and on which no algorithm fdp was not applied; the graph (2) is the result of the application of our algorithm for which the rules of graduation for attraction and the repulsion were positioned, here with median values (5 for each one on scales from 1 to 10). c. transitivity navigation in the initial graph is often too complex. in order to carry out it, it is possible to work on a subgraph. we start from a particular top selected in the complete graph and gradually extend the graph by transitivity. this technique allows, by a change of x-ray, to concentrate on a relevant extract resulting from targeted information (actor, key word and concept). measurements of degree centrality and constraint privilege the local point of view. more precisely, a data is known as a power station if it is strongly connected to the other members of the graph. the concept of centrality makes it possible to specify the dominant position of an actor, or a node in the network (freeman 1979). we base our work on the algorithm of floyd (1962). it is based on a generalization to the case of valued graphs by a calculation algorithm of graph transitive closing, discovered about simultaneously in france by roy (1959) and in the united states by warshall (1962). the transitive closing of a graph g= (x, a) is the minimal transitive relation containing the relation (x, a), it acts of a graph g*= (x, a*) such as (x, y) ∈ a* if and only if there exists a way f in g beginning by x and ending by y. the calculation of transitive closing makes it possible to answer the questions concerning the existence of ways between x and y in g and this for any couple of tops (x, y). (x, a*) calculation is carried out by iteration of the basic operation ϕx (a) which adds the arcs (y, z), and asks is a predecessor of x and z one of its successors. more formally: (4) definition : for any top x, (5) for any couple of top (x, y), (6) transitive closing a* is given by: (7) in our contribution, the user selects a specific node in the graph. other tops are masked and only the initially selected node remains visible. by the means of a scale, the change of transitivity is carried out. the first step indicates the direct neighbours of the node, who are then visible, like the bond with the initial node. the more the value of the scale is increased, the more the threshold of transitivity is important. this study of the structure of the graph and in particular of the topology of a particular node makes it possible to qualify this last and to study 26 its role within the whole of the studied population. if transitivity reveals many direct links towards other data this shows that the major importance of the data represented is revealed. sub graph studies by transitivity make it possible to carry out a more pointed analysis and to detect the most important actors. however, it is interesting to compare the typology of several important graph actors in order to be able to compare them with the same element: the number of bonds with direct neighbours (transitivity of first threshold) and it importance at the local level, importance of the basic data studied within the total graph. it is necessary to preserve an image of the first threshold of transitivity for each studied top. we add to visugraph a functionality allowing preserving a precise image of the top transitivity at one specific moment in the form of a small independent window. it is located near the main visualization window. the comparison of different sub graphs structure resulting from transitivity makes it possible to distinguish remarkable elements. in the following figure, the studied data are authors having taken part in a scientific congress on the topic of strategic watch. in this article context, the data are used at the end to do illustration of interactive methods, not as a complete analysis of this congress. in order to facilitate the graph legibility, we reduced to the maximum the size of wording. based on a global graph representation, we can see that stronger centrality data are distinguished and the sub graphs based on these data are extracted in order to be able to compare them. the higher graph corresponds to the total graph of the whole of the dataset. the interest is related to a node in particular which appears in the total graph which is strongly connected to the other tops. it is then interesting to calculate the transitive closing of this top and to study the structure of it. in this way, the top is isolated (3), by masking of the other tops. in the second time, using the change of graduation of the rule of transitivity, the direct neighbours of this top are obtained (4). the important number of direct connections of this node is remarkable, which means that the author is a paramount actor within his team and that he collaborates frequently with other researchers. by increasing the threshold of transitivity, we obtain the graph (5), representing the maximum threshold of transitivity for this top. comparison between this visualization and the total graph reveals the similarity between the latter. the author initially selected can thus be qualified as being one of the elements at the origin of the total structure of the graph, i.e. a very important author. 27 figure 2: extraction starting from the total graph of a specific top and calculation of its transitivity. d. filtering the filtering concept is based on the metric values. it consists in preserving only the tops and the edges of the associated graph with the values higher or equal to a threshold, according to a value fixed by the user via a scale. this procedure reveals the most representative tops, as well as the important components of the structure. the visualization of the result after filtering can be made by masking (total) adjacent edges and consequently their tops, having a value of metric lower than the threshold defined by the user. this kind of representation extracts the elements representative of the graph in terms of value of the metric (loubier and dousset 2008). e. k-core the decomposition in k-core (batagelj and zaversnik, 2002) consists in identifying particular subsets of the graph called k-core. consider a graph g = (v, e) with |v| = n tops and |e| = e edges. a k-core is defined as follows: definition a subgraph h = g (c, e|c) armature by the subset c⊆v is a k-core or a core of order k if and only if and h is a maximum subset with this property. the related subset is characterized by a “coreness” ce. it forms a cluster (a community) within the meaning of (alvarez and al, 2005). the k-core is obtained by recursive pruning of the nodes which have a smaller degree than k. the graph remaining contains only tops of degree ≥ k. k-core decomposition makes it possible to obtain a hierarchical partitioning of the tops such as the whole of coreness 1 is in top of the hierarchy and the maximum whole of coreness is at the bottom of the hierarchy. this partition depends on the degree of each top and 29 the degrees in the vicinity. complexity in time of the algorithm of decomposition in a k-core of alvarez-hamelin et al. (2005) is o (n + m) where n and m are respectively the number of nodes and edges in the network. applied to visugraph, the k-core is calculated starting from a threshold fixed by the user, via a scale. the more this threshold increases, the higher the coreness is. the obtained graph corresponds to decomposition in k-core, according to the threshold value chosen, via a scale. in the following figure, the k-core is applied for one k = 5, which means that only the nodes having at least five bonds are preserved. the results obtained allow: to visualize the main actors having collaborated; to distinguish the various teams, i.e. all the actors having to work more together. thus several different communities are distinguished, by the means of this method. it is noted that the global graph contains three large important teams. within each one of these groups, one distinguishes the major actors from each team, who are in the middle of the connections and thus the absence would divide the team, such as for example the nodes circled in the graph of the bottom of figure 2. figur 3: k-core (k=5). 30 4. conclusion in this article, we presented several interactive functionalities of the temporal data visualization tool, named visugraph. user point of views and user directives are taken into account, on the level of his or her needs but also on the level of its intervention when handling is dominant in the design of a tool of assistance to the analysis and for decision making. the tool and the visualization should not be fixed. the user must be free to be able to control fully his or her representation while intervening on the various statistical methods suggested, but also on the semiology suggested by the tool. within the framework of this article, we insist on the statistical analysis functionalities suggested by the visugraph tool, such as: the tops directed placements algorithm, transitivity, filtering, k-core. these various methods facilitate and improve exploration and graph structure analysis, like the particular study of specific nodes. our proposal is suggested by the interactivity offered for these traditional statistics methods. this interactivity between user and system makes it possible to control fully the chart, by means of scales and thus to target its analysis in order to obtain more precision as for the structure of the graph. thus, visugraph tool answers the principal ideas proposed by (card, mackinlay and shneiderman 1999) such as: cognitive resources reduction via an interaction raised with user, representation in graphic form of great volumes of data, increase of structures detection by the way of precise and interactive statistical methods, means of handling the data representation by semiology control. references alvarez-hamelin, j.i., dall’asta, l., barrat, a. and vespignani, a. 2005. k-core decomposition: a tool for the visualization of large scale networks. computing research repository: 41, 5255. balmisse, g. 2005. reflexions visualisation de l'information: quelques repères, retrieved 2005, [http://www.gillesbalmisse.com/blog/inde x.php?2005/02/24/35-visualisation-delinformation-quelques-reperes] batagelj, v. and zaversnik, m. 2002. generalized cores. working paper, department of theoretical computer science: 52. bertin, j. 1970. sémiologie graphique. haag: mouton. card, s.k., mackinlay, j.d. and shneiderman, b. 1999. readings in information visualization. san francisco: morgan kaufmann publishers. di battista, g., eades p., tamassia, r. and tollis, i.g. 1999. graph drawing algorithms for the visualization of graphs. upper saddle river: prentice hall. eades, p. 1984. a heuristic for graph drawing, congressus numerantium, 42: 149-160. fayyad, u., grinstein, g. and wierse. a. 2002. information visualization in data mining and knowledge discovery. san fransisco: morgan kaufmann. fekete, j.d. and lecolinet, e. 2006. visualisation pour les bibliothèques numériques. hermès-lavoisier. 9 (2) : 711. floyd, r. 1962. algorithm 97: shortest path. communications of the acm, 5, june: 345. frank, a., rapper, j. and cheylan, j.-p. 2001. life and motion of socioeconomic units. london: taylor and francis, page 353. freeman, l.c. 1979. centrality in networks: conceptual clarification. social networks, 1: 215-39. fruchterman, t.m.j. and reingold, e.m. 1991. graph drawing by force_directed placement. software – practice and experience, 21: 1129-1164. gayte, o., libourel, t., cheylan, j.p. and lardon, s. 1997. conception des systèmes d’information sur l’environnement. paris: hermès, 153. grinstein, g. 1996. harnessing the human in knowledge discovery. proceedings f the 2nd international conference on http://www.gillesbalmisse.com/blog/index.php?2005/02/24/35-visualisation-de-linformation-quelques-reperes http://www.gillesbalmisse.com/blog/index.php?2005/02/24/35-visualisation-de-linformation-quelques-reperes http://www.gillesbalmisse.com/blog/index.php?2005/02/24/35-visualisation-de-linformation-quelques-reperes http://en.wikipedia.org/wiki/communications_of_the_acm 31 knowledge discovery and data mining, portland, usa: 384-385. hochheiser, h. and shneiderman, b. 2002. a dynamic query interface for finding patterns in time series data. proceedings of conference chi, april 2002, minneapolis, usa. josselin, d. and fabrikant, s. 2003. cartographie animée et interactive. revue internationale de géomatique, 13 (1). kamada, t. and kawai, s. 1989. an algorithm for general drawing undirected graphs. information processing letters, 31: 7-15. kapusova, d. 2004. visualisation de l'information dans le portail staf18. http://tecfaseed.unige.ch/staf18/modules/ epbljolan/uploads/proj15/paper%20(et% 20dispositif)6.xml. accessed 2011-11-24 keim d., kriegel h. visualization techniques for mining large databases: a comparison. ieee trans. on knowledge and data engineering, 1996: 923-938. kramer, t. and jozsa, j. 1998. visualization and analysis of timedependent hydrometric data in windows environment. proceedings of the 3rd international conference on hydroinformatics, 1998, copenhagen, a.a. balkema publisher langran, g. 1993. time in geographic information systems. london: taylor & francis, 189. loubier, e. and dousset, b. 2008. temporal and relational data representation by graph morphing”. dans : safety and reliability for managing risk (esrel 2008), hammamet, 14/02/200816/02/2008, february ftp://ftp.irit.fr/irit/sig/2008_esrel_l d.pdf. maceachren, a.m., bosco f.p, haug d., pickle l.w. 1998. geographic visualization: designing manipulable maps for exploring temporally varying georeferenced statistics. proceedings of the ieee symposium on information visualization infovis, research triangle park, usa, ieee computer society: 8794. rainsford, c.p. and roddick, j.f. 2000. visualisation of temporal association rules. proceedings of 2nd international conference on intelligent data engineering and automated learning ideal, hong kong, chine: 91-96. renieris, m. and reiss, s.p. 1999. almost: exploring program traces. workshop on new paradigms in information visualization and manipulation: 70-77. shahar, y. and cheng, c. 1999. intelligent visualization and exploration of timeoriented clinical data. topics in health information management, 20 (2): 15-31. shahar, y. and cheng, c. 2000. modelbased visualization of temporal abstractions. computational intelligence, 16 (2): 279-306. spence, r. 2000. information visualization. new york: acm press. tutte, w.j. 1963. how to draw a graph. proceeding london maths, plowshare, 3 (13): 743-768. ware, c. 2000. information visualization, perception for design. san fransisco: morgan kaufmann. warshall, s. 1962. a theorem on boolean matrices. journal of the acm, 9, january: 11–12. http://geo.e-revues.com/ http://tecfaseed.unige.ch/staf18/modules/epbljolan/uploads/proj15/paper%20(et%20dispositif)6.xml http://tecfaseed.unige.ch/staf18/modules/epbljolan/uploads/proj15/paper%20(et%20dispositif)6.xml http://tecfaseed.unige.ch/staf18/modules/epbljolan/uploads/proj15/paper%20(et%20dispositif)6.xml http://www.irit.fr/publications.php3?code=3983&nom=loubier%20elo%c3%afse http://www.irit.fr/publications.php3?code=114&nom=dousset%20bernard ftp://ftp.irit.fr/irit/sig/2008_esrel_ld.pdf ftp://ftp.irit.fr/irit/sig/2008_esrel_ld.pdf http://en.wikipedia.org/wiki/journal_of_the_acm vol9no1paper2 to cite this article: bleoju, g. & capatina, a. (2019) enhancing competitive response to market challenges with a strategic intelligence maturity model. journal of intelligence studies in business. 9 (1) 17-27. article url: https://ojs.hh.se/index.php/jisib/article/view/369 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index enhancing competitive response to market challenges with a strategic intelligence maturity model gianita bleojua*, alexandru capatinaa adunarea de jos, university of galati, romania *gianita.b@gmail.com journal of intelligence studies in business please scroll down for article editor-in-chief: klaus solberg søilen included in this printed copy: exploring new ways to utilise the market intelligence (mi) function in corporate decisions: case opinion mining of nuclear power enhancing competitive response to market challenges with a strategic intelligence maturity model gianita bleoju and alexandru capatina pp. 17-27 how managers stay informed about the surrounding world journal of intelligence studies in business v o l 9 , n o 1 , 2 0 1 9 j o u r n a l o f i n t e llig e n c e s t u d ie s in b u s in e s s issn: 2001-015x vol. 9, no. 1 2019 klaus solberg søilena pp. 28-35 kalle petteri nuortimo and pp. 5-16 janne härkönen enhancing competitive response to market challenges with a strategic intelligence maturity model gianita bleojua*, alexandru capatinaa adunarea de jos, university of galati, romania corresponding author (*): gianita.b@gmail.com received 4 february 2019 accepted 3 may 2019 abstract tracking meaningful insights about companies’ exposures to high risk of failure in competitive markets, intelligence studies in business should listen to practitioners’ signals and act in providing decision making support to systematic scanning for valuable information. in order to gain robustness in confronting unexpected events in real markets, companies should adopt an unstructured learning perspective with maturity assessment tools, while purposely pooling strategic intelligence (si) skills. by bridging organizational maturity modeling with a future orientation stream of literature and intelligence studies in business, this conceptual research aims to highlight a genuine strategic intelligence capability maturity model (si cmm), capable of purposely addressing the challenge of aligning detective and anticipatory organizational capabilities. the conceptual model highlights the degree of preparedness of four si profiles behaviors (intelligence provider, vigilant learner, opportunity captor and opportunity defender – previously developed by the authors) against seven levels of maturity. the si cmm framework outlines both conditioned scanning capabilities (the first five si readiness levels) and enablers to anticipate future market trends (the last two si readiness levels). the novel approach of the strategic intelligence readiness framework supplies companies with a valuable organizational learning tool to close the skills gap through an opportunity provider profile. the main features lie in coordination and sharing si common knowledge to enhance preparedness in forward-looking competitive pressures. the conceptual framework invites academia and the community of intelligence experts in business to evaluate the relevance of the new conceptualization, clarity of constructs and complementary nature of correlation and causation with the proposed si cmm model. keywords capability maturity model, intelligence provider, opportunity captor, opportunity defender, strategic intelligence, vigilant learner “if we are blinded by darkness, we are also blinded by light” annie dillard 1. introduction in the context of unpredictable changes, which have a huge impact on firms’ competitiveness, providing managerial tools to assess organizational preparedness for the future becomes compulsory. the performance gaps registered between competitors are due to the different degree of organizational preparedness to anticipate and react to future market trends. managerial proficiency in understanding and addressing market challenges lies with scanning for relevant information, reacting to ambiguity, developing peripheral vision and overcoming cognitive bias in weak signal journal of intelligence studies in business vol. 9, no. 1 (2019) pp. 17-27 open access: freely available at: https://ojs.hh.se/ 18 interpretation. in order to enhance future organizational preparedness, core organizational skills to embed knowledge need to be addressed and responses need to be provided, confronting the demand of decisionmakers for strategic intelligence (si) training with developing anticipative capability. the changing patterns of competition and its impact over the organizational capabilities’ alignment continue to be a challenge for scholars and practitioners in business and management. in order to deal with increasing complexity and volatility of the competitive landscape, organizations should inquire about the knowledge and skills they must develop for the managerial future orientation. current patterns of strategic behaviour are still dominated by standardized or specific models and tools which are foreseeable to deter gain from innovation and change in future markets. therefore, strategic intelligence core skills should be trained to support management decisions in providing adjustable learning tools to successfully leverage dynamic capabilities of the firms. in order to provide anticipative managerial training, a strategic intelligence framework to assess the degree of organizational preparedness is hosting a learning approach to si maturity with: • conceptual training: knowledge acquisition oriented, to match si missing skills; • interpretative and iterative: expected proficiency in knowledge sharing; knowledge transfer oriented of core si skills; actionability trough collective learning experimentation; • future oriented behavior training: knowledge capitalization oriented to enhance competitive identity of si performers; influencing the future competitive environment; developing a si supportive culture. the strategic intelligence capability maturity model (si cmm) articulates actionable organizational knowledge and provides guidelines for managerial practice to share si practices about future competitive pressure anticipation in order to identify the specific si core skills that need to be improved. the value added of the si cmm resides on an interrelated body of knowledge of strategic intelligence and competitive behavior, valorizes our up-to-date benchmarking insights over the key topics on organizational alignment capabilities to environment turbulence and underlines knowledge discovery vocation as a si unique feature to influence organizational intelligence maturity. in the following sections, the main approaches and outcomes in the field of intervention, conceptualization, constructed experimentation and adjusting within the multi-framing approach of strategic intelligence profiling are exposed, as well as the methodological matching. 2. theoretical background the value of intelligence in influencing managerial thinking builds upon business practice reports about the lack of perspectives on strategic intelligence capability importance to assist decision-makers with scenarios of aligning intelligence agendas with the anticipation of competitive pressures (gilad, 2011). developing the capability to design interpretive frameworks is particularly important, while managerial strategic decision has to anticipate future competitive pressures with unanalyzable environments. a conceptual model of collective creation of meaning emphasizes the principles of puzzle method and provides an anticipative scanning process (anticipative strategic scanning and collective intelligence) to enrich the literature and business collection of cases (lesca and lesca, 2011). qualified foresight capability is approached with a future orientation stream of literature and intelligence studies in business to enhance managerial relevance of various business toolkits to confront competitive environment complexity and volatility. intelligence studies in business highlights the importance of designing support decision making tools to share practitioners’ concerns about interpreting relevant information regarding the external environment, affecting strategic positioning. intelligence analysis toolsets, cross-disciplinary studies, foresight and industry-specific case studies are listed as uncovered areas of interest among respondents’ perceptions. the definition of ci studies in business continues to track confusion with implications in formulating precise responses to practitioners’ needs. intelligence studies in business should focus on the content of managerial training to enhance their knowledge about relevant external influences, through ethically gathering 19 actionable information. moreover, the industry-specific focus deals with the necessity to develop anticipative tools to mitigate failures and crises (søilen, 2016). furthermore, intelligence studies should help to articulate need-to-know, strong signals and trends affecting organizational intelligence preparedness. the body of knowledge should be enriched with relevant evidence of various applications confronted to real competitive context, where we expect that learning by doing bridges what we see with what we do not see about the future to generate relevant intelligence training content (søilen, 2018). enhancing competitive responses to market challenges requires managerial proficiency not only in distinguishing between key drivers of success in current markets but to anticipate future changes in complex and volatile environments. taking leadership to steer organizations in an unstable competitive landscape needs a high level of preparedness in challenges to the current status quo, mainly if successful. the market leader position is under serious threat once ordinary capabilities are misperceived as extraordinary, as the risk of non-replicating the business success is very high. new challenges arise from ambiguity and volatility, influencing leadership to change the current business model; therefore, developing new dynamic capabilities emerges. an insightful approach organizes dynamic capabilities around three pillars: sensing change, seizing opportunities and transforming the business model, which are considered critical in enhancing competitive response within volatile, uncertain, complex and ambiguous future environments. proactively upgrading key features of the current business model is decisive to ensure the successful organizational fitness to vuca environments, while reframing strategic leadership on core skills pillars is listed: anticipate, challenge, interpret, decide, align and learn. the real challenge for organizational preparedness is to reinvent the business model through purposely combining sensing, seizing and transformation to comply with unforeseeable consequences. (shoemaker et al., 2018). competitive positioning relies upon an organizational learning approach of interpreting the environment with test makers actively searching for information and test avoiders with passively interpreting information within limits. four categories of interpreting behavior are considered: enacting and discovering labels intrusive organizations, while conditioned viewing and undirected viewing labels non-intrusive organizations (daft and weick, 1984). intelligence studies in business builds upon the above seminal work and focuses upon an organizational learning approach to improve managerial interpretive skills to cope with the environment. the foresight maturity model (rohrbeck, 2010) adapts and develops the three-step model of managerial acting upon weak signals on emerging change: scanning or data gathering, interpretation of the meaning of data and enacting through learning (daft and weick, 1984). the future orientation stream of literature provides useful insights about measuring corporate foresight, maturity to reach future preparedness status, and labeled vigilant future prepared status at maturity. valuable insight features continuously perceiving through change sensors, systematically prospecting for anticipating unexpected changes, followed by probing scenarios to shape the rules of competition, as core skills to be developed (rohrbeck, 2010). the conceptual framework underlines five capability dimensions against which the respondent is assessing the level of organizational future orientation (ofo) readiness: information usage, method sophistication, people and networks, organization and culture. the quantitative benchmark research assessed the level future preparedness with a 300 multinationals longitudinal study, 120 interviews among high and medium management levels, followed by 20 case studies across industries. the study defines an optimum level of future preparedness when its corporate foresight need level is matched by its corporate foresight maturity level, with the results clustering corporate foresight practices with the sample as follows: vigilant (24%), deficiencies (26%) and in danger (50%) (rohrbeck et al., 2018). enhancing competitive response to volatile and uncertain environment challenges requires managerial core skills to understand, interpret and enact upon competitor analysis and market selection. mapping competitive pressure in different industries gives valuable insights about how to make relevant a current position to future positioning when anticipating change patterns of competition. each firm will be uniquely affected by its capacity to decide upon markets selection. therefore, to enhance the competitive 20 response, reconfiguration with alliances and targeting will be undertaken. based on common strategic intent, five types of alliances are labelled: surrogate attackers, critical supporters, passive supporters, flank protectors or strategic umbrellas will destabilize and redirect the pressure system (d’aveni, 2002). relying upon measuring the managers’ perceptions about competitive dynamics, one significant study informs about limited capability to identify and act upon sensors, once opportunities and threats dominate competitive response decisions. reflections upon developing organizational capabilities shapes plausible competitive response behavior through an experimental learning approach to align internal and external influences in anticipating early changing patterns of competition in future markets (fouskas and drossos, 2010). exploring new markets is particularly challenging for capturing opportunities, while previous performance is non-repeatable. to address the concern, a useful response lies with mapping corporate foresight activities to overcome vulnerabilities in coping with uncertainty. experimenting recipes with multiple iterations of perceiving, prospecting and probing in bottom of the pyramid (bop) segments finds distant opportunities, crucial for capitalize upon them (højland and rohrbeck, 2018). differentiation in future markets becomes particularly difficult when it comes to managing innovation-related benefits among partners engaged in coopetition, as they are sharing a common knowledge base. seeking offer differentiation colludes with a technological coopetition business model and peculiar concerns arise when analyzing radical innovation vs incremental improvements for individual firms engaged in coopetition. conflictive objectives derived from the propensity to share vs protect practices to embed relevant knowledge has implications for business model transformation. return on evidence of a cross-industrial survey in finnish markets informs about the emergence of a radical business model innovation to preserve the offer differentiation outcome within collaboration among competitors (ritala and sainio, 2014). one recent study proposes a comparative three-level (early stage ci, mid-level ci capability, world-class ci) capability ci maturity model with eight dimensions: strategy and culture, relationship with management, structure, resources, system, deliverables and capabilities, analytical products and ci use, and impact. the comparative model aims at enabling benchmarking across industries and returns on empirical evidence underlines the necessity of a holistic model to track each company’s ci practices to reach maturity (oubric et al., 2018). business and intelligence communities are seeking relevant guidance to act upon organizational competitive capital and training should provide external expertise support to focus on defining the scope of a business opportunity (liebowitz, 2006). developing competitive capital lies with selecting facilitators and enablers from organizational-environment interaction. organizations must go beyond mere awareness of si practice benefits to engaging in purposely pooling strategic intelligence skills. in order to cope with a turbulent environment, managerial practices should be enriched with engaging in sensing and seizing change, and acting before competition. moreover, a genuine learning approach to collective intelligence practices would overcome cognitive dissonance in strategic decision and activate interpretative and iterative loops to enrich si core skills for influencing future markets. si cultural identity embraces collective filtering to develop insights about distant opportunities, while strategic leadership will take lead in exploiting competitive capital though openmindedness and learning from consequential mistake experimentation. 2. strategic intelligence capability maturity model (si cmm) the conceptual model highlights the degree of preparedness of four si profile’s behaviors (intelligence provider, vigilant learner, opportunity captor and opportunity defender) against seven levels of maturity. the si cmm framework outlines both conditioned scanning capabilities (the first five si readiness levels) and enablers to anticipate future market trends (the last two si readiness levels). si cmm defines a systematic approach to pooling si core skills, leverages si expertise to 21 combine conditions affecting competitive response and enables organizational intelligence to influence future markets (figure 1). si cmm antecedents reveal volatility, uncertainty, complexity, ambiguity and competitive pressure at the external level, while dynamic capabilities, test makers and test avoiders are related to the internal level. si cmm novelty resides on the knowledge discovery vocation and the competitive capital collection cases return on experiences to share within the community or practitioners to match the future need of si core skills upgrading, while its scope deals with targeting profile-specific needs for updating si knowledge. si cmm moderators aims to assess the lack of managerial anticipative skills associated with each si profile identity. this is the coordination and sharing of si common knowledge to enhance preparedness in forward-looking competitive pressures and the development of a supportive culture to enable organizational preparedness for assisted learning consultancy-based (conceptual training), business mentoring (problem solving), and procedural animators (action oriented). si cmm outcomes reveals profile-specific roadmaps to improve si core skills tailored to four si profiles, previously developed within exploratory research conducted by the authors (figure 2). si core skills acquisition assisted learning consolidates profile-specific si competitive identity through tailored interventions and enhances profile-specific capability to si process self-improvements. drawing upon organizational intrusiveness and matching test makers vs test avoiders (daft and weick, 1984), profile-specific si performance improvement with each maturity level assessment will focus on an iterative and interpretive approach to learning progress, tailored to each si profile. the intelligence provider (ip) develops core skills to distinguish between market challenges influencing organizational fitness, explores strategic trajectories to gain si cmm novelty and scope antecedents moderators outcomes figure 1 key elements of si cmm. figure 2 the strategic intelligence profiling tool. figure reprinted from bleoju, g., & capatina, a. (2015). leveraging organizational knowledge vision through strategic intelligence profiling-the case of the romanian software industry. journal of intelligence studies in business 5(2). 22 proficiency in noise and consequential mistakes recognition, and pursues risk of failure minimization. moreover, ip is capable of engaging systematic scanning of the environment with the specific purpose of blind spot recognition, while developing scenarios of their impact. vigilant learner (vl) leverages contextdependent knowledge gain to permanent upgrade case-based experience in discerning opportunities and threats, and adopts ready-toadjust behavior in confronting future competitive contexts. opportunity captor (oc) pursues market challenger behavior by leveraging learning from imprinted consequential mistakes to recognize similarities in avoiding future failures through sensing changes and filtering among capturable challenges. opportunity defender (od) focuses on market follower capability to protect market shares though systematicly avoiding consequential mistakes. the si cmm builds upon previous informative pilot testing of the si profiling tool against four variables with high impact on organizational knowledge: strategic scope, organizational agility, organizational cultural change process and the approach of competitors. the in-depth analysis of the si cmm framework empirical testing outlines the si profile specific core skills to develop in order to overcome managerial lack of anticipative skills (table 1). si cmm claims to overcome the rigidity of a traditional maturity framework, being designed as an auto-adjustable organizational learning solution, through recalibrating the classical assessment toward a portfolio of exploring anticipative maturity profile-specific si trajectories (table 2 and figure 3). phase 1. conceptual training with basic features of each profile observed and initial skills assessment tailored to each profile need for improvement. 2.1 sirl 1: entrepreneurs’ missing skills in labeling strategic behavior. focus on understanding the benefits of the si profiling tool. the seed stage focuses on understanding the benefits of the si profiling tool, provides guidance with critical information to match organizational knowledge gaps and enhance profile alignment to industry competitive advantage dynamics. it also stimulates managerial reflections with strategic scope decisions regarding future market opportunities, key success factors and organizational configuration to meet strategic goals. the first step in estimating si readiness is to identify the strategic challenges the positions in which the start-up in seed stage, with the right combination of skills, talent, and knowledge, has the biggest impact on enhancing its anticipative capabilities. the needs to cope with frequent environmental change and to deal with the strategic decisionmaking complexity require a renewed approach to the entrepreneurs’ knowledge base. the conceptual training should adopt the open intelligence perspective (calof, 2017) at this stage. table 1 si profile specific core skills detective and anticipative core skills intelligence provider vigilant learner opportunity captor opportunity defender sharing vs protecting knowledge sharing knowledge new knowledge acquisition competence portability effective reaction against competition intelligent filtering strategic agility process focused products and services operational efficiency strategic dissonance and cultural dissonance capacity to interpret weak signals of cultural dissonance culture favorable to change culture open to change and capacity to monitor the cultural dissonance capacity to monitor cultural changes enhance competitive response permanent care for upgrades and innovations focus on meeting the clients’ needs instead of attacking rivals competitive advantage on harvesting over competences’ portability high capacity to detect competitors’ threats 23 table 2 strategic intelligence capability maturity model (si cmm). si profiles si readiness level ip vl oc od sirl 1 seed stage: missing skills in labeling strategic behavior. focus on understanding the benefits of si profiling tool non-replicable achievements knowledge discovery differentiation among competition replicable achievements fresh knowledge acquisition wake up and act! discern among opportunities wake up and pay attention to threats! sirl 2 positioning on si profiling tool actively seek information to upgrade the knowledge base learned behavior approach passively seek information about the environment contextual intelligence skills self-assessment ready-to-adjust to competitive environment customized skills to cope with threats sirl 3 understanding how to accommodate with conflicting objectives derived from market orientation vs. vision orientation improve capability to balance conflicting objectives generate nonreplicable knowledge ability to leverage market vs vision orientation in filtering conflicting objectives generate replicable knowledge unpredictable positioning payoff due to environment dependence propensity to collaboration predictable payoff because context dependent propensity to resistance sirl 4 develop profile specific core skills anticipation and detective capacity as trainable qualities recognize impactful signals before competition attention and confrontation to competitors’ signals contextual intelligence skills to deploy in specific industry competence portability effective reaction against competition protect market share sirl 5 activating profile specific core skills developing agility and calibrating competitive response strategic agility focus on anticipatory cues of the competition key future challenge recognition noise recognition within a chain of non-consequential mistakes refinement of interpreting early enough competitive challenge coordination in ready to adjust capability learning from experimenting noise with consequential mistakes react and wait! quick response to capture only specific signals from industry trends gain competitive experience wait and react! learning from own and competition failure sirl 6 foresight skills to anticipate unexpected change recognition sensing changes in competitive landscape seizing changes in competitive landscape ranking opportunities to develop sharpness in positioning ranking defense mechanisms strengthening foresight skills from small consequential mistakes sirl 7 influence future markets as trend setter strategic framing and promoting a si culture sharing cultural practices to set up new patterns of competition proficiency in overcoming cultural dissonance proficiency in leveraging cultural dissonance due to context unicity mastering cultural practices to avoid systematic failures in future markets setting up the strategic scope enables pre-profiling upon embedding knowledge from relevant experience of each profile on: • sharing knowledge differentiation among competition ip • fresh knowledge acquisition and capitalization seeking vl • competence portability oc • effective reactions to the competition’s strategic behaviour od the si preparedness journey will check ip against knowledge sharing propensity through systemically being alert to non-replicable achievements, while vl focuses on replicable achievements and will foster the acquisition of new knowledge. in turn, the oc’s propensity to wake up and act enhances competence portability, while the od’s actions (wake up and listen) enable effective reaction against competition. the si skills to develop in order to enhance competitive response will be focused on the ip’s orientation toward change anticipation through recognitional reasoning, while vl focuses on analytical skills to capture relevant 24 information and to commute it toward exploitable knowledge. oc focuses on exploring benefits while systemically leveraging market footholds to challenge competitors’ positions, while od’s concern is to protect market share and avoid consequential mistakes. 2.2 sirl 2: entrepreneurs confronting concerns about positioning on the si profiling tool to confront concerns of basic si requirements to comply with positioning on the si profiling tool, the assessment will focus on: • vl capability to learn through actively seeking information about the environment. • ip capability to frame the organizational learning landscape through actively selecting information about the environment. • oc adopting conditioned scanning for the best differentiation to discern among opportunities in a particular industry environment; seeking customizable achievements replicable across markets. • od customized skills to rank competitor threats valuable across industries. in this stage, the entrepreneur’s focus is to set specific si competencies needed to perform the strategic jobs related to positioning on the si profiling tool. the differences between the requirements needed to select an si profile and the company’s current si capabilities leads to “competency gaps” that assess the organization’s si readiness. these si missing skills are embedded in a training portfolio dedicated to the effective launch with the maturity journey. 2.3 sirl 3: the entrepreneur understands how to accommodate conflicting objectives derived from market orientation vs. vision orientation si core capabilities check market orientation vs vision orientation on each profile. leverage knowledge gains to match strategic scope and competitive pressures reveal how to act upon organizational agility to approach competitor threats: • ip vision-oriented behaviour gains depth and ability to balance conflicting objectives. generates nonreplicable knowledge. • vl’s ability to leverage market vs vision orientation in filtering conflicting objectives. generates replicable knowledge. • oc’s ability to recognize distant opportunities. distant opportunities are a challenge in bop markets because there are a high number of consumers with very low spending power, therefore opportunities for differentiation are not obvious, and high risks of competence transferability among competitors erodes competitive advantages, therefore perceiving and prospecting are core skills to train. • od’s ability to protect the market share while predictable positioning payoff is context dependent. propensity to resistance. entrepreneurs are aware that creating a si report regarding market orientation vs. vision orientation becomes compulsory. with such a report, they can analyze the si readiness of the organization at a glance, easily detecting the figure 3 si profiles maturity journey. phase 1. sirl 1-3 knowledge acquisition oriented with focus to match si missing skills: conceptual training. phase 2. sirl 4-5 knowledge transfer oriented to improve core si skill actionability, collective learning anticipative training, interpretative and iterative support. phase 3. sirl 6-7 reinforcement of profile specific core skills actionability is knowledge capitalization oriented to check proficiency upon si core skills and influencing the future competitive environment, future oriented behavior training, developing the profile specific supportive culture to consolidate each competitive identity. 25 strategic domains in which more resources are needed to converge with a particular si profile. phase 2. intermediate level with interpretative and iterative support 2.4 sirl 4: entrepreneur’s selfassessment of the capability to develop profile-specific core skills experimental matching of si capability areas and profile-specific core skills to evaluate strategic options to anticipate proficiency upon an intermediate level of si maturity: • vl develops adjustable instruments to comply with competitive environment pressures. • ip seeks to improve organizational processing. • oc develops its capability to capture distant opportunities before rivals and owns the capacity to detect the advantageous market niche. • od develops its capability to mislead competition with regard to its own strategy. entrepreneurs should avoid the risk of being overconfident in their ability to develop si profile-specific core skills. they could be tempted to have high degrees of confidence that their company is prepared to fully adapt to a specific si profile. gaining effectiveness in strategic early warning is a chance in this step. 2.5 sirl 5: activating profilespecific core skills through strategic trajectories already selected • od is capable of internally employing mechanisms focused on results protection in order to exploit the ignored opportunities. • oc is capable of anticipating the dynamics of the most advantageous market segments. • vl is primarily oriented toward change anticipation. • ip is focused on sharing knowledge designing instruments. developing agility and quickness ip strategic agility • decision making abilities • focus on anticipatory cues of the industry • key future challenge recognition • coordination with ready-to-adjust capability vl business model process agility • refinement of interpreting early competitive challenge • capacity to align managerial decisions to competitive environment • learning from experimenting scenarios with non-consequential mistakes oc portfolio agility • quick response to capture only specific signals displayed by opponents • gain competitive experience • learning from competition failures od operational agility • wait and react to minimize consequential mistakes activating the si profile specific core skills should overcome the risks of underestimating new sources of competition and/or impossibility to keep pace with disruptive trends in the next three to five years. companies have to gain autonomy in interpreting market insights if possible, to act early enough. phase 3 consolidate si core skills with sirl 6 and 7 2.6 sirl 6: developing foresight skills to anticipate unexpected changes related to industry trends (si sense-making) • ip is developing a portfolio of anticipative scenarios based on market dynamics • vl is fully aware about the importance of successfully embedding the customer experience in order to incessantly offer adaptation • oc is systematically pursuing the premium market segments • od is deploying knowledge protection early warning mechanisms the profile-specific facilitators of strategic positioning lie with oc and od embracing a flanking attack for price sensitive segments and undisputed markets due to their sharpness in picking an own battles approach. in turn, ip and vl act as savvy sense-makers and refine 26 interpretive judgment with incomplete information about positioning payoffs by carefully checking for decision biases. 2.7 sirl 7: mastering the capacity to influence future markets as a trendsetter (si sense-giving) the capacity to become proficient in future markets relies upon a cultural change approach. therefore, each profile core skill should be consolidated to enhance the effective market response. ip, endowed with sensing changes in facilitators and challenges, will become influential in promoting technological innovation. it will pursue a proactive approach to match facilitators and challenges; generate enablers to gain in the future value chain while consolidating the capability to cope with uncertainty and complexity. vl focuses on seizing changes in facilitators and challenges; it will become proficient in orchestrating matching of selected dynamic capabilities to the competitive environment’s future key success factors. moreover, vl pursues proficiency in leveraging cultural differences through ambiguity and volatility tolerance. oc will master the ability to capitalize upon its unique ability to rank opportunities with adopting sharpness in selecting its own battles. it will become proficient in leveraging cultural dissonance. due to context unicity, nonreplicable performance is at stake. od will gain strength from small consequential mistakes while mastering vigilance in avoiding systematic failure. 3. conclusions, implications and future research in the attempt to fully evolve from the fragile capacity to monitor cultural change to the most profitable capacity to recognize the value of cultural differences, a si new profile emerges, opportunity provider (op), as a repository of outliers and mismatches, due to ambiguous trajectories in each profile maturity journey. op enacts as a test maker of si core skills renewal, consistent with an emergent competitive identity prone to the knowledge discovery vocation, as si’s unique feature is to influence organizational intelligence maturity. op profile’s core responsibility is to collect and interpret outliers and mismatches of ip, vl, oc, od behavior when relying upon transient competitive advantage during an instable stage of maturity assessment. op’s main features lie with coordination and sharing si common knowledge to enhance preparedness in forward-looking competitive pressures. op will monitor the risk of strategic dissonance upon the features of organizational cultural change and experiment with a therapeutic approach, through more refined decision-making support, as a basis for nonrepeatable behavior. the op profile is built upon promoting a strategic leadership approach to master transient competitive advantage while trained to behave in an agile way, it embeds learning on organizational fitness to various competitive contexts. the op profile identity lies with competitive capital influence in mastering and tracks pattern recognition when capturing opportunities. sirl 1 to 5 provide improvements in developing the capacity of what we do with what we see, while sir 6 and 7 inquire about what we see and what we do not see, therefore op focus on blind spots to capture distant opportunities. stages 6 and 7 make sense of stages 1 to 5 of si knowledge acquisition and provide improvements on si actionability while developing foresight skills to anticipate unexpected changes. op acts as an early warning control of each profile capacity to cope with unexpected consequences associated with roadmap implementation of selected strategic trajectories on sirl1 to 5. the need for si instruction level 1 through level 7 lies with profile specific learning support, ranging from sharing common si knowledge (level 1-5), while tailored guidance should focus (level 6-7) on developing managerial capability to active experimentation of enhancing competitive response. sharing commonality focus is about gaining trust with the learning content and about capitalizing on past competitive successes and failures. the maturity gain lies with collective judgment in filtering causal associations of conditions in success and failure stories. tailored organizational preparedness guidance supposes assisted experimentation of anticipated future competitive pressures with a focus on developing new si core skills to enhance competitive responses. future research aims at exploring causal configurations of conditions (sensing change, seizing opportunities, business model innovation) affecting competitive response 27 preparedness (sirl 6 and 7) through qca methodology. 4. references bleoju, g., & capatina, a. (2015). leveraging organizational knowledge vision through strategic intelligence profiling-the case of the romanian software industry. journal of intelligence studies in business, 5(2). calof, j., richards, g. and santilli, p. (2017) insight through open intelligence. journal of intelligence studies in business. 7 (3) 62-73. daft, r. l., & weick, k. e. (1984). toward a model of organizations as interpretation systems. academy of management review, 9(2), 284-295. d'aveni, r. a. (2002). competitive pressure systems: mapping and managing multimarket contact. mit sloan management review, 44(1), 39. fouskas, k. g., & drossos, d. a. (2010). the role of industry perceptions in competitive responses. industrial management & data systems, 110(4), 477-494. gilad, b. (2011). strategy without intelligence, intelligence without strategy. business strategy series, 12(1), 4-11. højland, j., & rohrbeck, r. (2018). the role of corporate foresight in exploring new markets– evidence from 3 case studies in the bop markets. technology analysis & strategic management, 30(6), 734-746. lesca, h., & lesca, n. (2011). weak signals for strategic intelligence. iste, london lesca, h., & lesca, n. (2013). weak signals for strategic intelligence: anticipation tool for managers. john wiley & sons. liebowitz, j. (2006). strategic intelligence: business intelligence, competitive intelligence, and knowledge management. auerbach publications. oubrich, m., hakmaoui, a., bierwolf, r., & haddani, m. (2018). development of a competitive intelligence maturity model: insights from moroccan companies. journal of intelligence studies in business, 8(1). ritala, p., & sainio, l. m. (2014). coopetition for radical innovation: technology, market and business-model perspectives. technology analysis & strategic management, 26(2), 155169. rohrbeck, r. & gemünden, h. g. (2011). corporate foresight: its three roles in enhancing the innovation capacity of a firm. technological forecasting and social change, 78(2), 231-243. rohrbeck, r. (2010). corporate foresight: towards a maturity model for the future orientation of a firm. springer science & business media. rohrbeck, r., etingue kum, m., jissink, t., & gordon, a. v. (2018). corporate foresight benchmarking report 2018: how leading firms build a superior position in markets of the future. schoemaker, p. j., heaton, s., & teece, d. (2018). innovation, dynamic capabilities, and leadership. california management review, 61(1), 15-42. søilen, k. s. (2016). a research agenda for intelligence studies in business. journal of intelligence studies in business, 6(1). søilen, k. s. (2018). why you should be interested in intelligence studies. journal of intelligence studies in business, 8(3). vol6no1paper4 calof to cite this article: calof, j. (2016) government sponsored competitive intelligence for regional and sectoral economic development: canadian experiences. journal of intelligence studies in business. vol 6, no 1. pages 48-58. article url: https://ojs.hh.se/index.php/jisib/article/view/142 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index government sponsored competitive intelligence for regional and sectoral economic development: canadian experiences jonathan calofa,b,c atelfer school of management, canada; bnorth-west university, south africa; cnational research university higher school of economics, russian federation; calof@telfer.uottawa.ca journal of intelligence studies in business please scroll down for article government sponsored competitive intelligence for regional and sectoral economic development: canadian experiences jonathan calofa,b,c atelfer school of management, canada; bnorth-west university, south africa; cnational research university higher school of economics, russian federation; calof@telfer.uottawa.ca received 2 february 2016; accepted 20 may 2016 abstract can competitive intelligence (ci) be used to assist in regional and sectoral economic development? this article looks at intelligence initiatives (largely around training) sponsored by various government departments and agencies in canada and their link to regional and sectoral economic development. the article provides examples of the kind of intelligence initiatives that have been used in canada to support regional and sectoral (industrial) economic development. the article proposes a method for categorizing these regional and sectoral intelligence programs and suggests methods for assessing the impact of these programs on regional and sectoral economic development. the canadian programs are divided into three broad categories 1) government programs aimed at enhancing their own ability to develop competitive intelligence 2) programs that are sponsored by the government for industry and others to develop competitive intelligence and 3) programs sponsored by the government to help communities develop competitive intelligence for local economic development. positive economic impacts were identified using program review documents, government officer reports and anecdotal evidence from program participant surveys. however, while the evidence does support positive impact a more comprehensive approach to evaluating these impacts should be considered in the future. keywords competitive intelligence, economic development, economic intelligence, program impact, program review 1. introduction and overview making better decisions based on a proper understanding of the competitive environment (present and future) is at the heart of competitive intelligence (ci). competitive intelligence assists organizations in developing a proactive approach that identifies and responds to changes in the competitive environmental, helping organizations (companies, governments, universities, associations and others) thrive in turbulent times. this need for understanding the external environment and its impact on success has been echoed in the regional economic development planning literature. external environmental changes (the focus of ci): “have brought new opportunities to regional industries while simultaneously exposing them to increased competition both domestically and internationally” (stinson 2006, p. 4). it has also been identified as critical in designing economic policy and programs (calof et al., 2015). the objective of this paper is to look at how government competitive intelligence initiatives have been used in canada to enhance economic development at both the regional and sectoral journal of intelligence studies in business vol. 6, no. 1 (2016) pp. 48-58 open access: freely available at: https://ojs.hh.se/ 49 level. the intent of presenting both programs and evidence of program impacts is to stimulate a global discussion on how regional and sectoral economic development can be enhanced through government competitive intelligence activities. it is hoped that researchers from other countries that read this article will be encouraged to develop similar articles and provide additional program examples that can be shared amongst the competitive intelligence and government program communities. governments in canada both at the federal and provincial level have been involved in competitive intelligence initiatives largely since the mid 1990s. in this article, several of these programs will be described and discussed. this article uses, as its base for discussing these initiatives, a comprehensive review of competitive intelligence in canada (calof and brouard, 2004) and programs that the author of this article has extensive knowledge about either through active involvement in them (e.g. training programs delivered by the author, organizational systems created by the author etc.) or because the author reviewed and/or studied them for academic purposes (for example, the national research council’s competitive intelligence unit study as reported in calof, 2014). while this could lead to possible biases in terms of the comprehensiveness of programs reviewed for this article, nevertheless in depth knowledge of the programs and the government officers responsible for the programs are required to properly analyze and classify them. over one hundred government programs and intelligence initiatives are examined in this article. these are divided into three broad categories that are discussed in more detail in section 3 (including the rationale behind these categories): 1. government programs aimed at enhancing their own ability to develop competitive intelligence. this includes training initiatives (e.g. sending government officers for competitive intelligence training) and creating intelligence units. 2. programs that are sponsored by government for industry and others to develop competitive intelligence. this category includes providing or sponsoring training in competitive intelligence for canadian companies (and associations) and joint intelligence projects (both government and industry working together to develop competitive intelligence). 3. programs sponsored by the government to help communities develop competitive intelligence or local economic development. this category involves programs sponsored by the government aimed at assisting small communities in developing competitive intelligence capabilities for local economic development programs and initiatives in these three categories are then examined for evidence of economic impact at the regional and/or sectoral (industry) level. 2. government involvement in competitive intelligence government involvement in competitive intelligence has been studies and written about for many years. dedijer (1994) wrote about the french government’s involvement in competitive intelligence. much has been written about the french involvement in ci including the use of and development of ci for government economic policy purposes, french government ci assistance to companies and associations, as well as joint intelligence assistance involving chambers of commerce, industry association and companies (dedijer 1994, horne and parks, 2004, bisson, 2014). similarly, calof and brouard (2004) looked at canadian federal and provincial involvement in canadian competitive intelligence and julyeta et al. (2014) looked at examples of government involvement in competitive intelligence in indonesia. these and other authors have looked at the importance of these activities as a stimulus to regional and sectoral economic development. for example, julyeta et al. wrote ““it was then decided to used competitive intelligence not only to promote new economic and development conditions, but to move to local policy to promote in some key positions people which will have a competitive intelligence background and which will be able to facilitate a global move of the local stakeholders to new horizons.” (2014, p. 38). bisson (2014, p. 10), in looking at the work of guesnier (2004), momagri (2012) and massmann and quonniam (2010), wrote: 50 “[these authors have] pointed out the correlation between territorial governance and economic performance, and in this way ci activities should lead to better territorial economic results. a lack of information, for example, on price or technology lowers the price of farmers’ yields.” calof and brouard (2004) looked at the canadian experience with competitive intelligence between 1989 and 2004. in their research, they looked at competitive intelligence growth in terms of academic development (courses and research), corporate activity, associations, consulting and government activities. the authors noted that there had been significant development in the 1990s in terms of government involvement in competitive intelligence. for example, in the mid 1990s the department of foreign affairs developed an intelligence program for producing competitive intelligence for canadian companies and departmental officials. agriculture canada established market intelligence within their market and industry services branch for providing policy advice within the department. industry canada brought in a competitive intelligence training program to enhance their officers’ skills. the national research council established a technical intelligence unit in their organization to provide technical intelligence to departmental officers for decision making and policy development. provincially, alberta economic development brought in competitive intelligence training for their officers and also made it available to their industry clients. alberta also set up a joint market intelligence committee, which had representation from various federal and provincial economic departments. in saskatchewan, step (saskatchewan trade and export program) developed an intelligence department and established market intelligence as one of their offerings to saskatchewan business. in nova scotia, nova scotia business inc. also brought in competitive intelligence training and established market intelligence as a product offered to nova scotia business. in quebec, each quebec ministry had an officer responsible for competitive intelligence. this officer reported to a central government business intelligence committee. it is within this context of significant growth in government led competitive intelligence activity that this article is set. this article looks to provide readers with information on government competitive intelligence initiatives in canada, in particular those geared towards regional and/or sectoral economic development and their economic impact. there are three caveats on the programs discussed in this article: 1. this article does not cover all canadian programs that use intelligence for regional or sectoral economic development. it is not truly comprehensive. it includes only ones that the author has been involved with, either through studying them, running them or advising the organization in charge of them. this limitation is made to ensure that the author has sufficient information to discuss, assess and properly classify the programs. 2. although this article covers programs between 1993 and 2015, the majority of the programs discussed occurred before 2006. this arose as from 2006-2015 significant budget cutting arose both at the federal and provincial levels, making the funding of the programs discussed in this article difficult. 3. this article only looks at competitive intelligence programs and initiatives associated with economic departments. it does not look at programs associated with national security and national intelligence agencies (for example canadian security and intelligence service – csis, communications security establishment – cse). 3. canadian government activities in competitive intelligence one of the contributions of this article is that it attempts to develop a classification scheme for government competitive intelligence initiatives. in reviewing past articles on government involvement in competitive intelligence (described in section 2) the author notes that programs and initiatives tend to fall into one of two broad categories: 1) programs designed to help the government develop competitive intelligence (for example development of in-house intelligence units, training in competitive intelligence for government officers). the intent of these programs is to ensure that the department has the ability to develop competitive intelligence 51 that can be used either to assist companies or help the department make decisions. 2) programs designed to help companies develop their own competitive intelligence. the author notes several of the articles listed above written about the government providing competitive intelligence resources and training to local companies so that they can develop their own competitive intelligence (calof and brouard, 2004 and dedijier 1994 in particular write extensively about this). in spite of the limitations listed above, there have been a plethora of programs developed in canada that are focused on developing intelligence to assist in both regional and sectoral (industry) economic development. these were reviewed for the writing of this article and examined to determine their focus (departmental intelligence development vs corporate intelligence development). in looking at the mandate of the programs, reviewing reports about them (where available) and talking to those familiar with the program, further enhancements to the classification scheme mentioned above were made. table 1 provides a list of those departments and agencies and the type of programs they have had. this list is compiled from the authors’ direct experience either in developing and delivering the program or knowledge of the program through academic research. as such it is not a comprehensive list but can be seen as a convenience sample that is being used to examine the ability to categorize and later assess programs. the programs listed are divided into the following categories: 3.1 government programs aimed at enhancing their own ability to develop competitive intelligence this category covers competitive intelligence training that the government (federal or provincial) had customized to their organizations’ needs to help their personnel develop intelligence skills. some are of the classic introduction to competitive intelligence variety, while others allow participants to run an intelligence application (project) as part of the training. the general intent of the training is to enable the government officers to develop or enhance their understanding of what competitive intelligence is and work on key intelligence skills such as planning intelligence projects, collecting information for intelligence, analysis and communication to assist in their job and either contribute to sectoral or regional economic development by using these skills to provide canadian organizations with intelligence that will make them more competitive or use the skills to develop policy and programs that will enhance the economic performance of the region or sector. a) personal/department: training geared around helping officers learn how to use intelligence to assist the department/agency. the agencies/departments mentioned in table 1 have specific sectoral or regional development responsibilities. as a result, the focus for the training/skills development was on using these skills to help develop appropriate industry policy. examples of this include industry canada receiving intelligence training to help in the development of sectoral assistance programs. nrcan (national resources canada) had a module on intelligence to help in selecting the appropriate research and development programs to focus on for industrial development. agriculture canada had a project related to intelligence training that was focused on identifying sectors of the agriculture industry for further development in a 2020 exercise. b) helping others: several government departments have used intelligence training to assist in developing skills that would enable them to better provide intelligence to canadian companies. examples include the department of foreign affairs, which had provided intelligence training to most trade officers since 1993 to help them better serve canadian exporters. nova scotia business inc. and step (saskatchewan trade and export partnership) have taken extensive skills training in intelligence as both these organizations have the provision of intelligence to local companies as part of their mandate. the two categories (personal/department and helping others) are not mutually exclusive. for example, the national research council established a technical intelligence unit that helped the department develop industrial policy, helped officers make recommendations on technology investments and also helped canadian technology companies directly. also, although training is mentioned above, it is not 52 the only element of the programs: step and the nrc (mentioned above) have established infrastructure that includes specific intelligence units while nsbi (nova scotia business inc.) included it within their mandate and developed materials around it. table 1 canadian federal and provincial government department and agencies competitive intelligence programs by program category. x indicates that the program was run/sponsored by the department or agency identified. the programs and departments/agencies in this table are not a comprehensive list of all programs in competitive intelligence run in canada, but they are the ones that the author of this paper is familiar with either through research done on canadian intelligence programs (with francois brouard) or through involvement either in running the program or evaluating it for the department/agency. the programs are also limited to those that were run by departments with economic related mandates. this table is used to demonstrate the breadth of programs run in canada and to provide a demonstration of the program categorization method proposed in this article. canadian federal government departments and agencies enhancing their own (department's) ability to develop intelligence sponsored by the government for industry and others to develop intelligence programs to help communities develop intelligence personal/ department helping others intro. skills joint projects company projects trade show intelligence agriculture canada x x x x atlantic canada opportunities agency x x x x canadian food inspection agency x x department of foreign affairs x x environment canada x export development corporation x industry canada x x x national research council x x x natural resources canada x office of the national science advisor x the alliance for sector councils x x western economic diversification x x x x provincial government departments and agencies alberta agriculture x x x x x x alberta economic development x x x x x x alberta energy research x alberta innovation and science x x alberta treasury board and finance x manitoba agriculture, food and rural development x ministry of economic development and trade ontario x x newfoundland advanced technologies industries x x nova scotia agriculture x nova scotia business inc. x x x x x ontario cultural heritage x saskatchewan advanced technology x saskatchewan trade & export partnership x 53 3.2 programs that are sponsored by the government for industry and others to develop competitive intelligence. federal and provincial governments throughout canada have sponsored a myriad of programs across canada designed to help canadian organizations develop and enhance their competitive intelligence skills. some of these have been geographically focused (offered in one or more regions to help develop and enhance the local economy) and some have been sectorally focused, providing training and intelligence assistance to companies in multiple regions but in a specific sector (for example training for agriculture companies or training for technology companies). while sponsored programs have been given to a broad number of sectors, the two most frequent sectors for sponsored programs have been agriculture and technology. in work that the author has done with other governments the same two sectors have also been the most frequent focus for sponsored intelligence programs. a) introduction to ci/skills development: these types of programs introduce participants to the concept of competitive intelligence and the skills and organizational requirements to develop intelligence. these programs have ranged from one-hour keynote addresses as part of major government events (for example the manitoba department of agriculture and rural development program and ontario economic development had intelligence keynote talks as part of industry events) or as long as two day introductions to competitive intelligence programs such as some of those sponsored by alberta economic development. b) joint government and industry projects: joint projects bring industry, association and government together to work together on intelligence project with results being shared amongst all participants. an example of this is alberta agriculture, food and rural development, which sponsored an intelligence program that brought together industry, association and government participants. the joint project was to develop intelligence on opportunities for the alberta beef industry in japan. the program involved providing a basic introduction to intelligence (two-day program involving introduction to intelligence, how to collect information, planning for intelligence and analysis) to all participants who were then put in project teams (each team had industry, association and government representation) with each team developing intelligence on the japanese imported beef market. the final intelligence product (the combination of each of the team’s intelligence reports) was then shared with all participants. c) company projects: company projects are similar to the introduction to ci/skills development training but also involve participants developing and running an intelligence application on behalf of their organization as part of the training. these programs start with one to two days training and then participants go back to their organization, develop an intelligence plan (which is discussed with the program trainer) and then have weekly mentoring sessions with the trainer as they work on their intelligence project. at the end of the program (normally one month) all participants gather again with the trainer to discuss their experiences. for some of these project sessions, participants have both the trainer and a government officer helping them on the project. an example of this type of program is the atlantic canada opportunities agency (acoa) sponsored program that was focused sectorally on technology companies on the east coast of canada. acoa and the trainer provide the training and project support to companies in halifax (nova scotia), st. john’s (newfoundland) and fredericton (new brunswick). d) trade-show intelligence: a cooperative trade show intelligence approach was developed which combined small and medium sized companies, appropriate associations, federal and/or provincial government officers in a training program focused on a specific trade show. all participants were given trade show intelligence training. the training involved two days of training both on 54 competitive intelligence and trade show intelligence. for the training, specific materials from the trade show they were attending were included in the training material. for example, in training for the bio-technology trade show, participants were given a list of exhibitors that were going to the show, a list of all seminars, workshops, presentations and also social events. as part of the training program, participants were asked to develop trade show intelligence plans for the trade show that all program participants were going to (for example foodex in japan, fancy food show in san francisco, bio in washington) and to send the plan to the program trainer. the trainer then provided feedback and additional guidance to participants. government and association participants helped the companies execute their projects as well as running their own applications and the consultant/trainer also assisted. the approach was run at several trade shows and helped companies identify opportunities, assess markets, helped associations identify better ways to serve their members and government officers identify better programs and policies. one of the trade show programs from a technology trade show was written up in calof and fox, 2003 and provides details on the organization of the program. several provincial and federal departments and agencies have sponsored trade show intelligence programs across a broad number of sectors. these include nova scotia business inc., agriculture canada, alberta economic development, western economic diversification and alberta agriculture. trade show intelligence is an example of a program that can be regionally and sectorally focused. it is sectorally on the specific event and regionally in terms the regional authority sponsoring the training. 3.3 programs sponsored by the government to help communities develop competitive intelligence for local economic development this was a program developed to help small communities harness the knowledge within communities to develop their own economic development plan using intelligence. in the program, community leaders, local business owners, government officials and others were brought together in a facilitated program, taught about competitive intelligence and were then put in groups to develop the intelligence needed to support their region’s competitive advantage. all of this was then used to develop a regional economic development plan designed by the program participants and then presented to the community at large. the program involved multiple training sessions and intelligence projects and was done over an extended period (nine months). the program was designed to help small communities develop a long term economic development plan based on identifying their competitive advantage(s) and the intelligence required to exploit it. local community media have written extensively about the success of the program in their region (see dalman 2005 for an example of the program in humboldt, saskatchewan). a more detailed description of the program can be found in calof et al. (2010). 4. competitive intelligence program impact on regional and sectoral economic development section 3 provided a method to categorize government competitive intelligence programs. given that the programs mentioned above are designed to lead to regional or sectoral economic development, this section looks at documents generated by the program that would indicate that they had some sort of economic impact. 4.1 community economic development programs one of the community economic development programs (in humboldt, saskatchewan) was subjected to a full program review within a year of the program delivery. the purpose of the program was to transfer both skills that could be used to develop an economic development plan for the community that would lead to economic development and also 55 intelligence skills that could be used to help program participants in their organizations. the program review, done by impact research consulting ltd (kehring 2006) asked several questions about knowledge gained and economic development. amongst the question asked: “do you think that the process of creating the action humboldt economic development plan has produced positive gains in community capacity building knowledge and skills (including facilitation, competitive business intelligence, and networking)?” a total of 95.2% of program participants responded yes to the program reviewer. “do you think the creation of the action humboldt economic development plan has contributed in positive, tangible ways to the economic development of the region?” a total of 90% of program participants responded yes to this question. “were you able to increase your business or professional opportunities as a direct result of your involvement with the action humboldt economic development plan?” a total of 60% of program participants responded yes to this question participants were asked to list specific benefits attributable to the program. those identified by participants included: new residents moving to the region, new businesses starting up, increased employment opportunities, employee retention and the development of regional partnerships. the program review concluded with the following statement “the potential for economic development has been enhanced in the humboldt region due to the creation and the implementation of the economic development plan. there have been direct and significant results in the region due to the initiative.” (kehring 2006, p. 23) collectively, the answers to the evaluation questions coupled with the evaluators overall conclusions and analysis provide support for positive regional economic benefits arising from the humboldt community intelligence program that was sponsored by the government. unfortunately, this was the only community economic development program that was evaluated. there were other community economic development programs but no evaluations were done, therefore this section can only conclude that for the one program reviewed, a positive economic impact was found at the regional (local) level. 4.2 sponsored programs for industry despite the large number of sponsored programs for industry in canada there has not been a formal program review according to the organizations contacted for this article. accordingly, the link between these sponsored programs and regional and sectoral economic development is based more on the post-training reports provided by the sponsoring organizations and the anecdotal evidence in these reports in the form of participant comments gathered as part of the program assessment. one report written up in alberta and published in alberta treasury board and finance documents (2006) assessed the project intelligence program success using their organization’s metrics for the program. the article noted that 88% of the companies that attended the competitive intelligence course did undertake an intelligence project (a measure of success for this government agency). comments in the report included: “one company noted that the process was valuable…. a second company confirmed that they had sought out additional information leading up to a conference and it had prepared them to more effectively discuss their needs with others that could provide them with information. a third noted that they had completed a process that led them to refocus their marketing efforts in a slightly different direction. “all indicated that they found the process valuable. one company indicated that they would like three additional members of the team to take the training with another company saying ‘i was able to gain considerable information/intelligence…as a result of the training’ … finally, one company reported that the training session ‘led to discussion across divisions on how [company name] could advance its ci infrastructure.’” (p. 86) in the case of one of the joint programs (in which government, industry and associations worked jointly on a specific intelligence 56 application) a post program review had industry participants estimate the value to them (industry) as being in the six figure range. once again this provides support for economic value at both a regional (provincial) and sectoral level. in terms of anecdotal evidence from officer reports on the program and participant evaluations, here are a few examples mainly from the trade show intelligence programs. they are from a review of an intelligence program event given on the east coast of canada. for the houston offshore trade show the following comments were included in the officers’ report “the training, mentoring and support at the trade show enabled me to do three months of work in four days in houston”. the same review also looked at participant comments from another east coast program focused on the plastics industry for the national plastics exhibition trade show (npe). the following quotes were in the report “i was able to use ci techniques to optimize my info gathering exercise. a ‘focused approach’ was, i believe, the key to a productive two days… the show was huge and would have been overwhelming if not for the ci preparations.” a report on a trade show intelligence program that focused on sial (a food show in paris) included the following quotes from program participants: “i really enjoyed it. the process made me think carefully about what i was trying to find and what decisions needed to be made.” “it was valuable as a planning tool because nobody realized how big the paris sial was.” “this is something that can be a value to nearly everybody. it should be required of those that go to large trade shows. it is applicable to both governments and the private sector….the training allowed me to do much more at paris sial (food trade show) than i could have done under normal circumstances. the process yielded more and better information.” finally, a report out of alberta after a trade show intelligence program for bio (biotechnology trade show) included the following comments from the association that had jointly sponsored the training with the government “we all benefited from this process a lot…we will do this again.” “the process assisted our companies and the association itself in acquiring more reliable information in less time. it is something that we will use again and recommend to our members.” as a final measure of program impact, some of the government officers that were in charge of the programs (public servants) noted that the program had been the recipient of various recognition awards. these awards include department based awards (referred to as minister’s awards) as well as provincial awards (referred to as premier’s awards). readers are cautioned that while the results indicate positive economic impacts of these economic or sectoral intelligence programs, with the exception of the program review on the community economic development program and the valuation exercise for the joint intelligence exercise, all other results are either from officer reports or are anecdotal. there is no way to tell whether the comments in the reports and articles about the project intelligence and trade show intelligence are reflective of the majority of program participants and not just biased towards those that were most satisfied. nevertheless, the following can be concluded: 1. for the small community economic development program, a positive regional economic development impact was shown through the program evaluation results provided in this article. 2. for the joint intelligence project in alberta (beef industry) a positive economic impact both sectorally (beef) and regionally (alberta) was indicated according to the reviewers’ estimation of the value of the intelligence produced. for #1 and #2 these are a matter of public record from government conducted program reviews. 3. for all other sectoral and regional programs presented in this article that had anecdotal comments (and there were many) they (those that provided the anecdotal examples) indicated that they had received some sort of economic benefit. 5. conculsions and areas for future research this article has sought to classify government competitive intelligence programs and 57 initiatives used in canada and also examine the impact of these programs on economic development. three broad categories were identified along with several subcategories in each: 1. government programs aimed at enhancing their own ability to develop competitive intelligence 2. programs that are sponsored by the government for industry and others to develop competitive intelligence and 3. programs sponsored by the government to help communities develop competitive intelligence for local economic development. this article has sought to provide examples of intelligence programs and initiatives under each one of these categories. it is hoped that future research will look at other intelligence related regional and sectoral economic development programs to help develop a more comprehensive list and description of the kind of intelligence programs that have been used around the world to assist in sectoral and regional economic development. it is hoped that in the future, the categorization method described in this article will be improved by others applying it to programs in their countries. as well it is hoped that this kind of research will result in the development of a comprehensive list of the kinds of competitive intelligence initiatives that have been used around the world. this article only reports on canadian initiatives. finally, this article has attempted to link these programs to regional and/or sectoral economic development. economic impact was examined using program review documents but only in the case of one community economic development program. other initiative had to be reviewed using government officer reports and anecdotal evidence from participant satisfaction surveys. however, while the evidence does support a positive impact a more comprehensive approach to reviewing these impacts should be considered in the future. which intelligence programs and initiatives provide the best sectoral and regional economic development impact cannot be answered based on the way these programs were reviewed and this should be addressed in future studies. acknowledgements the article was prepared within the framework of the basic research program at the national research university higher school of economics and supported within the framework of a subsidy by the russian academic excellence project '5-100'. 6. references alberta treasury board and finance .(2006). alberta heritage trust fund magazine. an experiment in problem solving. bisson, c. (2014). exploring competitive intelligence practices of french local public agricultural organizations. journal of intelligence studies in business. 4 (2), 5-29. calof, jonathan l. (2014). evaluating the impact and value of competitive intelligence from the users perspective the case of the national research council’s technical intelligence unit. journal of intelligence studies in business 4 (2), 79-90. calof, j.l., (1997). so you want to go international? what information do you need and where will you get it? competitive intelligence review, 8(4), 19-29. calof, j.l.,brouard, f. (2004). competitive intelligence in canada, journal of competitive intelligence and management, 2(2), 1-21. calof, j.l. and fox, b. (2003). trade show intelligence: intensive, exhaustive and fun. competitive intelligence magazine, 6 (6), 6-10. calof, j.l. and arcos, r. (2015). scip members intelligence practices: first phase of a global program, european preliminary findings. presented at scip european summit, november 3-5, madrid spain. calof, j.l., richards, gregory and smith, jack. (2015). foresight, competitive intelligence and business analytics tools for making industrial programs more efficient. foresight-russia, 9 (1), 68-81. dalman, keri. (2005). plan for a better economic future moves ahead another step, humboldt journal, january 13. dedijer, s. (1994). governments, business intelligence-a pioneering report from france. competitive intelligence review, 5 (3), 45– 47. du toit, a.s.a. (2013), comparative study of competitive intelligence practices between two retail banks in brazil and south africa. 58 journal of intelligence studies in business 3 (2), 30-39. horne, m., & parks, t. (2004). implementing competitive intelligence in a non-profit environment. competitive intelligence magazine, 7(1), 33–36. julyeta p.a runtuwene, audy aldrin kenap and verry ronny palilingan (2014). the development of north sulawesi through competitive intelligence. journal of intelligence studies in business. 4 (1), 36-42. kehrig, randall. (2006). project evaluation: action humboldt economic development plan. massmann, o., & quoniam, l. (2010). mise en réseau d’acteurs publics et privés, et stratégies d’innovation et de développement international du territoire : l’exemple de la chambre de commerce et d’industrie du var. paper presented at the 2010 vsst, toulouse, france. salvador, marisela rodriguez and luis francisco salinas casanova (2012). applying competitive intelligence: the case of thermoplastics elastomers. journal of intelligence studies in business. 2(3), 47-53. stimson, robert j, stough, roger r, roberts, brian h. (2006). regional economic development: analysis and planning strategy. springer, united states. wright, s. and calof, j.l. (2006).the quest for competitive, business and marketing intelligence a country comparison of current practices, european journal of marketing. 40 (5-6), 453-465. jisib-vol-12_nr-1(2022) (3).pdf journal of intelligence studies in business vol. 12 no. 1 (2022) open access: freely available at: https://ojs.hh.se/ pp. 83–90 networking capabilities and digital adoption of business agility with business model innovation as a mediating variable idris gautama so richardus eko indrajit sri bramantoro abdinagoro abstract in business, agility is a method that places projects on a smaller scale and engages capabilities and digital adoption on business agility with the variable business model innovation as a mediation variable using quantitative method. the results show that all variables have digital adoption, and business model innovation can escalate business agility keywords: business agility, networking capabilities, digital adoption, business model innovation 1. introduction in the business world, agility is a method that places projects on a smaller scale and engages team members through constant collaboration and continuous iteration. this method offers an iterative and gradual approach, so it does not work sequentially and creates a product at the end of the project (xie et al., 2022). observing the current work environment, the need to have resources becomes very important, especially for workers in a company. the developthe dynamics of business and small businesses to be so volatile. therefore, it is not surprising facing change is an important component in maintaining the sustainability of a company. this also has an impact on the micro, small, and medium enterprises(msme)/usaha mikro kecil dan menengah (umkm) sector. in order to maintain productivity and maintain their income, umkms are competing to take advantage of digital platforms. coordinating minister 84 that there are around 301,115 micro, small, and medium enterprises that switch digital platforms (cepeda & arias-pérez, 2019). the agile process certainly reiterates the importance of the role of agility, especially during this pandemic. agility is an important aspect that encourages individuals to be able to quickly adjust to changes and existing situations. unfortunately, in indonesia, agility is actually a concept that has not been noticed for a long time. in fact, looking at the description of competencies that are a component of agilemployee potential, especially in the current in addition to business agility, business models are useful in modern business environments because they allow organizations to understand the value of future organizations and how companies in general operate (orvos, model can be explained, for example, capturing the functioning of the company way and creating value and providing value to customers a,nd converting customer responses into profits (bouwman et al., 2018). the application of business model innovations is expected to be able to be better useful by collecting creative ideas to be processed which then the ideas become informative innovations that are able to be implemented on innovation projects in one of the factors that affect business agility is the company’s network capability or ability to develop and establish cooperation eration. the advantage obtained from having network capability is the ease of obtaining information related to resources, markets and the latest technology that can be used to support company performance (gulati, r., n. capability is important for the company’s longterm success and viability (parida et al., 2016, 2017). previous research conducted by (majid the conclusion that network capability effectively affects the level of business agility. in addition to network capablity, the next factor that affects business agility is digital adoption. it is undeniable that by applying improve the company’s performance. so many conveniences can be achieved in various aspects of the business. digital adoption can meet the information needs of the business world quickly, precisely, accurately and relevantly. in addition, digital adoption also has an important role for companies in their competitive advantage strategy. digital adoption will affect almost all aspects of 2 business management and can provide added value if managed properly and designed into an effective information system. (karvonen et al., 2018) states that the behavioral aspect in the adoption of information technology is an important thing to pay attention to because the interaction between users and computers is the result of tions as aspects of behavior that exist in individuals as users. therefore, based on the explanations presented above, researchers are interested in conducting research on how networking capabilities and digital adoption affect business agility with the business model innovation as a mediation variable. the latest in this study is the addition of business agility variables and network cpabilities based on suggestions from previous research conducted by nasution (2004), so that it becomes four variables networking capabilities, digital adoption, business agility, business model innovation. the purof networking capabilities and digital adoption on business agility with the variable business model innovation as a mediation variable. 2. literature review 2.1 network capability network capability is a dynamic capability that creates dependence inside and outside the organization (battistella et al., 2017). network capabilities allow companies to gain access to different resources, identify opportunities and respond quickly to ever-changing marketing needs (solano et al., 2018). this variable is a company’s ability to develop and utilize interactions between organizations to gain access to various recources owned by other parties (walter et al. in chabachib, capability is the company’s ability to create, improve, and use internal and external organizational relationships. in network capability there are four aspects, which are internal communication, coordination, relationship skills, partner knowledge. coordinationconsists of the integration and synchronization of resources to ensure their effective utilization to achieve organization’s 85 goals (bengesi & le roux, 2014). the main essence of coordination is a situation in which various important organizational resources and activities are shared outside the boundaries of the organization, which connect different individuals and independent organizations together, thereby developing a network of dalam majid et al., 2019). 2.2 digital adoption (lee et al., 2021), the adoption rate is the relative speed at which innovation is adopted by members of the social system. it is generally measured as the number of individuals who adopt a new idea in a certain period, such as each year. so the adoption rate is a numerical indicator of the steepness of the adoption curve for an innovation. the perceived attributes of an innovation are one of the important explanations of the adoption rate of an innovation according to (ghobakhloo & ching, 2019), the adoption of innovation is a process of social change with the presence of new discoveries that are communicated to other parties, then adopted by society or social systems. innovation is an idea that is considered new by a person, it can be a new technology, a new way of organization, a new way of marketing agricultural products and so on. the adoption process is son hears a new 16 xxx thing until the person adopts (accepts, applies, uses) the new thing. (parra-sánchez et al., 2021) mentions that the nature and character of technology develops depending on one’s perception of technology. technology can be viewed as an object, as a process, as a science (as a knowledge), and as control (as a volition) (patil et al., 2022) technology has three domains, namely: design technology (design), production technology (manufacture), and marketing technology (pradhan et al., 2020). 2.3 business agility nowaday’s business is moving very fast, innovation and disruption are emerging every day. if organizations do not implement agile methods, then they can lose their advantage and be no longer relevant. agility itself, is the ability to think and understand the situation quickly. in the business world, agility is a method that places projects on a smaller scale and engages team members through constant collaboration and continuous iteration. this method offers a iterative and gradual approach, so it does not work sequentially and creates a product at the end of the project. the concept of agility itself is originally tems studies (saputra et al., 2021). meanwhile, in strategic management, drucker conceived agility to explain the importance of increasing (liao et al., 2019). the further research involved hundreds of companies and the results were studies on organizational agility in strategic management have been widely carried out in the study of entrepreneurship, organizational agility itself is a form of entrepreneurial action (attar & abdul-kareem, 2020). 2.4 business model innovation according to (geissdoerfer et al., 2018) one of underserved markets” is adapt business model to community realities. thus, business model innovation is one of the important keys to success. according to (colovic, 2022), broadly speaking, business model innovation is planning and designing new ways of doing business through changes, improvements, and improvements to existing business processes, both internally and in collaboration with externals so as to create new work processes that have never been done before to increase the added value of stakeholders. so in this study the author concludes that business model innovation is a unique, compleand effectiveness where it is able to create, provide and capture value. 3. research method research design this research is included in descriptive quanstates that, say that, research methods are used in the quantitative approach. according research is research that uses observations, interviews or questionnaires regarding the current state of affairs and also the subject we are researching. through questionnaires and so 86 on researcher collect data to test hypothesis or answer a question. through this descriptive research, the researcher will explain what is actually happening about the current situation that is being studied. research subject this research was conducted at culinary smes in surabaya bandung semarang jakarta this study was random sampling so that in this study a research sample of 100 culinary smes in surabaya bandung semarang jakarta data collection data collection technique done is through questionnaires that are spread using google form. the google form can ease the collection of survey research. data analysis the data analysis technique in this study used partial least square (pls). pls is a structural equation model modeling (sem) with an approach based on variance or componentbased structural equation modeling. according to (sohaib et al., 2020), the purpose of plssem is to develop a theory or build a theory (predictive orientation). pls is used to explain the presence or absence of relationships between latent variables (prediction). pls is a powerful analysis method because it does not assume current data with a certain scale measurement, the number of samples is small. 4. result a. outer model analysis in order to measure the validity or validity of a questionnaire, the researcher uses ity testing is done using convergent validity value (> 0.6). 2) uji reliabilitas in this study, researchers used 2 types of reliability tests, namely the cronbach alpha test and the composite reliability test. cronbach alpha measures the lowest value (lowerbound) reliability. the data is stated to be good if the data has a cronbach alpha value and a composite reliability score of >0.7. based on the calculations carried out, it was found that all instrument items met the requirements of validity and reliability with scores that exceeded the criteria.. 3) r square used in the measurement of how many endogables. based on data analysis carried out through the use of the smartpls program, the r-aquare value was obtained as stated in the following table in appendix. the score in the table explains that the business agility ties, digital adoption, and business model innoother variables that were not studied in this study. the table explains that the business networking capabilities and digital adoption, variables that were not studied in this study. this table is avaluable in appendix. the presentation of the hypothesis results are the results of testing the business model innovation hypothesis on business agility obtained a score of (p = 0.039) with a p value of 0.773 (p1.96) showing that there was the business model innovation variable on business agililty. this rejects the research b) effect of networking capabilities (x1) on the results of testing the networking capabilities hypothesis on business agility obtained a score (p = 0.436) with p values of 0.001 (p1.96) indicating that there was variable networking capabilities on business agility. the better the networking capabilities owned by smes, the better that are in line with the results of this study (2012) that entrepreneurial networks have or performance. then (akintimehin et al., on business performance in fabric centers the three dimensions of network capability 87 (internal communication, partner knowledge and relational skills) on performance in small and medium-scale companies. c) effect of networking capabilities (x1) on the results of testing the networking capabilities hypothesis on business model innovation obtained a score (p = 0.555) with a p value of 0.000 (p1.96) showing that there the networking capabilities variable on business model innovation. the better the sme’s networking capabilities, the better the sme’s business model innovation will be. this is in line with the research conducted by (mihardjo, sasmoko, alamsjah, & elidjen, 2018). d) effect of digital adoption (x2) on business the results of testing the digital adoption hypothesis on business agility obtained a score (p = 0.291) with p values of 0.009 variables on business agility. the better the digital adoption carried out by smes, the better the business agility will be. this is in line with the research conducted by e) effect of digital adoption (x2) on business the results of testing the digital adoption hypothesis on business model innovation obtained a score (p = 0.338) with p values of 0.000 (p1.96) showing that there is a sigital adoption variables on business model innovation. the better the digital adoption owned by smes, the better the innovation of sme business models will be. this is in line with the research conducted by (ghezzi & cavallo, 2020). f) effect of networking capabilities (x1) on the results of testing the network capablities hypothesis on business agility mediated by business model innovation obtained a score (p = 0.216) with p values of 0.009 network capablities on business agility mediated by business model innovation . the better the network capabilities owned by smes, the more it will affect business agility, this is also strengthened by the innovation of business models. this is in line with research conducted by mulyana g) effect of digital adoption (x2) on business the results of testing the network capablities hypothesis on business agility mediated by business model innovation obtained a score (p = 0.213) with p values of 0.008 (p1.96) showence between variable network capablities on business agility mediated by business model innovation. the better the digital adoption carried out by smes, this can increase business agility, as well as the existence of business model innovation variables to strengthen digital adoption of business agility. 5. discussion business agility is a relatively new paradigm painted as a solution for maintaining competitive advantage during times of uncertainty and turbulence in the business environment. quickness is about the speed with which the organization can respond to customer requests, market dynamics, and emerging technology options. this includes the time to sense relevant events, the time to interpret what is happening and assess the consequences for the organization, the time to explore options and decide on which actions to take, and the time to implement appropriate responses. resources are about the capabilities that are available within the organization including people, technology, processes, and knowledge. resources can be both tangible and intangible and they provide the basis for doing business and for instantiating change. adaptability is about how well the organization responds to changing demands, threats, or opportunities. this requires the ability to learn as well costs. agility is concerned with economies of scope, rather than economies of scale. based on the results of this research, although business agility has increased, yet it is unaffected by the business model innovation. business model innovation / bmi that has advantages to enable companies to be adaptive to market changes. through a production framework that relies on cooperation with sme partners is one of the keys to being overcome, it will make it easier for companies 88 to change resource allocation and form competitive prices. in addition, such business models form a unique attractive market segment. thus, it allows the company to provide value added to the customer and will facilitate revenue streams. in addition, the network capability possessed by entrepreneurs forms the foundation for entrepreneurial success. according to (r. as a company’s ability to initiate, develop, and utilize internal organizations as well as external inter-organizational relationships. when the network capability is increased, business agility will be able to be increased. broadly speaking, the use of digital technology is directed at increasing the company’s business agility. according to sri mulyani, the ability to create and also adopt digital technology determines how an economy and a country are able to enter the global value chain system that will increase productivity. so that with good digital adoption from smes, it will increase their business agility. other than that, based on the result of this research, the existence of business model innovation can increase more the variables that affect business agility. the ability to collaborate between smes will continue to give birth to innovations. changes in consumer needs and desires to satisfy themselves will spur companies to innovate continuously in order to create products that are in accordance with consumer desires. so that this can increase the business agility of smes. in fact, this research also shows that business network capability is said by the ability to carry out integrated cooperation between two or more parties that is harmonious, synergistic, systematic, integrated and has the aim of establishing business potential in generating companies, it will provide business model innothe diversity of insights from owners/managers in smes on technology adoption strategies generates different driving forces and barriers related to adopting, adapting and assimilating internet information technology in organizations. (bleicher & stanley, 2016) noted organizational readiness is the main reason technology adopters differ from non-adopters. a critical characteristic of technology adoption is the ability of sme executives to navigate and adapt to an environment that sets the right organizations so it may shape business model innovations. 6. conclusion based on research and discussion, it can be innovation on business agililty, there is a signetworking capabilities on business agility, variable networking capabilities on business variables on business model innovation, there able network capablities on business agility mediated by business model innovation, there variable network capablities towards business agility mediated business model innovation. capabilities, digital adoption, and business model innovation by 49.7%, and business capabilities and digital adoption, by 68.3%. the researchers hope that in the next study to replace variables that are not yet in the study so that this research becomes more reliable. references akintimehin, o. o., eniola, a. a., alabi, o. j., (2019). social capital and its effect on business performance in the nigeria informal heliyon.2019.e02024 asad, m., sharif, m. n. m., & alekam, j. m. e. (2016). moderating effect of entrepreneurial networking on the relationship between and small enterprises. paradigms, 10(1), 1. attar, m., & abdul-kareem, a. (2020). the role of agile leadership in organisational agility. in agile business leadership methods for industry 4.0. https://doi. org/10.1108/978-1-80043-380-920201011 pessot, e. (2017). cultivating business model agility through focused capabilities: 89 a multiple case study. journal of business research, 73, 65–82. https://doi.org/https:// doi.org/10.1016/j.jbusres.2016.12.007 ence of dimensions of networking capability in small and medium enterprise performance. nternational journal of business and social science, 2(5), 189–200. as a catalyst for business model innovation a three-step approach to facilitating economic success. journal of business management. agility using business model stress testing. electronic markets. https://doi.org/10.1007/ s12525-016-0243-0 ant role of corporate entrepreneurship, digital capabilities, and readiness to change in business performance: moderated by the adoption of business model innovations in the newspaper industry in indonesia. national conference of economics, business & entrepreneurship, icebe 2020, 1st october 2020, tangerang, indonesia, 483. european alliance for innovation. cepeda, j., & arias-pérez, j. (2019). information technology capabilities and organizational agility: the mediating effects of open innovation capabilities. multinational business review. https://doi.org/10.1108/ mbr-11-2017-0088 chabachib, m. (2020). buku monograf: kinerja umkm kota semarang. colovic, a. (2022). leadership and business model innovation in late internationalizing smes. long range planning. https://doi. org/10.1016/j.lrp.2021.102083 (2018). sustainable business model innovation: a review. journal of cleaner production. https://doi.org/10.1016/j.jclepro.2018.06. 240 ghezzi, a., & cavallo, a. (2020). agile business model innovation in digital entrepreneurship: lean startup approaches. journal of business research. https://doi. org/10.1016/j.jbusres.2018.06.013 ghobakhloo, m., & ching, n. t. (2019). adoption of digital technologies of smart manufacturing in smes. journal of industrial information integration. https://doi. org/10.1016/j.jii.2019.100107 gic networks. strategic management journal, 21(3), 203–215. agile and resilient organizations. systems research and behavioral science. https:// doi.org/10.1002/sres.2624 (2018). enterprise agility: why is transformation so hard? lecture notes in business information processing. https://doi. org/10.1007/978-3-319-91602-6_9 improving organizational agility of micro, small, and medium enterprises through digital marketing strategy. proceedings–2017 2nd international conferences on information technology, information systems and electrical engineering, icitisee 2017. https://doi.org/10.1109/icitisee.2017. 8285561 drivers of digital adoption: a multiple case analysis among low and high-tech indusbusiness administration. https://doi.org/ 10.1108/apjba-05-2019-0093 and organisational agility to business model innovation in smes. technology analysis and strategic management. https://doi.org /10.1080/09537325.2019.1601693 network resource and organizational capabilities to create competitive advantage nal of small business management. https:// doi.org/10.1111/jsbm.12449 in hospitality industry. international jourment. elidjen. (2018). the role of distinctive organisational capability in formulating co-creation strategy and business model innovation. polish journal of management studies. https://doi.org/10.17512/pjms. 2018.18.2.16 wibawa, i. m. a., ayu sriathi, a. a., & adi, i. n. r. (2022). market entry agility in 90 a dynamic capability perspective. international journal of data and network science. https://doi.org/10.5267/j.ijdns.2021.9.018 orvos, j. (2019). achieving business agility. in achieving business agility. https://doi. org/10.1007/978-1-4842-3855-4 ki, m. (2016). network partner diversity, network capability, and sales growth in 69(6), 2113–2117. erberg, m. (2017). network capability, innovativeness, and performance: a multidimensional extension for entrepreneurship. entrepreneurship & regional development, 29(1), 94–115. parra-sánchez, d. t., talero-sarmiento, l. of ict policies for digital transformation in colombia: technology readiness for iot adoption in smes in the trading sector. digital policy, regulation and governance. https://doi.org/10.1108/dprg-09-20200120 patil, a. s., navalgund, n. r., & mahantshetti, s. (2022). digital marketing adoption by start-ups and smes. sdmimd journal of management. https://doi.org/10.18311/ sdmimd/2022/29677 pradhan, p., nigam, d., & tiwari, c. k. (2020). partial least square method-structural equation model for assessment of drivers of digital marketing adoption by indian smes. international journal of advanced science and technology. the quantitative approach. journal of perioperative practice. https://doi.org/10.1177/ 175045891502501002 era. procedia computer science. https://doi. org/10.1016/j.procs.2021.12.147 mazzara, m. (2020). a pls-sem neural network approach for understanding cryptocurrency adoption. ieee access. https:// doi.org/10.1109/access.2019.2960083 lado agudo, j. (2018). effect of market orientation, network capability and entrepreneurial orientation on international performance of small and medium enterprises (smes). international business review. https://doi.org/https://doi.org/10.1016/j. ibusrev.2018.04.004 corporate networks on competitive advantage: the mediating effect of ambidextrous innovation. technology analysis & strategic management, 1–15. media marketing improve customer reladynamic capability perspective. journal of interactive marketing, 39, 15–26. varrete, s. (2022). digital platforms and smes’ business model innovation: exploring the mediating mechanisms of capability information management, 65, 102513. tive and qualitative research in business technology: justifying a suitable research methodology. review of integrative business and economics research. impact of network capability on small business performance. management decision, 53(1), 2–23. impact of network capability on small business performance. management decision. https://doi.org/10.1108/md-11-2013-0587 vol8no1paper5 kss to cite this article: søilen, k.s. (2018) book review: superforecasting: the art and science of prediction. journal of intelligence studies in business. 8 (1) 46-53. article url: https://ojs.hh.se/index.php/jisib/article/view/286 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index book review: superforecasting: the art and s c i e n c e o f p r e d i c t i o n klaus solberg søilena adepartment of engineering, natural sciences and economics, faculty of marketing, halmstad university, halmstad, sweden; klasol@hh.se journal of intelligence studies in business please scroll down for article book review: superforecasting: the art and science of prediction. crown publishers, new york, ny. tetlock. e. philip, gardner, dan (2015) klaus solberg søilena adepartment of engineering, natural sciences and economics, faculty of marketing, halmstad university, halmstad, sweden *corresponding author: klasol@hh.se throughout this review i write “the authors” referring to everything that is written in the book, even though i suspect that tetlock is the leading theorist. gardner is a journalist, it says on the dust jacket. i do not exactly know what that means when it comes to whose ideas are in the book – who has contributed with what – and i do not want to speculate. philip e tetlock is a scholar of psychology with an impressive number of publications and citation, so expectations are high right from the start. and, this is a good book, but not for any of the reasons that it pretends to be one; in fact, it is the opposite. i will get back to this at the end of this review but concentrate on the critique. forecasting is another word for intelligence work or guessing about the future. when we talk about forecasting we normally think about scientific methods that imply using more quantitative methods, on problems where such methods are thought to be of real use, as in weather forecasting. as we shall see throughout the book, the methods used for actually predicting events in this book are not quantitative but qualitative. that by itself is a problem when the term ‘forecasting’ is chosen, as it is confusing to intelligence professionals. the ‘super’ in ‘superforecasting’ sounds like something that is made up to sell extra copies of a book. for two authors who place so much value on modesty (as they describe in chapter 12) it’s an odd contradiction to throw the word “super” around in so many forms through a book about the activities one is doing oneself (for example, superforecasters, superteams, superquestions, supersmart, superquants and supernewsjunkies). i guess all professional like to be “super”, but super is something that others say about our work, not something we use to describe our own work and it is difficult to find any irony most of the time when the prefix is being used about how well the authors/project/project members did. it’s quite possible that the authors thought that the ambiguity and playing with irony would go over well with the reader, but it does not. the subtitle is the ‘art and science’. it’s a popular subtitle in english but does not say much as it suggests everything (both a science and an art), thus nothing. what is normally more interesting to know is if the authors see something as a science or an art and why. again, the impression is one of selling more copies of the book. chapter one throws arounds names and parallels like bill gates and his anthropological work and tom friedman and his thesis about the flat world. the project the authors work with is “the good judgement project,” which sounds like something pulled out of a commentary to the bible. more interesting, the authors explain how their wok is supported by the american intelligence community (ic) and that its participants have outperformed other analysts. this is a claim throughout the book which is never explained in any detail. we are not told much about how the actual competition was arranged, for example how the answers were graded. we are only given some example of questions asked and presented with names of some participants journal of intelligence studies in business vol. 8, no. 1 (2018) pp. 46-53 open access: freely available at: https://ojs.hh.se/ 47 that used the authors methods (the superforecasters) and how well they did compared to others. the book promises that the key to becoming a good forecaster using the method is not math skills, or an abundance of reading or excellent knowledge of history or geography, but comes down to some simple methods of psychology. in other words, good predictions all come down to how you think (not what you know), the authors claim. it is about thinking in a way that is “open-minded, careful, curious and – above all – self-critical. it also demands focus” (p. 20). now, if i had been a few decades younger i would have been very excited at this point in the book with the promise of a quick solution, a method available to everyone (who reads the book), but these personal qualities, as much as they are required, are just the beginning of good forecasting. at this point in the book i get the feeling that i just saw an infamous gambler ride into town. chapter two cannot wait to provoke with its title: “illusions of knowledge”. we are told some quick, smart stories from the history of medicine where the moral is that we should be critical, as in scientific rigor. then we should think about how we think, a favorite idea among psychologists. the chapter goes on to talk about kahnemann and tversky (colleague) and abruptly ends without every really explaining what illusions are found in knowledge or having ever come close to treating the topic of knowledge more than superficially. by this time it is unclear whether or not it is worth reading the rest of the book. the suspicions from having read the title and the few introductory pages are confirmed. in chapter three, entitle “keeping score,” we are introduced to an old legend, the historian sherman kent, who was one of the first people in modern times to introduce science into intelligence work. to ensure his analysts were using the same language, kent defined 100% certainty as “certain”, 95% as “almost certain”, 75% as “probable”, 50% as “chances about even”, 30% as “probably not”, 7% as “almost certainly not” and 0% as “impossible”. the idea that this would help analysts use the same measure, thus increasing accuracy in predictions. the idea was also good, but never became widespread. one could object that if you use a likert scale of seven it would make more sense to set the percentages with 14.3 percentage point intervals (for example, 10085.7%). to allow for the 50% mark, it would make more sense with a five-grade likert scale. the authors do not comment on this but conclude that the system was never adopted. what they do note is that what is here presented as objective statements is subjective. that in itself is a strange comment as it excludes the possibility that some observations are facts (100% and “certain”), and that all statements are subjective. the authors go on to say that at the end all these estimates can only be presented as opinions, which depends entirely upon what kind of questions the scale goes on to measure (for example, natural facts or predicting human behavior at time t). what did remain in ic after kent was the use of probabilities, such as when ic told obama that there was a 70% or 90% probability that the man in the pakistani compound was osama bin laden (p. 59). what that implies is more disturbing, that obama decided to lead a military operation into a foreign country (a military ally) without even consulting their government when there was a 10-30% probability that they were wrong. the same logic goes to explain why so many civilians are killed with drones and other air strikes; the us has a policy of bombing targets when they are not quite sure who the targets are. the authors go on to argue for the value of the brier score that measures the accuracy of probabilistic predictions. but they fail to note that the brier score becomes inadequate for very rare (or very frequent) events, because it does not sufficiently discriminate between small changes in forecasts. the authors fail to see the fundamental difference between predicting the weather with fewer and easier variables to measure and predicting human behavior which consists of many more variables that are more difficult to measure and that frequently vary under the same conditions, such as when a customer suddenly decides not to buy an ice-cream on a hot day even though he did so a week ago under similar conditions. not to mention the unreliability of the rationality assumptions, which are largely avoided in the book. too many analysts think ideologically, and try to fit their observations with their beliefs. what does not fit is treated as an irrelevant distraction. they are also likely to declare things “impossible” or “certain”, the authors remind us. this brings us to a key element in the method that is presented, that the “superforecasters” are taught to express themselves more carefully. this is illustrated 48 in the allegory of the fox and the hedgehog by isaiah berlin. the foxes win by “playing it safe with 60% and 70% forecasts where hedgehogs boldly went with 90% and 100%” (p. 69). this is the same in obama’s dilemma presented above. what actually happens is that the risk of mistake is transferred from the intelligence analyst to the decision maker. the decision maker is tempted to give the go-ahead if he is presented with something that has a 60% or higher probability. if things go wrong then the intelligence analyst can always say it was not his fault as there was a 40 or 30% chance of failure or mistake. does this mean we have a better method for intelligence analysis? no, of course not. it is only transferring the risk of fault from the person who is doing to analysis to the person who is requesting it or making the decision. to the extent to which it is not possible to be more certain of course then 60 or 70% likelihood will have to do. the question then becomes if the decision maker should make a decision to engage at all, given the risks. are the risks sufficiently explained to the decision maker? in the case of osama in the bunker the answer is not clear. so, is this better intelligence work and is it a better method for intelligence analysis? i think the book offers some good advice in terms of rules of thumb, which we shall come back to, but so far the suggestions made imply that the analysts have just become smarter fencing off potential criticism for potential mistakes. if this is how the authors won the competition against their colleagues in the ic – by giving vaguer answers then that is no real victory, but a statistical trick. this would also explain why they do not focus on knowledge, as they are not so concerned with ideas, but more with careful expressions. so far into the book this seems to be the essence, and a better title may have been “the art of careful expressions”. the question remains what kind of people you would like to fill your intelligence department with, well-read experts or people who have learned that careful expressions will put you in the right more often? note again that in the obama case the analysts are not really helping obama by saying that there is a 70% or 90% possibility bin laden is in that house in pakistan. it’s also odd to say “70% or 90%”, 70 to 90% would at least make some sense, but 70 or 90 is like giving two different answers. as if we are free to choose. obama is faced with two choices: to bomb/attack or not to bomb/attack, it is either or, but the answers given him are in terms of a percentage likelihood of bin laden being in that house, which is not what he needs. in other words he is not being given the intelligence he requested. if it was difficult to be sure, why not wait until they were more certain? the analysts figure obama will bomb/attack because there is only a 30% chance that bin laden is not in that house, but obama could also have reasoned that it is not worth bombing/attacking as there is a 30% chance someone else (innocent people) will be killed. another technique used by foxes is to analyze the problems using many methods/analyses and synthesize it into one answer at the end, something the authors call aggregation, but others call redundancy in method. it is a well-used method in the social sciences, so there is nothing new about it. chapter four starts with the horrifying story of how the intelligence community made up of 20,000 intelligence analysts supported a claim from the white house that iraqis had a nuclear weapons program that produced weapons that was a threat to the us and nato countries (national intelligence estimate 2002-16hc). one explanation was that the ic had been bullied by the white house to come up with documents that suggested a war. with the authors method, the ic should have said that there was a 70% likelihood or similar, but then the results would probably have been the same anyway. this just proves how dangerous the method of transferring the risk to the decision maker is. the authors struggle to find the right answer to the question. they do not start by saying that maybe the ic should have listened to dr. hans blix, the iaea director general from 1981 to 1997, who was experience with these issues and guided the agency through the chernobyl disaster. dr. blix was against the invasion from the start, as there was no evidence to suggest that the claim was true. thus, it is disheartening to see how the authors stay with their initial method in this example, they should have said 60-70%. then they would not have been completely wrong and that, the authors think, would have been better. for whom? for the estimated 1 million iraqis who died as a result of the conflict? another example that is used in the book is the use of math to make predictions on wall street. the authors suggest that the answer to intelligence is statistics and math, just like for the study of economics (probability). but how well did the quantitative analysts really do for their investors? what about the consequences 49 of the failed banks and all the pensioners who lost their retirement funds? the authors never go down that road. in general, has the study of finance succeeded with math? if one had asked that question 20 years ago most colleagues would have said yes, but today large part of quantitative finance is left behind as irrelevant, including option pricing models. some of those who received the nobel prize for their “inventions” in finance have since been discredited. chapter five is about iq and intelligence. much of the chapter and chapters in general are case allegories, small cases with no clear conclusion, as in the example of the cause of death of yasser arafat (pp. 114-117). the case is picked up in later chapters as a to-becontinued ploy for the reader to find the content interesting, it seems. chapter six is entitled “superquants”. we are told that superforcasters are not like the quants (quantitative analysists) of wall street, they don’t use that much math. it’s more careful thought-out and nuanced answers (p. 129). the authors return to the obama – bin laden example, citing mark bowden, who confirms what obama thought about the intelligence estimates he received. obama got “probabilities that disguised uncertainty as opposed to actually providing you with useful information“ (p. 135). obama acknowledged that he was left with a gamble, as we commented on earlier in the review. obama himself is quoted as having said it was a “fiftyfifty”. then a whole analysis follows about what this comment means; if it was to be interpreted literally or not. was he being sarcastic, critical or just stating a fact? it’s easier to say for those who were in the room. he may have thought that the figures presented insufficient information. one interpretation says that obama would have attacked the facility no matter how small the odds were for finding bin laden. if that is true it borders to an almost bizarre example of decision making that resembles gambling, which may or may not be what he meant. the authors and those consulted in the book cannot agree what obama was thinking when he said “fifty-fifty” or what i meant, which is not much more comforting. chapter seven in entitled “supernewsjunkies”. just the idea that extensive reading makes someone a “junkie” is offensive but fits well with the authors’ idea that it is not what you know but how you think. the chapter starts by unfolding more of the “superforecasting” method, leaving the reader puzzled as to why the method is spread around the book in small pieces. it makes the book seem scientifically unfriendly, again, as it is all about selling books and consultant services. the suggestion is to “unpack the question into components” distinguish between unknown and known and leave no assumption unscrutinized (p. 153). fair enough, but this is much more difficult than it seems and poorly explained on the following pages. “adopt the outside view and put the problem into a comparative perspective that downplays its uniqueness and treats it as a special case of a wider class of phenomenon”. “also explore the similarities and differences of your own views and those of others…” (p. 153). the author’s method consists of synthesizing these two views and the views of the crowd. this is questionable. first of all, if i am not well-read on a topic why include my opinion at all? and surely the opinion of the crowd is a function of the information spread in mass media, whatever that may be. thus to find some sort of average (another statistical ploy) on these three positions is ludicrous. why should this method bring you any closer to anything truthful? what it will give us is what the social truth is, but the social truth is very often different from the truth per se as will be obvious, for example, to anyone asking people about which religion is right. the authors go on to say that this process of gathering the three views takes time and is only the beginning of the method (but by now the reader is a bit tired of the sales talk). the reader is annoyed by the probability figures the authors keep throwing around in the chapters, like the 60% probability that polonium would be found in arafat’s body (p. 153). the authors should for once tell the reader how the analyst got to that figure, as that calculation is the cornerstone of the whole method suggested in this book. it’s not explained anywhere. the time frame of a decision is very important of course. the authors talk about “scope”, an effect that may give an answer of no today, but yes in a month or two, so the answer depends on the point in time. the “superforcasters” know this so they update their information much more frequently, on average, than regular forecasters, we are told. it makes you wonder who the regulars are, analysts at ic? i am sure they must be thrilled 50 to read how badly they do their work, all 20 000 of them. by now the reader is also annoyingly interested in learning about all the facts of the “tournament” where the “superforecasters did so well and so much better than the rest. what were the questions? who set them up? how much time was given to each question? and more fundamentally, how were they graded? i do not want to speculate but i suspect that the best answer was not in terms of right or wrong answers, but the answer that comes closest to the truth as that would favor those answer with vague answers. it should have all been explained clearly at the start, not as loose sentences spread around the book like bait to turn another page. on the other hand i guess that is how bestseller books are written, they are exiting partly because the reader hopes to know what it’s all about and keeps flipping those pages. the point about updates also makes you wonder if the “superforcasters” won because they updated their information more frequently. the article continues on the arafat question, and bill flac (one of the superforcasters) updates his estimate from 60% to 65% yes as he thinks that the delay in time the swiss laboratory has with publishing the results has to do with the operation they may be testing to rule out lead as the source of death. another issue that is interesting here is the calculation that increases with 5% likelihood. that calculation is never shown. why not? surely if focus is on psychology it would be interesting to learn about the cognitive processes that makes the difference of 5%, not least the biases if there is no clear calculation but more of a feeling. in a book dedicated to this essential topic how come the calculations are not shown? i am not saying it is easy, but others have tried and it is the central theme of the book. instead the authors talk about the briar score again, which is used as a measure of success for predictions, not for the calculation of estimates. in fact, about the only thing the method presented in the book has in common with forecasting is the briar score. the randomness of the method is clear in another example about republican voters in colorado: … “so you think that the maximum you should raise your forecast is 10%. it’s now between 1% and 10%” (p. 168) “finally you settle on 4%”. this shows clearly that this is what we call a rule of thumb, which by itself is fine, but then it should say so clearly, and there is nothing new with this approach. maybe that is the most critical part about this book: that it pretends to be about forecasting but is instead a good collection of rules of thumb. it’s a method by which new information leads to small adjustments in the estimates. another methodological problem is that if you go with a certain hypothesis and gather a large amount of information in that direction, then you are likely to get a high likelihood of true or false because each new piece of information could lead to a small adjustment. it will also depend on the information you happen to find in the language(s) you can read. there will be plenty of information that you do not see or find, there will be some stories you tend to go with so in reality this incremental approach by which likelihoods are increasing or decreasing with percentage points is not that straight forward to use. chapter nine is entitled “superteams”. it starts by telling the disastrous story of the bay of pigs invasion (1,400 terrorists were surrounded by 20,000 soldiers when they tried to invade a foreign country) and how that lead to the cuban missile crisis. much of this is true but the authors forget to mention that the russian placement of missiles was also a reaction to the american placement of missiles in turkey. that in itself is an argument for the importance of knowing history. and if you did not know that it does not help to put you into a team of other superforecasters in a superteam asking superquestions. the result is just going to look even more wrong. chapter ten raises a relevant topic for anyone who has read this far, how it is possible to be a good leader and make accurate decisions if all you are getting are vague estimates. the answer suggested by the authors seems to be based on moltke, the prussian general. the reason moltke is largely implied is because he said that everything in war is uncertain. so, don’t trust your plan. an officer should be calm and assuring, and knows that he needs to make a decision in a fog of uncertainty. as often is in these kinds of books, there is the introduction of a german magic word that is supposed to explain it all (other examples in other books: “gestalt” or “verstehen”). the word this time is ‘auftragstaktik’, or mission command in english. as valuable as the idea may be, i am not sure it is going to be a consolation for obama when he is asked to take the risk of attacking a house just outside of a pakistani 51 army base. it is not going to give me more confidence in intelligence analysts. chapter eleven is the second to last and is called “are they really so super”? so, through the whole book they have been telling me how super they are and now they are about to say that they are not super? as could be expected, the authors do not give a clear answer. this is not unusual in these kinds of bestseller books either. instead, there is an insinuation, a hint to the reader to draw his own conclusion that they are in fact super because their predictions are best, which is a claim that can never be tested. the chapter goes on to talk about conversations with general mikael flynn who was the national security advisor for donald trump for 24 days, the shortest in the office's history. (he pleaded guilty to lying to the fbi over his contact with the russian government during the trump presidential transition). flynn tells the author that he thinks “societal conflicts” are at unprecedented levels. the reader thinks that he must have forgotten about the race riots of the 1960s and the american civil war. maybe he meant during the past generation, in the us, but it does not say so. the authors criticize flynn for falling for the “oldest trick in the psychology book”, assuming that what is presented to you is all there is. flynn’s inbox is full of reports that confirm this view. the authors argue that facts show that interstates conflicts have been declining since the 1950s: it’s enough to google the question and you will see. what the authors fail to mention is that googling a question is often a poor source of information, but otherwise they may be right. much of the information found on webpages is false and most good information is not freely available. that is one reason why books continue to be so important. not to mention a good general education. then there is a lot of kahnemnan and tverksy again, but few other references to psychologists’ research. there is also a comparison between the authors and kahnemann and taleb’s ideas about predictions, where the authors claim to be right. an interesting replica of a strategic memo written by linton wells ii (not linto wells, who was his father and a well-known american foreign correspondent) is presented. it was from 2001. in it, wells ii shows examples from the past hundred years of how fast foreign relations have changes, thus drawing the conclusion that the us should plan for something unexpected, that that is the best overall strategy. another good citation here is from eisenhower, “plans are useless, but planning is indispensable” (p. 244). the memo from rumsfeld citing wells ii says nothing about what england, and later the us, actually knew or how good their guesses were about the future at that time. it just assumes that they were surprised, which is probably close to the truth for most of the examples listed. at the same time, it’s a bit like saying that the us was not very good at predictions at the time (not that any other powers are recorded has having gotten it right more often, to my knowledge). wells ii’s response was to plan for adaptability and resilience as a way to meet the unexpected. this is also close to what the us has done with its continuous massive military buildup. one problem has been that there has not been any money for this buildup, so the government has turned to massive borrowing during the past administrations. (it is often forgotten, but obama borrowed more money and engaged in more wars than any of his predecessors since the vietnam war). the us has also not been able to make money on its wars, which is the other major problem. today they are in a squeeze needing to borrow more money to keep the military strong so as not to have to repay their foreign debt, which cannot be paid. in wells ii’s defense, we can say that he did not imagine the financing part of his strategy. unfortunately for the us and its allies the us military is failing both with adaptability and resilience. the authors then go on to speculate about why china may not become the world’s leading economic power by comparing it to japan. many thought japan would become the leader, but it did not happen, they reason. the authors do not discuss the fact that china’s population is growing to ten times the size of japan’s, the fact that china has been a world economic power for most of the past 2-3 millennia, except since the mid-1600s (the enlightment). they do not discuss cultural similarities or differences either, i assume again because they do not look at knowledge but how you think. sure, china may face great difficulties and may even decline as a result, but the authors are too light on this question. the simplicity with which this parallel is treated is symptomatic of the whole book when it comes to questions of history, geography and culture. their approach is a combination of psychology 52 studies and basic statistics, good enough, but not enough by itself. chapter twelve is the last chapter. it highlights the credo, “keep scores”. it also says to analyze results, but how to do this is not shown with any clarity anywhere in the book (p. 259). keeping scores, or evaluations of past performances, is a key part of any intelligence cycle (that is why it is drawn as a cycle), which is the most basic model any intelligence analyst is shown for how to work. that evaluations are not done in the american ic (or in many other countries, i am sure) is not surprising, but that is more a question of professionalism within the working corps. it’s a fact, the “sharpest knives in the box” don’t become intelligence analysts, not yesterday and not today. the ic is not mckinsey or kpmg, not yet at least. a useful rule of thumb mentioned in the book is to try to solve the larger questions by breaking them into many small questions. a parallel is made to the technique of pointillism (p. 263), where a painter makes a painting by adding a greater number of dots on the canvas. a few dots do not look like anything, but as more dots are added we see an image emerge, the larger picture or question. of course a painter knows what he is setting out to make so no dots are wasted. an intelligence analyst may collect the wrong dots, or dots belonging to another painting and it is far from certain that enough dots or the right dots are collected to get the larger picture so the parallel is merely suggestive. towards the end the author reminds us that his friend tom friedman (who is mentioned on every other page or so it feels) was for the invasion of iraq because he thought that iraq was the way it was because of saddam hussein. another possibility is that saddam hussein was the way he was because of iraq. friedman decided upon the first alternative. the authors point to the fact that the conclusion and his reasoning was not correct. to present the conflict in such simplistic terms is shocking, to say the least. anyone with a minor grip on history will analyze this conflict from a shia-sunni perspective, which could also explain why the sunnis felt desperate enough to form the islamic state after their defeat. it was the american-led invasion that created isis. actually us foreign policy is to blame for most of the disruption of the arab world and the middle east, which started with the first gulf war but whose history goes back to the beginning of the american-saudi relationship at the end of ww2, a relationship they inherited from the british. at the end the authors explain that superforcasters are more humble than other forecasters, analysts or experts; they do not show off and know their limitations (they do not need to go to davos, but leave that to others). they can do this because they have the support of a proven record of predictions. with the briar score they ride into the sunset. somehow i was never impressed but i know some of my colleagues are. conclusion there are many things that are good about this book. philip e tetlock is a scholar with an impressive number of publications and citation. the book is well-written and easy to read, but that is also the best that can be said. the book falls into a long line of bestselling books that have an extravagantly attractive title that has little to do with the content, and a first chapter that is all about promises of what is to be delivered in the following pages. as such, this is all too common in the management literature in general as we have known it since the early 1980s, maybe even earlier. it throws around the names of famous people and stories people can relate to. but what is the problem with that, the reader may ask. well the problem is that these types of management books continue to have a significant influence on practice, much more so than scientific articles or more instrumental books on intelligence analysis. this is not a new phenomenon either but has been going on since “in search of excellence” or maybe even longer. for the most part though these books are being discredited in the long run, but then it is too late, as their content has already been put into practice. for one thing there is nothing that has been presented in the book that helps explain why the project was better at predicting events than anybody else, if we are to believe that that is true. more worryingly, the book does not say how the authors and the project beat the other analysts, if it was by simply using a more vague language in its estimates or by the way correct answers were calculated. the rules of these competitions are never explained, at least not in the book. the main idea in the book is that if you give precise questions and ask for answers expressed in numbers for specific time frames, then you can also sit back and wait to measure the results. you will then know how good you 53 are. that by itself is not a bad idea. instead we are led on a series of loose threads and assumptions, by the authors who are expert analysts because they did so – “it took years” and won. it seems like a proven way to sell consultancy, but does not convince a reader who is even half awake. clearly psychology is important for decision making and forecasting, especially when confronted with social situations where an outcome is the result of the interaction and the expectations of several individuals with different interests and values. some of these problems can be modelled using game theory, but the authors fail to see that this is only one half of the equation. the other half is what you actually know. the intelligence reality of mr tetlock is much like that of a psychologist in a poker game. he does not know what the other person knows but tries to guess it based on his behavior. that is a much riskier way of solving a problem than using resources to actually find out. good intelligence is about finding out what hand was actually dealt. this will give us certainty to know how we could win the game, or at least avoid losing more money than what was in the pot. psychology is important in knowing how the player will behave. it is this other part of the equation—that the psychological insights are valuable—that tetlock introduces in this book. it’s a good suggestion to test or check guesses to learn from them, but it’s hardly a new or novel idea. it’s true that it is “astonishing” how many organizations do not check the intelligence they produce or buy, but it’s hardly a new problem or even surprising. the book is one in a long tradition of “hype” books which are so popular and not only in the anglo-saxon world, similar to nassim taleb’s book “black swan”, which the authors also refer to. you take something that is merely common sense and present it in an appealing way, such as that complete unknowns are like black swans. the reader will not have learned anything new, but old wisdom is frightfully well packaged, thus appealing. it does not help that the authors disagree with taleb in that they think that many swans that people say are black are in fact grey (another metaphor of the same type). i said at the beginning that this is a good book. the reason for this is that it contains many good rules of thumb. unfortunately, they are not listed in any single place in the book. we should break large questions into many small questions. we should make scorekeeping an integral part of intelligence analysis (p. 259). that is a simple but important lesson. thus the book is worth reading. jisib-vol-12_nr-3(2022).pdf journal of intelligence studies in business vol. 12 no. 3 (2023) open access: freely available at: https://ojs.hh.se/ pp. 27–37 knowledge mapping for the study of literature reviews mengqi wang khunanan sukpasjaroen abstract. this study aims to provide a systematic and complete knowledge map for education. in addition, it is designed to help researchers quickly understand author collaboration characteristics, institutional collaboration characteristics, trending research topics, evolutionary trends, and research frontiers of scholars from a library informatics perspective. in this study, a bibliometric approach was used to quantitatively analyze the retrieved literature with the help of the bibliometric analysis software citespace. the analysis results are presented in tables and visual images in this paper. the results of this study indicate that collaborative relationships among scholars need to be improved and collaborative research relationships among research institutions are more fragmented. this study also points out the shortcomings of this study: chinese educational researchers and practitioners still have a relatively vague understanding of some fundamental issues in the process of integration and development of ai and education. therefore, this paper uses quantitative research methods such as bibliometrics 28 and visualization pictures to systematically and intuitively reveal the research progress and and to provide a reference for further research on this topic in the future. keywords: 1. introduction neering of making seeded machines that exhibit human behavioral intelligence characteristics, including reasoning, learning, goal-seeking, problem-solving, and adaptability (monostori, logical force for social development, has rapidly penetrated all walks of life and become a new driving force and trend for the development of various industries.in this situation, it has worldwide to adapt education to the needs of the intelligent era and to use innovative technologies to promote changes in teaching models and the cultivation of creative talents.the u.s. ai education and expanding ai and data science curricula into developing the talent needed for ai to drive economic development (white gated by the chinese state council in july 2017 proposes to develop intelligent education, use innovative technology to accelerate the reform of talent training models as well as teaching methods, build a new education system that includes intellectual learning and interactive cial intelligence in teaching, management, and resource construction (chinese state council, plan for national education development promulgated by the state council of china also proposed to “explore new models of future education and teaching by making comprehensive use of technologies such as the internet, big (chinese state council, 2017b).as can be seen, the use of ai technology to promote change and innovation in education systems has attracted a great deal of attention from countries around the world. although china’s education reform has made remarkable progress, there are still some outstanding problems, such as unbalanced education development, an imperfect cultivation model of innovative talents, and an unreasonable allocation of quality education resources. cial intelligence will become a “powerful tool” to crack these educational problems, playing an essential role in innovating education and teaching models, optimizing talent training programs, developing students’ professional skills, and building a lifelong learning system to promote the change and development of education in the future. in recent years, domestic experts and on the connotation and critical technologies of educational ai (leun et al., 2017), the connotation and target orientation of intelligent eduet al., 2018) and the innovative educational applications of deep learning and machine et al., 2017), etc. a preliminary discussion was and practitioners still have a relatively vague understanding of some fundamental issues in the integration and development of ai and education, such as the technical framework of ai in education, application models, and development challenges. based on this, this study uses citespace software to visualize and analyze the literaintelligence in education so that the readers can understand the current situation, research hotspots, and research trends of this research china more clearly and intuitively, and thus provide references for further in-depth research education. 2. literature review citespace is a java-based information visualization software developed by professor chaomei chen of drexel university, usa. it responding visual atlases, and interpret them 29 to understand the knowledge base, research hotspots, disciplinary frontiers, and new citespace requires jre 1. 4. 2 or higher as the runtime environment for the software authoring platform. although citespace can access many web services and other information through pubmed, etc., the internet is format input to citespace is the data format output by isi. unlike other similar information visualization software, the citespace software itself comes with a data converter, which can directly convert the data format downloaded from the internet without converting the downloaded raw literature data to the correlation matrix, which can eliminate the complex steps and processing of correlation matrix conversion, which is one of the advantages of citespace software (chen c, 2004).before starting data processing with citespace, the literature data creating a new project using citespace, two ture data store and one for the project store. the project storage path allows researchers citespace is running, and the setup process is done from the main citespace interface. citespace has the following essential features. (1) the raw data does not need to be converted into the format of the matrix, and the raw data format of databases such as wos and cnki can be directly imported into the same data sample, multiple plots can be performed to show the evolutionary characteristics of the data from different perspectives. (3) the software clearly shows the change of literature data over time by marking nodes the color of nodes is represented chronologically, clearly showing the citation of different resents the earliest time when the co-citation frequency of that connecting line reaches the selected threshold. citespace has four essential functions: (1) identify critical paths in the evolution of subject areas through citation network analysis. (2) identify crucial literature for the evothe potential dynamic mechanisms of disciplinary evolution. (4) predicting disciplinary frontiers. citespace software is used to detect and analyze temporal trends in disciplinary research frontiers and their relationship to the knowledge base and to discover internal connections between different research frontiers. by visually analyzing the information in the literature on the subject area, researchers can visually discover the evolutionary path of the subject frontier and the classical primary literature of the subject area. citespace software uses the cosine algorithm to calculate the strength of collaboration between researchers or institutions, and the power of connection between nodes represents the strength of association between researchers or institutions, which is calculated by the cosine distance of the angle between 2022). equation (1) is as follows. where cij represents the number of papers published by co-authors (author i and author j), si and sj represent the number of documents published by author i and author j, respectively, and the value of collaboration intensity ranges from 0 to 1. the main principles and methods of using citespace are as follows: divide and conquer principle: the idea of the divide and conquer strategy is to divide directly into several smaller-scale identical problems and solve them separately, dividing and conquering them. the basic idea of divide and conquer is to decompose a problem of size n into k smaller subproblems that are independent of each other and identical to the original problem. the solution for each part is found, and then each part is combined into a solution for the whole problem. success breeds the success principle: if a paper is cited in more articles, the greater the probability of encountering it when reading the literature and, therefore, the greater the probability of citing it in an article. barabasi and albert (1999) showed that many real-world complex networks are not regular random networks but belong to scale-free networks and made several studies on such a class of networks’ some studies on the number of features point to two fundamental properties that determine the scale-free properties of networks such as the internet, the world wide 30 web, and collaborative research networks of scientists: node growth and preferential connectivity. minimum spanning tree algorithm. weighted graph, and if the subgraph g’ of g is a tree containing all the vertices of g, then g’ is called the spanning tree of g. the sum of the weights of the edges of the spanning tree is called the consumption of the spanning tree. among all the spanning trees of g, the spanning tree with the minor consumption is called the minimal spanning tree of g. in modern mathematical graph theory, prim’s algorithm and kruskal’s algorithm can be applied and implemented by computer programming statements. expectation maximization algorithm. the maximum expectation clustering method (em clustering for short) is a basic algorithm for large likelihood estimation in statistics, i.e., the maximum likelihood estimation of parameters in distribution with hidden state variables. the algorithm is mainly applied to estimate the missing variable x from the availplete. the e step takes the conditional expectation, and the m step takes the maximum value. this iterative optimization method is known as the em method. clustering is performed by distance characteristics of nodes publication, authorship, node centrality, halflife, number of citations, etc. the criteria for clustering are determined by statistical analysis using the maximum likelihood estimation of the algorithm. clusters of nodes shown on the graph as different colors, i.e., clusters of nodes of the same color, form the same clusleads to the expected results. word frequency analysis method. by counting the frequency of core words such as keywords, subject words, and chapter words the research hotspots, knowledge structure, the frequency of subject terms appearing in a literature set can form a clustering network of these word pair associations. the proximity chuanhui, 2010). citation analysis method. the citation and journals, papers, authors, and other analysis objects are analyzed to reveal their quantitative characteristics and internal laws. citespace generates maps with richer colors and better appearance.in addition, we can view the articles covered by the nodes, the cluster’s size and content, and the cluster’s average year from the visual image.therefore, we decided to use citespace to analyze the data from this study.this study allows us to derive visual images, obtain partnerships between authors and research institutions, and identify research trends in the research the subject of this study is the application belongs to the subject of education, and cnki collected all data on this subject.with the help of cnki data sources, this study conducted preliminary research and obtained 527 literature records using advanced search tools with education. the authors imported these 527 documents into cite space software, automatically checked the weights, eliminated non-research documents and de-weighted them, and used word frequency analysis and citation analysis to conduct the analysis. 3. research trends 3.1 analysis of the results of a survey of chinese researchers analyzing the distribution of authors is a preticular discipline. the study of authors with research of the research topic.after the data set to author, in 2003–2020, with a time cut of 1 year. set selection criteria (top = 50, selecting the top 50 strata for each year) to get the visuthe corresponding font of the author, the more the posting volume, and the connecting line between the nodes represents the cooperation relationship between the authors, the thicker 31 the degree of connection, the more the coop5 (2%), indicating that the largest group of mary researcher and xinfeng gao, li chen, collaborative research team, which accounts for only 2% of the total number of researchers. 3.2 distribution of chinese institutions for research on the application of the node type was changed to the institution, and the software was run to obtain the visual mapping of research institutions on the applithe top 10 institutions in terms of the number 32 of publications were selected to draw table 1. the college of education of shaanxi normal university and the college of education technology of beijing normal university, and the college of education science of xinjiang terms of the number of articles, with four artiuniversity, the department of education of beijing normal university, the department of education technology of the college of education of peking university, the college of education of tianjin university, and are tied for the fourth place in terms of the party school of the communist party of china beijing materials co. and the college tied for the ninth place in terms of the number of articles, with two articles.this suggests that these research institutions have not focused much on how ai can be applied in education and have not studied it in depth. that researchers in these institutions have researched the application of ai in various focusing on the application of ai to a particthe whole network mapping is more serious, which indicates that the research among institutions is still relatively independent. the cooperation is not close enough and needs to be strengthened. the nature of the institutions shows that most institutions conducting and publishing-related research are universities, indicating that the leading positions of ai in education application research are in universities, and they are credited with the rapid development of ai in education application research. 3.3 hot spot analysis of chinese research on the application of keywords are a high-level summary of the research topic and content of the literature. proper keyword analysis can tell the literature’s actual research content, and measuring the number of keywords can determine the hot spots of disciplines, institutions, and this research set the node as keywords, set the node threshold as top n = 30, selected to obtain the knowledge map of ai in educawords of the retrieved documents, the size of the circle to which the keywords belong represents their frequency of occurrence, and the connecting lines between the nodes represent the co-occurrence relationship between the keywords. the centrality is a measure of the size of the connectivity in the knowledge graph network, and a purple color at the edge of the circle indicates that the centrality value of the node is greater than or equal to 0.1. according to the keyword co-occurrence mapping and partial keyword table of ai in education, it can be seen that the frequency and education. serial number count year institution 1 4 2019 college of education, shaanxi normal university 2 4 2006 college of educational technology, beijing normal university 3 4 2018 college of education science, xinjiang normal university 4 3 2019 cunjin college of guangdong ocean university 5 3 2018 department of education, beijing normal university 6 3 2010 department of educational technology, college of education, peking university 7 3 2018 college of education, tianjin university 8 3 2018 9 2 2019 party school of communist party of beijing materials co. 10 2 2019 33 serial number count centrality key word 1 124 0.57 2 108 0.62 3 17 0.1 education 4 13 0.03 5 12 0.09 smart education 6 11 0.05 education applications 7 9 0.08 deep learning 8 8 0.06 primary and secondary schools 9 7 0.02 education informatization 10 5 0 education technology 11 5 0.01 12 5 0.04 information technology 13 4 0.03 big data 14 4 0.03 ministry of education 15 4 0.02 16 4 0 information literacy 17 4 0.02 talent cultivation 18 4 0.01 programming education 19 3 0.02 creativity education 20 3 0.03 learners 21 3 0 grace 22 3 0.03 intelligent age 23 3 0.02 24 3 0.06 information technology course 25 3 0 26 3 0.01 new engineering 27 3 0 28 3 0.02 29 2 0.01 it 30 2 0 34 centrality of “ai,” “ai education,” and “education” are in the top position. the corresponding node area is large, which indicates the accuracy of data retrieval and topic matching, and the series of keywords are consistent and comprehensive in the domestic concept.as shown applications,” “deep learning,” “primary and secondary schools,” and “education informatization” are the main research hotspots. 3.4 keyword evolution analysis of research on the application of in addition to static analysis of the distribution of research hotspots of ai in education, it is also necessary to pay attention to the time zone changes of hotspots to discover the future development direction more effectively. we set the time segmentation as 2003–2020, select the node keywords, set the node threshold as top n = 20, and output the result as “time the time-zone distribution chart of ligence in education consists of a series of keywords in the corresponding time intervals, and the keywords corresponding to each time interval indicate the hot issues of research on be seen that the research on the application of ai in education from 2003 to 2020 is rich, and the whole is developing in depth. 2003–2020, with the increasing improvement of intelligent technology, the development of 5g, wap, cloud computing, smartphones, mobile internet, and other technologies tend to mature, and user needs are more extensive, profound research direction of research was information technollum and the problems that existed. 4. conclution ogy has pointed out the direction for the intellectual development of computer network technology. applying this technology to computer network technology is conducive to enhancing the technical level of computers and better-providing quality services for social and economic development. through the visual analysis of this study, the author believes that research can be conincrease the research and development of educational ai products and improve the quality of technical services: the research and development of educational ai products and 35 the improvement of technical service quality should strengthen the cooperation between intelligence experts, and enterprise personnel to understand the current realistic needs of ligence and education, and promote the development and application of intelligent products in education.second, the functional modules of educational ai products should be continuously expanded to effectively meet students’ personalized learning needs and teachers’ teaching requirements at different stages. currently, the chinese government actively advocates the introduction of ai-related courses in primary and secondary schools, so it can develop educational ai products that go with them, such as programming-based teaching tools and software, as a way to assist education and teaching and optimize students’ learning effects.third, to establish a complete education ai product safety supervision and evaluation system, standardize industry standards, and increase market supervision and monitoring efforts to ensure that enterprises provide safe, high-quality products and services for the development of education ai. cial intelligence in education, multi-disciplinary cross-collaboration to help the development of education innovation: dig deeper into in education, expand the application space so that it can better provide services for education can break the barriers to education and effectively integrate formal and informal learning. therefore, it is recommended that the chinese government establish an ai education service platform to gather global high-quality education resources and precisely push learning resources suitable for learners’ development according to their needs. establishing an ai education management platform in china to track and record learning process data and conduct deep mining and learning analysis to comprehensively understand learners’ interests and real-life needs can help to realize personalized education and lifelong learning. build a harmonious symbiosis “human-machine combination” new ecology, enhance ligence and education is an important trend in the intelligence era.educational ai will replace the repetitive work of teachers and reduce their pressure and burden to a certain extent, allowing teachers to spend more time optimizing the instructional design to facilitate students’ personalized learning. dents’ moral qualities, values, and emotional cial intelligence and still needs to be done by teachers.therefore, “human-machine integration” will become the mainstream trend mechanical and repetitive tasks will be completed by machines, such as replacing teachers to correct homework, organizing and collecting learning materials, arranging exams, etc. teachers will focus more on emotional interaction with students, shaping students’ personalities, cultivating moral qualities, and improving higher-order thinking skills.in addition, human-machine trust is a critical factor in developing educational ai. establishing a long-term human-machine trust mechanism is a prerequisite for building a harmonious and symbiotic “human-machine combination” new ecology. therefore, it is necessary to accelerate the improvement of the ai governance system, develop and embed ethical standards, create a more powerful, safe, and trustworthy educational ai application system, and promote the peaceful development of ai and education integration. strengthen the “government, enterprise, academia and research” multi-party cooperation, collaborate to promote the rapid develeducation is a long-term and arduous task, only “government, enterprise, academia and research” multi-party cooperation to proattach great importance to the development of educational ai, establish a sound system to guarantee the system, and continue tional ai to protect the innovation of intelligent technology.secondly, enterprises should increase the design and development of educational ai products, expand product supply, improve service quality, and cooperate extensively with schools and research institutes to broaden the development channels of enterprises.again, schools should actively explore the education and teaching mode supported by ai technology, offer ai-related courses, and focus on cultivating students’ data science literacy and computational thinking skills to 36 meet the development needs of the future intelligent era and continuously deliver talents for enterprises and research institutions. the frontier of ai development, widely conduct theoretical research on ai educational applications, and build a new generation of educational ai theoretical systems. through continuous technical breakthroughs and product innovation, solve the technical problems faced in the development of educational ai and provide technical support for developing enterprise products. establishing educational ai demonstration sites and exploring the application model of educational ai: based on the principle of “pilotmoting,” we will select areas and schools with good informationization conditions to establish educational ai demonstration sites and explore the application model of educational ai, and gradually promote it to the whole counindustry or university ai experts as consultants to provide regular guidance on the construction of the demonstration site and worked to build a team of information technology personnel, including ai teachers. in addition, artito administrators and teachers in pilot district schools to strengthen education administrators’ understanding of ai educational applications and to enhance teachers’ ability to apply and guarantee system is developed to encourage teachers and administrators to innovate the application of ai technology, innovate the education and teaching model, and improve teaching standards. in the era of big data, the integration of technology is deepening. based on the charcomputer network technology in the era of big data can be explored and analyzed in depth. in addition, ai technology will also complement blockchain, the internet of things, and cloud computing technology. therefore, the future of has been able to be applied in early childhood gence education. references barabasi, a. l., albert, r. emergence cf scaling in random networks. science. 1999, 286:509–512. chen, c. searching for intellectual turning points: progressive knowledge domain visualization. america (pnas). 2004, 5303–5310. chen, chaomei. cite space ii: deteching and visualizing emerging trends and transient the american society for information science and technology, 2006, 57(3):2007. teaching and ecological chain construction. modern distance education research, (2):24–31. situation and countermeasures of special education informatization construcuniversity. leun, c., tang, x. i. a., qin xuan et al. (2017). implications, key technologies and applitelligence (eai) – an analysis of the u.s. gence r&d strategic plan reports. journal of distance education, (1):26–35. journalistic professionalism in mainland china. contemporary communication, (1), 4–7. form construction and key implementation technologies of educational big data. modern educational technology, (1): pp. 100–106. environments: new directions for library subject services. . 2010, (1):52–53. technology educational applications: current status and prospects. open education research, (5):113–120. laperriere, l., & reinhart, g. (2014). cirp encyclopedia of production engineering[c]. berlin: springer: 2–39. state council (2017a). notice of the state council on the issuance of the development 37 telligence. [2018-01-25]. http://www.gov. cn/zhengce/content/2017-07/20/content 5211996. htm. state council (2017b). notice of the state al education. [2018-01-25]. http://www. gov.cn/zhengce/content/2017-01/19/content-5161341.htm. (2015). research on fragmented learning in the era of big data. research on electrochemical education,(10): pp. 26–30. gent virtual assistant: analysis and design of a new learning support system. electrochemical education research, (2):1–6. obamawhite-house.archives.gov/blog/2016/ os/03/preparing-future-artifi-cial-intelligence. ligence + education.” journal of distance education, (5):27–39. (2016). sources and collection techniques of big educational data. modern educational technology, (8):14–21. tikasthira, n. (2022). knowledge mapping of research data in china: a bibliometric study using visual analysis. , (ahead-of-print). tion of educational applications and innovations of machine learning in the perdistance education, (3):11–21. cial intelligence in computer network technology in the era of big data. science and technology innovation and application, 2020(33):168–169. 57 towards an environmental awareness model integrating formal and informal mechanisms – lessons learned from the demise of nortel jonathan calof 1 , laurent mirabeau 1 , greg richards 1 1 telfer school of management, university of ottawa, canada email: calof@telfer.uottawa.ca mirabeau@telfer.uottawa.ca richards@telfer.uottawa.ca received april 20, accepted may 6 2015 abstract: this case study uses multiple lines of enquiry to better understand how nortel went from being a ‘global powerhouse’ at the turn of the century to filing for bankruptcy just nine years later. it tracks competitive intelligence as well as other environmental awareness capabilities of the company and theorizes on how they have contributed to its rise and fall. the findings suggest that nortel was a company with significant environmental awareness capability in the early 90’s that had all but lost this competency by the year 2000, which impacted their ability to make decisions consistent with a changing environment. through interviews with 48% of all nortel officers that were there during the period of interest as well as other stakeholders, the researchers identify a two-layer typology that includes a set of cognitive factors as well as three broad categories of monitoring practices that can help companies better understand their environment: 1) formal external monitoring practices, such as competitive intelligence units; 2) informal external monitoring practices such as board meetings with members with industry connections and knowledge, and 3) internal monitoring practices with external insight capability, such as performance management reviews and accounting reports. cognitive factors identified include decision maker orientation, as either technical or business, internal vs., internal focus, cognitive complexity and open mindedness. keywords: nortel, competitive intelligence, corporate failure, monitoring practices available for free online at https://ojs.hh.se/ journal of intelligence studies in business vol 5, no 1 (2015) 57-69 mailto:calof@telfer.uottawa.ca mailto:mirabeau@telfer.uottawa.ca mailto:richards@telfer.uottawa.ca https://ojs.hh.se/ 58 1.0 introductiondescription of the case study by 2001, nortel, a canadian telecommunications company with a capitalization approaching $300 billion, was accounting for nearly one third of the toronto stock exchange; the largest valuation in canadian history. macdonald (2000), in his book entitled “nortel networks : how innovation and vision created a network giant” described the company’s extraordinary success that lead to 75% of all internet traffic in north america being funneled through nortel equipment at the time the book was published. indeed, in 2001, nortel had crafted itself an enviable leadership position in optical, wireless, wireline and the business enterprise markets. yet, by 2003, less than thirtysix months later, nortel’s long-term viability was being seriously questioned by its own customers. a few years later as detailed in a 2007 note from senior management, nortel was experiencing continued erosion in the company’s ability to influence the business roadmap of an increasing number of key customers. in january 2009, the company filed for bankruptcy protection. this was the single biggest corporate failure in canadian history and one of the largest worldwide. this case study looks at the role played by the environment and the company’s environmental monitoring approaches/systems to understand both the success that culminated to nortel’s position in 2001 and the failure that brought about bankruptcy in 2009. specifically, theorizing from an extensive data set that includes both interviews and surveys, the authors seek to understand: 1. how the environment changed and in particular whether significant opportunities or threats arose. 2. given the changing environment, the extent to which nortel’s response contributed to both its success and to its failure. 3. nortel’s capabilities/approaches to understanding its environment. this study proposes a revelatory single case study of both epic success and epic failure, theorizing about the role of competitive intelligence in both the rise and fall of a company. this is in keeping with solberg søilen’s findings (2014) regarding the need for more case studies in intelligence. 2.0 case study methodology the study features multiple data collection methods, including an initial survey (343 respondents), interviews with nortel stakeholders (133 people), a follow-up survey of those interviewed (57 respondents) and a validation check of the study results with 22 of the interviewees. the methodology had at its core a grounded theory approach. grounded theory was used to ensure that a-priori hypothesis and existing literature did not bias or drive study conclusions but that the study participants drove study findings. analysis moved in an iterative fashion with data collection as initial interviews and surveys allowed the researchers to refine the interview protocol. methods for analyses included three main techniques that have been identified as prominent in process research (langley, 1999): a grounded theory approach was taken for coding the interviews (glasser and strauss, 1987), a narrative strategy was used to uncover the richness of this revelatory case (yin, 2003; patton, 2002) and temporal bracketing was used to organize the findings in building a model and uncovering monitoring practices as well as cognitive factors (eisenhardt, 1989). the initial survey consisted of open-ended questions combined with a series of seven-point likert scale questions around causes of failure. in total 343 responses were received (table 1). interviews were then conducted with those familiar with nortel’s failure. in all 133 people were interviewed (some multiple times) including 48% of all nortel officers who were at nortel at some point over the study time period (1997-2009), several key customers (interviews were with senior customer personnel generally at the “c” level), competitors (including competitive intelligence personnel of key competitors), suppliers and others that would have knowledge of the nortel failure. the second survey was sent to all informants who were interviewed (133) giving them a final opportunity to list the reasons for nortel’s failure. responses were received from 57 of those interviewed. as a final validation step and in keeping with the case methodology, the final case results were presented to 22 of those interviewed. 59 in the first step of the analysis, both the interviews and the surveys were coded using a mixed logic, as we derived our codes partly from our literature review on organizational failure and partly by letting them emerge from the data (gioia, corley & hamilton, 2012). established techniques of the field such as inter-rater reliability were applied and we conducted this work using nvivo 10. in the second step we layered temporality on the data, to identify when each failure factor happened, both in terms of the external and internal perspectives (mellahi and wilkinson, 2004). in the final step we built a narrative of nortel’s events, providing a rich account from the temporally layered fine grain data we had collected and analyzed (van de ven and poole, 1990). three temporal periods were identified: 1. 1997 to 2001, corresponding both to the ceo tenure of john roth and also the rapid rise of nortel culminating to its maximum market capitalization value in 2001. 2. 2002 to 2004 corresponding to the ceo tenure of frank dunn, rapid change in industry dynamics and a series of internal crises within the company. 3. 2005-2009 – the ceo tenures of bill owens (interim ceo appointed on the firing of frank dunn) and mike zafirovski culminating in nortel’s filing for bankruptcy protection. table 1 – data collection methods and response numbers data collection step total* officer/senior employees other employees customer external initial survey 343 60 265 53 127 initial interviews 133 46 45 18 35 final survey 57 20 18 8 13 validation interviews 22 11 0 7 6 *note that the totals do not necessarily correspond to the summation of the columns as in some cases respondents during the study period fell into two categories. for example in several cases officers/senior employees in the 1997-2004 period then moved to customer or competitor organizations in the later years. 3.0 findings: an overview of environmental changes for each period in the telecommunication industry between 1997-2009 the majority of interviewees commented on the significant industry change throughout the study period. indeed, interviewees recounted how 1997 to 2001 was a period of great opportunity in the industry; fuelled by the advent of the internet, as well as the growth in demand that accompanied the deregulation of various foreign markets, providing new vectors for market development. these created opportunities that propelled many of the firms in the telecommunications supply industry to historically high market capitalization values by 2000/2001. the second period ranging between the years 2002 and 2004 was also one of significant industry change. participants of our study described how the .com bubble bursting resulted in significant decline in demand for all industry participants. this was further complicated by new competition arising from china, which had made important strides in catching up with the incumbents in the market in terms of technology expertise. while demand was stalling, rapid technology advancement continued unabated. the third period during 2005-2009 saw continuing increase in competition and major changes in both how customers bought telecommunications product and the criteria used for acquisition. furthermore, the customers during this period began to push industry suppliers towards interoperability with other equipment makers and also sought to diversify their risk by purchasing from multiple suppliers rather than following the historical pattern of relying on a single supplier. unfortunately for nortel, as new and old competitors were gaining ground gaining access to nortel’s traditional customer base, nortel was not taking customers from rivals. 60 the global recession was also part of this third period. the events in this period, according to our data, had a significant impact on underlying industry profitability and the nature of the opportunities. indeed, while the latter period presented firms with significant opportunity due to rapid growth in both internet and wireless lines of businesses, the growth opportunities came at the expense of a more commoditized and competitive landscape. by 2009, nokia and siemens telecommunications divisions had merged to become nsn and alcatel and lucent also merged creating alu. 4.0 findings: nortel’s response to the changing environment interview and survey results overwhelmingly noted that nortel appeared to respond well to industry opportunities in the late 80’s and early 90’s but that the company had lost its way by the later 1990’s. the practices to understand the environment was not seen as being effective; nor was the company’s ability to both sense and appropriately respond to industry changes in the 2000’s. for example, interviewees talked about the fact that in the 80’s and 90’s nortel was the first company to go from analog to digital. however, many respondents in both the initial and final survey listed nortel’s failure to adapt to the market as a primary reason for failure (table 2). customers listed this as the #1 reason for nortel’s failure citing in particular lack of appropriate response to customer needs . in fact, both customers and others said that nortel was late to the internet in the late 90’s. table 2 2009 initial survey responses to environmental related questions nortel responded well to its markets and customers competition suppliers strongly disagree 13% 20% 10% disagree 18% 29% 10% somewhat disagree 23% 18% 14% not sure 9% 6% 37% somewhat agree 21% 16% 18% agree 13% 9% 9% strongly agree 2% 2% 2% findings in other reports from the nortel study provide both support and provide insight into the survey and interview observations listed about (see calof et al 2014, vasudev 2014 and mackinnon et al 2015). in examining technology choices, mackinnon et al (2015) found that research and development and commercialization activities tended to focus on legacy products which would be sold to mature markets and not innovative products for growth markets – 55% of research funds going to late life cycle products, 36.5% towards mature products and only 8.5% allocated to future and emerging products. their analysis found that in the 2000’s nortel failed to commercialize several of those products that were under development. they also did not develop products and services that could have been sold to those areas of the market that were profitable and growing. they concluded that while the products in r&d were very advanced, sometimes even exceeding customer needs, the products nortel chose to commercialize were more oriented towards existing technologies and did not support their customer’s emerging needs. the calof et al (2014) report also noted that nortel responded to the changing market conditions later than many of the other competitors concluding that they were late to both perceive and accept the changes in the environment. in summary, our data suggests that while the environment changed in a significant way during all three periods of the study, that nortel, a company that was known historically for its innovativeness, for anticipating and creating future markets, and for leading customers during the pre-1997 period, responded inadequately to these changes. more specifically we found that nortel: 61 was late to recognize and respond to environmental changes, commercialized the more mature technologies in its portfolio and, did not respond appropriately to new customer business requirements 5.0 findings: towards an environmental awareness model sections 3 and 4 described how while nortel had historically seen and taken advantage of opportunities created from industry change, in the period of interest from 1997 to 2009, it was late to recognize and make appropriate changes. this failure eventually led to the erosion of its enviable pre 1997 leadership position. how then could a company that had exhibited foresight in the past, go from frontrunner to laggard in the industry in such a short time span? to better understand nortel’s ability to assess environmental changes, the research team examined data collected during the case study that would shed light on nortel’s monitoring practices as well as its cognitive makeup, the way it understood its own world. in particular, we reviewed interview notes and survey written responses for specific comments around nortel’s ability to learn about and act on the environment. many of those interviewed talked about the early to mid 90’s and nortel’s extraordinary competitive intelligence unit and competitive intelligence guild (an across-lines of business “club” that brought together nortel ci practitioners and users, hogan 2001). they talked about nortel’s design and interpretive center – a unique center where nortel invited their customer’s customers (the end users of telecommunications equipment) to use the nortel products that would be sold to the telecommunication companies. this helped nortel learn more about the end user’s needs so that they could develop better products for their customers. many talked about an advanced planning function (some referred to the unit as division 6) that engaged in environmental scanning and reported directly to the top levels of the corporation and about customer surveys, something of great importance at nortel which provided a wealth of information. the competitive unit, the competitive guild, the planning unit, the design interpretive center and the customer survey, we have grouped under our first type: formal external monitoring practices (see exhibit 1). a second type that emerged from our data was practices that that also helped nortel gain insight into the external environment without being part of the formal external monitoring mechanisms, but rather were informal. for example, many talked about bell northern research (bnr) units and their work, a long-term oriented research group that conducted fundamental research for both nortel and bell. this unit through its relationships with scientists around the world, its involvement in symposium and even through its own magazine can best be described as nortel’s long-term competitive technical intelligence unit. bnr it was said in many interviews created the future environment. bnr was an important part of an external technology monitoring capability that would then translate this knowledge into design and future products. they were not intelligence personnel but scientists in what many called an ivory tower environment. their job/role was not environmental scanning but developing new technologies and in doing so they would scan the pertinent literature, attend appropriate conferences and network with various external experts, in an informal yet effective manner. several respondents also talked about how nortel learned a lot due to ongoing interaction between technical staff and nortel clients. one senior technical person commented that by listening to the clients’ concerns they could ‘in 10 minutes develop new solutions’. industry relationships were also seen as a method for gaining knowledge about the industry with many of those interviewed commenting on the closeness between nortel senior management (in particular sales management) and customer senior management, outlining the information they gained because of these relationships. one interviewee commented that the telecommunications supply industry was ‘truly a village, a community where everyone knows each other’. others talked about the valuable information gained thanks to for example board members, in particular the board members who represented bell canada enterprise (bce), a key nortel customer. having a customer on the board provided nortel with valuable information on customer’s needs and concerns as well as test sites for new technology. also mentioned was nortel’s links with universities through endowed chairs and research programs, which provided valuable insight into technology developments to nortel. trade shows and conference involvement were also mentioned as notable sources of industry information. finally, many talked about management development programs such as the princeton series, where once a year nortel senior management would attend an inhouse program in which leading management thinkers (for example drucker) would provide nortel with insights into new management techniques, management approaches and evolving market changes. while none of these activities/organizational elements were specifically designed as formal environmental monitoring mechanisms, respondents were clear that each provided valuable insights into the 62 external environment, early warning on customer needs/changes, technology changes and even early warning on competitor movements. we refer to these as informal external monitoring mechanisms (see exhibit 2). thirdly, respondents talked about internal systems such as the accounting system, and how those also provide insight into the external environment. for example, respondents talked about how by analyzing where sales were coming from (legacy products versus new technologies) they could figure out underlying customer sentiments. in addition, forms used in the sales approval process (many talked about b forms), provided insight into customer demands.. performance management practices (increasingly developed in 2007) proved to be valuable in identifying markets and research and development using the product life cycle stage model. many also mentioned that internal relationships facilitated information flow across units; that no matter how bad systems were, they were always able to call up someone they knew to get information on what was truly going on. internal relationships were used for example to provide updates on technology developments within and outside of the company. we refer to these as internal systems with external insight (see exhibit 1). thus we found three types of monitoring practices: formal external, informal external, and internal with external insights. however, our data analysis unveiled another important component to the model: the cognitive makeup of the company, which impacted its ability to make sense of the data that was unearthed by the monitoring practices. indeed, respondents talked about the mindset and cognitive abilities of decision makers when receiving information about the environment and how these abilities impacted decision maker’s sensemaking (cite weick here). our analysis indicates that it was not just about having the information, that decision makers also needed the right mindset when receiving it. for example many talked about nortel’s strong culture creating a “not invented here” type mindset resulting in the perception that management was not open minded to information about possible environmental changes that came from outside the company, especially when it was contrary to their beliefs in technology needs. some referred to this as “not invented here syndrome” and some referred to this as open-minded versus closed-minded. others talked about an external focus versus an internal focus of management. this was a particular factor brought up in the 2000’s when a series of internal crises (restatements, fraud investigation, staff cuts) focused senior management attention on activities inside the organization rather than having the time (or interest) to focus on the external environment. respondents also talked about technical versus business orientation of management. while a technology oriented company does need a mix of both technical and business orientation, many talked about the ability, or in some case the inability of senior management and board members to comprehend the technology implications of strategic decisions. specific examples were brought up where it was evident that the decision maker may not have fully understood the technical impact of the decision. finally a few respondents brought up the complexity of decisions that senior management had to make. this was referred to in interviews as their ability to handle multiple variables at one time (e.g. simultaneous consideration of multiple competitors and customers along with technology change as opposed to assessing one at a time) and overall intelligence of the senior manager. we refer so these factors as decision makers’ cognitive makeup. exhibit 1 provides the overall environmental awareness model arising from analysis of the respondents comments on nortel’s environmental understanding capability and provides a competitive intelligence perspective of nortel’s rise to prominence leading to the beginning of our three temporal periods. 63 exhibit 1 environmental awareness model: the case of nortel 6.0 the evolution of nortel’s environmental awareness over the study time period: decisions, environment and impacts. in this section we examine developments in nortel’s environmental awareness and discuss key decisions made during the three temporal periods. 6.1 1997 – the starting point of the study albeit with a few exceptions (difficulties in gathering intelligence from poor accounting systems, a culture of close-mindedness to outside ideas, and the use of non-systematic performance management systems), respondents commented positively on all but three elements included in the environmental awareness model.. based on the variables in the environmental awareness model, the 1997 starting point would be defined as good in all four elements. this assessment is based only on the existence of the factors and is not an assessment as to their quality. 64 exhibit 2: environmental awareness model: nortel, 1997 6.2 1997-2001: nortel’s growth 1997-2001 provided companies in this industry with great opportunities. john roth (ceo of nortel) saw the opportunity to significantly grow the company and developed a new vision for nortel, which he called the right angle turn, a refocusing of nortel traditional’s telephony technology to the internet protocol based technology. roth felt that dealing with rapid growth and massive market opportunity meant the need to eliminate or change any procedures that slowed down responding to customers. furthermore, since nortel did not have all the technologies required for the right angel turn, roth felt that nortel would have to engage in systematic acquisitions of external technologies. in a business sense these decisions and actions appeared to provide immense value to the company and its shareholders, and were handsomely rewarded by the stock market. in 1997 nortel’s market capitalization was $23 billion and by 2000 once the strategy was fully in place it was $250 billion; sales had more than doubled and the gross margin had improved. as well customers in general were pleased with the company. by the end of this period not only did nortel realize its ambition to grow in terms of sales and market capitalization but its organization had also grown significantly, going from roughly 30,000 to 95,000 employees. while the streamlining of decision-making did lead to both sales growth and stock growth, it also had a negative effect on nortel’s environmental awareness capability. on the acquisition side, the buying of dozens of companies coupled with nortel’s antiquated accounting systems left nortel in a situation where it was had islands of information and no sense of the integrated accounting picture. some in the interviews commented that it took several months after the quarter before the true numbers could be known. this reduced the ability of internal systems with external insight to generate accurate environmental information. but perhaps it was those changes made to speed up nortel’s ability to meet customers’ needs that had the biggest impact on environmental awareness capability. for example, nortel eliminated some of the administrative forms, including sales forms (such as b forms) opting instead to place more responsibility on salespersons for sales terms than requiring sign offs of management. while this sped up response, it also reduced the abilities of internal systems with 65 external insight. massive hiring during this period (from 30,000 to 95,000) led to reduction in the strength of internal relationships, again a downward impact on internal systems with external insight. informal external monitoring mechanisms also were reduced as an indirect consequence of right angle turn. for example, bell northern research (bnr), the central research arm of nortel was split up and placed into each of the four product divisions. in this way, research could be focused more at the division level. but, since business lines tend to be short to medium term focused, respondents stated that longer-term research and technology suffered. further, the split up of bnr also fractured the strong network and information sharing that existed within the group. another change during this period was bce reducing its ownership and involvement with nortel (eventually selling all remaining stock in the next temporal period). this reduced the influence and impact of bce at the board level, effectively removing an important voice of the customer at the table. the result of restructuring decisions and bce was therefore a significant reduction in informal external monitoring. exhibit 3: environmental awareness model: nortel 1997-2001 perhaps the biggest impacts arising from the right angle turn, was in the formal external monitoring. those interviewed talked about reductions in competitive intelligence both in terms of role and effectiveness, the competitive intelligence guild and the closing down of the design interpretive center and reduction in the role of the central planning unit (again consistent with movement towards more divisional power). collectively this meant a significant reduction in formal external monitoring. exhibit 3 highlights the changes in the elements of the model. it shows how seeking to develop a faster customer response capability had negative impact on several monitoring practices. next we look at the second period. 2002 – 2004 the market turns and internal focus begins much like the first period, 2002-2004 was a period of significant industry change. however, the change was much different: from a positive growth environment in the first period, nortel experienced a hostile retracting demand environment after the dot.com bubble. it meant that there was significant oversupply in the industry and with increased competition from asia and increasing customer power there was downward pressure on prices. 66 unfortunately, as was mentioned in interviews the decrease in environmental awareness capability during the 1997-2001 period left nortel late as many noted to react to these changes. our data shows that to remain in this industry, nortel would have needed to reduce their costs significantly or capture significantly more sales to gain economies of scale. decisions made during this period were consistent with this idea. a new ceo was hired, frank dunn, nortel’s former chief financial officer. a cfo as ceo was logical given that the challenge was a financial one. under dunn’s leadership the head count was reduced from 94,500 in the beginning of 2001 to 35,160 by the end of 2003 (versus 68,000 in 1996). the new ceo also worked on fixing structural issues and on the accounting systems. as expected, there were other significant cost cutting measures, although efforts were made to minimize the cuts to r&d. exhibit 4: environmental awareness model: nortel 2002-2004 while these measures helped to stabilize nortel’s financial situation they further weakened nortel’s environmental awareness capability (see exhibit 4). massive layoffs meant that technical staff could no longer spend as much time with customers as there was limited time outside of the main operational day-to-day tasks. needed reductions in trade show attendance, in management training initiatives, as well as lower university funding meant that informal external monitoring capability was further eroded. as well, as this period focused on what respondents said were almost weekly requirements for management to reduce headcounts meant that the focus of nortel management was now internal with limited time to focus on external environmental issues. environmental awareness capability also eroded during this period due to the wilmer-cutler investigation. wilmer-cutler, a washington law firm was hired by the board to investigate a potential financial irregularity. the subsequent investigation, according to those interviewed in the study, was very intrusive and resulted in a lengthy focus by executives of nortel on the investigation (once again a factor which further increased the internal focus). wilmer-cutler’s recommendations, which were accepted and implemented by the 67 board, included the firing of the ceo (frank dunn) and many other senior executives. the firings of senior executives along with the layoffs of some 60,000 staff also resulted in a reduction in the number and strength of relationships between nortel management/staff and customers. several customers commented on this. 2004 ended with a restructured nortel, a new ceo (bill owen, a board member who volunteered to temporarily fill the role), and a significantly streamlined organization. however it also ended with eroded capability for informal external monitoring, reduced internal systems with external insight capability and attenuated decision maker cognitive abilities (see exhibit 4). 2005 – 2009 the road to bankruptcy protection with frank dunn fired, there was a need for a new ceo. bill owens, a member of the board, volunteered to fill this void temporarily until a new ceo could be found. in november 2005 mike zafirovski was hired as ceo. the accumulating weaknesses mentioned earlier in environmental awareness capability were perhaps most visible during this period. for example, in 2006/2007 an internal document noted that the turnaround of nortel was well in hand with significant recent sales from two key customers. however, the customers themselves told the researchers that the sales were reflective of a concern about nortel’s viability and the need to stockpile nortel parts should nortel go out of business. perhaps with stronger environmental awareness capability as was seen in the 1990’s nortel management would have known this. further, as was also noted both by customers and by others interviewed, during this period (2005 to 2009) sales were predominantly in legacy products. customers were reluctant to buy nortel’s newer technology solutions, again for fear that nortel would not be around to service them. sales may have been increasing during part of this temporal era but the limited environmental awareness capability meant that nortel might not have been aware that customers were in fact stockpiling legacy replacement parts, and that the growing customer discontent had them question the company’s future. our data shows that customers wanted nortel to either merge with another company or sell business units and focus on one or two businesses rather than the current four (optical, wireless, wireline and business enterprise). however, nortel’s decisions during this period were not consistent with these expectations thus significantly eroding customer confidence. both owen and zafirovski recognized the need to improve nortel’s systems and to also deal with the various lawsuits and other legal issues confronting nortel. they also saw the need to meet with and reassure customers who were growing increasingly concerned with nortel. zafiroviski’s strength according to several interviewed was in management systems. having worked with general electric (ge) he brought with him knowledge of ge systems and methodologies, which he started implementing at nortel. he also hired several new “c” level officers with similar backgrounds. zafirovski also went about trying to improve quality at nortel and further reduce manufacturing costs by implementing six-sigma. he also oversaw the installation of a performance management system that included r&d and technology assessments. competitive intelligence was also strengthened as part of this investment in systems. nortel could see what was in front of them. but informal external mechanisms were further weakened. customers talked about not seeing technology workers as much, different kinds of conversations, and constant changes plagued their once strong relationships. the new top executives came with strong business skills, but did not have the same understanding of technology that past leaders had exhibited. both customers and technical staff cited specific what was perceived by them as strategic errors made by senior management which were indicative they said of senior management not having a sufficient awareness of the technical dimension of the job.while many interviewed did cite strong business decision making abilities within senior management it was the technology acumen that was questioned. 68 exhibit 5: environmental awareness model: nortel 2005-2009 in summary, 2005-2009 brought with it strengthening in formal external monitoring, informal external monitoring and internal systems with external insight. however, decision maker cognitive factors appeared to weaken with continual focus on internal matters (e.g. six sigma and additional lay-offs) and reduction in technical capability at the senior levels of management. 7.0 conclusion in january 2009, nortel filed for bankruptcy protection and subsequently sold all of its units. while the company had immense technology strength (its patents were purchased for $4.5 billion), the failure to see and adapt to the new competitive environment contributed to this company’s downfall. yet, strength in environmental awareness in the 90’s had contributed to the rise of the company and was a key element of their success during this period. using a multi-method approach involving multiple surveys and interviews, this in-depth case study has examined the impact of the change in environment on nortel and of nortel’s environmental awareness capability during the turbulent period (1997 to 2009). this study makes two notable contributions. first, the study theorizes building a model of environmental awareness that features three types of monitoring practices as well as cognitive factors that impact sensemaking abilities of decision makers (exhibit 5): 1. formal external monitoring practices (for example competitive intelligence, planning) 2. informal external monitoring practices (for example board members reaching out) 3. internal monitoring practices with external insight capability (for example accounting systems) 4. decision makers cognitive makeup (for example the level of open mindedness) the case study traces the development of each of these factors during the study time frame and noted that in the last time period (2005-2009) the first three were strengthened while there was not a strengthening of the fourth factor (cognitive makeup factors) with in fact the focus still being internal. this latter factor might have contributed to the customers’ perception that nortel was not responding to their concerns. as a result, customers were wary of buying nortel’s new technology offerings. second, the case study has shown how decisions that make sense from a business and environment perspective may in fact have an adverse effect on 69 environmental awareness. for example, while costcutting during the 2002-2004 period was needed given the industry dynamics, it reduced nortel’s informal external monitoring capability. similarly, organizational restructuring in the 1990’s designed to increase speed of response to customers, also resulted in a reduction in formal external monitoring capability. furthermore bce’s sale of nortel stock and subsequent exit from the board, also led to a reduction in informal external monitoring capability. accordingly the study makes a notable contribution to both the academic and practitioner communities illustrating that significant changes to strategy or organization should be examined for any unintended impact on environmental awareness capability. readers are advised however that these findings are based on a single case study. the list of items provided above under the four categories (decision maker cognitive makeup, formal external monitoring, informal external monitoring and internal systems with external insight) is exhaustive from the perspective of the nortel, however it might not be exhaustive for other companies. future research should seek to expand and to validate the model in different organizations. furthermore, no attempt is made to evaluate the effectiveness of each of the monitoring practices or the cognitive factors. further studies are required to validate these findings (calof et al, 2014). 8.0 references austen, ian. (2009). nortel seeks bankruptcy protection. new york times, january 14, 2009 as referenced on www.nytimes.com/2009/01/15/technology/com panies/15nortel.html?_r=1& calof, jonathan., richards, greg, mirabeau, laurent, mouftah, hussein, mackinnon, peter, chapman, peter (2014) an overview of the demise of nortel networks and key lessons learned. http://sites.telfer.uottawa.ca/nortelstudy/files/20 14/02/nortel-summary-report-and-executivesummary.pdf calof, jonathan (2014). evaluating competitive intelligence from the users perspective. journal of intelligence studies in business, 4 (3): 79-90. eisenhardt km. 1989. building theories from case study research. academy of management review, 14(4): 532-550. gioia, d. a., corley, k. g., & hamilton, a. l. (2012). seeking qualitative rigor in inductive research: notes on the gioia methodology. organizational research methods, 16(1): 15-31 fortune magazine online. meet the the market’s biggest loosers. http://archive.fortune.com/galleries/2010/fortun e/1002/gallery.biggest_losers.fortune/ accessed on april 8 2015. glaser,b.g.,& strauss,a.(1964) awareness contexts and social interaction. american sociological association ,29 669–679. global intelligence alliance. gia intelligence benchmarking tool. https://www.globalintelligence.com/insights/wo rld-class-market-intelligence/intelligencebenchmarking-tool. accessed april 17, 2015. hogan, scott. ci in high tech environments: a practitioners view. presentation made february 14 2001, nortel networks. http://www.fpttpftt.gc.ca/pdf/hogan.pdf accessed april 19, 2015. langley a. (1999). strategies for theorizing from process data. the academy of management review 24(4): 691-710. macdonald larry (2000) nortel networks : how innovation and vision created a network giant. john wiley and sons. canada. mackinnon, peter, chapman peter and mouftah, hussein (2015) nortel technology lens: analysis and observations. university of ottawa school of electrical engineering and computer science. mcfarland, janet (2011). enron and the biggest corporate governance scandals of the past decade. the globe and mail, november 27 as referenced on june 14 2014 at www.theglobeandmail.com/report-onbusiness/careers/management/board-games2011/enron-and-the-biggest-corporategovernance-scandals-of-the-pastdecade/article640949/ mellahi, k., & wilkinson, a. (2004). organizational failure: a critique of recent research and a proposed integrative framework. international journal of management reviews, 5/6(1), 21-41. patton mq. 2002. qualitative research & evaluation methods, sage publications: london, uk reardon, marguerite. 2009. nortel files for bankruptcy. http://www.cnet.com/news/nortelfiles-for-bankruptcy/ accessed april 8 2015. sheppard, j. p., & chowdhury, s. p. (2005). riding the wrong wave: organizational failure as failed turnaround. long range planning, 38, 239-260. solberg søilen, klaus. (2014). a survey of users’ perspective s and preferences as to the value of jisib a spot check volume 4, no 2, 61-66 van de ven ah, poole sm. (1990). methods for studying innovation development in the minnesota innovation research program. organization science 1(3): 313-335. yin rk. (2003). case study research: design and methods. sage publications: newbury park, ca http://sites.telfer.uottawa.ca/nortelstudy/files/2014/02/nortel-summary-report-and-executive-summary.pdf http://sites.telfer.uottawa.ca/nortelstudy/files/2014/02/nortel-summary-report-and-executive-summary.pdf http://sites.telfer.uottawa.ca/nortelstudy/files/2014/02/nortel-summary-report-and-executive-summary.pdf http://archive.fortune.com/galleries/2010/fortune/1002/gallery.biggest_losers.fortune/ http://archive.fortune.com/galleries/2010/fortune/1002/gallery.biggest_losers.fortune/ https://www.globalintelligence.com/insights/world-class-market-intelligence/intelligence-benchmarking-tool https://www.globalintelligence.com/insights/world-class-market-intelligence/intelligence-benchmarking-tool https://www.globalintelligence.com/insights/world-class-market-intelligence/intelligence-benchmarking-tool http://www.fptt-pftt.gc.ca/pdf/hogan.pdf http://www.fptt-pftt.gc.ca/pdf/hogan.pdf http://www.cnet.com/news/nortel-files-for-bankruptcy/ http://www.cnet.com/news/nortel-files-for-bankruptcy/ jisib-vol-12_nr-3(2022).pdf journal of intelligence studies in business vol. 12 no. 3 (2022) open access: freely available at: https://ojs.hh.se/ pp. 6–17 competitive intelligence in an ai world: practitioners’ thoughts on technological advances and the educational needs of their successors abstract: information age trends have caused the competitive intelligence (ci) industry interested in knowing what knowledge and skills are necessary for future practitioners. in 2022, addressed this topic’s relevancy, noting increases in ci departments the question of what skill sets are needed for future ci analysts and how do instructors prepare them for an evolving and dynamic future in ci? over 130 ci practitioners were surveyed about evolution (e.g., faster turnarounds, greater client expectations). while tech-savvy skills are disciplines that analyze data for business strategy. keywords: 1. introduction since the pandemic, the importance of intelligence in the corporate world has hit new heights. as misleading information proliferates, so does the need for ci departments to aid companies in effective decision-making (kolbe and morrow, 2022). calof et al.’s (2018) comparative study discovered a widespread growth of ci over the last two decades with “87% of all responding organizations had some form of formal competitive intelligence structure and many organizations had multiple intelligence or intelligence type functions in their organization” (p. 675). a sister discipline to offering ci because “most faculty members do not view the intelligence profession as a disuniversity resistance to ci appears to be breaking down with the recognition of such ci activities as monitoring competitors, benchmarking, and war-gaming (barrett, 2010). ci skills are evolving due to technological advances. one of the most impactful is 7 the next years, ai will change learning, teaching, and education” (p. 2). gunderson (2019) notes that “these rapid [technological] changes et al. (2019) asserts on the one hand “it is important to enable practitioners to “understand which skills and capabilities they should develop,” but then notes “there is currently no set framework of ci practitioners” (p. 720). this calls into question skills are necessary for ci pracing needs of the 21st century, this study will research the following questions: environment and subsequently, the educational needs for future practitioners? can educators best prepare future ci analysts? the paper will review ci’s evolution and the discipline. methodology will cover survey development and distribution followed by pedagogy. 2. literature review the origin of ci can be traced to (porter, 1980). porter advocated both “competitor monitoring” (p. 96) and “relating a company to its environment” (p. 3). until the mid-1990s, intelligence was portrayed as a cloak-and-dagger activity (miller, 2000). by the late 1990’s publications including street journal began to endorse intelligence drawing upon practices in the u.s. intelligence ducing the ci cycle. before the information age, “the scenery of science and technology was quite stable. large and even small companies knew exactly their marketplace” (dou et al., 1992, p. 35). technological developments eliminated stability, prompting the expansion of ci presence and scope. some changes included the digitization of corporate information (sadok et al., 2019), plummeting cost of data storage the start of the 21st century, 90% of the information needed by a company to monitor competitors and their industry was available 2002). a related development has been the proliferation of software designed to facilitate and expedite the work of ci practitioners (semerkova et al., 2017). ci’s evolution has seen the rise of competitive technical intelligence (cti), a branch of ci, used by companies to ensure they have “the best information possible on customer needs, technology options…and the competitive environment” (paap, 2020, p. 41). paap expanded ci’s traditional scope from porter’s (1980) competitor focus to include customer needs and . in recent years, cti has become more useful applying ai, coupled with big data, to reveal insights that were previously unattainable (porter, 2019). to gain ci knowledge and skills, professionals often draw from trade organizations (e.g., scip: strategic competitive intelligence professionals) and academies. while universities often incorporate business, library sciresources are necessary, but recent research managing the profession’s demands. applying the ci cycle as the framework (dishman and will be discussed as it relates to the needs of strategic thinking is necessary to do the backward planning to conceptualize, and achieve, a desired corporate end state (wang et al., kula and naktiyok (2021) stated, “strategic a ci perspective, this translates into imagining the future and having vision regarding such factors as the impact of emerging technology, the implications of competitor activities, or the effects of new regulations. task force approach collaboration is stage. paap (2020) described how ci practitioners “have expertise on data collection and analysis” and turn to the company’s technical staff for expertise on technical issues (p. 44). mabe et al. (2019) also stressed the importance of “relationship building (networking) skills in order to foster collaboration” (p. 724) calling them “the most required skills for ci practitioners” (p. 726). 8 finding information. online information that is publicly available and accessible on the web (data indexed by search engines) accounts for only four percent of what available in the so-called deep web (iftikhar, and how to seek information is an increasingly valuable skill. external sources. business intelligence practitioners access dedicated data warehouses of their company’s internal information to provide diagnostic, prescriptive, and predictive information. ci practitioners acquire external information requiring a different approach because “the range of topics are too broad, and the frequency of looking at any individual area so spread out, that it is not practical to keep the database up-to-date” (paap, 2020, p. 44). rather than rely on databases, practitioners have “more reliance on external sources that are kept up to date by the service providers” (paap, 2020, p. 44). analysis analytic skills. while big data may be to achieve maximum value. saddhon et al. (2019) asserted that, “the keys to the fortunate utilization of competitive intelligence are analysis of information and synthesis of knowledge” (p. 156). experienced analysts strive to professionalize analytic work to “get analysts to challenge their arguments and judgments, defend analytical positions and more effectively determine between what was fact and what was their opinion” (walsh, 2017, p. 550). technology forecasting encompasses futu re-oriented techniques developed by the u.s. department of defense and the rand corporation to assess and predict implications of future technologies (cho and daim, 2013). ci practitioners tasked to forecast technological developments must build expertise in these techniques (paap, 2020, p. 49). papp (2020) explained that a science & technology ci practitioner “uses tools to assess shows, and other sources of technical information to identify the who, where, why, and how fast new technologies are being developed or used” (p. 43). ci data may be structured, unstructured, or semi-structured, with user required to gather, store, and process that data (gunderson, 2019, p. 9). porter (2009) described the value of technically analyzing patent information. while, paap (2020) also advocated it as it “can help you identify who the players are, new developments in a particular technical area” and provide “insights on development trends” (p. 50). cl cucle of skills needed for future analysts. 9 dissemination communication is a critical skill throughout the entire ci process. practitioners must effectively communicate with clients to understand and accurately capture information needs successfully communicated in writing and/or poor communication skills as one of the major contributors to a ci project failure. due to the volume of data, communication through visualization has become an expectation by clients via dashboards and other graphical et al. (2019) used the example of overlaying visualization and network-based metrics for competitive intelligence analyses. adaptability. ci “is characterized by nu merous ‘one-off’ intelligence efforts” seeking information from external sources (paap, 2020, p. 44). a plethora of open-source information is now widely and equally available to all companies in any given industry. the companies that are able to rapidly identify, analyze, and turn information into actionable intelligence will likely gain competitive advantage (gilad its ability to quickly adapt to changing market practitioners rely on interpersonal skills to validate requirements, function as a team, obtain information from human sources, and deliver conclusions and insights to clients. at the same time, practitioners are expected to technology to perform their craft. these developments prompted researchers to ask ci practitioners what they believe are the educational needs of the crop of college students who will ultimately replace them. 3. methodology a survey was created based on the ci cycle and respective literature to address: 1) key evolutionary trends in ci, 2) needed skills for ci and 3) respective curriculum to prepare future analysts. several curriculum-based questions were derived from mercyhurst university’s business & competitive intelligence program (established 2009). according to kolbe and morrow (2022) “academic institutions, such as mercyhurst university, are producing a new generation of private-sector focused intelligence professionals” (para 5). expert discussions from a ci council webinar on the topic of preparing future analysts along with the researchers’ own expertise also ity, questions were reviewed by ci experts and educators to ensure questions were relevant and meaningful, unambiguous, and easy to answer from the perspective of the participant (connell, et al., 2018). the survey offered several openended questions for additional insights. valid inferences from survey data, responpopulation (malhotra, 2019). to achieve this, the study included members of the ci council, scip and special librarians association, ci division. a two percent were part of scip, 40% special librarians association and or on ci boards. using proquest©, 721 individuals viewed the survey, 219 responded (30.3% response rate) and 134 were fully completed (18.6%). a growing issue in organizational research and noted “if there are no systematic differences between respondents and non-respondents, then the sample remains representative of the population and can provide valid inferences” (p. 4). the researchers deemed the response rate acceptable. managerial and higher-level positions represented 49% of the respondent pool, while perspectives at a strategic, operational, and experience, the distribution was roughly 1/3 representing the categories: 3 years or less, 4-6 years and 7+ years. respondents were equally distributed in part-time and full time positions and as sole practitioner. in terms of education, 81% had a bachelor’s or higher degree. industries represented: • it (hardware, software, consulting) 22% • consulting 18% • construction or building trades 8% • manufacturing 7% • other categories < 5% 10 4. results both quantitative and qualitative feedback were assessed to address the research questions. the following section presents the current perspective of ci’s evolution, the ci cycle categories related to necessary skill sets and feedback regarding curriculum development and future skills needed. to fully assess the future of the discipline, how ci has changed over the past decade followed by an open-ended question to gather respondents rated four factors based on degree of change. based on the mean values of the likert scale, the impact of technology represented the most change with client/customer mean standard deviation 1. impact of technology (n = 130) 3.87 .80 2. doing more ci tasks in-house (n = 129) 3.52 .85 3. nature of client taskings (n = 128) 3.52 1.04 4. client or customer expectations (n = 129) 3.26 .79 open-ended responses to w provided more insight. common terms. key quotes are presented: 1) technology’s impact • . • • 2) customer expectations • • 3) nature of tasking • 4) change in perception of ci • ential and become a trusted business 5) in-house ci • • planning and the decision maker. (2017) noted that the planning step in the ci process is to ensure that not all possible information and data is collected, but instead idenplanning is reliant on two primary conditions: a) an understanding of what ci provides an organization and b) actual decision maker support whether executive, manager or client have argued the need for leadership support in order for the discipline to grow and evolve ning stage. common themes (in order of response rate) 1) building an understanding of what ci is and its value. • 11 • • 2) time and technology limitations offer challenges. • • • 3) executive reliance on own internal resources as a trade-off to ci. • • collecting. a question regarding the colmost commonly used by practitioners. company website information and third-party sources were most common followed by news was used by only 10% of respondents identianalysis commonly includes using methodologies to evaluate collected data and information. age of structured analytic techniques (sat) they used that were taught in college. there was an even distribution of responses with approximately 1/3 representing the categories of <40%, 41-60%, and >60%. only 8% noted that they learned more than 80% of sat in college indicating opportunities to build curriculum. respondents also were to identify what ket research were most common, while future oriented technology forecasting ranked much lower. ironically, the top methodologies have been part of the ci discipline for decades. this may indicate an opportunity to build ci curriculum incorporating new techniques that address the complexity of evolving technologies. common sources for research (n = 131). 12 current ci techniques used n = 130. structured analytic techniques total % 1. swot analysis 54.6% 2. 46.9% 3. market research & analysis 45.4% 4. scenario planning / simulation & modeling 38.5% 5. 36.2% 6. benchmarking 34.6% 7. 33.8% 8. r&d / technology forecasting 33.1% 9. 31.5% 10. trade show collection & analysis 29.2% 11. win / loss 28.5% 12 counterintelligence 23.8% 13. steep/pest 23.1% 14. other 9.2% ci dissemination methods. mean sd frequency* (n=130) 1. ci research reports (ad hoc tasking) 3.75 .97 2. in-depth analysis reports 3.68 .93 3. ci reports to other co. departments 3.53 .97 4. ci newsletter 3.49 1.09 5. (n=129) 3.43 .89 6. periodic ci reports (monthly, quarterly) 3.42 .90 7. other 3.26 1.12 8. online forum (n=129) 3.02 1.06 9 electronic ci alerts 2.85 1.05 effectiveness** 1. (n=132) 3.61 1.02 2. 3.60 1.05 3. (130) 3.53 .97 4. phone (132) 3.52 1.12 5. company intranet (129) 3.18 1.01 6. email newslettermass (130) 3.18 .90 7. online forum (129) 3.06 1.12 8. printed newsletter (130) 2.97 1.03 dissemination. two questions addressed the dissemination of ci: 1) most common methods used and 2) effectiveness of methods. based on frequency of use, project reports scored highest, while more technology based online forums and electronic alerts rated neutral or nities to build curriculum expanding communication methods to incorporate more technology-based dissemination. written reports and personal dissemination were rated as the most effective methods pointing to the importance of interpersonal skills. mass communication tools like newsletters and forums rated neutral indicating direct dissemination as being more effective. practitioners were provided skill sets based on the literature and asked to rate how critical these skills were for ci (1 = not critical at strong at 0.826 et al. 2010). one-sample greater than neutral (4.5) identifying them the top three variables as analytical, research and communication representing the key stages of the ci cycle. curriculum development questions were asked regarding courses and degrees. courses were rated in terms of professional utility for ranked based on means with top courses being bi/ci, market research, and data analytics being top rated over more traditional subjects. respondents rated desirability of degrees ogy (i.e., it) were rated as more desirable over more traditional degrees. recommendations and suggestions for future see appendix for themes and key quotes. 13 5. discussion the intent of this research was to address questions pertaining to ci’s evolution with technology in the hopes of guiding educators to better prepare students. one common theme related to curriculum supported the incorporation of more specialized courses relevant to the discipline (i.e., bi/ci, analytics) and gaining experiences prior to graduation. beyond traditional business curriculum, open-ended feedback stressed liberal arts-based skills as being essential. ironically, more collection-based courses lower with several comments regarding critical skill sets for ci (n = 130) and ( = 129). skills mean sd t sig 1. analytical (n = 129) 8.02 2.01 16.79 2. communication skills 7.80 1.67 15.72 3. research 7.66 1.66 14.85 4. 7.57 1.76 13.36 5. adaptability 7.55 1.62 14.32 6. it/computer 7.36 1.57 13.56 7. 7.28 1.93 10.54 8. presentation 7.12 1.64 11.26 9. strategic 7.08 2.01 8.93 (n = 131). course mean sd 1. intelligence studies (n = 129) 7.61 2.02 2. business & competitive intelligence (130) 7.49 1.82 3. information technology 6.74 2.33 4. management 6.60 1.98 5. library science (130) 6.36 2.37 6. math (130) 6.07 2.35 7. accounting 4.99 2.16 * (n = 130) and ( = 129). course mean sd 1. bi/ci course 3.95 1.1 2. market research 3.76 .79 3. data analytics 3.74 .78 4. business 3.72 .57 5. economics 3.64 .82 6. statistics 3.61 .82 7. collection (n = 129) 3.60 1.0 8. computer programming 3.30 .95 9. library science (n = 129) 3.20 .99 10. accounting 2.95 .79 * 14 as ai had led to unrealistic expectations of data having all the answers and situations of “a world where human analysts have been as a top competency, instructors may want to ensure that research is presented holistically stressing the synergistic value of data thinking and analytical skills. respondents stressed the need for students to be versed in sats recommending more analytics focused courses. as noted in the literature, analysts are impacted by ai and navigating evolving technologies may require more 2019). based on the lower ranking of futuristic sats like technology forecasting, instructors may want to continue to build the curriculum with a focus on more technology-based techniques. denoted as essential for a ci analyst’s success. popular methods of dissemination were methods may need to incorporate more electronically based dissemination especially for executives (nohria, 2021). themes, beyond curriculum, parallel the ci cycle (dishman and calof, 2008). many comments reinforced the need of planning and having the research capabilities to know where and how in addressing the evolution of ci, technolfrom emerging platforms and big data to some interpersonal skills. with technology, ci professionals reinforced the idea that expectations are growing for more concrete and faster analysis of what it all means (especially ai) is still in pioneering stages. this may be the skills new analysts can to bring to the table. most in general as more organizations recognize its value (kolbe and morrow, 2022). 6. conclusion this study gained valuable insight into the current ci environment, its challenges and its evolution with technological advances. survey feedback supported the ci cycle regarding necessary skills from strategic thinking to research capabilities and analytical competencies. communication skills were ranked as most valuable in the discipline, while courses future curriculum. results indicate a shift to more focused degrees in intelligence studies over traditional business degrees. technologies is evolving the discipline, softer skills like communication and analytical skills will never waiver in importance. these should remain a focus in curriculum development, as synergies will ensure not only a tech savvy analyst, but a successful one too. this study serves as a starting point in building curriculum to prepare future ci analysts. expanded research could build the framecipline with the goal to evolve curriculum for the ai-enabled world. with the growing speed of technology along with rising expectations, this topic will only continue to increase in relevancy. that the submission has not been previously published and has not been submitted to or is not under review by another journal or under consideration for publication elsewhere, and, if accepted, it will not be published elsewhere in the same form, in english or in any other language, including electronically without the written consent of the copyrightholder. the anonymized research data will be made available if required and if the university ethics board permits. to the best of our knowledge there is no copyright material in this paper. no funding was received for this study. 15 reference list barrett, s. e. 2010. competitive intellicalof, j., arcos, r., and sewdass, n. 2018. competitive intelligence practices of european , springer, london. pp. 67–112. connell, j., carlton, j., grundy, a., buck, e., keetharuth, a., rickets, t., burkham, m., robotham, d., rose, d., and brazier, j. 2018. the importance of content and face validity in instrument development: lessons learnt from service users when developing the recovering quality of life measure (reqol). pp. 1893–1902. https://doi.org/10.1007/s11136018-1847-y dishman, p. and calof, j. 2008. competitive intelligence: a multiphasic precedent to marketing strategy. la tela, a. 1993. technology watch and competitive intelligence: a new challenge in education for information. tion . palgrave macmillan. petitive intelligence process of the firm and the factors that impact its effectiveness. doctoral dissertation. anderson university, in. vey research: implementing response enhancing strategies and conducting nonresponse analyses. 10.1177/0049124 115626169 companies actually use the competitive intelligence they collect. , pp. 2–4. competitive intelligence: need of real-time competitive intelligence and the impact on decision-making. doctoral dissertation. son, r. (2010), . new must champion business intelligence programs. no. 5, p. 48. gence needs. , successfully investing in commercial intelligence and knowledge management. 29. the future of intelligence in an ai-enabled able at: https://www.cifellows.com/resources/ webinars-videos/ci-fellows-webinar-series-2020 (accessed 13 august 2021). ture of competitive intelligence in an ai-enabled world. and karim, k. 2011. an ajax powered formsbased approach for crawling the deep web. pajin, t., and ju, b. 2014. the corporate information agency: do competitive intelligence practitioners utilize it? kolbe, p. r., and morrow, m. r. 4 jan help businesses manage risk. https://hbr.org/2022/01/how corporate-intelligence-teams-help-businesses-manage-risk (accessed 15 may 2022). kula, m. e., and naktiyok, a. 2021. strategic thinking and competitive intelligence: comparative research in the automotive and communication industries. lackman, c., and lanasa, j. 2013. competitive intelligence and forecasting systems: strategic marketing planning tool for sme’s. pp. 98–109. mabe, k., sibeko, n., morake, t., and nkadimeng, l. 2019, september. competitive intelligence skills and capabilities required from ci practitioners in south africa. in european con academic conferences international limited, pp. 708–716. malhotra, n. 2019. an applied orientation (seventh ed.). upper 16 ploring and understanding the causes of competitive intelligence failures: an information behaviour lens. proceedings of isic: the information behaviour conference, krakow, poland, 9–11 october 2018: part 1. miller, j. p. (2000), . cyberage books. medford, new jersey, pp. 55–67. a case for competitive intelligence. business digital articles, pp. 1–8. available at: https://hbr.org/2021/08/how-ceos-should-manage-their-time-in-the-hybrid-workplace (accessed 25, may 2022). paap j. 2020. mapping the technological landscape to accelerate innovation. doi: 10.17323/2500-2597.2020.3.41.54 porter, a. l. 2019. data analytics for better informed technology & engineering management. , pp. 29–32. porter, a. l. 2009. tech mining for future-oriented technology analyses. , pp. 1–20. porter, m. 1980. . analytics in building the competitive intelligence of organizations. saddhono, k., chin, j., toding, a., qadri, m. n., and wekke, i. s. 2019. competitive intelligence: systematic collection and analysis of information. , sadok, m., welch, c., and bednar, p. 2019. a socio-technical perspective to counter cyber-enabled industrial espionage. security journal, pp. 1–16. ar, p., and luo, j. 2019, january. data-drivcompetitive intelligence. in nd system sciences, pp. 127–136. nologies in competitive intelligence. in (pp. 804– 807). ieee. telligence on learning, teaching, and education. . luxembourg: pp. 1–47. telligence analytical practice through qualitative social research. security to achieve organizational excellence. business intelligence. in routledge, pp. 67–81. 17 appendix practitioners’ recommendations topic themes key comments strategic thinking planning • • • • research skills collecting • • • analytic techniques analysis • • • • • ci courses & experience curriculum • • • • ditter jisib 1 2011 19_28 6 final kopie using xbrl technology to extract competitive information from financial statements dominik ditter *, klaus henselmann * and elisabeth scherr * * department of accounting and auditing, friedrich-alexander university erlangen-nuremberg, lange gasse 20, d-90403 nuremberg, germany dominik.ditter@wiso.uni-erlangen.de, pruefungswesen@wiso.uni-erlangen.de, elisabeth.scherr@wiso.uni-erlangen.de received 1 june 2011; received in revised form 22 november 2011; accepted 26 december 2011 abstract: the extensible business reporting language, or xbrl, is a reporting format for the automatic and electronic exchange of business and financial data. in xbrl every single reported fact is marked with a unique tag, enabling a full computerbased readout of financial data. it has the potential to improve the collection and analysis of financial data for competitive intelligence (e.g., the profiling of publicly available financial statements). the article describes how easily information from xbrl reports can be extracted. keywords: financial intelligence, xbrl, competitive intelligence, real-time business intelligence 1. introduction competitive intelligence (ci) can be defined as the process of “gathering and analyzing information about your competitors’ activities and general business trends to further your own company’s goals” (kahaner 1998, 16). important sources of competitive information are publicly available financial statements. they provide a lot of valuable information about competitors as their financial performance (e.g., for the calculation of financial key metrics to measure the profitability of competitors) and financial position (e.g., for the evaluation of the capability to survive price wars). however, this information usually cannot be used to the full extent. the established format types of published financial statements, for example ms excel, ms word and adobe pdf, are unstructured and therefore not computer readable. software programs simply do not know how to use this information. with no information for further working, data processing systems interpret the information as on-going text. every item (in approximately 100 to 500 pages) must be manually fed into an analysis software tool or database system. the effort it takes to manually extract the required information from financial statements is time-consuming and error-prone. for this reason, ci managers are forced to acquire adjusted or structured financial data from intermediaries or business data providers. the disadvantages of this approach are the high costs available for free online at https://ojs.hh.se/ journal of intelligence studies in business 1 (2011) 19-28 20 that are incurred and the fact that the data is not obtained directly from the source (i.e., the target company). the extensible business reporting language, or xbrl, has the potential to solve these problems. information within documents that are provided in the xbrl format enable automatic data processing of almost all reported items without timeconsuming manual feed of data. the idea behind is that companies have to publish their business reports in a standardized electronic structure, increasing the transparency of the reports for investors. with a little programming effort, everyone (including small investors) can access financial data directly from the source, at low cost and almost in real-time. as a side effect, xbrl also offers opportunities for ci. today only a small amount of specific literature for accessing xbrl data is available (except hoffman 2006). this article is based on hoffman 2006 and describes how information from xbrl data can be extracted and used for ci. the article shall serve as a technical guide and outlines how to get started and what instruments are required. this article proceeds as follows. first, we give a short explanation of the xbrl concept, before explaining an approach to xbrl data extraction in section 3. in this example, specific financial line items of an actual xbrl document will be extracted. because the implementation status of xbrl is very sophisticated in the u.s., all explanations for extracting and using xbrl are based on sec filings. the article closes with a discussion of the effects of xbrl on the development of ci and a short summary. 2. the xbrl concept because xbrl is a derivate of xml technologies, the fundamentals of xml will be illustrated first, followed by an introduction to the fundamentals of the xbrl concept. 2.1 fundamentals of xml the extensible markup language, or xml, is a meta-language for the creation of a self-defined document markup language (watt 2002, 10). a popular markup language is the hypertext markup language, or html. with html, it is possible to assign a specific look or layout to document content. therefore, the text or numbers of an html-formatted financial statement (file extension *.html) are tagged (marked) by specific expressions. for example, html tags can indicate that the number “14013000000” is to be displayed in bold letters or in the color green. this enables computer programs like mozilla firefox or microsoft internet explorer to interpret and present the document content in the deposited layout. the world wide web consortium (w3c) lists the applicable markups (vocabulary) and logical structure (grammar) for the creation of an html document in the html specification (w3c recommendation, 1999). xml is similar to html in the way it uses tags. however, xml markups define the meaning of document content. for example, in figure 1 the number “14013000000” is encircled by two tags indicating the start and the end of the markup. these tags tell us that the number reported is the net income of a company (and not its turnover, assets, etc). further, we can see that it is the net income for the year 2010 and that it is measured in us dollars (not euros or pounds). using this information, a suitable computer program could open the file, read the number and do any computations with it. no human beings are needed to retype the numbers on a keyboard. access to the data is much faster and less error-prone. in contrast to html, xml is a meta-language. therefore, the w3c does not regulate the vocabulary, but a set of grammatical rules for creating self-defined computer readable markups (watt 2002, 10). the name and order of elements and attributes used for the creation of markups can be arbitrarily extended. the xml specification ensures that xml markups, which consist of a logical structure of elements, attributes and values, are well-formed (w3c recommendation, 2008). figure 2 illustrates two simplified examples of well-formed xml documents with the description of identical data content. the examples a and b (see figure 2) show that there are different possibilities to describe the same issue according to 14013000000 element name attributes start-tag end-tag figure 1: logical structure of markups 21 xml rules. for xml documents to be automatically exchangeable between different senders and receivers, all participants of the communication chain have to use the same xml markup language. in other words, a uniform and consistent markup of document content must be ensured. therefore, the usable element names and attributes have to be predefined and deposited in a schema file. today it is common to do this with the xml schema language (van der vlist 2002, 2). an xml document is “valid” if the markups conform to the rules of the corresponding schema file. therefore, this xml document is an instantiation of the schema or a so-called instance document (binstock 2003, 12). xml instance documents (a technical term for a valid document with data content; file extension *.xml) and schema documents (documents in which the declared elements and attributes like netincomeloss and year are deposited; file extension *.xsd) are connected by the bold expressions in figure 2. a so-called validating xml parser (module of a software program; responsible for the reading in of an xml document) can search for the attribute schemalocation (harold 2004, 453). if this reference to the schema document is available, the parser can check the xml document for conformity against the predefined schema. in other words, by rejecting xml documents in the event of inconsistencies or markup errors, the schema can control consistency. because it is possible to select a free number of self-defined elements and attributes, two different xml markup languages may use the same name for an element. for example, in figure 2 “apple” addresses the company apple incorporated. however, in another context “apple” may mean a kind of fruit. to ensure a clear unique classification, this name conflict can be solved with xml namespace (w3 schools, 2011). a namespace is an inventory of affiliated elements and attributes that can be identified with a unique name. the namespace name must be an uri (uniform resource identifier) (w3c recommendation, 2009). because uris are absolutely unique, it is not possible for the same uri to exist again. a default namespace is defined in the start tag of the root element by the attribute xmlns = ”uri” (evjen 2007, 29). it thereby applies to all other elements that are reported within the document. in the upper example of figure 2 the elements apple and netincomeloss are associated with the namespace ”http://www.apple.com /instance/examplea”. 14013000000 8235000000 14013000000 8235000000 figure 2: two well-formed xml documents 22 via the creation of individual, customized tags, xml is a very flexible standard for electronic data exchange. almost all transmission requirements and communication constellations can be covered with xml. however, for the structured exchange of business information a certain recognized framework has been established: xbrl. 2.2 fundamentals of xbrl xbrl was created for the automatic and electronic exchange of business data. the non-profit organisation xbrl international incorporated (xii) maintains the standard in an own specification. xbrl is a meta-language for creating markup languages for business reporting issues. but in contrast to xml, the xbrl specification provides both the grammar and core vocabulary (xbrl international incorporated 2008, 2). the xbrl syntax is based on several open, globally accepted standard specifications, including xml, xml schema, xml namespace, xlink and xpointer. the repertoire of xml technologies selected for xbrl is compiled in the xbrl specification (sec release 33-9002 2009, 11). furthermore, the xbrl specification outlines elements and attributes used to define reporting elements and to express relationships among them. therefore, the unity open-standard xbrl can be understood more precisely as the “core language” for the creation of markup languages for business reporting issues. however, with xbrl it is possible to create not only a markup language, rather more a classification system (taxonomy) (hoffman 2010, 301). there are many different types of accounting standards around the world, for example, ifrs (international financial reporting standards), us gaap, german gaap, swiss gaap, etc. each accounting system demands the reporting of different numbers and data. sometimes the differences are smaller, sometimes bigger. to make things more complicated, there are different reporting requirements in every country for banks and insurance companies than there are for industrial companies. for automatic electronic reporting purposes, each reporting standard has to be converted into a standardized structure. in xbrl, this is done with a hierarchical structure (taxonomy) to cope with the complex and extensive accounting rules. hence, taxonomies consist of xml schema documents and so-called linkbases (see figure 3). schema documents and linkbases are separate files, but they are an entity and together constitute a taxonomy (edgar online, 2011). the schema documents represent an unsorted list of declared element names and their corresponding attributes (hoffman 2010, 82). as schema documents contain a predefined list of a business report’s possible contents, taxonomies are often interpreted as “digital dictionaries” for the transmission of financial statements, for instance (hoffman 2010, 301). it would be theoretically possible to store all declared elements in one single document, but this would be difficult, due to thousands of elements that are needed for the markup of a financial statement (e.g., the usgaap taxonomy contains approximately 19,000 monetary and non-monetary element names). for this reason, the elements and their associated attributes are usually stored according to their purpose in different schema documents. elements that have been defined in an xbrl taxonomy are so-called concepts (hoffman 2006, 67). figure 4 illustrates an excerpt of an element declaration from the us-gaap taxonomy. in this figure an element with the name netincomeloss is declared. companies can use the element name for transmitting a financial line item: in this context, net income in accordance with us gaap standards. the xbrl specification provides several elements and attributes (vocabulary) that can be used to describe the declared elements in more detail. the attribute nillable (possible value: true/false) determines if there is an obligation to report this item in the instance document (sec, 2010). this concept does not need to be included in the report if the value is true. the attribute type xlink / xpointer xbrl taxonomy schemadocumenta.xsd calculationlinkbase.xml schema documents linkbases schemadocumentb.xsd schemadocumentc.xsd schemadocumentd.xsd definitionlinkbase.xml presentationlinkbase.xml labellinkbase.xml referencelinkbase.xml figure 3: basic structure of an xbrl taxonomy figure 4: concept declaration 23 expresses if the concept is a monetary item, a string item, a date item and so on. the taxonomy developer may add an optional balance attribute (possible value: debit/credit) to the concept definition if it is a monetary item type (xbrl international incorporated 2008, 80). for example, it will indicate if the reported fact is an asset or a liability in the statement of financial position. the attribute periodtype indicates if the concept is an instant or duration type. the net income is a duration type because it is part of the statement of income (hoffman 2010, 89). a special feature of xbrl is to describe complex relationships (links) between different concepts (concept-to-concept link) or to add auxiliary information to concepts (one-way link). the different links are stored in separate files according to their purpose, the so-called linkbases (e.g., label links are generally stored in a separate document, the so-called labellinkbase). the supported linkbases according to the xbrl specification are shown in figure 3. the calculation-, definitionand presentationlinkbase contain concept-to-concept links, whereas the labeland referencelinkbase contain one-way links. the links are built with the help of the w3c specifications xml linking language (xlink) and xml pointer language (xpointer). every concept has the attribute id that serves as unique identifier (hoffman 2010, 88). in figure 4, the identifier of the declared concept is “us-gaap_netincomeloss”. with the help of the identifier, xpointer can locate (point to) concepts in the schema document. xlink is used to describe the relationships (links) between two located concepts or from one located concept to auxiliary information. the concrete xlink and xpointer rules can be looked up in the xbrl specification (http://www.xbrl.org/specrecommen dations). a calculation link between two monetary item type concepts enables them to be linked mathematically, but with the limitation it only allows the description of the summation or subtraction between them (edgar online, 2011). for example, the use of calculation links enables the description of net income as total earnings minus expenses. all specified calculation links between concepts are aggregated to a linkbase, in this case the calculationlinkbase. the function of the calculation links is important because it makes it possible to control if the reported monetary statements are mathematically complete and correct (xbrl spain 2005, 21). the definitionlinkbase serves to express different kinds of (inter)relationships between concepts (hoffman 2006, 67). for example, it can be deposited that an explanation to the impairment must be disclosed in the notes in the case of asset impairment. the main function of the presentationlinkbase is to display the list of unsorted concepts in a hierarchical structure according to the presentation rules of the accounting standards. additionally, for each hierarchical level the order of the concepts can be deposited according to the particular formal requirements (iascf 2010, 23). for example, within the statement of financial position the assets are comprised of current assets and noncurrent assets. furthermore, us gaap requires current assets to be displayed before non-current assets. this can be implemented with the use of presentation links. all in all, the presentation links offer the possibility to group and sort the unsorted list of declared schema elements for the human eye. the labellinkbase offers the possibility to add a human-readable name (e.g., net income) for a concept (e.g., ). if several links with human-readable names in different languages have been defined, xbrl reports can be prepared and read in different languages (van der heiden 2006, 15). for example, the company apple could provide the numbers of its balance sheet. analysts from germany could choose the german language and they would receive a report with lines like “sachanlagen”, “vorräte” and so on. an englishspeaking analyst would see “property, plant & equipment” and “inventories” on his report. by overcoming the language barrier in this way, information about foreign competitors is easier to understand. the aim of the referencelinkbase is to reference the underlying legal background of the concept and descriptive literature in commentaries. reference links may also provide documentations about the correct usage of the special concept. in summary, taxonomies consist of schema documents and linkbases. schema documents only represent a container of unsorted concepts. they will be structured with the individual linkbases. in the area of accounting, taxonomies are primarily developed and published by such standard-setters as the ifrs foundation or the financial accounting standards board (fasb). depending on the particular legal situation or xbrl adoption degree in the respective countries, the reporting companies may or are required to use the taxonomies to create and file reports in xbrl format (instance documents). due to the standardized markup structure, xbrl reports can be automatically readout and processed by computer programs. to fulfill this aim, it is important that all participants of the reporting chain use the same standardized taxonomy. how easily information from xbrl reports can be extracted shall be illustrated with the help of sec filings according to the us-gaap taxonomy in the following. 24 3. extracting competitive information from xbrl financial statements this section describes how competitive information can be extracted from us gaap xbrl reports. an actual annual report from the company apple incorporated serves as basis for the illustration. 3.1 financial data provided by the sec xbrl can be implemented for different business reporting issues (e.g., banking supervision, tax and other regulatory reporting as well as internal management reporting). however, xbrl originally has been created to improve the data exchange of financial statements. with different taxonomies, it is possible to represent the specific national accounting standards like us gaap, ifrs or german gaap. in the u.s., companies have to use the usgaap taxonomy when they are obligated to prepare their financial statements according to us gaap and sec regulations (xbrl us, 2008). in 2006, the non-profit jurisdiction xbrl us was commissioned by the u.s. securities and exchange commission (sec) to develop a taxonomy that is consistent with us gaap requirements and the commission’s regulations (sec release 33-9002 2009, 12). in 2010, the on-going development and maintenance responsibilities for the us-gaap taxonomy devolved to the fasb (fasb, 2011). the taxonomies supported by the sec xbrl mandate are listed on the web site http://www.sec.gov/info/edgar/edgartaxonomies.sht ml. because of the sec xbrl mandate (or interactive data program), many xbrl filings of listed companies are available for analysis online. beginning with fiscal periods ending on or after june 15, 2009, domestic and foreign large accelerated filers that prepare their financial statements in accordance to us gaap and have a public equity float above $5 billion were required to provide their financial statements to the sec and on their web sites in xbrl format (sec release 33-9002 2009, 42). all other public companies that fell under the definition of large accelerated filers using us gaap were required to submit their financial statements in xbrl format for fiscal periods ending on or after june 15, 2010. finally, all remaining us gaap filers and all foreign private issuers using ifrs had to comply with the xbrl requirements in year three of the phase-in (sec release 33-9002 2009, 43). for foreign private issuers using ifrs, the requirement to file xbrl reports was postponed until sec approval of the ifrs-taxonomy (sec, 2011). it was estimated that about 500 companies in year one, 1,800 companies in year two and about 12,000 companies in year three of the phase-in were required to submit their filings in xbrl (hoffman 2010, 219) to the sec electronic data-gathering, analysis, and retrieval system (edgar). anyone can access this data pool and download the xbrl filings (forms 10-k, 10-q, etc) free of charge. by providing several types of rss feeds, all xbrl filings can be downloaded to and integrated into a database or an analysis tool. in combination with the edgar system, xbrl enables competitive information from thousands of companies to be downloaded and analysed almost in real-time. 3.2 extracting apple’s xbrl data for extracting all information that an xbrl report provides, a special xbrl processor is needed. the reason is that an xml processor has no knowledge of xbrl and thus is not able to understand and handle the structure and relationships among the different xbrl documents (hoffman 2006, 494). an xbrl processor can follow the xlink and xpointer expressions and is able to put the different information together. it can read, write, control, handle or otherwise process xbrl data (hoffman 2010, 232). an xml processor can also be used to extract information; however, it is not possible to use all information (e.g., to mathematically check for correctness and completeness) xbrl documents provide (hoffman 2010, 24). an xml processor is a software program that can read, change, delete or transform xml documents. the module of the xml processor responsible for the reading-in of an xml document is called xml parser. an xml parser facilitates access to the content of an xml document by converting it into an application programming interface (api). afterward, this api can be accessed with programming languages for further processes (maruyama 2002, 21). one possible programming language is visual basic for applications (vba), which can be directly embedded in ms excel (hoffman 2006, 495). ms excel is a well-known and widely used analysis tool. furthermore, one important component is already integrated into it: an xml parser. as a result, ms excel can be a useful tool for extracting competitive information from xbrl financial statements. with only a little technical expertise, xbrl data can be extracted without the help of special software. because the built-in xml parser is used, only a stand-alone instance document and not the (extension) schema and the different (extension) linkbases can be used (note: xbrl supports creating own individual conceptextensions if the taxonomy structure does not provide the adequate concept for transmission. however, when the taxonomy structure is extended or adjusted, it is necessary to publish the corresponding extension schema and extension 25 linkbases.). nevertheless, this simple approach can generate huge benefits for ci. apple’s annual report for the fiscal year 2010 can be downloaded from the sec edgar database in the data formats html/ascii and xbrl. figure 5 shows a simplified excerpt of the xbrl report (instance document). among other data, it contains all information needed for the automatic extraction and calculation of the key metric return on sales (after interests and taxes) that is defined as the ratio between net income and sales (tracy 2009, 132). it is one way of measuring a company’s profitability (here the return on sales after interests and taxes). therefore, it is a useful key performance indicator for many competitive intelligence purposes. however, there are an infinite number of other calculations that could be automated as well. in accordance to us gaap, companies have to report their sales revenues as net value, that is as revenues earned from selling products minus sales returns, sales allowances and sales discounts. therefore, for the calculation of this key metric, apple’s net sales is inserted into the formula for the term sales. the net income is calculated after subtracting the expenses from earnings and represents the profit for the year attributable to shareholders. in apple’s instance document, the values for the numerator and denominator of the ratio return on sales are transmitted by the predefined element names salesrevenuenet and netincomeloss of the us-gaap taxonomy 2009. in order to distinguish between gaap (prefix: usgaap) and non-gaap element names (prefix: dei), a so-called prefix is used. a prefix in the start-tag of an element associates a specific namespace to single element names instead of assigning a default namespace for all element names within an instance document (see section 2, figure 2). each element name prefix is associated with an own uri (harold 2004, 65). for human beings the instance document in figure 5 might look a bit confusing. but computer programs can find a path through this “data jungle”, finding and extracting the information needed. the standardized structure enables the selective and automatic analysis of financial statements. in our approach, a few lines of vba code will need to be written (see figure 6) and the code will have to be inputted into the visual basic editor in ms excel. first, it is necessary to convert the instance document to an api so that the document content can be accessed. afterward we can search for the element names salesrevenuenet and netincomeloss and import the contained values into an ms excel spreadsheet. in figure 6 the vba code for the extraction of the net sales (see the bold expression) is illustrated. if we feed the storage location of the instance document into column a in the ms excel spreadsheet (see figure 7) and execute the vba program (or vba macro), this specific fact value will automatically be imported into the denoted column e. apple inc 2010 fy 65225000000 14013000000 2009-09-272010-09-25 iso4217:usd figure 5: simplified excerpt of apple's instance document 26 3.3 results by extending the vba code (or replacing the bold expression), the remaining columns in the ms excel spreadsheet (columns b, c, d and f; see figure 7) can be filled. after the import of the needed information into the spreadsheet, normal ms excel formulas can be applied to the values (column e and f) in order to calculate the requested key metric. for the company apple we calculate a return on sales of 21.48 % for the fiscal year 2010 with the aid of apple’s xbrl data. the result is displayed in column g. therefore, with xbrl no manual work for the calculation of the return on sales is needed anymore. if we do this calculation only once and for one company, the benefits of this approach seem to be limited. the true potential appears if we imagine that the procedure will be applied to many companies. by extending the vba macro with a few more lines of code, it would be possible to calculate a ratio (or dozens of them) for thousands of competitors in a fully automated process. it would be possible to compare apple’s performance measure with all other examined companies (or the industry average) by a pivot table (benchmarking) or further graphical analysis, for example. often used analytical ci techniques like benchmarking and competitor profiling (e.g., the profiling of financial statements) (bouthillier 2003, 54) therewith can be supported. 4. effects of xbrl on the development of competitive intelligence the ultimate goal of ci is to gather and analyse as much (external) information as possible in order to guide strategy by understanding a company’s marketplace competitiveness and its adaptability to future changes in the competitive environment. in the literature the ci process is often divided into the following four steps: (1) direction, (2) collection, (3) analysis and (4) dissemination (vrien 2004, 3). for the collection of competitive information (step (2)) there are several different sources possible. studies found that the systematic screening of the internet is among the most important and widely-used instruments of ci (vrien 2004, 11 and 17). the “internet" technology xbrl provides a lot of opportunities for ci. when all participants in the reporting chain (sender and receiver) use the same xbrl taxonomy, an figure 6: sample vba code to extract an xbrl fact value figure 7: extraction results sub extractxbrlforci() dim row as range set row = sheet1.range("a2") 'xml parser -------------------------------------------------------------------------------------dim instancedocument as msxml2.domdocument set instancedocument = new msxml2.domdocument instancedocument.async = false instancedocument.validateonparse = false instancedocument.load (row) 'xbrl extraction -------------------------------------------------------------------------------dim nodelist as msxml2.ixmldomnodelist set nodelist = instancedocument.getelementsbytagname("us-gaap:salesrevenuenet") dim node as object for each node in nodelist cells(cells(rows.count, "e").end(xlup).row + 1, "e").value = node.text next node end sub 27 automatic selection of individual desired data is possible. a time-consuming manual search through online available financial statements will not be needed anymore. in combination with other internet technologies like rss, the financial data can be extracted almost in real-time directly from the source and it doesn’t have to be acquired at high cost. besides the analysis getting faster and cheaper, a broader data basis can be examined. mass data can easily be analysed as well as textual or qualitative data (e.g., information about the company’s strategy and the managers’ forecast to the future performance) with the use of xbrl. with taxonomies (esp. labellinkbases) available in different languages, the collection of data can be driven independent from language hurdles. this will become more and more important for ci due to globalized markets. all in all, xbrl contributes to a quantitative better collection of data without reducing the data quality. the data quality rather increases. the fact that step (2) in the ci process improves, has also positive consequences for the steps (3) and (4). on the basis of better data, qualitatively and quantitatively, more reliable decisions are possible. 5. summary the article illustrates a simple approach to automate the extraction and further processing of financial statement information (e.g., for profiling of financial statements) using publicly available xbrl reports and ms excel. with the creation of a simple vba macro, xbrl data enables calculating not only one stand-alone key metric, but whole ms excel templates (e.g., scoring systems or benchmarking models) can be fed with financial data. the xbrl technology provides a lot of opportunities for ci. competitive information from financial statements can be collected and analysed independent of former limitations (e.g., data volume, language or qualitative data). designed as an open-standard, it is possible to customize the use of xbrl to own individual needs so that it can greatly simplify and speed up the analysing of financial data. references binstock c et al. (2003) the xml schema complete reference, pearson education inc., boston, massachusetts bouthillier f and shearer k (2003) assessing competitive intelligence software: a guide to evaluating ci technology, information today inc., medford, new jersey edgar online (2011) try xbrl glossary, available online on url: http://www.tryxbrl.com/learn/glossary/tabid/5 8/default.aspx evjen b et al. (2007) professional xml, wiley publishing, indianapolis, indiana fasb (2011) faf/fasb xbrl taxonomy role, available online on url: http://www.fasb.org/jsp/fasb/page/ harold e and means s (2004) xml in a nutshell, third edition, o’reilly media inc., sebastopol, california hoffman c (2006) financial reporting using xbrl, available online on url: http://frux.wikispaces.com/ hoffman c (2010) xbrl for dummies, wiley publishing, indianapolis, indiana iascf (2010) the ifrs taxonomy guide 2010, available online on url: http://www.ifrs.org/nr/rdonlyres/38eab57a7 264a7491eceeef29bbe8a6/0/itg20102010 0702.pdf kahaner l (1998) competitive intelligence: how to gather, analyse and use information to move your business to the top, touchstone, new york maruyama h (2002) xml and java, second edition, pearson education inc., boston, massachusetts sec release 33-9002 (2009) interactive data to improve financial reporting, available online on url: http://www.sec.gov/rules/final/2009/339002.pdf sec (2010) xbrl glossary, available online on url: http://www.sec.gov/spotlight/xbrl/glossary.shtm l sec (2011) no-action letter, available online on url: http://www.sec.gov/divisions/corpfin/cfnoactio n/2011/caq040811.htm tracy j (2009) how to read a financial report, seventh edition, john wiley & sons, hoboken, new jersey van der heiden j (2006) xbrl in plain english, available online on url: http://www.bataviaxbrl.com/downloads/xbrli nplainenglishv1.1.pdf van der vlist e (2002) xml schema, o’reilly media inc., sebastopol, california vrien d (2004) information and communication technology for competitive intelligence, idea group publishing, hershey, pennsylvania w3c recommendation (1999) html 4.01 specification, available online on url: http://www.w3.org/tr/html401/ w3c recommendation (2008) extensible markup language (xml) 1.0, available online on url: http://www.w3.org/tr/rec-xml/ w3c recommendation (2009) namespaces in xml 1.0, available online on url: http://www.w3.org/tr/rec-xml-names/ 28 w3 schools (2011), xml namespaces, available online on url: http://www.w3schools.com/xml/xml_namespac es.asp watt a (2002), xml in 10 minutes, sams publishing, indianapolis, indiana xbrl international incorporated (2008) xbrl 2.1 specification, available online on url: http://www.xbrl.org/specification/xbrlrecommendation-2003-1231+correctederrata-2008-07-02-redlined.doc xbrl spain (2005) white paper on xbrl technology, available online on url: http://www.xbrl.es/downloads/libros/white_pa per.pdf xbrl us (2008) us gaap taxonomy preparers guide, available online on url: http://xbrl.us/documents/preparersguide.pdf 91opinion section competitive intelligence in the defense industry: a perspective from israel – a case study analysis avner barnea 1 1 ono academic college, israel avner.bar@ono.ac received november 28, accepted december 26 2014 abstract: purpose the defense industry is one of the leading business sectors in israel and also worldwide. competitive intelligence (hereafter ci) is embedded into this sector and supports its decision making process. in recent years more information about this industry and about the ci activity is available while characterized by fierce competition and quick changes in the competitive environment. it is evident that ci is used widely by the leading firms in this sector while it has become an integral part of the business activity, and its added value seems to be significant. it is possible to define a framework of ci activity in this industry and to reflect on its advantages and limitations. it is my hope that this paper will encourage further research on this topic. methodology/approach – gathering information that has been published in israel and abroad that was analyzed and thus offers insight into this issue. findings – the defense industry in general and especially in israel is using ci intensively in the highly competitive environment of defense products to support the decision making process. research limitations – for many years, the information on this sector was not https://ojs.hh.se/available for free online at journal of intelligence studies in business vol 4, no 2 (2014) 91-111 https://ojs.hh.se/ 92opinion section available. it is in now in a process of change and this enables us to build up a comprehensive picture. practical implications – this study can make a contribution to global corporations competing in highly dynamic sectors, especially those that are operating in the governmental sectors. originality/ value – this is the first work in israel on the use of ci in the defense sector. paper type: a case study analysis. keywords: competitive intelligence, marketing intelligence, defense industry, israel introduction the defense industry was one of the fastest growing business fields in israel (2010). in recent years and especially since the mid 1990's, defense export became one of israel's leading export sectors, with high profitability and stable growth. israel was considered world wide as one of the leading countries in the field of defense exports. according to national data on arms exporters in 2007, israel was in fourth place, with sales of $4.4 billion after usa; russia and france (http://www.sipri.org/yearbook/2009/07/ 07b). according to recent estimations israel's global share on the arms exports in 2009 has reached to 14% (http://jdw.janes.com/public/jdw/index.s html). in 2010 the overall spending of worldwide governments on defense has reached to $1.7 trillion while the us is responsible to 45% of it. israel's defense exports in 2009 amounted was $ 6.75 billion, which is 16% of total israeli exports in 2009 (http://www.israelwtc.co.il). this is a slight increase compared to 2008, which amounted to defense exports at $ 6.3 billion, an increase of 7%. the israeli defense exports 2010 results are indicating that they have reached to $7.2 billion in 2010 (http://www.globes.co.il/news/article.aspx?di d=1000654713). it should be noted that defense exports is one of the few areas that have been hurt less during the global economic slowdown that began at 2008 (http://www.israelwtc.co.il, http://www.prinside.com/research-and-markets-israeldefence-and-r2131715.htm). the heart of the israeli defense companies was its advanced technology. its comparative advantage was technological excellence. israeli solutions were often considered to be highly innovative and better than other solutions by the competitors. investment of hundreds of millions of dollars a year in research and development intended to maintain this advantage. israeli defense products and technologies were considered to be most advanced, http://www.sipri.org/yearbook/2009/07/07b http://www.sipri.org/yearbook/2009/07/07b http://jdw.janes.com/public/jdw/index.shtml http://jdw.janes.com/public/jdw/index.shtml http://www.israelwtc.co.il/ http://www.globes.co.il/news/article.aspx?did=1000654713 http://www.globes.co.il/news/article.aspx?did=1000654713 http://www.israelwtc.co.il/ http://www.pr-inside.com/research-and-markets-israel-defence-and-r2131715.htm http://www.pr-inside.com/research-and-markets-israel-defence-and-r2131715.htm http://www.pr-inside.com/research-and-markets-israel-defence-and-r2131715.htm 93opinion section multi-disciplinary and often long ahead of the technology used in the civil market. the primary source of israel's relative advantage in this industry was the needs for the most advanced products set by the israeli military systems, especially by the idf (israel defense forces). on the other hand, one of the most important goals of israel's economy is to increase its exports as its economy relied heavily on export of most advanced technological products. a distinct advantage of israeli defense products is the fact that they usually have gained a variety of combat experiences by the idf, which increased their attractiveness in the eyes of its customers (http://www.businessmonitor.com/defence /israel.html). although there were security limitations on defense exports to avoid leakage of secrets that could damage the state security, israel authorized a wide range of defense products for be exported. (dvir & tishler, 1998). as competitive intelligence (hereafter, ci) became recognized, and its value was more acknowledged in recent years, its direction went towards gaining strategic intelligence (montgomery and weinberg, 1979). fulfilling ci became part of the many firms' capabilities (porter, 1980). qualified ci functions have been playing growing role by israeli firms in this sector to become more competitive. the purpose of this paper is to assess the value of ci to the defense industry, especially in israel and to see how beneficial it was for the process of decision-making in this field. referring to this issue was possible through studying the performance of israel's defense firms in foreign markets, mainly in recent years. characteristics of the sector of defense industries here are the characteristics of the defense industries' markets; 1. defense equipment purchasing is determinated by states based on their assessments of military threats and on the allocations to defense budgets, usually affected by economic parameters. 2. this market was characterized by intense competition, while the leading companies were based mainly in the us, uk, france and germany. although 2010 has seen changes in these markets while us shifted its priorities, china's global rise while threats in europe have been much reduced, the competition was still fierce. 3. the targets of the sales were usually government organizations, mainly the military and the defense establishments which have high quality demands and http://www.businessmonitor.com/defence/israel.html http://www.businessmonitor.com/defence/israel.html 94opinion section were anticipating for highly sophisticated solutions. 4. usually, the sales were resulted of winning tenders. these wins have far been reaching financial and strategic significance, as often it would be leading to extended business relations, including later upgrading of the systems and expanding sales of existing systems. 5. defense export process was characterized by high entry barriers to be able to develop advanced products that have undergone a long process of field experience in complex situations and have been proved their effectiveness. 6. defense export procedures were generally long-term processes, from raising the initial demand, responsiveness, getting security clearance, selecting the winner, the start of procurement, implementation and execution of systems and acquisition returns. 7. defense exports were characterized by the participation of huge corporations with high complexity of demands that often required ad hock cooperation with other companies to increase the chances of winning tenders. that implied that these companies also required a double vision both for customers and potential customers, usually state military and security organizations and also for competitors, which often were the ones you have shared with them in the past and possible candidates for cooperation again in the future. hence, defense industries are also characterized by intense competition and also by cooperation between the rival companies (known as coopetition). the turning point in the israeli defense exports' industry was in 1993 after major political developments in the middle east: the agreement between israel and the palestinian authority and the peace agreement signed with jordan that changed the strategic position of israel and enhanced israel's rapid economic growth while the export was its leading strength. as we can see in table 1, the transformation in the external forces influenced intensively on this industry while the demand to fulfill ci needs was evidently growing. 95opinion section table 1: impact of external forces after 1993 before 1993 external forces no. developed new capabilities and advanced technological products to answer global needs and compete successfully with leading world corporations moving towards more advanced technologies in response primarily to the local needs technological 1 enhanced an international strategy by aiming towards identifying the needs of foreign customers. mainly influenced by internal politics among government and military political 2 moved towards global markets with distinctive pricing structure supplied mainly local military needs economic 3 intense competition in global markets low exposure to global competition. low competition in the local market industry competition 4 monitoring capturing of global needs of numerous military establishments monitoring local needs of the military establishment key ci needs 4 characteristics of competitive intelligence in the defense industries a survey conducted in the usa (prior, 2009) compared 152 companies actively involved in ci with 1,396 in the same 19 industries. a benchmarking study of 24 firms in aerospace and defense found that, by using ci, three companies obtained outstanding results. the study showed that the industry average: 1. bid success rate was 18 per cent, but the top three won 87 per cent, 96opinion section 75 per cent, and 57 per cent respectively; 2. return for every dollar spent on proposals was us$78, but the top three averaged us$225. the evolution of ci in israel was behind the progress achieved in the us and other western countries (prescott, 1999). one of the main reasons for this inferiority was the overconfidence of israeli executives claimed to have captured the essence of intelligence while in their military service and implemented it within the business field with no need to develop dedicated ci capabilities. this has been changed in the last ten years (barnea 2004). by its nature, ci in defense industries was more strategically oriented, then tactical. the issues ci often covered were more long term defense trends and in depth competitors and customers assessments. its customers were the top management, (but also sales teams and technological teams) and its analysis methods were advanced to meet the expectations of senior executives. the fierce competition described above brings the companies engaged in defense exports to develop strong ci units that make the best use of ci discipline for competitive benchmarking. (mcgonagle & vella, 1996). companies engage in this sector, unlike many other sectors (attaway, 1998), recognize the need for professional peripheral vision (see day and schoemaker 2006). they actually acted by applying 'informed anticipation' approach (see day 1997) to systematically identify in advance changes in the needs and in the markets and to respond by build comprehensive understanding of the technological trends that shape the future and make their assessment available to their management. here are some distinctive features of ci in the israeli defense industry: 1. ci activity was perceived as it can significantly increase the chances of winning tenders and producing competitive advantage (see kahaner 1996). one of the results was wide ci awareness among executives and members of staff in this sector. 2. defense export companies tend to allocate significant resources to develop inhouse ci capabilities. 3. ci activities in this area were characterized by the need to monitor comprehensive range of many frequent changes in the competition map with large quantities of information. it was considered more as a strategic tool rather as a tactical tool by providing important insights (general discussion on the value of ci see in prescott and gibbons, 1993). 97opinion section 4. the key intelligence topics (kit's) of ci units in this industry were mainly the requirements, intentions and plans of countries and defense establishments to improve their military capabilities by purchase defense products and competitors' activity aiming to beat the others. special attention was given to technological innovations. the price issue was a significant factor in decisions regarding winning tenders. 5. strong macroeconomic analysis capabilities were implemented to understand long-term trends and to be able to assist in solutions to strategic planning needs. 6. the development of early warning capabilities that help early identification of business opportunities and threats from existing and new players. these allowed better monitoring and enhance for understanding (for further discussion see gilad 2004). 7. assistance by external research companies to get updates through initial definition of key intelligence needs and also initiating specific research needs like assessing firms that were potential targets for acquisition or for partnership or considering entering into new business sectors close to their core business, as homeland security. 8. durable relying on the gathering capabilities and sharing of information by the sales force teams (contrary to what we know in other industries, lambert, 1990) that were also benefited from the ci analysis capabilities. sale force has become an important gathering tool and efforts are conducted to improve their ci capabilities (the conceptual issue is discussed in moncrief and marshal, 2005). 9. ci functions usually were holding highly the interrelations between them and the various business units and expected to provide added value to the decision making process. it is likely to infer as shown in table 2, that the progress of ci practices conformed to the changes in the activity of this sector supplied added value intelligence: 98opinion section table 2: changes in israeli ci activities after 1993 before 1993 ci activities no. ci dedicated capabilities became formal process of slow developing formal ci and infrequently use ci task forces ci model 1 in hq (corporate level) and also in business units mainly in hq slightly spread in business units ci unit location 2 global domestic ci area focus 3 broad: to cover world competition covers tactical and strategic issues narrow: to cover mainly local competition, usually tactical information ci topics 4 moderately becoming intensive little support by it dedicated tools 5 moderate limited extent of analysis 6 broad, mainly for gathering through open source intelligence (osint) limited extent of use of out sourcing 7 critical as the buying processes and the marketplace became more complex. not considerable ci support to the selling process 8 practical implementation of competitive intelligence usually the professional level of ci units among defense export companies was considered to be high ranked at the top, comparing to similar units in other sectors by the total resources invested in them including the use of advanced information technological systems (see discussion of the use of these tools in israel in barnea, 2009). this was the outcome as of the need to cover a wide range of information sources, regular updates of the decisionmakers and being involved in countless activities, including assessments of the state of competition. these units often 99opinion section make use of forecasting tools of the business environment being characterized by monitoring long-term planning processes (for further discussion on the challenges of business forecasting see laseter, lichtendahl and grushkacockayne, 2010 and courtney, 2001). an important part in responsibilities of ci units was early identification of business opportunities. the purpose was to find opportunities while still in the initial stage at the prospect, preferably in the stage of shaping the requirements, to be able to prepare a response ahead of the competitors. although ci in defense industries enjoyed high awareness to the importance of ci by many executives in the firm, still the implementation of the discipline of "sharing of information" had to be enhanced. the obstacles were not just the nature of people but also the security aspects which were not to be ignored. still the need to share more competitive information existed. defense industries are not alone. lovello and sibony (2010) were referring to the problematic culture of many organizations that withhold to share information and practically were strengthening the "silo thinking" while ci was often aiming towards avoiding these behaviors. accepted estimate was that anyone who could translate the competitive information received from open source intelligence (osint) combined with primary sources and translated it all into formulating an answer would have an advantage and increase the chance to win defense tenders. we could assume that a british company in the defense industry will monitor the difficulties of british soldiers fighting in afghanistan, for example, in the early detection of enemy snipers and will initiate the british defense ministry to propose a solution, even if the bureaucratic procedure of issuing a tender yet not started or completed. this information may come from a variety of sources, including social networks, publications of the department of defense, blogs of soldiers participating in the war, interviews with soldiers who have returned from the battlefield in local newspapers, publications of the islamic organizations active in afghanistan and more. key intelligence topics in the defense industries 1. military threats monitoring and assessing of military threats encountered by clients or potential clients such as defense organizations and defense forces are critical to early identification of business opportunities. for example, the threats that were faced by indian troops on the border with pakistan were different than the threats faced by the spanish intelligence and 100opinion section security organizations fighting against the basque resistance eta. being aware of military threats often led later to characterizing the operational needs and the requirements specific tools, which will reduce the threat or cancel it altogether. comprehension of the progress of the operational needs by the customers or future customers were critical factors expected to be addressed by ci units. 2. technological intelligence technological intelligence continuously monitors technological solutions offered by competitors in response to customers' needs as early as possible. the aim was to understand the existing and future products that would compete in the marketplace in the future. it was required to implement the discipline of competitive technology intelligence (cti). one aspect of this issue was the need of the ci units to build strong internal collaborations with technological professionals to estimate precisely the current and future markets. one of the challenges was determining the right priorities of the technological issues that have to be monitored at any given time. 3. marketing intelligence while technological intelligence was targeting competitors' capabilities, the focus in marketing intelligence was on the customers. marketing focuses on gathering intelligence on customer needs and rising opportunities and support decisions throughout all stages of the competition. an important tool was the company's employees who were in continuous touch with their customers. they should be briefed also to collect information on current and future marketing needs. for example – prior knowledge of budgetary limitations of potential customer, which was familiar to just a few, ended in submission of a competitive proposal that brought this into account. 4. strategic intelligence strategic intelligence was the intelligence required to assess long-term processes and intentions by various players and the marketplace. that was, which direction facing the operational requirements of the countries and armies, the extent of investments in r & d by competitors over the coming years, estimates of new directions by the competitors beyond their core business areas, their intentions to enter into new areas, whether by self-development or through acquisitions, mergers and strategic partners. for example, it was reasonable to estimate that the world's leading companies in defense were following with great interest after the business moves of their israeli competitor elbit systems, which in recent years entered into new areas of activity mostly through mergers 101opinion section and acquisitions and not by organic development and would try to assess elbit's strategy in the coming years (http://www.accessmylibrary.com/coms2/s ummary_0286-28619791_itm). sometimes these strategic reports (for example see bae systems http://www.baesystems.com/productsservi ces/bae_prod_eis_global_analysis.html) are distributed to clients (policymakers and intelligence officers) to help them to understand the threats, risks and opportunities in the international environment. 5. tactical intelligence tactical intelligence was considered to be less critical in this sector, but it was still done on daytoday basis: monitoring changes in the markets, customer insights, changes among competitors and new products (see discussion on tactical and strategical ci in sawka 2010). this intelligence often had an added value for the strategic intelligence. in conclusion of this chapter some people may think mistakenly that ci in defense industries was about price discovery offered by competing tenders. it was usually impossible to obtain this information in advance and companies competing in this area were required to expand their intelligence scoop as outlined above in order to maximize their chances to win. ci in this industry was actually in its strongest position of managing the intelligence, according with the outline that was described in the white paper by arthur d. little consultancy (2010). working programs ci functions usually fit into the annual programs of the israeli defense companies. the main task of the intelligence was to respond to the intelligence requirements according with these plans. for example, a company decided to focus on the defense market of the far east which until recently was ranked low in its priorities list. its ci unit was expected to provide information about competitors' activities in the above mentioned region, the customer's needs by defense establishments and states, to point towards new competitions (tenders) and to identify early strategic partnerships between companies that may give a joined response to the customer's needs and so on. it was assumed that it was impossible to develop a strategy of winning competitions without setting up an orderly key intelligence topics (kit's) list executed by the intelligence unit. it was also likely that the ci functions may build quickly intelligence capabilities that would meet the needs of the firms and thus http://www.accessmylibrary.com/coms2/summary_0286-28619791_itm http://www.accessmylibrary.com/coms2/summary_0286-28619791_itm http://www.baesystems.com/productsservices/bae_prod_eis_global_analysis.html http://www.baesystems.com/productsservices/bae_prod_eis_global_analysis.html 102opinion section increase their chances of winning. action plans were expected to summarize priorities in collaboration with their business units. ci units expected to work closely with the company's executives to bring on to their attention the new opportunities as a result of the intelligence monitoring. the uniqueness of ci activities in the sector of defense was the ability to act simultaneously in several areas of intelligence as mentioned above, in markets which were characterized by tough competition and often insignificant differences in products offered by competitors. therefore, it was necessary for finest understanding of customer needs, markets and capabilities of competitors to know how to produce competitive advantage that would help in pointing at the competitive price which was often a determining factor in the final decision who wins the competition. sources of information and managing the gathering efforts primary sources the defense export market was often characterized by ad hoc collaborations between companies and simultaneously fierce competition known as co opetion. therefore, it is possible that at the same time a single unit at a certain company cooperated with another company while another business unit within that firm competed against it in another sector. this modus operandi allowed skilled benefits of the primary sources among the company employees, especially among the skilled sales force and technological staff that having been working at relationships with various elements in the market. primary sources were also intensive users of ci materials and their professional expertise was playing a role in obtain important information on customers, products, competitors and opportunities, and shared it with ci professionals and other users. thus capable internal networks within the firm, supported by dedicated software often enable ci managers effectively to manage it. secondary sources what characterizes the activity of secondary sources in this industry was the challenge of utilizing enormous amounts of information gathered on military equipment needs, marketing intelligence, new technologies etc. the defense market was characterized by a lot of open source information on one hand and on the other hand, keeping secrets tight. this required high quality information management and precise direction of collection efforts, selection and analysis and distribution to the appropriate units. usually it was hard 103opinion section to expect to handle information without the assistance of dedicated information systems (see barnea 2009). managing the intelligencer efforts this competitive market required constant development of new information sources while keeping the existing sources. this was a result of the need to cover new technological solutions, new geographical regions and countries that were not in focus in the past, new products, etc. at the same time, there were sources that become obsolete as a result of changing priorities and focus in other lines of businesses. therefore, it was necessary to conduct an advanced system for managing key intelligence topics (kit's) and the targets of gathering ( firms, armies, military establishment, etc.), including answers to the needs: who was the firm initiating the request (asking for the information), who in the organization could provide the answers, monitoring and access to the answers received at any given time and information collected in response to avoid duplication and ensure optimal use of resources by the firm. by implementing the above, the ci functions were moving from occasional management of its kit's to a systematic direction. production of quality analysis complexities of strategic and technological issues in the exports' defense industries enhanced the need for qualitative analysis, including frequent use of forecasts and assessments methodologies, formulated the overall quality intelligence into the decision making process. for example, analysis of information about competitor's activity indicated that it moved into fast development of an advanced generation of technological solution, although the previous generation was relatively new. further thorough examination revealed that the existing solution did not meet the needs of the state acquired it so that competitor needed to present a suitable solution soon. this analysis also elevated business opportunity resulted in an attractive offer to the disappointed customer, a solution that proved itself but was not purchased in the past by that state in respect of the high price. this industry was often characterized by intense macro analysis of foreign economies, internal politics, international relations, social changes, and a good understanding of legal and regulation issues. this was in addition to common analysis of competitors, customer, supplies and monitoring of new technologies and advanced applications. 104opinion section using internal information systems ci units in the field of defense understood that one of the keys for their added value was on one side to give access to many people in the organization to competitive information and on the other hand to make many in the organization relate to information obtained, to evaluate the significance and bring it to the attention of others in the organization. advanced information systems were a critical support tool for the success of competitive intelligence processes but the primary challenge was to develop the awareness among the employees. these systems usually divided into two types: 1. systems developed by the companies themselves often via their information technology units 2. purchased solutions in which adjustments were implemented so that they can give the answers expected of them. the direction was to acquire and later adjust systems from the external software houses because solutions were often cheaper and enable internal information systems units to focus on their core areas. one of the challenges is to require of systems that interface with other systems within the organization, such as crm (customer relations management) and erp (enterprise resource planning), where important information was analyzed in conjunction with competitive information. for example, an army of a certain country issued an immediate rfp (request for proposals). it was required to know all "our" existing and potential capabilities to know if and how a reply could be provided. further assessments revealed that the date of the development of essential parts of the required system was two years therefore it was impossible to give an answer to that rfp. its submission date was in six months and placing the system was within a year. key success factors (ksf's) for ci function defining ksf’s (key success factors) for a ci unit is important in any industry (singh, fuld and beurschgens, 2008). it seems that the defense industry has implemented these ksf’s more than other sectors: 1. organizational culture – it is basically the development and the implementation of broad ci awareness by policy of sharing of information, streaming from both sides – from the ci to the internal clients and from them to the ci function. 105opinion section 2. procedures mainly internal procedures guaranteeing the two sided flow of information from external and internal sources and making intelligence available to those who need it to accomplish their assignments. 3. support by it technology – meaning the use of expert tools for complex demands of information attention, for the full intelligence cycle and by an easy access to the intelligence products to those who need it. the outcome using this methodology was that decision making without the contribution of ci was incomplete. these three essentials were together critical for the success of ci function in a corporation. they all had to be interrelated as shown in figure 1. figure 1: ksf's conditions to obtain needed information the following figure (see figure 2) has been prepared based on assumptions made by ci managers in the israeli defense field. it was looking towards two parameters – onethe extent of the difficulties in acquiring valuable information. the other one was the importance of the information received to significant decisions by the firm. as we can see from this figure, it was relatively easy to receive information about customers, competitors, suppliers, partners and decision makers. it was getting more complicated to acquire information about r&d planning and strategic planning while the most difficult was to get information which could directly support to win tenders. the difficulties of maximizing the value of the information were similar to those to obtain information. although a typical ci function strived to cover these topics, it was aspiring to obtain more valuable information (on new technologies, organizational culture procedures expert tools 106opinion section strategic planning, and tenders) which was harder to accomplish. figure 2: challenges of acquiring valuable information summarizing so far shows: ci units operated in the heart of the business activity in the israeli defense sector were involved in the decision making process. although there were often significant gaps of the information required, ci was expected to give assessments that could bridge the lack of focused information. this was done by successful involvement of many employees in the organization into the intelligence process, beyond the immediate scope of the ci unit. there was a good implementation of the discipline of "sharing of information" (internally), as one of the key success factors of ci in this sector. the complex challenges for ci were imposing on the structure of t ci in this field. the results were often a combined ci activity in the corporate level which actually directed the ci efforts while the business units have focused ci activity to answer their specific and often immediate needs. hard to get easy to get insignificant information valuable information competitors suppliers partners decision makers new technologies strategic information tenders customers 107opinion section decision making process by the customer i have already pointed towards the importance of intimate knowledge of the customers (including potential customers), as a key success factor of firms operating in the defense sector. the following key intelligence topics (kit's) were guiding the intelligence efforts: 1. knowing your customer a close and an intimate knowledge was a must in order to be able to make insightful decisions regarding the solutions offered and to be able to reply precisely to the implicit and explicit needs of the customer. interpreting it to actionable intelligence was the challenge of ci in defense firms. this was probably impossible without a crossorganization strategy by the ci function. growing number of firms in this sector admitted that there was no win in a competition without valuable contribution of ci. 2. customer's budget limitations estimating the over whole budget allocated for a defense project. this was included also in assessing the priorities inside the defense establishment in that country. i.e. – the allocations to air force against the needs approved to the armored forces. 3. hidden operational needs what were additional needs that went beyond those that have already formally defined, like what additional components embedded in the proposal could give a competitive edge. 4. special conditions and limitations certain limitations and conditions that were expected to be part of the over whole deal like the need to involve local manufacturing, collaboration with local contractors etc. 5. knowing the decision makers – who were taking part in the decision making process especially in the final stage of the decision about the winner in the competition. key personalities including influencers, approvers, users and buyers (see barnea 2006). obviously there was ongoing search for information that could be used to increase our chances to win. 6. past experience with the customer it was highly important to know the past of our relations with the customers and possibly their relations with our competitors. has this customer fulfilled his 108opinion section obligations? how the customer treated his partners. his suppliers. was that customer paying in time according with the agreements? history of artificial obstacles created for unjustifiable reasons? sometimes to obtain this information, there was a need to look at the experience of various sections in "our" company as customers may have lots of contacts that are unknown internally to others. 7. relations between israel and foreign countries – these relations had an immediate impact on the decision of the regulators whether to approve export of defense products to certain countries in extreme cases when it was assessed that it could harm the security of israel. i.e. – israel was exporting to turkey for many years as part of the close relations between the two states. when these relations have been hurt, it affected also on the volume of export defense goods. observations by senior executives of the role of competitive intelligence my continuous ci consulting with israeli corporations indicates that senior executives in this sector considered ci functions as follows: 1. ci functions had excellent understanding of firms intelligence needs (or the specific business units' needs) and were centering their efforts to provide competitive advantage information. 2. ci functions were integrated into the up to date priorities and had been given resources that enabled them to fulfill their missions. 3. there was an ongoing effort to assure that ci capabilities were matched to the scope of their kit's and were executed in accordance with the working plans. 4. the value of the ci was assessed continuously by the senior executives to maximize its contribution. 5. the resources allocated to ci had to be measured to make sure that shortage of resources will not hurt its activity. conclusions the recent global economic downturn since 2008 had only minor effect on this sector. the number of military conflicts is in increase 109opinion section (http://www.globalsecurity.org/militar y/world/war/index.html) and a moderate rise in global defense expenditures is expected to continue in the coming years jointly with the increase of the competition on each governmental customer. israeli firms in the defense sector enjoy a high reputation by their competitors and customers for their ci professionalism. not very much has been written about the role of ci functions inside defense companies and their effectiveness in the fierce competition in this sector (see an example in the journal of competitive intelligence management, vol.2, no. 4 2004), either worldwide or specifically in israel. the main objective of this paper is to focus on the role of ci in the israeli defense industries and its importance. it appears that ci was capable of holding an advanced position among the israeli defense firms while its capabilities were considered to be a critical success factor like in other sectors, i.e. pharma (badr, madden and wright 2006) and medical devises. this was mainly a result of the recognition by the valuable input of ci into the decision making process and its contribution to the success of companies in their various business lines. ci functions held a critical position in the strategic decisions making process. many business defense issues could not be met effectively and accomplished without ci implementation. in this sector's activity in israel, ci considered an integral part of the organizational structure and its business culture. still there was a tendency to keep the ci capabilities' secret, but this was in a swift change as it became evident that strong ci capabilities were common in this sector worldwide as in many other competitive areas. references attaway, m.c. (1998). "a review of issues related to gathering and assessing competitive intelligence", american business review, vol. 16 no. 1 pp. 42-58. badr, a, madden, e. and wright, s. (2006). "the contribution of ci to the strategic decision making process: empirical study of the european pharmaceutical industry", journal of competitive intelligence and management, vol.3 no. 4. barnea, a. (2006). "ci derived buying models to increase business results", competitive intelligence magazine, vol. 9 no.6, november december. barnea, a. (2004). "introducing ci in israeli firms", competitive intelligence magazine, vol. 7 no.5. http://www.globalsecurity.org/military/world/war/index.html http://www.globalsecurity.org/military/world/war/index.html 110opinion section barnea, a. (2009)."intelligence solutions through the use of expert tools", competitive intelligence magazine, vol. 1 no. 4 july/august 2009. courtney, h. (2001). 20/20 foresight: crafting strategy in an uncertain world, harvard business press. day, g and schoemaker, p. (2006). peripheral vision: detecting the weak signals that will make or break your company. harvard business school press. day, g. (1997). "strategies for surviving a shakeout", harvard business review, march-april. dvir, d. and tishler, a. (1998). “the change role of defense industry in israel’s industrial and technological development”, in se2.isn.ch/serviceengine/files/resspe cnet/16869/.../op25_ch10.pdf gilad, b., (2004). early warning: using competitive intelligence to anticipate market shifts, control risks and create powerful strategies, amacom, ny new york. kahaner, l. (1996). competitive intelligence: how to gather, analyze and use information to move your business to the top. simon &schuster ny. pp. 232 -233. lambert, d, harmorstein, h. and sharma, a. (1990). "industrial salespeople as a source of market information", industrial marketing management, vol. 19 no. 2, pp.141-149. laseter, t, lichtendahl, c and grushka cockayne, y. (2010). "cleaning the crystal ball", strategy +business (booz & company), http://www.strategybusiness.com/article/10202?pg=all&tid=27 782251 lovello, d. and sibony, o. (2010). "the case of behavioral strategy", mckinsey quarterly, march. mcgonagle, j. and vella c., (1997). a new archetype for competitive intelligence. greenwood publishing group. pp. 70-71. moncrief, w. and marshall, g., (2005). "the evolution of seven steps of selling", industrial marketing management, vol. 34 no. 1 pp. 13-22. montgomery, d.b. and c.b. weinberg. (1979). “toward strategic intelligence systems ”, journal of marketing 43(4): 4152. porter, m. (1980). competitive strategy: techniques for analyzing industries and competitors, free press, new york, ny. prescott, j. and gibbons, p. (1993). "global competitive intelligence: an overview", in prescott, j. and gibbons, p. (eds.), global perspectives of competitive intelligence, society of competitive intelligence professionals, alexandria, va. prescott, j. (1999 ). "the evolution of competitive intelligence, designing a process for action", www.apmp.org prior, v. (2009). "economic gardening: a role for government agencies in competitive intelligence", http://www.strategy-business.com/article/10202?pg=all&tid=27782251 http://www.strategy-business.com/article/10202?pg=all&tid=27782251 http://www.strategy-business.com/article/10202?pg=all&tid=27782251 http://www.apmp.org/ 111opinion section http://www.onlineopinion.com.au/view.asp ?article=9465 sawka, k. (2010). "be careful what you wish for", outward insights, september, www.outwarrdinsights.com singh, a. fuld, l. and beurschgens, a. (2008)."a roadmap for ensuring success", in swaka, k. and hohhof, b. (2008). starting a competitive intelligence function, competitive intelligence foundation, alexandra, va. white paper (2010). "the art of systematic surveillance", arthur d. little management consultancy, www.adl.com/im internet links consulted http://www.sipri.org/yearbook/2009/07/07 b http://www.sipri.org/yearbook/2009/07/07 b http://jdw.janes.com/public/jdw/index.sht ml http://www.israelwtc.co.il http://www.businessmonitor.com/defence/ israel.html http://www.pr-inside.com/research-andmarkets-israel-defence-and-r2131715.htm http://www.accessmylibrary.com/coms2/s ummary_0286-28619791_itm http://www.globalsecurity.org/military/wo rld/war/index.html http://www.onlineopinion.com.au/view.asp?article=9465 http://www.onlineopinion.com.au/view.asp?article=9465 http://www.outwarrdinsights.com/ http://www.adl.com/im http://www.sipri.org/yearbook/2009/07/07b http://www.sipri.org/yearbook/2009/07/07b http://www.sipri.org/yearbook/2009/07/07b http://www.sipri.org/yearbook/2009/07/07b http://jdw.janes.com/public/jdw/index.shtml http://jdw.janes.com/public/jdw/index.shtml http://www.israelwtc.co.il/ http://www.businessmonitor.com/defence/israel.html http://www.businessmonitor.com/defence/israel.html http://www.pr-inside.com/research-and-markets-israel-defence-and-r2131715.htm http://www.pr-inside.com/research-and-markets-israel-defence-and-r2131715.htm http://www.accessmylibrary.com/coms2/summary_0286-28619791_itm http://www.accessmylibrary.com/coms2/summary_0286-28619791_itm http://www.globalsecurity.org/military/world/war/index.html http://www.globalsecurity.org/military/world/war/index.html 5 a longitudinal look at strategy, intellectual capital and profit pools g. scott erickson 1 and helen n. rothberg 2 1 ithaca college, ithaca, usa 2 marist college, poughkeepsie, usa gerickson@ithaca.edu hnrothberg@aol.com received september 15, accepted october 16 2015 abstract: explores the link between the disparate fields of knowledge management, intellectual capital, competitive intelligence, and strategy. using an existing profit pool study of the digital economy, looks at the key industry sectors involved and their revenue levels and profit margins. these data include results from both 2002 and 2010. the profit pool observations are then compared with additional data on intangible assets (knowledge and related assets) and competitive intelligence activity in each sector. explores but generally dismisses the idea that sector revenue and/or profitability might be linked to high levels of intangibles. similarly, demonstrates that the link between sector revenue and/or profitability and competitive intelligence activity may be generally weak (though pronounced in some specific high-growth circumstances). alternatively, does provide some guidance for more indepth study, identifying the knowledge strategies necessary for success across sectors as well as what competitive intelligence attitude may be needed to move from one sector into another. keywords: knowledge management, intellectual capital, competitive intelligence, profit pools, strategy available for free online at https://ojs.hh.se/ journal of intelligence studies in business vol 5, no 2 (2015) 5-13 mailto:gerickson@ithaca.edu mailto:hnrothberg@aol.com https://ojs.hh.se/ 6 1. knowledge management and intellectual capital with the advent of the “knowledge economy,” practitioners and scholars have taken a new interest in the potential for strategically managing intangible assets. study of the phenomena encompass a number of different fields, overlapping in both content and concepts. this paper builds on several different literatures in order to examine how a better understanding of intangibles can be combined with other strategic planning tools to achieve competitive advantage. intangible assets were typically connected to innovation studies early on, including schumpeter’s (1934) work on creative destruction, wherein the new ideas came from knowledge combination and subsequent learning. evolutionary theory (nelson & winter 1982) brought innovation more squarely into the mainstream of economics, suggesting that skills, learning, and similar intangibles were the drivers of competitive advantage and economic growth. similarly, the resource-based view of the firm (wernerfelt 1984) sought sources of competitive advantage in unique resources employed by firms, including organizational knowledge or related intangibles. this perspective was further delineated by the knowledge-based view of the firm (teece 1998; grant 1996) and some came to consider intangible assets, as incorporated in personal knowledge or related concepts, as the only really differentiated, sustainable, defensible asset held by these organizations. while early attention in this area focused on innovation and intellectual property, it soon became apparent to both scholars and practitioners that intangible assets might include more than such formalized mechanisms. as just noted, part of the field became focused on the more general concept of knowledge, the know-how, learning, and skills that enhance job performance but don’t necessarily lead to formal patents, copyrights or such. definitions congealed around ackoff’s (1989) dikw hierarchy suggesting that intangibles progressed from raw data to information, then to knowledge and wisdom. “intelligence” has often taken the place of wisdom in more contemporary applications. in knowledge management (km), scholars have often focused on the lower three levels, specifically differentiating between data as observation, information as data in context, and knowledge as data subjected to experience and reflection (zack 1999b). classically, the field has explicitly and emphatically designated knowledge as being the only intangible of real value, data and information are only precursors. the related discipline of intellectual capital (ic) has also gone in this direction, focusing on defining and measuring knowledge assets (bontis 1999; edvinsson & malone 1997; stewart 1997) though some of its methods, as we shall see, are likely to include a wider range of intangibles in the metrics. regardless of measure, however, the field generally looks at human capital (individual knowledge), structural capital (organizational knowledge such as culture, routines), and relational capital (knowledge concerning and relationships with external publics, including customers). km studies deal more with what to do with these knowledge assets, how to apply and grow them. as such, distinctions in the nature of the knowledge and the nature of the organization are important in that they can affect successful development of the intangibles. at the heart of the field is the distinction between tacit and explicit knowledge (nonaka & takeuchi 1996; polanyi 1967) the former being personal and hard to express and the latter more expressable, codifiable, and sharable. nonaka & takeuchi went on to frame an approach to different types of exchanges (e.g. tacit to tacit) establishing the inclination in the field to recognize that singular aspects of knowledge called for distinct km approaches (choi & lee 2003; schulz & jobe 2001; boisot 1995). consequently, both tacit (communities of practice, storytelling) and explicit tools (it systems) exist for managing knowledge, adaptable to circumstance (brown & duguid 1991; matson, patiath & shavers 2003; thomas, kellogg & erickson 2001). other knowledge characteristics identified in the literature include complexity and stickiness/specificity ((mcevily & chakravarthy 2002; zander & kogut 1995; kogut & zander 1992). organizational characteristics can also make knowledge easier or harder to manage. these can include absorptive capacity (cohen & levinthal 1990), social capital (nahapiet & ghoshal 1998), and social networks (liebowitz 2005). there are strong incentives to better manage knowledge, as it can lead to competitive advantage (zack 1999a; grant 1996). but as circumstances vary, there is also a distinct theme in the literature that the appropriate strategy needs to be discerned and employed. there is no one-size-fits-all solution to knowledge development and application. 2. beyond knowledge a more strategic approach can lead in several other directions. not only should knowledge management initiatives be appropriate to the circumstances, but as we widen our perspective to other intangibles, their presence and relative importance can be evaluated as 7 well. in some ways, this is a different approach for the knowledge asset community, both km and ic scholars and practitioners. in other ways, there are indications of the fields already moving in these directions. various business disciplines have brought either intelligence, from one end of the dikw hierarchy, or big data, from the other end, into the conversation. intelligence can take a number of forms according to the vernacular, from business intelligence to marketing intelligence to competitive intelligence. andreou, green & stankosky (2007), in an attempt to organize the various disciplines, created the list of operational knowledge assets including the various intellectual capital designations and intelligence directions. in general, the disciplines moving from knowledge to intelligence suggest some additional level of insight or understanding. knowledge, information and/or data subjected to analysis and applied to decision-making can be considered intelligence. this perspective is perhaps best seen in the field of competitive intelligence (ci), the “intelligence” discipline with the longest practitioner history and most developed scholarship. ci concerns the practice of discerning, anticipating, and reacting to competitor strategies and tactics. this understanding comes from acquiring relevant data, information, and knowledge and applying specific analytical techniques resulting in actionable intelligence (prescott & miller 2001; gilad & herring 1996; fuld 1994). similar to km and ic, competitive intelligence relies on intangible assets as inputs, though it scans a wider range than simply knowledge. it also improves as operators gain experience (wright, picton & callow 2002; raouch & santi 2001). but ci can also differ from the knowledge approaches. high-level practice includes specialized analytical tools and applications (fleisher & bensoussan 2002; mcgonagle & vella 2002), drawing actionable insights rarely seen in km. intangible assets gathered for analysis are also more likely to be obtained from directed search rather than study of existing knowledge, filling designated information gaps. in this way, they are collected for a purpose, aimed at specific actions (gilad 2003; bernhardt 1993). km can be actionable but is more often concerned with developing the knowledge base and then leveraging it through sharing. the example of ci also points to the potential importance of intangible assets at the other end of the hierarchy. intelligence disciplines tend to be not so dismissive of data and information inputs, noting that insights can come from anywhere. indeed, at its base, most knowledge practitioners and scholars would probably agree that review of data and information can lead to new knowledge, that the former are precursors to higher level knowledge assets (and the even more advanced level of intelligence). the recent trend toward employing big data for business analytics and business intelligence both reinforces this view while also establishing the idea that data and information might have value in and of themselves, especially when we are talking about market valuations or capitalizations. big data, business analytics, and related terms all refer to the trend of organizations accumulating huge amounts of data, storing and processing them on increasingly inexpensive systems (often in the cloud), and mining them for insights (beyer & laney 2012; laney 2001). as an extension of how we’ve thought of intangibles from a knowledge perspective, there are clear connections. scholars have explicitly made the connection (bose 2009; jourdan, rainer & marshall 2008). indeed, a case can be made that the field fits comfortably within the accepted wisdom of the km/ic framework, with a structure running from data to explicit knowledge to tacit knowledge to the unknowable (simard 2014; kurtz & snowden 2003) with the latter perhaps including the unique insights coming from intelligence or wisdom. in a number of ways, ackoff’s dikw remains relevant even in this new context. as alluded to earlier, this is the area where all the fields can come together. the established scholarship and practice found in km and ic could be enhanced through more attention paid to preknowledge inputs such as data and information. alternatively, there are concepts about the workability of intangible asset management systems (trust, motivation for use, etc.), particularly how humans interact with it structures that are highly relevant to managing big data operations (matson, patiath & shavers 2003; thomas, kellogg & erickson 2001). but we aim to take cross-discipline integration even further. the intersection of the knowledge and intelligence fields also begs the question of asset vulnerability, as valuable intangibles spread ever more widely throughout an organization and its extended network can be particularly subject to competitive intelligence efforts. km, ic, intelligence, and now big data all call for ever increased sharing of valuable proprietary intangible assets throughout companies and even extended partner networks. this wider dispersion can raise vulnerability as competitors seeking these assets have more choice in targets (liebeskind 1996). at its heart, this is a cost/benefit evaluation, the additional benefits from greater employment of 8 intangibles vs. the potential costs of losing the intangibles to competitive intelligence or economic espionage. the appropriate levels of intangibles development, protection, and counterintelligence are a matter of strategy, with individual firms evaluating their particular circumstances in their particular industry (erickson & rothberg 2012; liebowitz 2006; rothberg & erickson 2005). but the strategy connection can be pursued more fully. as decision-makers evaluate strategic opportunities, we believe that a deeper understanding of intangibles and the intangible asset standing of a firm can be an aid. in particular, in the strategy literature concerning innovation or growth opportunities across industry sectors, part of the question is the firm’s “fit” with circumstances. if intangible assets really are the critical component of competitiveness, then understanding them, and their need in different industry sectors, may be key to correctly identifying strategic opportunities. when combined with tools such as porter’s (1979) five forces to assess sector attractiveness, a better understanding of intangibles could provide the explanation for why a sector is appropriate for entry by a specific firm (or not). similarly, christensen’s (1997) innovator’s dilemma posed the question of whether standard metrics such as market share were appropriate for judging success, let alone competitive capabilities. where standard metrics may not be enough to help with decisions concerning strategic direction, a better understanding of intangibles, particularly knowledge and these related assets, may be the missing piece in the equation. 3. conceptual framework and methodology this paper combines data on knowledge assets, competitive intelligence, and industry sector attractiveness. we assess the data over time, trying to get some sense of the relationship between intangibles and related capabilities against industry sector success (and potential success in other sectors). in order to do so, we employ profit pool analysis, added to our own databases concerning knowledge asset levels and competitive intelligence activity. profit pools describe revenue and profits within an industry, specifically in each sector along the industry value chain (gadiesh & gilbert 1998a). a profit pool map is sometimes constructed as a visual aid, contrasting horizontal revenue with vertical profit margin, yielding instant comparisons of the size and profitability of designated industry sectors (gadiesh & gilberg 1998b). more depth often comes from analysis of sector details such as segmentation and customer buying behaviour, product offerings, distribution channels and geographic options, particularly as similarities are seen across sectors that can be pursued as growth opportunities. continued tracking of changes in the profit pool over time can add even more dynamism to the analysis. here, we use profit pools of the digital economy constructed by booz consultants (standridge & pencavel 2011), showing conditions in both 2002 and 2010. the size and profitability of the industry sectors changes over time, as shown in the following table. this changes the attractiveness of the different sectors, creating new opportunities for cross-sector innovation and/or entry. standridge & pencavel note apple’s success, for example, in moving into downstream sectors with potentially higher margins than devices proper and offering higher margin services to go along with the devices it does offer. similarly, competitors from google to microsoft to amazon.com are all looking for new opportunities in sectors, potentially more profitable, where they haven’t traditionally competed. but sector attractiveness doesn’t shed light on organizational capabilities for exploiting such new opportunities. how can a firm assess its own potential for innovation within or across sectors? how can it assess competitors’ competencies? we believe the study of intangibles, especially intellectual capital, might lend some insight. if the firm knows what it knows, and it knows what competitors know, it may be better placed to predict, act, and counteract moves across industry sectors. in this study, we combine our own databases of intellectual capital level and competitive intelligence activity (erickson & rothberg 2012) with the standridge and pencavel profit pool. in measuring ic, a variety of metrics are available (tan, plowman & hancock 2007; firer & williams 2003) though only a few really make sense if evaluating a large number of firms (sveiby 2010). consequently, we employ a variation on tobin’s q (tobin & brainerd 1977). tobin’s q estimates intangibles by comparing the firm’s value with its level of tangible assets, specifically market capitalization to replacement cost of assets. as the latter figure is often hard to obtain, market cap to book value is a commonly used variation. we often take it a step further and use market cap to asset value as well (which removes liabilities, for our purposes the ownership of the assets isn’t usually material), though we have yet to see a consistent material difference between the two metrics in various comparisons. tobin’s q has the added advantage of implicitly containing all intangibles, from data and information to knowledge and intelligence. 9 our data come from i/b/e/s and include all firms listed on north american exchanges, 2005-2009, with annual revenues over $1 billion. the end result is over 2,000 firms and over 7,000 entries organized by industry (sic number). an earlier database, also included in this paper, covers over 500 firms from 1993-1996. we drew the market capitalization and asset levels from these databases. competitive intelligence data is drawn from two different sources. the 2005-2009 period contains data from a benchmarking study conducted by fuld & company, a major ci consultancy. over 1,000 ci practitioners from around the world answered self-reports on the maturity and proficiency of their operation. then added up by industry and indexed, they provide us with evidence of the level of ci activity in a given industry. similarly, data from the 1993-1996 group includes membership and activity reported from the then society of competitive intelligence professionals (scip) records. arranged again by industry, the relative level of activity in each sector can be assessed. note that the two ci metrics are not directly comparable. 4. results and discussion table 1 presents the more current data. the first two columns come from the profit pool constructed by standridge and pencavel. the latter three come from our database, constructed as detailed above. so the market cap columns show data retrieved from financial reports and the latter from the fuld & company database. the index employed for competitive intelligence combines self-reported proficiency with number of industry participants. the very high number for the software sector, for example, is indicative of multiple firms with ci operatives who report a high level of proficiency. for the intellectual capital/intangible asset columns, the global means for the entire database (thousands of observations) are reported for perspective. table 1: digital industries profit pool, intellectual capital, competitive intelligence 2010 industry revenue ($billions) ebit market cap/book (2005/2009) market cap/assets (2005/2009) ci index (2005/2009) content providers broadcast print 400 15% 1.56 2.53 0.73 0.74 0 2 service providers telecom wireless 2400 20% 1.99 3.90 0.54 1.02 12 16 equipment providers networking storage 300 11% 2.72 3.13 1.74 1.64 0 7 software 150 33% 3.89 2.14 113 net software and services 150 17% 3.48 2.08 19 devices computer communication 900 8% 4.48 2.73 1.58 1.56 22 17 total 4300 2.68 (global mean) 1.02 (global mean) table 2 includes similar information, but from the older databases. the first two columns of data again come from standridge and pencavel, this time their 2002 numbers. we pair that with our older database, from 1993 to 1996. this is obviously not an ideal match but does provide some basis for comparison between the older and newer data in the two tables. while our older data doesn’t exactly match the s&p time period and is more limited than our more recent database (in terms of number of firms), it does again provide multiple years of observations, smoothing the data somewhat and muting the effect of one-time events that may skew the results of individual firms. what we end up with is a comparison of data from 2010 and preceding years to be compared with 2002 and preceding years, even if the gap is somewhat different. it still provides a basis for analysis of what 10 happens in a profit pool and its related intangible asset levels. table 2: digital profit pool, intellectual capital and competitive intelligence, 2002 industry revenue ($billions) ebit market cap/assets (1993/1996) ci index (1993/1996) content providers broadcast print 500 12.5% 0.94 1.83 0.91 0.63 service providers telecom wireless 2200 17.5% 1.79 3.11 3.23 0.92 equipment providers networking storage 200 3% 2.68 0.82 software 100 25% 4.29 0.82 net software and services 100 -2% ---- devices computer communication 700 3% 1.25 2.65 1.62 1.16 total 3800 1.76 (global mean) our initial thought in conducting this type of analysis was that more attractive industry sectors (higher margins, though perhaps also higher revenue) would show indications of higher levels of intellectual capital. essentially, that more knowledge would be needed in high profit sectors. similarly, we hypothesized that higher levels of competitive intelligence activity would also be found, as competition would be fiercer where high potential existed. in a previous study on healthcare, we noticed some connection with ci but not much evidence of a relationship with intellectual capital. here, the exploratory evidence is decidedly mixed. the very highest ebit sectors show pretty high levels of intellectual capital, but the relationship is not exclusive. there are high ic ratios associated with some very low profit margins as well. in some ways, the details make some sense of the results with wireless, for example, showing high ic in the high margin service providers sector while traditional telecom does not—one would imagine that wireless is driving the profitability. another likely explanation is that fast growing areas with high profit potential might also require heavy investment and/or debt. either could drive down the ic rating, at least market cap/book. one can see some of the effects of such leverage in the relatively higher market/book vs. market/assets rating in 2010 in the wireless and print sectors. one really interesting result is the virtually uniform increase in profitability across sectors during the profit pool analysis period. at the same time, cap/asset ratio has gone down everywhere except computer devices (and the previously non-existent internet category). given the pattern, it seems much more likely that something appreciable has changed across all sectors (increased productivity, decreased labor, increased outsourcing, etc.) as opposed to any general insights about intangibles we might draw. the only real conclusion to be made is that software was and remains highly profitable while requiring substantial knowledge assets. at the same time, telecom seems a low-profit commodity with few and declining required knowledge assets, something seen to a lesser degree with content providers. equipment providers are in the unattractive situation of requiring extensive knowledge assets but with relatively low (though now growing) profitability. in terms of the competitive intelligence results, telecom and devices showed the highest level of ci activity in the early time period. these sectors remain relatively active, but have been eclipsed by software. while it was relatively docile in the midnineties, it is now way above other sectors and is, in fact, one of the absolutely busiest industries in our entire dataset. net software and services have shown similar growth. this might be tied to the high levels of profitability seen in the sectors. as competitors noticed the margins to be had in these industries, it seems quite likely that they attracted increasing ci 11 investment and attention. the possibility of correlation between high margins and ci is more pronounced than that seen between margins and intangible assets. there is certainly more to be studied in the general results, but our inclination now is that the more valuable insights may come from more indepth studies of selected sectors. as we’ve found in other areas, the application of both km and ci tend to be strategic. in some cases, it makes sense to invest in developing knowledge assets, in others not. it depends on the nature of the assets (tacit, explicit, human capital, relational capital, sticky, specific, etc.) and how effective and profitable km techniques might be. similarly, in some cases ci activity and/or protection make sense. investment in an aggressive ci operation may make sense when circumstances are right (again, the nature of the knowledge or other variables such as product life cycle stage or position on the industry value chain). in others, it may make little sense. in some circumstances, substantial counterintelligence may be right, in others, it may be a waste of money. the answers will be found in deeper understandings of the nature of knowledge and ci in the industry sectors. where is the valuable knowledge and what is its nature? how transferable might it be? the answers to those questions will also bring us back then to profit pools. by understanding the knowledge development and competitive intelligence imperatives in different industry sectors, individual firms will have a better idea about whether their capabilities and competencies would help them in a different environment. if a highly profitable sector demands extensive explicit knowledge, big data, and an advanced km system like software, for example, then a firm looking to come from a different sector without such tendencies (content?) might think twice or look to buy the required competencies as an entry method. similarly, if the ci activity is fierce and focused on a particular type of knowledge or activity (again, software), then once again a firm with no experience with such competitive conditions (broadcast, networking equipment) might again give pause before entering. finally, these metrics can provide deeper insight as the conditions change over time. when we see profitability and/or revenues change dramatically over time (as in net software and services), a fuller understanding of knowledge and ci details can provide interested firms with deeper insights as to the how, why, and what to do questions that naturally arise. acknowledgement the authors gratefully acknowledge the contributions of fuld & company and strategic and competitive intelligence professionals (scip) for providing some of the data used in this study. references andreou, a.n., green, a. & stankosky, m. (2007) “a framework of intangible valuation areas and antecedents”, journal of intellectual capital, 8(1), 52-75. bernhardt, d. (1993). perfectly legal competitive intelligence—how to get it, use it and profit from it, pitman publishing, london. beyer, m.a. & laney, d. (2012) “the importance of ‘big data’: a definition”, retrieved from https://www.gartner.com/doc/2057415. boisot, m. (1995) “is your firm a creative destroyer? competitive learning and knowledge flows in the technological strategies of firms”, research policy. 24, 489-506. bontis, n. (1999) “managing organizational knowledge by diagnosing intellectual capital: framing and advancing the state of the field”, international journal of technology management, 18(5-8), 433-462. bose, r. (2009) "advanced analytics: opportunities and challenges", industrial management & data systems, 109(2), 155 – 172. brown, j.s. & duguid, p. (1991) “organizational learning and communities-of-practice: toward a unified view of working, learning, and innovation”, organizational science, 2(1), 40-57. choi, b. & lee, h. (2003) “an empirical investigation of km styles and their effect on corporate performance”. information & management. 40, 403-417. christensen, c.m. (1997) the innovator’s dilemma: when new technologies cause great firms to fail, harvard business school press, boston. cohen, w.m. & levinthal, d.a. (1990) “absorptive capacity: a new perspective on learning and innovation”, administrative science quarterly, 35(1), 128-152. drucker, p.f. (1991) “the new productivity challenge”, harvard business review, 69(6), 6976 edvinsson, l. & malone, m. (1997) intellectual capital, harper business, new york. erickson, g.s. & rothberg, h.n. (2013) “competitors, intelligence, and big data”, in liebowitz, j., ed., big data and business analytics, crc press, boca raton, fl., 103-116. 12 erickson, g.s. & rothberg, h.n. (2012) intelligence in action: strategically managing knowledge assets, palgrave macmillan, london. firer, s. & williams, m. (2003) “intellectual capital and traditional measures of corporate performance”, journal of intellectual capital, 4(3), 348-360. fleisher, c.s. & bensoussan, b. (2002) strategic and competitive analysis: methods and techniques for analysing business competition, prentice hall: upper saddle river, nj. fuld, l.m. (1994) the new competitor intelligence: the complete resource for finding, analyzing, and using information about your competitors, john wiley, new york. gadiesh, o. & gilbert, j. (1998a) “profit pools: a fresh look at strategy”, harvard business review, (may-june), 139-147. gadiesh, o. & gilbert, j. (1998b) “how to map your industry’s profit pool”, harvard business review, (may-june), 149-162. gilad, b. (2003) early warning: using competitive intelligence to anticipate market shifts, control risk, and create powerful strategies, anacom, new york. gilad, b. & herring, j., eds. (1996) the art and science of business intelligence, jai press, greenwich, ct. grant, r.m. (1996) “toward a knowledge-based theory of the firm”, strategic management journal, 17(winter), 109-122. jourdan, z., rainer, r.k. & marshall, t.e. (2008), “business intelligence: an analysis of the literature”, information systems management, 25(2), 121-131. kogut, b. & zander, u. (1992) “knowledge of the firm, combinative capabilities, and the replication of technology”, organization science. 3(3), 383-397. kurtz, c.f. & snowden, d.j. (2003) “the new dynamics of strategy: sensemaking in a complex complicated world”, ibm systems journal. 42(3), 462-483. laney, d. (2001) “3d data management: controlling data volume, velocity and variety”, retrieved november 1, 2013 from http://blogs.gartner.com/douglaney/files/2012/01/ad949-3d-datamanagement-controlling-data-volumevelocity-and-variety.pdf. liebowitz, j. (2005). linking social network analysis with the analytical hierarchy process for knowledge mapping in organizations. journal of knowledge management, 9(1), 76-86. matson, e, patiath, p. & shavers, t. (2003) “stimulating knowledge sharing: strengthening your organizations’ internal knowledge market”, organizational dynamics, 32(3), 275285. mcevily, s. & chakravarthy, b. (2002) “the persistence of knowledge-based advantage: an empirical test for product performance and technological knowledge”, strategic management journal, 23(4), 285-305. mcgonagle, j. & vella, c. (2002) bottom line competitive intelligence, quorum books, inc., westport, ct. nahapiet, j. & ghoshal, s. (1998) “social capital, intellectual capital, and the organizational advantage”, academy of management review, 23(2), 242-266. nelson, r.r. & winter, s.g. (1982) an evolutionary theory of economic change, harvard university press, cambridge, ma. nonaka, i. & takeuchi, h. (1995) the knowledgecreating company: how japanese companies create the dynamics of innovation, oxford university press, new york. polanyi, m. (1967) the tacit dimension, doubleday, new york. porter, m.e. (1979) “how competitive forces shape strategy”, harvard business review, (marchapril), 137-145. prescott, j.e. & miller, s.h. (2001) proven strategies in competitive intelligence: lessons from the trenches, john wiley and sons, new york. raouch, d. & santi, p. (2001) “competitive intelligence adds value: five intelligence attitudes”, european management journal, 19(5), 552-559. rothberg, h.n. & erickson, g.s. (2005) from knowledge to intelligence: creating competitive advantage in the next economy, elsevier butterworth-heinemann, woburn, ma. schulz, m. & jobe, l.a. (2001) “codification and tacitness as knowledge management strategies: an empirical exploration”, journal of high technology management research, 12, 139-165. schumpeter, j.a. (1934) the theory of economic development, harvard university press, cambridge, ma. simard, a. (2014) “analytics in context: modeling in a regulatory environment”, in rodriguez, e. & richards, g. (eds.), proceedings of the international conference on analytics driven solutions 2014, 82-92. standridge, d. & pencavel. c. (2011) profit migration in the digital economy, booz & company. stewart, t.a. (1997) intellectual capital: the new wealth of nations, doubleday, new york. 13 sveiby, k-e. (2010) methods for measuring intangible assets, http://www.sveiby.com/articles/intangiblemethod s.htm, accessed 1/6/2012. tan h.p., plowman, d. & hancock, p. (2007) “intellectual capital and the financial returns of companies”, journal of intellectual capital, 9(1), 76-95. teece, d.j. (1998) “capturing value from knowledge assets: the new economy, markets for know-how, and intangible assets”, california management review, 40(3), 55-79. thomas, j.c., kellogg, w.a. & erickson, t. (2001), “the knowledge management puzzle: human and social factors in knowledge management”, ibm systems journal, 40(4), 863-884. wernerfelt, b. (1984) “the resource-based view of the firm”, strategic management journal, 5(2), 171-180. wright,s., picton, d. & callow, j. (2002) “competitive intelligence in uk firms, a typology”, marketing intelligence and planning, 20(6), 349-360. zack, m.h. (1999) “developing a knowledge strategy” california management review. 41(3), 125-145. zack, m.h. (1999b) “managing codified knowledge”, sloan management review, 40(4), 45-58. zander, u. & kogut, b. (1995) “knowledge and the speed of transfer and imitation of organizational capabilities: an empirical test”, organization science, 6(1), 76-92. jisib-vol-12_nr-1(2022) (3).pdf journal of intelligence studies in business vol. 12 no. 1 (2022) open access: freely available at: https://ojs.hh.se/ pp. 34–43 sharia compliance, islamic corporate governance, and fraud: a study of sharia banks in indonesia dedik triyanto received 29 june 2022 accepted 17 november 2022 abstract this study aims to examine the effect of islamic corporate governance and sharia compliance on indications of fraud occurring in indonesia’s islamic banks from 2016 to 2020. the independent variables are islamic corporate governance and sharia compliance with islamic commercial banks. the population in this study were all islamic banks registered in the purposive sampling method. in this study, there were 11 islamic banks with a 5 years research period so that the total sample used in this study amounted to 55. the analytical method used in this study was logistic regression which was processed using spss version 25. the results of this study indicate that the islamic corporate governance variable has a positive in islamic commercial banks while sharia compliance with the proxy of islamic income ratio does not affect the indications of the occurrence of frauds in islamic commercial banks. keywords: 1. introduction the existence of a type of bank clinging to the islamic principle shall promise the public trust towards the security upon things that against islamic sharia. on the contrary, the indonesian public trust on the sharia bank is far less compared with conventional that implements its activities based on islamic sharia principles stated in the al-quran and banks must adhere to the rules and regulations that apply to the contracts in the islamic commercial transaction jurisprudence or . with its nature of existence which inherently following the islamic principle, there should entail the people’s trust guarantee in security to avoid things that are not folin the practice of indonesian public trust, the trust in islamic banks is still very less than that of conventional banks. based on data the islamic bank market share in march 2019 occupies only 5.94% of the total banking market share in indonesia (otoritas jasa keuangan, 2019). this shows that public interest in islamic banks is still relatively very low. the performance evaluation applied to the islamic banks tends to prioritize solely on its performance obliges the same ratio as found banks should not neglect the islamic principle that needs to be applied to islamic banks ria elements themselves cannot promise the guarantee that an institution is free from fraud. recall that as of now, there are still 35 fraud cases that occur in islamic banks. one of the fraud cases at bank syariah mandiri for idr 1,100,000,000,000 where the submission of debtor funds did not used according to the proposal when the money was disbursed referring the indications that the funds although fraud-prone to occur anywhere, fraud in islamic banks is very contrary to islamic principles adhered closely to islamic banks. the corporate governance weaknesses found related to governance weaknesses in islamic banking companies, namely (marheni, 2017) the banks are required to carry out regular self-assessments on the implementation of good corporate governance based on rankings of 11 factors that are concluded as complete values, then the results of the assessment will be ranked (1 to 5) with the smaller indicates the better (nelson, 2014). ironically, real-world implementation of bank mandiri syariah which is cases) compared to ranked-2 (good) btpn syariah with no fraud committed in 2017. according to (abdi, 2017), the implementation of good corporate governance can be used in efforts to prevent fraud in the islamic banks. islamic corporate governance is an important issue related to governance weaknesses in the islamic banking and is also dominated by the sharia bank compliance with the sharia principles since sharia bank management is deemed unable to guarantee sharia compliance in the banking services provided (ansori, 2014). the low compliance with sharia principles provides an opportunity for fraud committed in the islamic banks. according to marheni (2017), the islamic disclosure index can be utilized to measure sharia compliance indicators and the indicators employed in this study is islamic income ratio is the income derived from islamic activities and investments in compliance with the principles of islamic law. the islamic income ratio is the ratio between the halal income obtained compared to the total income consisting of total islamic income and non-halal income. with the implementation of islamic principles and corporate governance in islam, the practice of fraud will be reduced. the higher level of compliant bank syariah to islamic principles in its governance is, the muamalat bank whose islamic income of 87% of its total income, there were still 35 cases of fraud in 2017. while in mega syariah bank with 75% islamic income ratio, there were only 3 cases of fraud occurred in 2017. it suggests that despite the good adherence to islamic principles, it does not necessarily indicate the lean possibility of fraud. according sharing ( and partnership sharing ( a sharia bank has implemented a strong shabased on sharia principles, the possibility of fraud will even be smaller. reduces the possibility of fraud at the islamic banks. panin syariah bank, with a profit-sharing ratio of 84% higher than that of bni syariah bank with 23%, has fraud occurrence was spotted. this study refers to research conducted by rahmayani & rahmawaty (2017), the difference in research lies in the independent variable used is sharia compliance. they further noticed that islamic corporate of fraud at islamic commercial banks. according to mohamed i, cholins g, opong, & avison (2017) found that dynamic corporate according to in’airat (2016), corporate fraud. this is in line with the study conducted by sitti (2016) where dynamic corporate governance has a positive effect on fraud. prevention. it means that the implementation of the corporate governance mechanism in islamic banks by observing and implementing all islamic principles could decrease the occurrence of fraud abdi (2017). in addition, accordgovernance prone corporate management to commit fraud. 36 according to marheni (2017), the islamic effect on fraud. the research aligns with ratio has a negative effect on fraud, but sharia compliance which is proxied by islamic income (2013) suggest that sharia compliance does not affect sharia banking compliance with sharia principles. based on the phenomenon upon the aforementioned cases and the inconsistencies in the previous research, the research related to fraud in islamic banks becomes interesting to be revisited. this study aims to determine the partial effect between islamic income ratio governance. also, it is to understand partially ratio and islamic corporate governance to the indication of fraud. the last, it is to observe sharing ratio on indications of fraud through islamic corporate governance. 2. theory 2.1 the effect of islamic income ration on islamic corporate governance the performance of sharia bank could be measured with the following indicators: islamic 2020). to obtain good performance, decent company management is required. prior studies indicated that islamic income ration has a positive correlation on islamic corporate governance (meilani, 2016). this reveals that the higher the level of islamic income ration or performance 2.2 the effect of islamic income ration on islamic corporate governance the performance of sharia bank could be measured with the following indicators: islamic 2020). to obtain good performance, decent company management is required. prior studies indicated that islamic income ration has a positive correlation on islamic corporate governance (meilani, 2016). this reveals that performance of sharia bank is in correspondence with the implementation level of islamic corporate governance on sharia bank. 1: islamic income ratio has positive effects on islamic corporate governance in sharia bank islamic corporate governance one of many reasons that sharia bank has of management ability to monitor operational activities, or in other words, it has a low implementation of islamic corporate governance (sapuan, sanusi, ismail, & wibowo, 2016). prior study found the positive correlation between ratio, the higher the management implementation based on sharia laws (alhammadi, archer, padgett, & abdel karim, 2020). 2: has positive effects on islamic corporate governance in sharia banks. 2.4 the effects of islamic income ratio on fraud the sharia principle forbids usury, and actions. therefore, sharia bank only procure the income from halal source as a study found that islamic income ratio has a negative effect on fraud (marheni, 2017) when a sharia bank adheres and conducts its business according to sharia principles by reducing non-halal income or usury, minimize fraud is expected because the management of funds is based on islamic principles and prudence. thus, if islamic income increases, the possibility of fraud will decrease because islamic income that is following sharia principles is an indication of islamic bank compliance with sharia principles. so, the hypothesis proposed in this study is: effect on fraud on sharia bank. on fraud on sharia principles. per uu no. 21 of 2008 coning in sharia banking is carried out through and contracts 37 pliance with sharia principles is low, it will potentially initiated fraud. therefore, a guarantee is needed for the application of sharia principles in all customer fund management. studies conducted by marheni (2017) fraud indications in sharia bank. thus, when nant in islamic banks, the fraud gets lesser. so, the hypothesis proposed in this study is: 4 effect on fraud in sharia banks 2.6 the effects of islamic corporate governance on fraud cial institution based on islamic principles becomes a demand for sharia banks in implementing good corporate governance and following islamic corporate governance. islamic banks have a higher management risk if compared to conventional banks. thus, a management that is per islamic principles requires wulandari, 2016). by implementing islamic corporate governance, it should be an added value to sharia banks in giving indications and impressions to the public that islamic institutions, especially sharia banks, are safer and more eager to avoid cheating practices, even though fraud can occur anywhere (mahmood & islam, 2016). this is supported fraud can occur due to a lack of proper management. sharia banks are obliged to adhere to sharia principles in carrying out their business and are expected to minimize fraud. according to abdi (2017) and ansori (2014), good corporate management negatively affects internal fraud. the islamic corporate governance model, if implemented properly, will have an impact on reducing the level of razimi, 2016). so, the hypothesis proposed in this study is: 5: islamic corporate governance nega3. data and methods 3.1 study characteristics according to sugiyono (2016), research is a sciposes. this study uses a quantitative method, a method that uses data in the form of numbers (statistics) or can be in the form of qualitative data that is converted into numbers (scoring). regression equation are islamic income corporate governance as the dependent variable. the independent variables in the second regression equation are islamic income ratio, governance with an indication of the fraud occurrence as the dependent variable. 3.3 population and sample in this study, the population is all islamic commercial banks registered with keuangan) in the 2016-2020 period. moreover, the sample is sharia bank registered with 2020 period which was selected by meeting the sample requirements using a purposive h3 h1 h5 h2 h4 islamic income ratio (x1) profit sharing ratio (x2) islamic corporate governance (y) fraud (z) 38 sampling technique. purposive sampling or judgment sampling is a sampling technique that is based on certain criteria (sugiyono, 2016). the criteria for sampling in this study are as follows: 3.4 data analysis technique and hypothesis testing according to sugiyono (2016) data analysis techniques act as quantitative data processing. in quantitative research, the characteristics of the sample in proportion, percent, or mean and standard deviation are described by the authors. estimation of the strength of variable relationships and statistical hypothesis testing is also conducted by authors. in this study, panel data regression analysis and logistic regression analysis were used. 3.5 panel data regression analysis according to basuki & prawoto (2016) panel data regression is a combination of cross-section model in this study has 2 independent sharing ratio, and a dependent variable: islamic corporate governance. the panel data regression formula is as follows: information: : a : constants : : 3.7 logistic regression analysis according to sekaran & bougie (2017), logistic regression as a mathematical model approach that can be used as a description of the relationship between several independent variables and a bound variable consists of two categories. because the dependent variable is of two categories (fraud and not fraud) leaves the logistic regression analysis as the most appropriate to be used in the second research model. essentially, the logistic regression analysis holds the same principle as discriminant analysis, but the difference lies in the type of data from the dependent variable (siyoto & ali, 2016). besides, the purpose of using logistic regression is to predict the size of the dependent variable in the form of a binary or dummy variable. the equation form of logistic regression according to ghozali (2013) is as follows: ln = fd1 – p where : ln = fd 1 – p : fraud committed in the sharia banks a : constant : islamic corporate governance : islamic income ratio 4. results the sharia compliance variables characterized ratio hold a ratio scale data that can go through sampling criteria, no. criteria quantity 1 13 2 sharia banks with consistent gcg report and annual report (2016–2020) (0) 3 sharia banks with unpublished gcg and annual report but have complete required data (2016–2020) (2) 4 sample quantity of sharia bank 11 5 study ample quantity (11 x 5) 55 descriptive statistic analysis of the data ratio. variable n minimum maximum mean std. deviation 55 .561 .997 .91880 .09385 55 .007 1.00 .45307 .28063 39 mean, standard deviation, minimum point, and maximum point. based on table 2, the results of descriptive statistical analysis show that the islamic income ratio variable has the lowest and the highest value of 0.561 and 0.997, respectively. besides, it has the mean or average and the standard deviation of 0.91880 and 0.09385, respectively. the average value which is greater than the standard deviation indicates that the islamic income ratio data is grouped and does not vary or does not spread far from the average. the results of descriptive statistical analythe lowest and the highest values of 0.007 and 1.00, respectively. whereas the average value and a standard deviation are 0.45307 and 0.28063, respectively. the greater average value compared with its standard deviation does not vary or group. islamic income ratio percentage of sharia bank within the period of 2016-2020. islamic income ratio sample percentage mean (0.91880) 55 100% 36 66% 19 34% based on table 3, 2016 to 2020 data for 55 samples of sharia commercial banks consists of 29 sharia banks (66% of sharia commercial banks) showed an above-average value. this means that 36 out of 55 samples have performed their islamic income ratios well or have complied with sharia bank principles by making more income based on sharia principles. the remaining 19 sharia commercial banks, i.e. 34% sharia banks, are below the average. this means that there are 19 out of 55 samples shave not complied with sharia principles and there are still large amounts of non-halal income the above and below average samples of islamic income ratio, it suggests that the above-average is superior. it can be concluded that the private sharia banks’ adherence to the principle is categorized as averagely good. sample percentage mean (0.45307) 55 100% 27 49% 28 51% based on the table 4, 2016 to 2020 data for 55 samples of sharia commercial banks consists of 27 sharia banks, i.e. 50% of sharia commercial banks, showed an above-average value. it means that 27 out of 55 samples of sharia commercial banks have complied with the remaining 28 sharia commercial banks or 50% sharia banks are below the average. this means that there are 28 sharia commercial banks out of 55 samples remains lack comthe above and below an average sample of tributed. thus, some private sharia banks have complied with sharia principles by it-sharing principles, namely and contracts. on the other hand, some private sharia banks have not complied neling more funding with other contracts other analysis of descriptive statistic of islamic corporate governance descriptive statistic of islamic corporate governance. criteria frequency percentage excellent 18 33% good 31 56% acceptable 6 11% jumlah 55 100% based on table 5, sharia banks holds a excellent predicate with a total value of less than 1.5 for islamic corporate governance from 2016 to 2020. it means that 18 of 55 samples or 33% of sharia banks have implemented good corporate governance very well. islamic banks possessing excellent predicate includes bank bca syariah, bank syariah mandiri, and bank panin syariah. islamic banks with good predicate with a complete value of 1.5 to 2.5 are 31. it means that 31 out of 55 samples or 56% of islamic banks have implemented good corporate governance well. sharia banks with good titles include bni syariah bank, bri syariah bank, mega syariah bank, btpn syariah bank, and bukopin syariah bank. then the sharia banks with acceptable predicate with a value of 2.5 to 3.5 are as many as 6. it means that 6 out 40 of 55 samples or 11% of sharia banks are acceptable in implementing good corporate governance. sharia banks with acceptable titles include bank muamalat, maybank there are no sharia banks with the predicate of bad or having a value of more than 3.5. it means that in this study, there is no sharia the implementation of islamic corporate governance. in this study, from 55 samples of sharia banks in the 5 years of the study period, the average sharia banks had a value of 1.5 55 samples or 56%, meaning that more sharia banks with islamic corporate governance were categorized as “good”. 4.1 descriptive statistic analysis on the fraud occurrence indications occurrence indications. criteria frequency percentage non-fraud 21 38 fraud 34 62 total 55 100 table 6 shows that in the variable indication of fraud from 55 samples of islamic banks, as many as 21 samples or 38% did not indicate fraud. during the 5 year study period of sharia banks, a fraud was not spotted including bca syariah bank (2016 to 2020), btpn syariah bank, bukopin syariah bank, and maybank syariah (2016 to 2017), and bni syariah banks (in 2020). whereas 34 samples or 62% were indicated as committed a cheat or indicated fraud. the number of companies indicated by fraud indicates that the internal control in the islamic banks is not robust enough. also, it means that more sharia banks have ever indicated fraud. based on data for 5 years of the study period, fraud cases at islamic banks occurred more prevalently at bank muamalat. in the last two years, there have been 83 and 35 cases of fraud committed by permanent employees in 2019 and 2020, respectively. 4.2 regression analysis of the data panel model r r square std. error of the estimate 1 .122a .15 .59613 table 7 shows that the r square value of 0.15 is obtained. this can be interpreted that the combination of sharia compliance which is indicated by the islamic income ratio and on the islamic corporate governance variable by the amount of 15%. while 85% of islamic by other factors. b s.e. sig. icg 1.324 ,836 ,051 step 1a iir -20.385 3,269 ,059 psr -1,324 1,662 ,368 constant 1,404 3,436 ,683 as shown in table 8, the islamic corporate effect on fraud indication in sharia bank. 4.3 the effect of islamic corporate governance on fraud indication logistic regression testing on islamic corporate 1 hypothesis. thus, could be said that islamic corporate governance partially has no effect on fraud indication. description fraud indicated not fraud indicated total n percentage n percentage higher than the average (>1,89) 22 73% 8 27% 30 lower than the average (<1,89) 6 43% 8 57% 14 total 28 16 55 the sharia bank has a complicit value of 1.52.5 with 1.89 as the average. all of 55 samples, 30 of them have higher than the average 41 value while the rest of them have lower than tioned, 22 samples (73%) have fraud indication, and the other 8 (27%) have no fraud indication. in line with the theory, the higher the complicit value, the more fraud will be indicated. whereas from 14 samples with lower than the average value (<1.89), 6 of them have fraud indication and the other 8 have no fraud indication. complicit value of <2.5 shows the excellency of management in or very good management systems are still having fraud indication, both from higher or lower than the average category. the effects of islamic indocme ration on logistic regression result of the islamic 2 hypothesis is rejected. thus, the islamic income ratio partially does not affect fraud indication. description fraud indicated no fraud indicated total n percentage n percentage higher than the average 16 56% 13 44% 29 lower than the average 12 80% 3 20% 15 total 28 16 55 based on research (marheni, 2017), when islamic income ration is high and the fraud indication is low, it means that the sharia bank already executed the sharia principle. bank with fraud indications mainly comes from the group with iir higher than the averthe average, as many as 16 samples (56%) have fraud indication and the other 15 samples (44%) have no fraud indication. thus, although the islamic income ratio is well implemented, there is no indication that sharia bank is clear from fraud. this also shows that income activity with the sharia principle has no effects on fraud. this study is aligned with another study that there is no effect of islamic income ration on fraud. 3 hypothesis is rejected. sharia banks. description fraud indicated no fraud indicated total n percentage n percentage higher than the average 11 50% 11 50% 22 lower than the average 17 77% 5 23% 22 total 28 16 55 both of the groups with psr higher and lower than the average. but, from 22 samples with iir lower than the average, as many as 17 samples (77%) have fraud indication. therefore, sharia banks with psr lower than the average is more likely to have fraud indication. indication, as many as 11 samples came from from 16 samples with no fraud indication, 11 of those data, could be concluded that the level of psr of sharia bank does not affect its fraud indication, with the proof from table 11 that both groups with psr higher and lower than the average have fraud indication. path analysis of direct and indirect effect. variable direct indirect total 0.480 0.136 -20.385 0.636 -19.749 -1.324 0.180 -1.155 1.324 attained that the direct effect of islamic income ration on fraud is -20.385 that is greater than cient of 0.180. these data reveal that islamic corporate governance is not an intervening variable which correlate islamic income ration 42 5. conclusions and implication corporate governance from common sharia banks from 2016-2020 has the complicit average value within the “good” category. thus, there were more sharia bank with good islamic corporate governance implementation. the sharia banks that possess the highest bank from 2016-2020 and mandiri sharia bank from 2016-2020. the other sharia bank with the “rather good” category is muamalat bank from 2016-2020. moreover, sharia compliance with islamic income ratio proxy in sharia banks from the 2016-2020 period, there was 29 out of 55 banks have higher than the average. thus, more sharia bank has implemented its islamic income ration or already following the sharia principle by focusing on islamic income and reducing usury. the average islamic income ratio is lower than its deviation standard, which means that the data are clustered and not far-placed from the average. on sharing ration proxy on sharia banks from 2016-2020; there were equally 22 banks with lower and higher than the average value out of 55 samples. these data depict that sharia banks is not stern on sharia principles in terms deviation, which means that the data is not varied and not scattered away from its average. on fraud indication on sharia banks from 2016-2020, there were 28 out of 55 samples have fraud indication. the other 16 have no fraud indication, and they are bca sharia bank from 2016-2020, btpn sharia bank from 20162020, bukopin sharia bank from 2016-2017, maybank sharia from 2016-2017, bni sharia sharia bank on 2016. simultaneously, islamic corporate governance and sharia compliance with islamic income ratio proxy are affecting fraud indication. islamic corporate governance is partially affecting fraud indication on common sharia bank with positive direction. sharia compliance with islamic income ratio proxy is partially not affecting fraud indication sharing ratio is partially affecting fraud indication on sharia bank in a negative direction. based on dan testing, the value of is 0.35, which means that the combination of islamic corporate governance and sharia compliance with ratio proxy are capable to explain the detection of variable on fraud indication as much as 35%. the other 65% is explained by other factors than in this study. thus, future studies expected to add other independent variables, for instance, the sharia compliance with moreover, more samples also expected since this study is focused on sharia banks thus of this study, the complicit value could be used as consideration for customers to decide where whose goals are improving market share and garnering customers, it is integral to pay attention to factors than affect fraud, since sharia bank has a strength that should be potential if managed properly. not to mention in the country with a predominantly muslim country such as indonesia. sharia bank should pay attention more to sharia principles that could affect since by abiding the sharia principles embedded with proper management, sharia bank could reduce the fraud potential. references abdi, s. (2017). pengaruh sistem internal kontrol, audit internal dan penerapan good corporate governance terhadap kecurangan perbankan (studi kasus pada bank syariah anak perusahaan bumn di medan). , . alhammadi, s., archer, s., padgett, c., & abdel karim, r. a. (2020). perspective of corporate governance and ethical issues islamic banks. ulation and compliance, (3), 406–424. ansori. (2014). implementasi islamic corporate governace dan implikasinya terhadap kinerja bank syariah. akuntansi, (1). basuki, a. t., & prawoto, n. (2016). analighozali, i. (2013). (7th ed.). semarang: badan penerbit universitas diponegoro. 43 pada bank syariah. , 4(2), 131–146. islamic bank vs conventional bank : intermediation , fee based service activity and ment, 01-2016-0003 in’airat, m. (2016). the role of corporate govtion study in the saudi arabia business environment. finance, (2), 119–128. fraud prevention in islamic country : does corporate governance matter ? . undang nomer 21 tahun 2008 tentang perbankan syariah (2008). lidyah, r. (2020). islamic corporate govertansi, (3), 437. https://doi.org/10.24912/ ja.v22i3.398 sis pengaruh pengungkapan syariah complience terhadap kepatuhan perbankan syariah pada prinsip syariah (studi kasus : di bprs kota semarang). me, 4(1). mahmood, r., & islam, m. (2016). practices of corporate governance in the banking sector of bangladesh. , (3), 17–29. https://doi.org/10.5121/ijmvsc. 2016.6302 marheni. (2017). analisis kepatuhan prinsip , (1), 143–170. governance business syariah terhadap bank syariah di indonesia. tal, (18), 85–90. mohamed i, e., cholins g, n., opong, k. k., & avison, l. (2017). corporate governance, islamic governance and earnings management in oman. , (june). https://doi.org/10.1108/jaee-09-2016-0064 nelson, t. (2014). . jakarta. otoritas jasa keuangan. (2019). snapshot perbankan syariah 2019. rahmayani, & rahmawaty. (2017). pengaruh islamic corporaterahmayani, & rahmawaty. (2017). pengaruh islamic corporate governance dan internal conpada bank umum syariah di indonesia. jurnal ilmiah mahasiswa ekonomi akuntansi, 2(3). retrieved from ht. , (3). retrieved from http://www.jim.unsyiah. ac.id/eka/article/view/4395 sapuan, n. m., sanusi, n. a., ismail, a. g., & wibowo, a. (2016). social learning and printract. humanomics, (4), 498–515. https:// sekaran, u., & bougie, r. (2017). metode (6th ed.). jakarta: salemba empat. sitti, j. (2016). pengaruh good corporate govbank perkrediatan rakyat (studi pada bank perkreditan rakyat di surabaya). , (2), 177–191. siyoto, s., & ali, s. (2016). penelitian. sugiyono. (2016). . bandung: alfabeta. trieved january 23, 2019, from https://www. cnnindonesia.com/ekonomi/20200214172620 78-276222/bank-syariah-mandiri-diduof banking customers for product development in islamic banking in indonesia a maslahah pyramid approach. https://doi. ceptual study on islamic corporate gover, 4(6), 357. https:// doi.org/10.11648/j.ijefm.20160406.17 36 evaluation of e-word-of-mouth through business intelligence processes in banking domain lucie šperková, petr škola, tomáš bruckner department of information technologies, faculty of informatics and statistics, university of economics, prague, czech republic lucie.sperkova@vse.cz petr.skola@vse.cz tomas.bruckner@vse.cz received september 1, accepted october 3 2015 abstract: social networks and internet discussions are valuable sources for a company’s marketing research and public relations management. the internet is full of public communication in an unstructured form and reflects recent movements of contributors' perception of the company, brand, products, competitors or whole market. as one of the approaches to achieve a better view we propose to design metrics which should be followed in order to get valuable insight where the company stands in terms of its customers. this paper focuses on obtaining an e-word-of-mouth in the banking sector using publicly available data. the main goal is to design metrics and dashboards evaluating customers’ perception of a bank’s services based on the analysis of public facebook sites and web discussions related to several banks in the czech republic. we studied several approaches to unstructured data analysis. thus we present complementary findings in classification of the unstructured data analysis presentation as a set of summarised metadata, top peaks of primary qualitative data and results of automated semantic analysis of the unstructured data. based on the result we discuss the possible value of an unstructured data analysis and related systems. we find out that the value could be in the identification of opportunities and threats in the market by unexpected movements in public opinion of the internet crowd, which we suggest to explore in future research. the benefit of this report is to describe the processing of data that can be obtained with emphasis on their content, their further enrichment, and their users. keywords: marketing, business intelligence, e-word-of-mouth, elasticsearch, banking, unstructured data, internet discussion, facebook available for free online at https://ojs.hh.se/ journal of intelligence studies in business vol 5, no 2 (2015) 36-47 mailto:lucie.sperkova@vse.cz mailto:petr.skola@vse.cz https://ojs.hh.se/ 37 1. introduction the phenomenon that people talk and recommend their favorite products and services to their friends and followers plays an important role in shaping their behavior (goyyette et al. 2010). deeper understanding of these talks may be crucial in creating a successful marketing strategy in online communities. the most common method for monitoring these data is now online monitoring. but there are another data from different sources as internal and external databases, crm, erp, etc. in data warehouses of the companies which could be put into context with the data from online communities. in marketing field these talks of customers are known as customer voice or word-of-mouth (wom). the unstructured data gained from the internet is also known as digital (hu et al. 2006), electronic (ewom) (choi and scott 2012) or online word-of-mouth (wu and zheng 2012). the most developed definition of the ewom which captures present and future development of communication more complexly is stated by bronner and de hoog (2010) : “any statement – positive, negative or neutral – made by potential, current or former stakeholders about a product, service, company or person, which is made available to a multitude of people, organisations or institutions, via a digitally networked platform.” potential of ewom data can be used to obtain information to a broader audience as companies, professionals, and retrospectively users themselves. any consumer in the world can connect to the internet and read the opinions of others. the emergence of various social media like blogs, microblogs, social networks, forums, online reviews etc. is an important step for customer voice research. users share there their personal experience with the companies, products and services and those are then followed by their transfer to other users. simultaneously these sources create opportunity for companies to be visible and convince customers by communication on the quality of its services. dellacoras et al. (2007) noted that the practice of reviewing products online significantly increases the potential for an empirical understanding of ewom marketing. breazeale (2009) states that digital platform is changing our understanding and the essence of the ewom meaning. while the articulated evaluation disappears shortly after they were spoken, and it is very difficult to capture and analyze it, online statement lingers long after it was written and is not necessarily spontaneous. it is also immediate and accessible by others. similar to classic wom research shown that in internet environment ewom may have “higher credibility, empathy and relevance to customers than marketer-created sources of information on the web” as stated gruen et al. (2006, p. 449). the importance of wom in shaping consumers’ attitudes and buying decisions led many researchers to examine its effectiveness in stimulating demand within various industries. there are researches including wom influence on the buying decision and sales (e.g. senecal and nantel 2004; tsang and prendergast 2009; chevalier and mayzlin 2003), quality control (ashton et al., 2014) or user and service experience (hedegaard and simonsen 2013; pai et al. 2012). there are studies investigating ewom in social networks (wu and zheng 2012) and estimating the social influence of individual nodes in social networks (lü et al. 2011). choi and scott (2012) focus on the relationship between the use of social networking, user social capital, sharing knowledge and ewom. the result shows that the intensity of use of the networks linked with confidence and identification, which has a positive impact on knowledge sharing. study conducted by almossawi (2015) proved that “wom has a positive influence on the youth’s decision-making process when choosing where to open a bank account”. this result can also lead to the importance of the customer segmentation according to their characteristics and preferences which they share on social networks and the data the banks has in their data warehouse. banks can thus connect the characteristics from the social profile with the customer’s behaviour. banking services are one of the industry where analysis of wom can be crucial to stay competitive in the financial market. the potential is in identification what clients attracts, how the trends in banking look like, what is necessary to improve in services and also in what is necessary to help the clients and how to communicate with them in the space of social networks. lack of confidence in the banking services might also be the result of an increase in perceived risk, which can reduce customers’ willingness to use banking services (aurier and siadou-martin 2007). wom can be a competitive advantage through banks can increase acquisition of prospects and retention of customers. the study of shirsaver et al. (2012) found that the major determinant factors of positive wom are corporate image, relationship marketing, perceived value, perceived risk, satisfaction, and loyalty. there are also studies which put in context wom, service quality and customer satisfaction of the banking services (e.g. yavas et al. 2004; lymperopoulos and chaniotakis 2008). wom affects individuals’ decisions and influences organizations’ operations. it has very important implications for a wide range of management activities, such as: building brand and reputation, increasing conversions, i.e. sales transactions, acquiring and retaining customers, product development, quality assurance. also business managers start to pay attention to social networks communication and new type of business intelligence is emerging (chen 2010). in business process management bringing together the 38 worlds of structured and unstructured data can add significant value to the enterprise. it can help to find the priority clients, problems relating to products and services, customer sentiment, find the next best step in business, identify activities of the competitors and customers, their reactions, etc. tremendous strides were made in recent years to automate the analysis of unstructured text data. the problem of semantic analyses is that their results should be quantifiable. complexities in the analysis of unstructured textual data often results in only minimal use of the data (ashton et al. 2014). so it is necessary to find a way how to generate outputs consumable to service providers. we are convinced that due to established culture, knowledge and technologies in companies the new methods has to adapt as much as possible to end users. according to adamala and cidrin (2011) the business intelligence solution must be built with end users in mind, as they need to use it. 2. motivation of the research today data warehouses of banks contain mostly structured data as an asset they can easily measure. business intelligence (bi) is primarily directed to the presentation and analysis of numerical business data. reporting systems, commonly based on dashboards, prepare quantitative data based on metrics in a report-oriented format that might include numbers, charts, or business graphics (kemper et al. 2004). according to kimball (2010) the metrics from the point of bi view are expressed on the basis of dimensional modelling as indicators and their characteristics, analytical dimension and their characteristics and the relationship between dimensions and indicators. cobit 5 emphasizes the importance of business metrics. metric is meant as degree, the extent to which company management is satisfied with the contribution of it to meet business strategy. dashboards are applications that allow to organize pre-selected key performance indicators (metrics) in a clear and intuitive graphical form (pour et al. 2012). at dashboard metrics can be viewed from many dimensions, for immediate use in decision-making processes in the organization. for business users dashboards bring the visibility and clarity of all monitored metrics and their instant overview of improving or deteriorating. thus users can immediately assess the plan or reality and save their time. management of unstructured data determines how efficiently the company will deal with their customers in the future. the danger threatens from the ignorance of unstructured data can be sorted from dissatisfied customers, very loud customers, rapidly rising costs for customer service and their departure to breaching trust in the organization, the customer knows more than its employees. the new approach allows companies to consolidate unstructured data to central data warehouse is able to communicate consistently through all channels. the customer then feels that company knows him when he communicates with his counterpart, whether it's agent or vendor, or attends a customer portal. also customer service operations at the same time can reduce costs while maintaining customer satisfaction. integration of unstructured and structured data were discussed on presentation level (e.g. becker et al 2002) where structured data are accompanied with relevant texts. the structured data selected as a results of metrics viewed from different dimensions and relevant documents are presented side-by-side. another integration exits on the level of extracting metadata from collections of unstructured data (e.g. keith et al 2005; sukumaran and sureka 2006). identifiers of the content items are treated as facts that are subject to analysis, whereas metadata fields (e.g., author, date of creation, length, and addressed product) are used for classification purposes and thereby act as analysis dimensions. this allows associate individual documents with numerical facts directly, based on shared dimensions and to investigate document frequencies, e.g., the number of documents that cover a certain topic and are connected to certain segment of customers. an integrated framework of business intelligence with the inclusion of unstructured data was constructed by (baars and kamper 2008), but they focus more on classic enterprise data and data from crm. they do not include ewom as a possible source of data to bi process. we are convinced, that ewom is specific source of data which has to be handled in specific way. our intention is also unique with its focus to banking domain, which has specific requirements to business. this paper follows results and expands article of (šperková 2014) and (šperková and škola 2015), where the first content analysis of banking data were conducted. our purpose is automation of the process of gaining the data and their pre-processing for further analysis. automation can reduce cost and timeconsuming, manual and comprehensive analysis conducted by people like reading posts and search links in them. it is not able to capture the full transfer of expertise that customers write anywhere on the internet. but at least in monitored publicly available sources can be analysed topics that interested users. furthermore, these themes can automatically evaluate categories of sentiment and thereby obtain the distribution of subjects with positive or negative customer experience. there are many studies conducted to mine the sentiment and opinion from the wom and using the computer aided methods like latent semantic analysis (ashton 2014) or machine learning classification (pai et al. 2012). these methods are well known but are uneasily to implement in service practice. for this purpose, the powerful tool elasticsearch seems to be adequate. there are only a few academic articles, which use elasticsearch in their research. these articles are focused on library science (johnson 2013) and full-text searching (divya and goyal 2013) or big log data (bai 2013). textual data analysis was the part of theses 39 elaborated at the department of information technologies at the university of economics in prague this year. these thesis uses unstructured data as the input and elasticsearch as a tool for data analysis. methodology used in those thesis are wellconceived and executed but lacks business context. the nature of unstructured data in contrast with structured data usually presented in bi solutions is different and its meaningful presentation may differ from usual bi dashboards. we discuss the possibility of measurement and dashboard presentation relevant to the nature of the data and its business importance. 3. objective and methodology the main objective of this research is to create a periodic review of the data evaluating banks according to the context in which their users speak about them on the internet. our approach is built on the methods used in bi and knowledge from unstructured data processing in bi. the insight will be given based on metrics which have to be defined on the base of facebook and web comments. after processing of information from those comments, metrics are counted and visualized on dashboards. the results is an overview of the sentiment of the talks about the bank in specific period and its position in monitored metrics compared to other banks in the market. the research is conducted as a case study and proof of concept which will be followed by other studies and anchored in a methodology. our approach is conducted according to established business intelligence process (kimball 2010) and data mining, eventually text mining methodology, specifically according to crisp-dm (chapman 2000) as the main aim of this integration is effective customer retention management. the lifecycle of the crisp-dm contains 6 steps – business understanding, data understanding, data preparation, modelling, evaluation and deployment. compliance with these procedures we outlined basic methodology of the research as follows: 1. identification of the web pages and social network sites where regular information from customers and users of banking services can be obtained – business and data understanding 2. creating a system that will ensure downloading of the necessary data from the internet and storing them in repository – data preparation 3. processing and data analysis – data preparation and modelling 4. design of metrics and characteristics, which evaluate the bank from the customers’ point of view – modelling and evaluation 5. design of the dashboard for the visualising the metrics and more detailed information – evaluation and deployment result of this paper is a dashboard which serves to further actions which should lead to better decision making and increasing performance. figure 2 shows a general model of the decision making process from the unstructured data used at this research. the findings will provide important insights into the business impact of social media and user-generated content an emerging problem in business intelligence research. further this model can be easily integrated to the traditional, on structured data based, bi process. figure 1: model of the decision making process from unstructured data (authors) 3. data collection and processing from the marketing research point of view, east (2007) claims that it is not difficult to find the data on the internet, but the problem may occur, if the data are only from one source/server. the ewom may be affected and rather be negative or positive. for this reason, we apply more than one data source. for the purposes of analysis and design of the metrics we chose comments that relate to banking occurring on the czech website or facebook profiles of czech banks. five czech banks with the largest balance sheet total in 2012 and with the facebook profile are shown in table 1. 40 table 1: chosen banks with facebook profile entering the analysis (authors) name of the bank facebook profile ceska sporitelna ceskasporitelna komercni banka komercni.banka unicredit bank czech republic unicreditbankcz raiffeisenbank raiffeisenbankcz ge money bank gemoney.cz pages that a web discussions are downloaded from must meet several requirements. pages must relate to the topic of finances and banks to put assume a high proportion of the discussions that deal with banking services. further discussions must have wellstructured and tagged html code, so they can be easily identified in the whole html page script. from the web sources we chose czech financial forums http://www.mesec.cz/ and http://www.penize.cz/. 4.1 connectors for downloading the data from the internet forums we programmed a web crawlers for automatic browsing website content by using java language and open source crawler4j library under the apache licence v2. in crawler4j we set up rules which domain to browse and optionally specified rules for browsing urls that were interesting in their content. a list of text strings in the url which should not be contained at pages was also defined for more efficient browsing. this crawler received information which parts of the site not to attend because they contain no user comments. parts of the html code, containing identification of the contributor, text (comment), date of the comment and eventually the number of reviews of the comment by other users, were separated and prepared for further processing. for acquisition of data from facebook we used java library restfb which contains classes for working with facebook objects. to login we used credentials (assigned app id together with access token) for the application created below the private facebook profile. the advantage of this log is access the data without the need to renew the validity of credentials. the objects of downloading from facebook are posts on the wall of czech banks and the data about the facebook page which are downloaded from. post can be represented by text, picture, link etc. every post can contain comments from other users. the download these objects are accomplished by withdrawing feed objects first. for each object is determined whether contains a comment. if so, this comment is downloaded. comments on facebook are in two layers. for each comment, users can respond by sub-comments, these are downloaded as well. for each object type post is also necessary to determine the number of likes a positive evaluation of the object. 4.2 repository as a repository and analysis tool of gained data we used open source elasticsearch software based on apache lucene library. elasticsearch is a distributed scalable system for real-time search and analysis tool whose main function is the full-text search. it also supports structured search, geolocation and recording the relationships between data. in elasticsearch, the data from all sources are collectively analysed. the data from both connectors are stored to elasticsearch in json format. every document contain unique identification under it is stored. this id enables to start connectors over again each day because elasticsearch saves one document under one id. downloaded data were enriched by other two java programs, which connected sentiment analysis and evaluation of named entities contained in posts. elasticsearch provides built-in support for analysis in the czech language. outputs from elasticsearch were then processed and visualized in kibana application. plugin head for simplification of indexes (data file) and application carrot2 for clustering documents were also used. 4.3 sentiment analysis sentiment analysis were conducted by open source opennlp library which is used for programming the various tasks of natural language processing like detection of sentences, tokenization, document categorization etc. evaluation of sentiment contributions are made through opennlp document categorizer based on the principle of maximum entropy. for the training of the categorization model we used data from the university of west bohemia as an output of sentiment analysis of data from the czech facebook sites and reviews from the czechoslovak film database web using machine learning with a teacher. 5. wom information extract before the design of metrics we explore which type of information could be extracted from the unstructured ewom data. the successful bi initiatives, as shown in (adamala and cidrin 2011) share factors like orientation on choosing best opportunities (“low hanging fruit”) or alignment to specific needs of business sponsor. in our case the generic best opportunity could be found in fast, easy and simple understanding of movements in public opinion related to the company and its competitors. the business vision or specification of unstructured data analysis is difficult due the fact that the content of the data is not known in advance. thus, the dashboard can be designed mostly by: summarised ewom metadata, top peaks of ewom primary data, automated semantic analysis of ewom data. 41 the metadata such as source, type or time of the contribution enables easy summarising and graphical representation. these data are easily integrable to current bi environments. the reason of these data in ewom analysis is to understand time, typological and quantitative differences, and recent and past movements in ewom data. the metadata are source for identification of top peaks in primary data such as topics with the highest absolute or incremental rate of appearance or the persons with the high influence. these primary data should be shown to the dashboard user as a primary, non-summarised content, because it entails the semantics not easily evaluable by computer. for example, when rate of appearance of terms such as “availability”, “outage” or “failure” grows in conjunction with a competitor, it could be valuable information about technical conditions of competitor’s e-banking system. also topics widely discussed about the company, e.g. social network campaigns started by unsatisfied customers, can be intercepted in its beginning. the automated semantic analysis is represented mainly by sentiment analysis, ie. identification whether the contribution is neutral, positive or negative. the output to dashboard can be the quantity of the customer’s statements of different sentiment to measure the mood of the internet public opinion or direct indication of sentiment of the top peak contributions. the example of a reason for semantic analysis could be an early cognition of negative or positive mood movements in the crowd after controversial marketing campaigns, thus is possible to avoid or intensify them. 6. metrics design the main purpose of metrics is to highlight the important facts that corporate resources or people need to be focused. metrics summarize various aspects of the data in aggregate form and are comparable among the surveyed companies. from downloaded and indexed data is necessary to draw metrics and other characteristics evaluating banks from the customers’ perspective. if the characteristics are of the quantitative type they are defined in proposed metrics in table 2. nominal characteristics are understood as dimension according them the metrics as measurable indicators can be calculated and sliced. metrics along with dimension form the value for gaining the ewom from the data. the highest value have dimensions created from textual analysis. some results of metrics can be further used as dimensions to slice other metrics. for example one metric can be the calculating sentiment of different comments. further this result can be used to slice metric most active contributors and show only those with negative sentiment. to better understand the content of posts and comments, the list of keywords has to be designed for better search of contributions according to user requirements. this is a domain knowledge of every enterprise which wants to use our procedure. this list can be always updated. keywords are attributes for different dimensions. considered dimensions in our case are: time period (e.g. month, week, day, date) source of the data (facebook, web forum) type of the contributor (facebook user, bank, follower, user (cookie)) type of the page (individual facebook page, individual forum page) type of the contribution (comment, post) name of the bank (keywords) name of the product (keywords) specific generic sentiment (positive, negative, neutral) topic table 2: definition of designed metrics (authors) name of the metric definition calculation unit of measure number of likes indicates people who liked the page/post/comment, shows the popularity of the bank on facebook summary of individual likes like number of posts shows the activity of the bank and its followers or other facebook users, indicates how many objects of the type post are on the wall summary of individual posts post number of comments indicates how many objects of the type comment are on the wall/under the post summary of individual comments comment 42 the ratio of the number of comments that contain the name of the bank or the product to all comments evaluates how important it is to monitor the website and its discussion number of comments containing the specific topic / all comments % frequency of the topics/keywords summarizes themes, a common signs of comments that occur most frequently summary of topics/keywords topic/keyword incidence rate of topics together with keywords indicates topics occurring together with the keyword number of pairs of specific topic and the keyword/ number of occurrences of the keyword % sentiment of the topic/contribution count the overall sentiment of the topic or contribution. serves for example for comparison between banks. (number of positive – number of negative contributions) / number of all contributions sentiment most active contributors users contributing the most – potential opinion makers summary of contributors contributor net promoter score evaluates measure of customer loyalty % of loyal customers – % of disloyal customers nps reach summary of users who were reached by the post/comment summary of users who read the post/comment (number of impressions) user/cookie 6. dashboards design designed metrics need to be placed to the dashboard. in our case the dashboard is realized in an application kibana. dashboard overview shows defined metrics and contains a set of visualizations that correspond to the quantitative questions about the stored data. topic analysis dashboard shows topics or words that frequently occurred, or may be potentially interesting. it is designed to gain insight on the topics discussed in the context of the stored data. dashboards are used for analysis of indexed data and are preparing for the final visualization. 43 figure 3: preview of the overview dashboard (authors) figure 4: preview of the topic analysis dashboard (authors) data can be viewed from different angles, search allows querying specific subsets of data. data which contain the specific shapes of searched word or phrase are then displayed. all objects defined in table 5 and placed to dashboards also serve as filters that allow view data according to user interest. for 44 example, finding where there are many negative posts, which source caused a blip in the number of contributions etc. another option is to enter a query into the search and thus, for example, determine whether the messages contained some of the key words or how often a name of the bank occurs. issues which were of interest of commenting can occur in several ways with objects frequent terms and top unusual terms and a frequency of posts in the course of time. table 3: defined objects placed in dashboards (authors) object description note activity development of the number of posts in time filter allows to limit data, e.g. to period of high activity of users page names of the pages and number of documents filter by clicking on the name and change the sort by number of documents source number of documents from different sources filtering by sources type number of documents saved in single type of bank index filtering by the type of sources page likes development of the number of facebook likes in time popularity of sites can be compared between themselves comments count number of comments on individual pages filtering by contributors posts count number of posts on individual pages filtering by contributors sentiment summary of the sentiment evaluation sentiment is flow number from -1 to 1 user activity most active users users with the highest number of comment or posts frequent terms most frequent words contained in posts and comments identification of themes related to the contribution. it shows the word in the form after stemming rules and frequency of occurrence. top unusual terms terms that are statistically unusual terms which occur more frequently than they according to statistical model by other data should. it highlights the novelties in selected data 7. further findings and implications of the study the results of reporting design may serve as indicator of the marketing department for the evaluation of bank in relation to others in the market, as a feedback for new product introduction, overview of the competition or the discovery of the customer wishes. it indicates what bank is customer friendly and what bank and issues people talk about. longerterm monitoring of metrics can therefore tell where to apply banking products. from a managerial perspective, our results suggest that firms should pay attention to textual content information when managing social media and, more importantly, focus on the right measures. therefore we also suggest closer cooperation of the people taking care of the social sites like facebook and bi analysts. this approach could lead to higher customer satisfaction and growth of agility, profitability and orientation to the customers. though we consider the metrics and the dashboard design itself as a main result of our study, we are able to extract a typology of a possible information value and thus present a distinctive business value which could be requested from similar cases. we can also discuss the consideration of overall business value of unstructured data-based intelligence systems. 45 the following unstructured data value typology is made by observation of the data presented on the designed dashboards. deployment of this typology to action in several situations is a base for future research. we suggest to perform a qualitative study by a sample of power users over the analysed data to authenticate the acceptance of the typology. • content / quantity • primary qualitative data / metadata • dynamics: static (absolute) / dynamic (change) • predictability: expected / surprising • object of business information value: market / competition / customer / product / brand • business impact quality: threat / opportunity • source of information: single / nests / distributed we are able to find value even in the primary information itself, such as in the content of public contributions, or in the amount of the contributions or similar quantitative values. while the static data representing the absolute value are predictible, dynamic information representing changes such as topics or words with the highest change rate of appearance creates unexpected value. that leads to further exploration of reasons and origins of the information. such origin sometimes lead to one source, sometimes to a/the competitor’s campaign, sometimes to a single internet personality with extended influence. such an influencer could be a possible partner in public communication. the overall business value of the unstructured data analysis is a sum of all of the expected business value described above. this makes similar systems very difficult to evaluate and to calculate a business case. a lot of value could be found in the area of unexpected, surprising information. it can create a big opportunity or prevent an extensive threat. such value cannot be calculated in a simple business case, because it is impossible to set probability of a rise of such surprising information from the ewom. then the value and roi of unstructured data intelligence systems could be considered similarly as in business continuity management approach; as the avoiding the possible business impact of not having the information, eg. in our case, as possible business impact of ignorance of the internet public opinion. conclusion the purpose of the research was to design a comprehensive overview of customers’ ewom based on web forums and facebook comments. after a study of the approaches to unstructured data analysis and wom analysis, we discussed the nature of the unstructured data analysis and possibilities of its dashboard presentation. we defined quantitative metrics evaluating individual aspects of customers‘ perception of the bank, dimensions and the way they can be displayed on the consolidated dashboards. we chose the czech banking industry and facebook pages and relevant websites with extensive discussions. the results were designed with respect to a possible future integration of the ewom to business intelligence process and data structures in banks. the advantage of our approach is its extensibility. connectors can be added for new sources of data; new metrics can be defined and incorporated to the dashboard. this approach can be also used besides banking in other enterprises. the main outcome is the design of the metrics and the dashboards over the analysed public banking market data. the main findings are the way of the unstructured data analysis presentation as a set of summarised metadata, top peaks of primary qualitative data and results of automated semantic analysis of the unstructured data especially the sentiment analysis, designed in the specific banking data dashboard. furthermore, we discussed, generalised and classified the possible value of unstructured data analysis and related systems. we found out that the value could be in the identification of opportunities and threats within the market by unexpected movements in the public opinion in the internet crowd, which we suggest to explore in future research. in the case of positive results of the typology validation, the future research could contain automatic classification of the data to identify the type of business value of information presented on the dashboard and thus transfer more intelligence from humans to automated unstructured data processing. 8. acknowledgements this article was prepared with the financial support of the research project vse igs f4/18/2014 and with contribution of long term institutional support of research activities by faculty of informatics and statistics, university of economics, prague. references adamala, s., cidrin, l. 2011. key success factors in business intelligence. journal of intelligence studies in business, vol 1, no 1, pp 107-127. almossawi, m.m., 2015. the impact of word of mouth (wom) on the bank selection decision of the youth: a case of bahrain. international journal of business and management, vol. 10, no. 4, pp 123–136. ashton, t., evangelopoulos, n., & prybutok, v. r. 2014. quantitative quality control from qualitative data: control charts with latent semantic analysis. quality & quantity, pp 1-19. aurier, p., & siadou-martin, b. 2007. perceived justice and consumption experience evaluations: a qualitative and experimental investigation. international journal of service industry management, vol. 18, no. 5, pp 450-471. 46 baars, h., & kemper, h.-g. 2008. management support with structured and unstructured data— an integrated business intelligence framework. information systems management, vol 25, no. 2, pp 132–148. bai, j. 2013. feasibility analysis of big log data real time search based on hbase and elasticsearch. in: natural computation (icnc), 2013 ninth international conference on. ieee, 2013. pp 1166-1170 becker, j., knackstedt, r., & serries, t. 2002. informationsportale für das management – integration von data-warehouseund contentmanagement-systemen. in vom data warehouse zum corporate knowledge center—proceedings der data warehousing, physica-verlag hd, pp 241-261. bronner, f. & de hoog, r. 2010. consumergenerated versus marketer-generated websites in consumer decision making. international journal of market research, vol. 52, no. 2, pp 231–248. dellarocas, c., zhang, x. & awad, n. 2007. exploring the value of online product reviews in forecasting sales: the case of motion pictures. journal of interactive marketing, vol 21, no. 4, pp 23–45. divya, m. s. & goyal, s. k. 2013. an advanced and quick search technique to handle voluminous data. east, r. 2007. researching word of mouth. australasian marketing journal (amj), vol. 15, no. 1, pp 23-26. goyette, i., ricard, l., bergeron, j., & marticotte, f. (2010). e‐wom scale: word‐of‐mouth measurement scale for e‐services context. canadian journal of administrative sciences, 27(1), pp 5-23. gruen, t. w., osmonbekov, t., & czaplewski, a. j. 2006. ewom: the impact of customer-tocustomer online know-how exchange on customer value and loyalty. journal of business research, vol 59, no. 4, pp 449-456. hedegaard, s., & simonsen, j. g. 2013. extracting usability and user experience information from online user reviews. proceedings of the sigchi conference on human factors in computing systems, acm, pp 2089-2098. hu, n., pavlou, p. a., & zhang, j. 2006. can online reviews reveal a product's true quality?: empirical findings and analytical modeling of online wordof-mouth communication. proceedings of the 7th acm conference on electronic commerce, acm, june, pp 324-330. chapman, p., clinton, j., kerber, r., khabaza, t., reinartz, t., shearer, c., & wirth, r. 2000. crisp-dm 1.0 step-by-step data mining guide. chen, h. 2010. business and market intelligence 2.0. ieee intelligent systems, vol 25, no. 1, pp 6871. chevalier, j.a. & mayzlin, d. 2006. the effect of word of mouth on sales: online book reviews. journal of marketing research, vol 43, no. 3, pp 345–354. choi, j. & scott, j., 2013. electronic word of mouth and knowledge sharing on social network sites: a social capital perspective. journal of theoretical and applied electronic commerce research, vol 8, no. 1, pp 11–12. jašek, p. 2014. analyzing user activity based on rfm models complemented with website visits and social network interactions. idimt-2014 (networking societies – cooperation and conflict), poděbrady, 10.09.2014 – 12.09.2014, linz : trauner, isbn 978-3-99033-340-2, pp 181–190. johnson, t., 2013. indexing linked bibliographic data with json-ld, bibjson and elasticsearch. code4lib journal, vol. 19, pp. 1-11 keith, s., kaser, o., & lemire, d. 2005. analyzing large collections of electronic text using olap”, 29th conf. atlantic provinces council on the sciences (apics 2005), wolville (canada), october. kemper, h. g., mehanna, w., & unger, c. (2004) “business intelligence—grundlagen und praktische anwendungen”, wiesbaden: vieweg. kimball, & r.ross, m. 2010. the kimball group reader : relentlessly practical tools for data warehousing and business intelligence. indianapolis: wiley publishing, isbn 978-0-47056310-6. lü, l., zhang, y. c., yeung, c. h., & zhou, t. 2011. leaders in social networks, the delicious case. plos one, vol. 6, no. 6, e21202. lymperopoulos, c., & chaniotakis, l. 2008. price satisfaction and personal efficiency as antecedents of overall satisfaction from customer credit products and positive word of mouth. journal of financial services marketing, vol. 13, no. 1, pp 63-71. pai, m. y., chu, h. c., wang, s. c. & chen, y. m., 2013. electronic word of mouth analysis for service experience. expert systems with applications, vol. 40 no. 6, pp 1993-2006 pour, j., maryška, m., & novotný, o. 2012. business intelligence v podnikové praxi. professional publishing, isbn 978-80-7431-0652. senecal, s. & nantel, j. 2004. the influence of online product recommendations on consumers’ online choices. journal of retailing, vol. 80, pp 159–169. shirsaver, h., gilaninia, s., & almani, a. 2012. a study of factors influencing word of mouth in the iranian banking industry. middle-east journal of scientific research, vol. 11, no. 4, pp 45-460. sukumaran, s., & sureka, a. 2006. integrating structured and unstructured data using text tagging and annotation. business intelligence journal, vol 11, no. 2, pp 8–17. šperková, l. 2014. analýza nestrukturovaných dat z bankovních stránek na sociální síti facebook. acta informatica pragensia, vol 3, no. 2-spec., pp 154-167. šperková, l., škola, p. 2015. design of metrics for e-word-of-mouth evaluation from unstructured 47 data for banking sector. in: 16th european conference on knowledge management. udine, 03.09.2015 – 04.09.2015. udine : published by academic conferences and publishing international limited reading, pp 717–725. isbn 978-1-910810-46-0. tsang, a. & prendergast, g. 2009. is a ‘star’ worth a thousand words? european journal of marketing, vol. 43, pp 1269–1280. wu, w., & zheng, r. 2012. the impact of word-ofmouth on book sales: review, blog or tweet?. in proceedings of the 14th annual international conference on electronic commerce. acm, august, pp 74-75. yavas, u., benkenstein, m., & stuhldreier, u. 2004. relationships between service quality and behavioral outcomes: a study of private bank customers in germany. international journal of bank marketing, vol. 22, no. 2, pp 144-157. to cite this article: hoppe, m. (2015) intelligence as a discipline, not just a practise. journal of intelligence studies in business. vol 5, no 3. pages 47-56. article url: https://ojs.hh.se/index.php/jisib/article/view/137 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index intelligence as a discipline, not just a practice magnus hoppea aschool of business, society and engineering, malardalen university, sweden; magnus.hoppe@mdh.se journal of intelligence studies in business please scroll down for article intelligence as a discipline, not just a practice magnus hoppe school of business, society and engineering, mälardalen university, sweden; magnus.hoppe@mdh.se received 27 august 2011; reviewed october 2015; accepted 5 december 2015 abstract this paper is a call for a new research agenda for the topic of intelligence studies as a scientific discipline counterbalancing the present domination of research in the art of intelligence or intelligence as a practice. i argue that there is a need to move away from a narrow perspective on practice to pursue a broader understanding of intelligence as an organizational discipline with all of its complexities where the subject is seen as more critical and is allowed to reflect on itself as a topic. this path will help intelligence academics connect to theoretical developments gained elsewhere and move forward, towards establishing more of an intelligence science. the article is critical of what the author sees as a constructionist line of thinking. instead the author presents a theory of intelligence as learning how to “muddle through” influenced more by organizational theory. the author also argues for an independent scientific journal in intelligence. [editor’s note: this article was originally presented in 2009, before the appearance of jisib.] keywords ideal informative flow, ideal organizational thinking, intelligence academics, intelligence scholars, intelligence science, organized intelligence 1. introduction in this paper i’m discussing two different perspectives on intelligence research: intelligence as a discipline (1) and intelligence as an art (2), where i argue that both are needed, but that research on intelligence as a discipline is underdeveloped. the current focus on the art has created a strong insider perspective that limits our understanding of what the intelligence domain contains, does and means to organizations. in accordance with this reasoning i start by suggesting a more critical stance towards the intelligence cycle (ic), the most used model for explaining intelligence as an example illustrating what is lacking with the arts perspective. ic has clear deficits as it supports a false belief that an ideal informative flow not only can be created but is of importance to organizations. the false belief that results from this thinking leaves us with an array of intelligence challenges unaccounted for when theory does not fit with reality. the continuous use of the ic is puzzling, but can be explained by its conceptual values (it's easy-to-use and understand) and that it works as a symbol bringing legitimacy both to those organizations implementing formal intelligence activities and to intelligence professionals who aim to manage this idealized informative flow. i argue that there will never be a true science of intelligence until the field opens up to other research questions and traditions other than those currently in favor. several initiatives can support this development, where i hope for the development of arenas that will allow for more dialogue on the topic of intelligence to prosper. we need to find and agree upon a term depicting our new perspective for the study, free from the narrow focus in use. my suggestion is organized journal of intelligence studies in business vol. 5, no. 3 (2015) pp. 47-56 open access: freely available at: https://ojs.hh.se/ 48 intelligence work. researchers adhering to this call will strengthen their positions as intelligence academics, counter-balancing the present domination by intelligence scholars. in addition, i argue that we must accept different and complimentary perspectives on the discipline of organized intelligence work. instead of just supporting formal decision making through an informative flow apparent in the ic, it's possible to view organized intelligence as a discipline for supporting ideal organizational thinking, thus helping to improve the competiveness of the organization (cf. hoppe, 2013a). viewing intelligence in different ways will enable researchers to move beyond the focus on a limited number of models, where the ic is a good example. 2. research as we know it when discussing intelligence research, one often comes to the conclusion that the present status is everything but satisfying. solberg søilen [2005:16] however writes, "the study of private and public intelligence has barely started as a positive area of research, 'a science' probably being too big a word." many researchers claim that there's lot to be done. there are often arguments for more systematic research [e.g. ganesh, miree and prescott 2003; svensson kling 1998], more quantitative studies [e.g. calof 2006], or just better research [e.g. fleisher, wright and tindale 2007]. however, there are fewer suggestions as to what this new and better research may be. some research areas are also neglected. in the call for papers to this conference – the third european competitive intelligence symposium (ecis) in stockholm 2009 – one could read "there has been a tendency to focus on the larger enterprise such as multinationals, with less attention being paid to business development and business creation, or entrepreneurship." to this, non-profit organizations and ngos could be added as well. according to these examples, it seems apparent that there's a need for more (and better) research. but to me, this picture of an immature field of research is not acceptable. the most prominent problem is, in my judgment, that the current research paradigm has limited itself to the art of competitive intelligence and is constructed too close to practice. the effect is a prevailing emphasis on practice – how to do and organize intelligence – and insufficiently on the creation of organizational theories including what intelligence means and does in organizations. and this is not to mention societal effects due to the continuous expansion of organized intelligence activities. the current research tradition creates results with only limited value to those researchers and laymen who are not familiar with the subject of intelligence. it neglects the larger issues. one might argue that we have at least over the years developed a deep understanding of how we ought to do intelligence, but i'm not that sure that this is true. even though current research is focused on how-to-do-intelligence, too often presented studies fall back on definitions of the art that are not solidly grounded in science. instead the study remains too much of a management practice unconcerned with its internal logic as long as it sells consultant hours. the abyss of the problem is apparent when, for example, jonathan calof [2006:11-12], summarizing an academic track on a scip conference, stated that there is a need to investigate what intelligence managers actually do and that "it's been suggested that the [intelligence] model may be prescriptive, not descriptive." to me this is not only a suggestion but a fact, and in that perspective calof’s statement can be read in the sense that most research up to 2006 (at least) is based on questionable prescriptive models followed by other ungrounded assumptions of what intelligence managers actually do. it is not built on unprejudiced empirical studies of what is actually being done. 3. what support and what decisions? but, as some might argue, there are theories about what intelligence does to organizations; it supports the decision-making processes inside the organization. even though i agree to some extent with this description, i'd like to pose two questions: is this all that intelligence does to organizations and does it really support all kinds of decisions? these questions are of course rhetorical, but still important as they question the normal way of defining intelligence. intelligence and those creating it do a lot of other things in and with organizations, but current descriptions of intelligence as decision support tend to limit the intelligence subject to more formal decision-making, leaving all other kinds of organizational perspectives unaccounted for. 49 from this brief overview we can derive a possible explanation as to why intelligence appears to be prescriptive instead of descriptive, and why this creates problems for researchers. as long as we chose to describe intelligence in the context of formal decisionmaking, intelligence will be nothing less than the logic and deductive result derived from an idea that organizations are the result of formal decisions. intelligence will, in this perspective, be explained as the process that makes formal decision possible, feeding correct information to the decision-makers in order for rational choice to be a correct assumption. theories come before empirical data, which in consequence allow for a poor fit with reality. as a consequence, we will only be able to study those aspects that theory permits us to study, and at the same time we will be blind to aspects that are not accounted for in the theories guiding our understanding. this deductive way of reasoning favors those aspects that are apparent in the intelligence cycle, the model that comes with favored theories. this will not give a viable account of reality, which is where most research is conducted and why it will also give researchers problems in handling data that do not comply with guiding theories. for those who still like to limit the field of intelligence to this restricted view on knowledge, the value of formal decisionmaking has long been discussed and questioned, since the rise of empirically based decision making theories in the late 1950s. lindblom’s article the science of muddling through [1959] and march and olsens garbage can theory [1979] are just starting points for a discussion of how organizational decisions are really made. we could also add simon’s extensive work on bounded rationality [1945, 1982, 1991] that leaves all humans with just one option: to seek satisfying decisions instead of ideal decisions. what these theories are saying is that rational decisions can't be made. they are ideals resting on obsolete perspectives on organizations that surfaced about a hundred years ago with weber, fayol and taylor. the only places where we find them are in our dreams, and in textbooks on strategy, mintzberg, ahlstrand and lampel [1998] would add. to resolve this troublesome situation we'd better accept the limitations of formal decisionmaking [see e.g. brunsson 2002; mintzberg 1973; mintzberg et al. 1998], but also accept that most decisions inside organizations are of other types, as lord and maher [1991] argue. besides this, by focusing on decisions we will not fully understand what other organizational activities are in need of intelligence, and how they are related to one another (see hoppe, 2013b, for an example of how scouting is related to intrapreneurship). of course there are still formal decisions, and they do count. but, according to my research based on interviews with different intelligence professionals and their clients for my phd, the big formal and strategic decisions are exceptions to the rule. what my research has brought to light is that the art of intelligence, just like the art of management, is the art (not science) of “muddling through”. it's focused on the everyday troubles of the intelligence clients, where the intelligence staff struggles to make their clients take more contextual aspects into account in their work, instead of relying on their present limited understanding of things. it's also a much more symbiotic relationship where information not only is retrieved, analyzed and disseminated. instead, information is shared in a two-way game, and analysis is created within conversations expanding beyond the formal intelligence discipline. as an example, one of my informants let the analysis evolve by letting it pass through different discussions where each discussion added different perspectives to the analysis but also helped to decide what the next step would be and who else to involve. at the same time, those involved shared their information and ideas (aka knowledge) of the subject at hand, and in this manner created a common and actionable understanding of aspects important for the organization. 4. an ideal way of organizational thinking judging by my empirical data, a complimentary view of what intelligence professionals actually do is to say that they are supporting an ideal organizational way of thinking. this is a thought that will contribute to the well-being of the organization, which can be defined in three dimensions: • think beyond what’s happening right now. expand your reasoning into possible future developments. • think beyond those aspects closest at hand and the actors and organizations that are directly affected by each issue. expand your reasoning to aspects, 50 actors and organizations that are indirectly affected. • think beyond your own and your organization’s interests. judge the situation from several perspectives and chose the path that's the best for your organization, not for you. through their actions, products and tools, the intelligence professionals i studied aim at making people expand their reasoning in these three dimensions: beyond their own bounded position in time, room and interests. but it's also about making their clients aware of their shortcomings, to never be satisfied with their present understanding of things and taking action to do something about it. the products – the artifacts of intelligence – are just tools to accomplish this changed reasoning. just because intelligence artifacts exist doesn't mean that they have a real value as ends in and of themselves. they are means, not ends. regretfully, we are likely to view them as ends if we rely on models like the ic for describing intelligence (as many do, according to ganesh et al. [2003] and treverton [2004]). relying on the ic, it's quite easy to argue that the effectiveness of intelligence can be found in its material output (reports, dissemination), as the cycle defines intelligence as a production process. it's a seductive stance that invites us to think intelligence can be easily described, controlled and measured. as this view rests on an assumption of disciplinal rationality and control, one might also claim that intelligence professionals set to work in this process are neutral, putting together objective intelligence for the outspoken need of others. but once again, these are ideas that crumble in contact with reality. all people who deal with information are limited to their own bounded abilities to search, value and analyze information [simon 1945, 1982, 1991]. but that's not all, where jeffrey pfeffer [1992] writes: "our belief that there is a right answer to most situations and that this answer can be uncovered by analysis and illuminated with more information means that those in control of the facts and the analysis can exercise substantial influence. and facts are seldom so clear cut, so unambiguous, as we might think. the manipulation and presentation of facts and analysis are often critical elements of a strategy to exercise power effectively.” [247248] this is a troublesome statement for those who believe that intelligence professionals serve decision-makers with non-biased information and analysis [e.g. furustig and sjöstedt 2000; murphy 2005]. but if we instead chose to see intelligence professionals as organizational agents for an ideal organizational thinking then this problem ceases. according to this perspective, intelligence professionals are aiming to influence and exercise power. they are trying to manipulate the information to make their clients change their thinking, reaching beyond their present understanding of things. my informants engage in war games and workshops. these two examples can be viewed as the most effective tools to reach the main objectives of intelligence: to help people think and act better to make better decisions. this is the true mission of intelligence work, not the production of intelligence artifacts. viewing intelligence as something that goes beyond the material output and the clear-cut boundaries of the intelligence discipline will open up unexplored dimensions of intelligence. these dimensions will add to our understanding of what intelligence managers exactly do (to comment on calof’s statement above) and what intelligence does to organizations. these dimensions have no definite end, and intelligence will accordingly never be fully explored, not to say easily defined and measured. 5. “intelligence is bubbling” this calls for another note of caution as most writers in the field of intelligence indirectly suppose that the art of intelligence is restricted to those who have it in their job descriptions. this is not at all true, as i argue above. but i'm far from the first to notice this. john prescott wrote this 20 years ago [prescott and smith 1989], but it has also been touched on in later studies [e.g. gibbons and prescott 1996]. this is done even more explicitly so in sven hamrefors [1999], who forcefully argues that all people inside an organization seek the meaning in their specific situation, creating their own intelligence if no one else helps them with it. unfortunately, these studies are more or less neglected by researchers. what this research tells us is that intelligence is created everywhere. "it bubbles," as one of my informants put it, continuing to explain that it was her job to support this bubbling intelligence. and this is not a small remark at 51 the side of the page. what this tells us is that we can't restrict the intelligence subject just to those who have it in their job descriptions. all employees work to improve their information sets. all employees are thus working with intelligence. this is the true face of intelligence work, not formalized business intelligence teams, etc. furthermore, it also tells us that at least some intelligence professionals right now strive to support the creation of useful intelligence wherever it might surface. stating this, it becomes apparent that we no longer can limit the creation of intelligence to some specific formal unit and the use of intelligence to some other formal place. if we do, we risk adjusting empirical data so it will fit with our theories, or we sell consultancy ideas that will never be implemented because organizational life is never this way. to raise the stakes, i'll argue from my observations that for most organizations, informally constructed intelligence is much more important than formal intelligence [see also gibbons and prescott 1996]. this is mainly because informally constructed intelligence is created closer to the user, those who are supposed to act on it. acting is much more dependent on what we feel and think and not on so-called impartial information, especially when it comes in writing [brunsson 2002]. with reference to hamrefors [1999], it can also be argued that informal intelligence activities always precede formal intelligence. therefore, it's not surprising that most of my informants actively seek to involve their clients in the analytical processes of intelligence. remember, the intelligence processes and artifacts are just tools to support and strive for ideal organizational thinking. to make the organization’s members do intelligence, and do it better, is inside the normal definition of the job. the intelligence i'm describing is the intelligence carried out in live organizations, not theoretical organizations. the live situation is what real intelligence professionals adapt to. they do not adapt to artificially prescriptive ideas of how intelligence is supposed to work, according to dominating theories on intelligence. furthermore, intelligence is in its adaption a much more emergent task than planned. my informants are pretty much left to themselves to create results that make a difference [see also treverton 2004, 106]. to view them as simply answering the commands and whims of formal decision makers does not do them or their profession justice. this is actually also one of benjamin gilad’s [2008] main points when he spurs the new intelligence professionals to go for the fun. 6. the importance of water but how does this agree with the normal way of describing intelligence? can intelligence still be regarded as restricted to intelligence managers preparing analytical support for formal decision-making? with this question comes a choice. it's quite possible to answer "yes," but with this yes comes an obligation to clearly state that the knowledge searched and gained is only viable within a restricted part of a wider field of research. those who pursue this path cannot, at the same time, state that they cover the whole intelligence field. those who make this choice will also be of little help building an intelligence science, covering other aspects and perspective on intelligence that their outspoken position will restrict them from acknowledging. as i've argued that a more becoming answer is "no," as this will allow us to explore intelligence more candidly. unfortunately, there are many writers and researchers who don't agree with me, where the most outspoken of which seems to be benjamin gilad [e.g. 1988, 1996, 2003]. even though gilad often takes a pragmatic stand, his writing usually revolves around formal structures for the creation of formal intelligence for formal decisions at the top levels of organizations. to carry it further, gilad’s works can be viewed as important contributions to a writing tradition that focuses on practical advice and analytical aspects of intelligence, according to solberg søilen [2005]. with this i agree, but i must disagree when solberg søilen asserts that we should stick to this tradition in building an intelligence science, especially as solberg søilen states "it should be a positive science in the sense that it should not mix science with too much philosophy."[ibid:14] on the contrary, if we want a true science to emerge then we need to accept different philosophical foundations for its knowledge constructs. but that's not all. there will never be a true science of intelligence as long as researchers fail to recognize the existence of different knowledge interests, and/or just keep researching the art and discipline of intelligence. the problem with this path is that it most likely will hinder those pursuing it to 52 create a fertile distance between themselves and the subject they are researching. as a lot of intelligence research is constructed today, it lacks independence from the practice and, consequently, will never gain the trust of academia at large. the how-to-dointelligence tradition of the field has created an insider perspective that works like a paradigm for how to think and do research on intelligence. of course people, especially on the inside, might call this a science, but this doesn't mean that those on the outside will agree. the media theorist marshall mcluhan [1995:35] once said ”we don't know who discovered water, but we are pretty sure it wasn't a fish.” building on this metaphor it can be argued that as long as most researchers are swimming in the same water as the practitioners, they will never be able to discover how much the water is influencing both their perception and their chances to give a viable account of what intelligence is really about. of course there are a lot of good things to be known about the swimming habits of fish, but these will not tell us anything useful about the water or how seagulls regard fish (except that fish better stay clear of the surface). what we need is a reflective division between the practice and the science, where we once again can use the idea to divide the topic respectively between the art and the discipline. to find ideas about how to make this division, we can learn from others who already have done it. my suggestion is that we turn to the subject of marketing. 7. learning from the emergence of marketing ingmar tufvesson [2005] describes how marketing, over a hundred years, became both a practice and a science. the marketing subject was formed in the 1950s, but it was not until the 1980s that a more independent and critical research tradition formed [see also vironmäki 2007; svensson 2007]. one of the problems slowing down the process was that both practitioners and researchers shared the same theories, models and concepts but due to different knowledge interests gave different meanings to the symbols and words used. tufvesson illustrates this clash of contexts in figure 1. due to this conflict, a lot of time and energy was wasted in disputes over how marketing was to be approached and understood. a conflict that, in retrospect, could have been resolved sooner if those involved would have shown a more benign attitude towards one another’s thinking. over the years, more and more researchers took an interest in marketing, more business schools put marketing into their curriculum and after a while independent periodicals emerged. these periodicals were very important as they allowed researchers to develop their ideas independently from more practical demands from marketing professionals. today a situation has developed where business schools, according to vironmäki [2007], incorporate both "marketing academics" (focusing on marketing as a topic), and "marketing scholars" (focusing on marketing as a discipline). both are necessary, as they serve different knowledge interests, vironmäki concludes. i believe that there are some important things that the field of intelligence can learn from the development of marketing. first, we must accept that the process of creating a science will take time. second, there is most likely a need for both intelligence academics and intelligence scholars, and both have a rightful place in the business school environment, not to mention in creating knowledge about intelligence. a clear division between scholars and academics is to be regarded as a theoretical simplification for the sake of argument. this also poses a question: how do these two groups balance today? judging by my research, most contemporary writing focuses on the art ! marketing as a function marketing as a topic theories/ models/ concepts research context actor context figure 1 tufvesson’s model describing the clash of contexts in the development of the marketing subject (interpreted from tufvesson 2005) 53 of intelligence, not the science, and therefore can be classified as knowledge constructs for intelligence scholars. the writings and knowledge for intelligence academics are thus left wanting. the situation is worsened by a limited amount of intelligence academics, but also through the lack of independent periodicals and conferences where the topic of intelligence can be discussed without the influence of the more practical aspects and concerns. fleisher, wright and tindale [2007] touch upon the problem with present intelligence writing when they encourage researchers to produce better articles: "the field would be better served in both the short and medium term [...], by articles appearing in well-established disciplinary and cross-disciplinary outlets. it could be argued that until, and unless, high level research is carried out and published through wellaccepted or well-read outlets, ci will never achieve its place at the board table or in the curriculum of degree-based programs at top business schools.” [44] although the authors’ solution is to make intelligence studies fit into already existing outlets, they indirectly argue that most intelligence research today doesn't have the right qualities for getting published anywhere besides scip’s periodicals. another way of putting it is that most of the present research isn't interesting enough for other academics. it fails to connect. scip’s ongoing project of redesigning the journal of intelligence and management so that it will become more accepted in academia, is a welcome initiative. [author’s note: this was written in 2009, before the journal was closed.] but, i must regretfully admit that i do not think this will do at all. as long as scip is mainly a practitioners' organization, there will always be restrictions for its periodicals to become the main arenas for discussions on the topic of intelligence. i would also like to stress that i don't suggest that either scip or its periodicals should change. the point is instead that those of us who are interested in the topic of intelligence can't expect someone else to do the job for us. instead we have to form our own forums, but also start to question existing and limiting ideas of the field, the normality that is maintained by the prominent inside perspective. those who adhere to this call will, at the same time, attract attention to themselves, and in due time an avant-garde of intelligence academics will form. 8. coming to terms with organized intelligence work returning to the example of marketing, intelligence is not a field that has come together over one single dominating term. there are numerous discussions whether the intelligence field should be labeled competitive intelligence, business intelligence or something equivalent. i suggest that we leave all the existing labels of the art to the practitioners. instead we, the intelligence researchers, have the opportunity to find a term of our own. this term can separate the academic field from the intelligence practice, but also allow us to embrace all intelligence activities that are carried out, regardless of the label. let us focus on what's actually being done instead, and find a term that describes what we study. my own suggestion is that we should use the term organized intelligence work. today this term is unaccounted for and relates to one of the first (and still viable) academic works on intelligence: harold wilensky’s book organizational intelligence – knowledge and policy in government and industry [1967]. unfortunately, wilensky’s term organizational intelligence is used in a discussion about organizations displaying human-like intelligence (smartness), constraining the direct adoption of this particular term. by picking up the term organized intelligence work we will also free ourselves as academics from unnecessary restrictions that epithets such as "business" or "competitive" bring to mind. hence, this will give us a chance to research the field without being forced to accept – or worse, adapt to – current definitions set by practitioners. 9. out of the water in the process of taking this necessary step out of the water and addressing questions about the meaning of organized intelligence, i've conducted an extensive reading of current ciliterature and literature on organization, decision-making and leadership. in addition, i've collected empirical data on intelligence from four different swedish multinational companies. these studies were carried out in 2003 and 2006 and encompass twenty semi-structured interviews. the final results are presented in my thesis the myth of 54 the rational flow [hoppe, myten om det rationella flödet, 2009]. some of the arguments i've put forward in the present paper are based on this research and writing, but there is more to be extracted. i've already discussed the idea of ideal organizational thinking and touched upon the idea of ideal informative flow. i will now expand a bit on the latter as it can help us understand why many organizations use the ic to explain why they chose to implement organized intelligence activities. in this discussion i'm distancing myself from the intelligence discipline and getting closer to the topic of intelligence in general. 10. the idea of an ideal informative flow supposing decision makers knew what they needed to know, that sufficient intelligence could be collected to fulfill these needs, that all organizational interests could be satisfied in each decision, that decision makers could agree on the meaning of the collected intelligence and gain a common understanding of things, and that the rest of the organization would easily adhere to the decisions taken – only then would the ic give an exhaustive description of how intelligence is created and used. as both practitioners and academics know, these occasions are rare. still, many organizations use the ic for explaining the adoption of intelligence, and one might ask why. new institutional theory will provide us with an appealing answer. all organizations are in need of symbols that tell their interest holders that the organization is run in a rational way and that the management is in control [brunsson 2002; meyer and rowan 1983; powell and dimaggio 1991; røvik 2000; sjöstrand 1997]. to be able to implement intelligence by describing it in accordance with the intelligence cycle – as a discipline for formal decision-making – is just the type of easily used symbol of rationality organizations crave. that the true organization and true intelligence doesn't live up to this ideal is of less importance to an organization in need of legitimacy. to the intelligence professional the ic also comes in handy to describe what intelligence conceptually is about and why intelligence professionals, like themselves, are important to the organization. according to my research, these are the most important aspects (besides the unreflected tradition) in explaining the continuous use of models like the intelligence cycle. in this respect, the ic follows a political logic, not the logic of empirical description. as with the ic, the idea of an ideal informative flow has political value and it will also most likely live on for a long time. what we, intelligence researchers, should do is accept this, but also recognize that we need other complimentary models and descriptions of intelligence work: models and descriptions that will give us the freedom to develop an empirically grounded intelligence science based in reality, not how things are supposed to be, or we wish they were. the new intelligence science must be descriptive. 11. summary in this paper i've compressed a vast and difficult discussion that revolves around some problems with contemporary intelligence research and also the possibility of forming an intelligence science. with inspiration from the emergence of marketing, i've suggested that our understanding of intelligence can become better if we work together exploring the topic of intelligence in all its complexity, hence building a foundation for intelligence as a discipline. doing this, the first step would be to acknowledge the existence of different, but still legitimate, knowledge interests. the second step is to find a term that depicts the unit of study for those interested in researching intelligence. for this second purpose i promote here the term organized intelligence work. we also need to find other models and perspectives of intelligence that will allow us to view this important organizational phenomenon in new, more realistic ways. the prevailing reliance on models like the ic is unfortunate as it rests on theoretical ideas that exhibit severe drawbacks when confronted with empirical data and observations. to solve this situation i suggest we should pay less attention to the material output of intelligence and instead focus on intelligence as a tool for supporting better organizational thinking. 12. references brunsson n (2002) the organization of hypocrisy : talk, decisions and actions in organizations, malmö: liber calof j (2006) the scip06 academic program – reporting on the state of the art, journal 55 of competitive intelligence and management, 3(4), 5-13 ecis call for papers (2009) ecis 2009, the third european competitive intelligence symposium, stockholm, sweden, june 1112, 2009 fleisher c s, wright s and tindale r (2007) bibliography and assessment of key competitive intelligence scholarship: part 4, (2003-2006) journal of competitive intelligence and management, 4(1), 34-107 furustig hand sjöstedt g (2000) strategisk omvärldsanalys, lund: studentlitteratur. ganesh u, miree c e and prescott j (2003) competitive intelligence field research: moving the field forward by setting a research agenda, journal of competitive intelligence and management, 1(1), 1-12 gibbons p t and prescott j e (1996) parallel competitive intelligence processes in organisations, in international journal of technology management, special issue on informal information flow, 11(1/2), 162-178 gilad b (1988) the business intelligence system: a new tool for competitive advantage, new york, ny: american management association gilad b (1996) business blindspots : replacing myths, beliefs and assumptions with market realities, calne: infonortics gilad b (2003) early warning: using competitive intelligence to anticipate market shifts, control risk, and create powerful strategies, saranac lake, ny, usa: amacom gilad b (2008) no, we don't know what makes intelligence functions effective. so what now? in k sawka and b hohhof (ed) (2008) starting a competitive intelligence function, topics in ci 3, alexandria, virginia: competitive intelligence foundation. hoppe m (2009) myten om det rationella flödet, diss, åbo: åbo akademi hoppe, m (2013a) the intelligence worker as a knowledge activist – an alternative view on intelligence by the use of burke’s pentad”, journal of intelligence studies in business, 3(1), pp. 59-68. hoppe, m (2013b) working as technology scout and techno-intrapreneur in françois thérin (ed.) handbook of research on technoentrepreneurship, 2nd edition. cheltenham: edward elgar. hamrefors s (2002) den uppmärksamma organisationen : från business intelligence till intelligent business, lund: studentlitteratur lindblom c e, (1959) the science of “muddling through”, public administration review, 19(1), 79-88 lord r g and maher k j (1991) leadership and information processing: linking perceptions and performance, people and organizations, volume 1, boston, unwin hyman march j g and olsen j p (1979) ambiguity and choice in organizations (2 ed), bergen, oslo, tromsö: universitetsforlaget mcluhan m (1995) essential mcluhan, new york, ny: basicbooks meyer j w and scott w r (1983) organizational environments ritual and rationality, beverly hills, california: sage mintzberg h, ahlstrand b and lampel j (1998) strategy safari: the complete guide through the wilds of strategic management, harlow: financial times/prentice hall mintzberg h (1973) the nature of managerial work, n.y.: harper & row murphy c (2005) competitive intelligence: gathering, analysing and putting it to work, london: gower publishing/ashgate publishing pfeffer j (1992) managing with power: politics and influence in organizations, boston, mass.: hbs press powell w w and dimaggio p j (1991) the new institutionalism in organizational analysis, chicago: the university of chicago press prescott, j e and smith d c (1989) the largest survey of “leading edge” competitor intelligence managers, planning review, 17(3), 6-13 røvik k a (2000) moderna organisationer : trender inom organisationstänkandet vid millennieskiftet, malmö: liber simon h a (1945) administrative behavior: a study of decision-making processes in administrative organizations, new york: the free press simon h a (1982) models of bounded rationality (vol 2), behavioural economics and business organization, cambridge, mass.: the mit press simon h a (1991) bounded rationality and organizational learning, organization science, 2(1), 125-134 sjöstrand s-e (1997) the two faces of management: the janus factor, london: international thomson business press 56 solberg søilen k (2005) introduction to private and public intelligence, the swedish school of competitive intelligence, lund: studentlitteratur svensson kling k (1999) credit intelligence in banks: managing credit relationships with small firms, lund: lund business press svensson p (2007) marknadsföringsarbete, in alvesson m and sveningsson s (ed) (2007) organisationer, ledning och processer (chapter 14), lund: studentlitteratur treverton g f (2004) reshaping national intelligence for an age of information, cambridge university press tufvesson i (2005) hundra år av marknadsföring, lund: studentlitteratur wilensky h l (1967) organizational intelligence, knowledge and policy in government and industry, new york/london: basic books vironmäki e (2007) academic marketing in finland: living up to conflicting expectations, diss, åbo: åbo akademi vol5no3 article3 coverpage vol5no3 article3 48 leveraging organizational knowledge vision through strategic intelligence profiling the case of the romanian software industry gianita bleoju 1 and alexandru capatina 2 1 dunarea de jos university of galati, romania, postdoctoral researcher – al. i. cuza university of iasi, romania 2 dunarea de jos university of galati, romania gianita.bleoju@ugal.ro alexandru.capatana@ugal.ro received june 7, accepted august 10 2015 abstract: this paper presents the empirical testing of a strategic intelligence profiling tool customized for software development companies that we have previously designed, through an abductive methodology. we conducted a quantitative survey to identify the associations between the strategic profiles embedded into the profiling tool (intelligence provider, vigilant learner, opportunity captor and opportunity defender) and four variables with high impact on organizational knowledge: strategic scope, organizational agility, organizational cultural change process and the approach of competitors. we found that the relevance of our strategic intelligence tool’s variables is a consistent base for testing the robustness of the model in software industry, in order to validate the profiling instrument. we consider that the originality of the strategic intelligence profiling tool, tailored to software industry requirements, resides mainly in the foresight capability of the firm, which is highly dependent on less acknowledgeable factors such as: anticipative versus non-anticipative signal processing; the profile specific equilibrium of recognitional versus analytical strategic decision and rising the actionability of tacit managerial knowledge through collective intelligence reliability. keywords: strategic intelligence, maturity model, software industry, vigilant learner, opportunity captor, opportunity defender, intelligence provider available for free online at https://ojs.hh.se/ journal of intelligence studies in business vol 5, no 2 (2015) 48-58 mailto:gianita.bleoju@ugal.ro mailto:alexandru.capatana@ugal.ro https://ojs.hh.se/ 49 introduction our research is focused on the empirical testing, by means of appropriate statistical methods, of a conceptual strategic intelligence matrix reflecting four strategic profiles related to software development companies (vigilant learner, opportunity captor, opportunity defender and intelligence provider). we conducted a quantitative survey in view to identify the correlations between the strategic profiles embedded into the above mentioned profiles and four variables with high impact on organizational knowledge modeling: strategic scope, organizational agility, organizational cultural change process and the approach of competitors. the statistical methods that we used in order to analyze the hypotheses are cross-tabulations and chisquare tests, on a sample of 106 companies from the romanian software industry landscape. the paper is organised as follows: literature review, research methodology, findings and results, valorizing similarities of organizational knowledge vision approaches and we conclude with current and future industry challenges addressed by the profiling tool. 1. strategic intelligence in software industry: a literature review strategic intelligence should provide a company with the information about its business environment; thus, it will be capable to predict changes, design appropriate strategies that will create business value for customers and facilitate the future development for the company in new markets within or across industries (xu, 2007). mcdowell (2008) considers strategic intelligence as being the ability of management to shape itself to fit the particular informational needs of the organization, providing the type of analysis that relates directly to achieving the strategic goals. according to pellisier and kruger (2011), strategic intelligence is the result of the synergy between business intelligence, competitive intelligence and knowledge management, allowing organizations to embed all their information into an easily manageable system in order to meet the intelligence requirements of management’s strategic planning. in the software industry framework, with such intense competition, a company needs a method of analyzing its environment that is more fundamental than the typical methods of scanning and trend analysis. software companies confronted with major uncertainties and life-threatening competition should implement the scenario analysis method. moreover, identifying the interrelationships of the relevant trends that will significantly affect the software industry represents a challenging strategic intelligence task that can be achieved through specialized tools such as influence diagrams and causal maps (schoemaker, 2012). software development projects require knowledge embodied in project managers and software developers, as well as knowledge embedded in technological systems. according to leonard‐barton (1992), “the closer the alignment of project and core knowledge set, the stronger the enabling influence”. ethiraj et al. (2005) suggested that strategic capabilities of software development companies are context-specific and evolve over time through the joint effects of deliberate, persistent firm-specific investments and learning-by-doing approaches. software companies can prepare for technological innovation by sharing intellectual assets through knowledge intensive alliances, recognizing their great use in setting the leading edge of technology and shaping the marketplace (duysters et al., 1999). in this context, the strategic intelligence radars allow them to capture the collaborative opportunities. the emergence of new technologies makes software development more efficient, but at the same time, it is difficult for developers to become proficient with a new technology and managers to understand its impact (lindvall and rus, 2002); in our opinion, the best way to face this challenge is to capture knowledge from the software industry, using the appropriate strategic intelligence tools. embeddedness and knowledge transfer are key determinants of software industry clusters that lead to global competitiveness (dayasindhu, 2002); by taking into consideration these findings, we can state that, dealing with strategic intelligence programs, software development organizations are able to design processes for knowledge transfer and build strategic management capabilities. ajila and sun (2004) investigated two approaches to delivering knowledge to software development projects: “push” and “pull”. first approach is based on tools which allow identifying and providing knowledge to potential users, while the second approach considers that users themselves have to use repositories and other tools to identify relevant knowledge. in both cases, strategic intelligence capabilities are highly required, in order to facilitate the knowledge transfer. the agile methodologies embedded in software development practices can be considered the most significant outcomes of strategic intelligence processes. we have in view four methodologies (meso and jain, 2006): incremental (small software releases with rapid development cycles), cooperative (a close customer and developer interaction), straightforward (considering the possible adjustments during the development process.) and adaptive (an ability to make and react to unpredictable changes). moreover, they address flexibility at the project/product level, but higher level portfolio and product management are beyond the scope, improving performance and reliability through situationally specific strategies, processes and practices (kettunen, 2009). one of the main findings of a research coordinated by aurum (2008) in the software 50 industry reveals that software developers believe in the usefulness of knowledge sharing; the role played by personal networks in capturing and spreading tacit and implicit knowledge was considered as a pillar to foster a culture that encourages it professionals to share their knowledge with others from the software industry; we appreciate that this process is the key enabler of the collaborative innovation networks’ development. the main findings of a research conducted by von krogh et al. (2001) reveals the fact that by sharing existing knowledge on competitors and regulatory environments, the software organizations become increasingly aware of competitors’ moves and possible policy changes that could affect the performance of the company. in their goal to effectively manage speed and change in software development process, the strategic outcomes of agile software companies cannot be predicted in the normal sense of cause-and–effect relationships, but they can be generated by means of patterns, generated through strategic intelligence systems, that have previously produced similar results (highsmith, 2013). 2. research methodology on the basis of a previous research (bleoju and capatina, 2014), based on abductive methodology, reflecting four strategic profiles related to software development companies (vigilant learner, opportunity captor, opportunity defender and intelligence provider) according to their positioning into an innovative strategic intelligence maturity model – simm (figure 1), we developed a conceptual model (figure 2) and four hypotheses to be tested by means of appropriate statistical methods. we chose abductive methodology in the process of designing strategic intelligence maturity model, due to its power to capture and take advantage not only of the systemic character of the empirical evidence from business world, but also of the systemic character of our theoretical model. thus, the dimensions of analysis and the names of simm profiles were previously discussed and validated by experts from software development companies, before their integration into the current research conceptual framework. figure 1 – strategic intelligence maturity model – simm (source: primary research) having in mind the strategic profiles highlighted in simm, we state four hypotheses in order to determine the existence of associations with four relevant variables (strategic scope, organizational agility, organizational cultural change process and approach of competitors’ threats). hypothesis 1: the strategic profiles of the romanian software companies included into research sample are related to their strategic scope. hypothesis 2: the strategic profiles of the romanian software companies included into research sample are related to their organizational agility. hypothesis 3: the strategic profiles of the romanian software companies included into research sample are related to their organizational cultural change process. hypothesis 4: the strategic profiles of the romanian software companies included into intelligence provider vigilant learner opportunity defender opportunity captor strategic intelligence (si) radar focused on competitor analysis strategic intelligence (si) radar focused on the analysis of industry trends propensity for knowledge sharing propensity for counter intelligence practices 51 research sample are related to their approach of competitors’ threats. figure 2: conceptual model of the research each hypothesis aims at identifying the associations between the strategic profile of the software development companies and relevant features related to each variable, according to the table no. 1 table 1 – assumptions of relevant variables associations according to simm framework no variable intelligence provider vigilant learner opportunity captor opportunity defender 1. strategic scope differentiation through knowledge sharing acquisition of new knowledge competences portability effective reaction to strategic movements of the competitors 2. organisational agility strategic agility process agility portfolio agility operational agility 3. organisational cultural change process weak signals of cultural dissonance culture favourable to changes capacity to value the cultural differences capability to monitor the cultural changes 4. approach of competitors’ threats permanent care for upgrades and innovations focus on meeting the clients’ needs instead of attacking rivals competitive advantage on harvesting over competences’ portability high capacity to detect competitors’ threats due to the fact that we embedded nominal variables in the conceptual research model, we analyzed the data by means of cross-tabs and tested the hypothesis with chi-square method, which is used to investigate whether distributions of our variables differ from one to another. the chi-square compares the observed count in each table cell to the count which would be expected under the assumption of association between the variables included in cross-tabs. a low p-value (<0.05) indicates greater statistical significance, outlining a greater confidence and confirming that the observed deviation from the null hypothesis is significant. 3. findings and results in this section, we will outline the results of the four hypotheses tested through chi-square method, as previously mentioned. hypothesis 1: the strategic profiles of the romanian software companies included into research sample are related to their strategic scope. strategic profile according to simm vigilant learner opportunity captor opportunity defender intelligence provider strategic scope organizational cultural change process organizational agility approach of competitors’ threats 52 table 2 – cross-tabulation between strategic profile and strategic scope table 3 – chi-square tests related to first hypothesis value df asymp. sig. (2-sided) pearson chi-square 32.647 a 9 0.000154 likelihood ratio 31.176 9 0.000276 linear-by-linear association 13.480 1 0.000241 n of valid cases 106 as p-value determined in this case (0.000154) is smaller than the level of significance (0.05) and pearson chi-square value (32.674) is higher than its standardized value reflected by chi square distribution table for 9 degrees of freedom (16,919), we can conclude that there is an association between strategic profiles of the romanian software companies included into research sample and their strategic scope. the in-depth analysis of the research results outlines opportunity captors and opportunity defenders’ behavior, as regard new knowledge aquisition and effective reaction against competition, while the other two profiles intelligence provider and vigilant learner are validating their identity upon featuring sharing knowledge and competence portability respectively. the strategic scope features: knowledge sharing differentiation; acquisition of new knowledge; competence portability and effective reaction to strategic movements of competitors are best matching the si profiling role upon leveraging organizational knowledge vision. our simm claims to overcome the rigidity of a traditional maturity framework, being designed as auto adjustable actionable learning solution, through recalibrating the classical assessment toward a portfolio of exploring anticipative maturity profile specific trajectories. the observed strategic scope could become a relevant precursor for setting up a strategic trajectory portfolio based on renewal organizational knowledge vision statement, consistent with an emergent competitive identity. hypothesis 2: the strategic profiles of the romanian software companies included into research sample are related to their organizational agility. differentiation through knowledge sharing acquisition of new knowledge competences portability effective reaction to strategic movements of the competitors count 9 1 2 2 14 expected count 4.1 4.2 3.0 2.6 14.0 % within strategic scope 29.0% 3.1% 8.7% 10.0% 13.2% count 11 21 7 2 41 expected count 12.0 12.4 8.9 7.7 41.0 % within strategic scope 35.5% 65.6% 30.4% 10.0% 38.7% count 5 5 8 4 22 expected count 6.4 6.6 4.8 4.2 22.0 % within strategic scope 16.1% 15.6% 34.8% 20.0% 20.8% count 6 5 6 12 29 expected count 8.5 8.8 6.3 5.5 29.0 % within strategic scope 19.4% 15.6% 26.1% 60.0% 27.4% count 31 32 23 20 106 expected count 31.0 32.0 23.0 20.0 106.0 % within strategic scope 100.0% 100.0% 100.0% 100.0% 100.0% opportunity defender total strategic scope total strategic profile intelligence provider opportunity captor vigilant learner 53 table 4 – cross-tabulation between strategic profile and organizational agility table 5 – chi-square tests related to second hypothesis test value df asymp. sig. (2-sided) pearson chi-square 32.783 a 9 0.000146 likelihood ratio 30.739 9 0.000328 linear-by-linear association 6.752 1 .009 n of valid cases 106 a. 4 cells (25.0%) have expected count less than 5. the minimum expected count is 3.30. the second hypothesis tested outlines that strategic profiles of the romanian software companies are related to their organizational agility and is validated by chi-square test, which indicates an association between the variables strategic profiles and organizational agility, as a result of a p-value equal to 0.000146. the organizational agility main characteristics, identifying and capture opportunities, prove to be sustained by opportunity captor process focusing, vigilant learner focalized on products and services, while opportunity defender’ main feature is operational efficiency. we observe also the expected intelligence provider identity based mainly on strategic agility. the organisational agility is the locus of understanding the rationale of the simm conceptual approach and highlights its leveraging role by structuring distinctively the organizational knowledge vision. mapping the bundle of organizational capabilities, simm is also empowering the intelligent filtering through prioritized opportunities, both internal (oc and od process and operational agility) and external (ip and vl strategic and portfolio agility). hypothesis 3: the strategic profiles of the romanian software companies included into research sample are related to their organizational cultural change process. strategic agility process agility portfolio agility operational agility count 6 2 3 3 14 expected count 3.6 3.7 3.4 3.3 14.0 % within organizational agility 22.2% 7.1% 11.5% 12.0% 13.2% count 8 20 7 6 41 expected count 10.4 10.8 10.1 9.7 41.0 % within organizational agility 29.6% 71.4% 26.9% 24.0% 38.7% count 8 2 10 2 22 expected count 5.6 5.8 5.4 5.2 22.0 % within organizational agility 29.6% 7.1% 38.5% 8.0% 20.8% count 5 4 6 14 29 expected count 7.4 7.7 7.1 6.8 29.0 % within organizational agility 18.5% 14.3% 23.1% 56.0% 27.4% count 27 28 26 25 106 expected count 27.0 28.0 26.0 25.0 106.0 % within organizational agility 100.0% 100.0% 100.0% 100.0% 100.0% total organizational agility total strategic profile intelligence provider opportunity captor vigilant learner opportunity defender 54 table 6 – cross-tabulation between strategic profile and organizational cultural change table 7 – chi-square tests related to third hypothesis test value df asymp. sig. (2-sided) pearson chi-square 14.608 a 9 0.102273 likelihood ratio 15.266 9 0.083873 linear-by-linear association 2.679 1 0.101681 n of valid cases 106 a. 5 cells (31.3%) have expected count less than 5. the minimum expected count is 2.77. as regards to the third hypothesis test process, we observe a lack of association between the analyzed variables: strategic profile and organizational cultural change process, due to a p-value (0.102273) higher than the level of significance (0.05) and pearson chisquare value (14.608) smaller than its standardized value reflected by chi square distribution table for 9 degrees of freedom (16,919). we also remark some in depth profile communalities in terms of the tested issue that we consider relevant to underline. first and foremost a culture opened to change is mostly approached by opportunity captor followed by the capacity to monitor the organisational change, which is also prevalent for opportunity defender. vigilant learner confirms its capacity to capitalise upon cultural diversity, while the intelligence provider is slightly more prone to the propensity of organisational change. we consider that the invalidated hypothesis could be explained to the context sensitivity of cultural change process, due to both dynamism of the industry and heterogeneity of corporate culture that inertial declare the openness to change, but less serve to consolidate competitive identity. as a maturity model, the si profiling is validating its early warning role by signaling a risk of strategic dissonance upon the features of organizational cultural change and claim a therapeutic approach, through more refined decision making support, as based on non-repeatable behavior, in the attempt to fully evolve from the fragile capacity to monitor cultural change to the most profitable capacity to recognize the value of cultural differences. hypothesis 4: the strategic profiles of the romanian software companies included into research sample are related to their approach of competitors’ threats. weak signals of cultural dissonance culture favourable to changes capacity to value the cultural differences capability to monitor the cultural changes count 5 3 3 3 14 expected count 2.8 3.4 3.7 4.1 14.0 % within organisational cultural change process 23.8% 11.5% 10.7% 9.7% 13.2% count 7 16 7 11 41 expected count 8.1 10.1 10.8 12.0 41.0 % within organisational cultural change process 33.3% 61.5% 25.0% 35.5% 38.7% count 4 1 10 7 22 expected count 4.4 5.4 5.8 6.4 22.0 % within organisational cultural change process 19.0% 3.8% 35.7% 22.6% 20.8% count 5 6 8 10 29 expected count 5.7 7.1 7.7 8.5 29.0 % within organisational cultural change process 23.8% 23.1% 28.6% 32.3% 27.4% count 21 26 28 31 106 expected count 21.0 26.0 28.0 31.0 106.0 % within organisational cultural change process 100.0% 100.0% 100.0% 100.0% 100.0% total organisational cultural change process total strategic profile intelligence provider opportunity captor vigilant learner opportunity defender 55 table 8 – cross-tabulation between strategic profile and the approach of competitors’ threats table 9 – chi-square tests related to fourth hypothesis test value df asymp. sig. (2-sided) pearson chi-square 14.906 a 9 0.09355 likelihood ratio 14.774 9 0.09732 linear-by-linear association 6.824 1 0.00899 n of valid cases 106 a. 6 cells (37.5%) have expected count less than 5. the minimum expected count is 2.51. the lack of association in the case of the fourth hypothesis corresponding to a p-value (0.09355) higher than the level of significance (0.05) and pearson chi-square value (14.906) smaller than its standardized value reflected by chi square distribution table for 9 degrees of freedom (16,919) outlines the idea that opportunity defender and opportunity captor strong competitive identity and capacity to detect and react to competition atacks, while intelligence provider is consistent with its originary extraction position on competitor analysis and industry trends. the strategic intelligence undertake of this competitive identity profiling is proving useful for upgrading the perspective market oriented versus vision oriented behaviour of the firm and replacing it with the deeper organisational knowledge vision leading role on approaching organisational behaviour. starting with the third invalidated hypothesis we can observe the importance to redefine the organizational knowledge vision framework through anchoring our strategic intelligence profiling instrument and expose its leveraging role. organizational cultural change approach is further analyzed on a comparative basis with another empirically validated complementarity research perspective of the literature. 4. valorizing similarities of organizational knowledge vision approaches the methodological relevance of the complementarily approaches (action research and abductive methodology) outlines a strong validation of both si profiling and risk failure factors of strategic scanning projects. their theoretical and managerial relevance is addressed in terms of maximize market opportunities for the former and minimize industry dissonance for the later. strategic scanning projects failure factors identified (lesca & caron-fasan, 2008) and validated (lesca et al. 2012) are consistent with the simm because of key objectives similarity of both strategic scanning projects and si profiling – leveraging competitive information-through specific permanent care for upgrades and innovations focus on meeting the clients’ needs instead of attacking rivals competitive advantage on harvesting over competences’ portability high capacity to detect competitors’ threats count 7 1 5 1 14 expected count 3.0 2.5 4.0 4.5 14.0 % within approach of competitors’ threats 30.4% 5.3% 16.7% 2.9% 13.2% count 8 10 11 12 41 expected count 8.9 7.3 11.6 13.2 41.0 % within approach of competitors’ threats 34.8% 52.6% 36.7% 35.3% 38.7% count 4 3 8 7 22 expected count 4.8 3.9 6.2 7.1 22.0 % within approach of competitors’ threats 17.4% 15.8% 26.7% 20.6% 20.8% count 4 5 6 14 29 expected count 6.3 5.2 8.2 9.3 29.0 % within approach of competitors’ threats 17.4% 26.3% 20.0% 41.2% 27.4% count 23 19 30 34 106 expected count 23.0 19.0 30.0 34.0 106.0 % within approach of competitors’ threats 100.0% 100.0% 100.0% 100.0% 100.0% total approach of competitors’ threats total strategic profile intelligence provider opportunity captor vigilant learner opportunity defender 56 patterns of recognitional versus analytical decision making systems. the performance differentiator organizational capitalizing on anticipative capacity will enact as leveraging organizational knowledge vision, because encompasses a cognitive process approach of organizational cultural change. some fresh reflection is worth to highlight; the need of increased foresight capabilities at the organization level is already perceived as decisive for the future positioning, what it is not yet obvious and as such, compulsory to be acquired, is the tailoring of the optimal balance of both analytical and recognitional decision systems. the misbalancing position however is stimulating the keep choosing alert, which defines a qualified ready to adjust perspective of organizational knowledge vision. this qualified organizational statusquo explained by profile specific precursors of cultural dissonance is measuring the capacity to deal with competing interests and conflicting objectives. what we define “ready to adjust perspective” is a cultural based specific internal environment selection prone to address the collective intelligence awareness, emergence and sense making, accordingly. the ready to adjust approach to organizational decision system is consistent with inductive behavior presumption of fully awareness therefore assumed consequences and the subjectivity of any choice. organizational ready to adjust perspective and the role of our strategic intelligence profiling instrument by experimenting a whole range of strategic trajectories, from market oriented to vision oriented behavior, allow us to discriminate on types and breadth of decisional support. in formulating the needed decisional guidance it is compelling to distinguish between the following roles: a. consultancy-based upon sector specific deep understanding and suitable solution to be implemented; it contains the know what of the sector and adjust the knowhow of the profile. we advance the high risk of portability incongruence for collective intelligence sense making, but good enough for awareness assessment and emergence, as it is based on similarity of the solution already implemented. the uniqueness of the solution remains doubtful. b. business mentoring, being problem solving focused is distinctively offering decision making support to firm specific equilibrium, in terms of the suitable recognitional analytical framework. it assists top management to identify organizational anticipative capacity needs in terms of knowledge deficit and profile positioning through organizational’ future competence identification. the learning focus is to insure the development of the foresight capability of the firm through establishing the anticipatory capacity dimensions of a specific competitive identity and the future relevant capability of the firm by setting up the ready to adjust perspective. the solution is more profile tailored; therefore it will insure sustainability to assess industry dissonance risk. c. procedural animators, being action oriented, their role is to channel the leadership reflection and profile/firm specific capitalization (collective sense making) through qualified expertise (externally-therefore objective) minimizing any cultural dissonance (competing interests / conflicting objectives) in order to insure internalization of knowledge as organizational competence. very probable an organizational reconfiguration is compelling, in order to insure the rising of the actionability of tacit managerial knowledge through experimenting (learning by doing approach) and the reliability of empowering collective intelligence. the capitalization on collective intelligence sense making becomes performance differentiator, through monitoring at best both cultural and industry dissonance risks, being based on commonalties trained and learnt. the most valuable insight of this solution is the development of organizational collective intelligence role settings based upon own knowledge based interaction (revealing practices of collective creation of sense by exposing reflection mechanisms). we consider this role more context sensitive and therefore it is discriminating better between firms’ competitive identities. we denominate this solution as qualified organization status-quo, as tailored to serve at best the foresight capability. 5. conclusions and future industry challenges addressed by the simm the preliminary conclusions about the simm’s robustness test on empirics in romanian software market is consistent with current debate around balancing inductive with analytical approach for better identify and address the conflicts between the different dynamics of theoretical and managerial framework in order to accommodate the methodological mix. we consider that the literature neglects the following useful insights and we advocate that they could be relevant. one first issue to underline is that our model does not claim to anticipate patterns of organizational strategic behavior, but to channel the debate among researches toward the practitioner’s emergency to dispose of conceptual toolkit. exposing accountable tracking empirics will enable the managerial competence as qualified to discover, consolidate or adjust profile specific rules and routines, based upon commonalities trained and learned. more specific to our case, the invalidation of the third and the fourth hypothesis highlights one significant difference between opportunity captor 57 and opportunity defender profiles as regards organizational cultural change process and approach of competitor threats; these results are consistent with the propensity to repeatable versus non repeatable behavior approach, revealing practices of collective creation of sense, and their respective deriving organizational rules and routines. however, the two profiles (oc and od) will adopt the ready to adjust perspective by consolidating their internal decisional structure with appropriate decisional support business mentoring and procedural animators, accordingly. as regards expected capitalization over profile specific identity, we assert that ready to adjust perspective in the case of oc is to be the best positioned for industry future opportunity mapping, while od will successfully address niche strategy design through the anticipation of the most favorable differentiation. the intelligence provider behavior’s best matching the organizational knowledge vision by capitalizing upon strategic resources, being prone to successfully approach the it sector’s most difficult future challenges, by means of its profile specific competence, best fitting to knowledge intensive demand. as the most illustrative example we can mention cyber security issues, better addressed by the multiplier effect of ip behavior as source of strategic intelligence solutions to be tested by the other tree profiles (vl, oc, od) of our profiling tool embedded into simm. the specific profile approaches to security issues and competitively (=separately) capitalizing on solutions, is becoming an unsustainable strategic behavior, not only due to the magnitude and spread of this threat, but because of envisaged software industry requirements, which will be successfully fulfil only by organizational foresight capability development. the current key success factor –minimizing the customer concern (transaction cost approach) and detriment (targeting) outline the different profile’s capacity to deal with it and is emphasizing a waste of knowledge resources. we advance that simm not only reveals the specific gap of market versus vision oriented behavior, but it is also able to support the managerial design of a portfolio of sustainable strategic trajectories to be deployed through profile specific collective intelligence instruments. using tacit managerial knowledge through experimenting and empowering collective intelligence reliability is the best solution for gradually improving the anticipative capacity of the firm insuring quasi-full coverage of future threats and taped opportunities. we consider that simm and its experimental role is a powerful tool enabling the foresight capability of the firm through specific awareness focusing on knowledge resources modeling allocation. the above mentioned waste of knowledge resources can be avoided or adjusted by an disruptive approach based upon less acknowledgeable factors as: anticipative versus non-anticipative signal processing; the profile specific equilibrium of recognitional versus analytical strategic decision and rising the actionability of tacit managerial knowledge through collective intelligence reliability. the broad outline of the foresight capability approach requires a preliminary analyze against critical influence factors: power, resources and independence on software industry, which reliability’s the source of strategic capitalization upon successful anticipative capacity of the firm. acknowledgements this work was supported by the european social fund through sectorial operational programme human resources development 2007 – 2013; project number posdru/159/1.5/s/142115, project title “performance and excellence in postdoctoral research in romanian economics science domain”. references: ajila, s. a., & sun, z. (2004). knowledge management: impact of knowledge delivery factors on software product development efficiency. in information reuse and integration, 2004. iri 2004. proceedings of the 2004 ieee international conference on (pp. 320-325). ieee. aurum, a., daneshgar, f., & ward, j. (2008). investigating knowledge management practices in software development organisations –an australian experience. information and software technology, 50(6), 511-533. capatina, a., bleoju, g. (2014). the specific valorisation of competitive intelligence profiling on the software industry, proceedings of eckm 2014, 189-197. dayasindhu, n. (2002). embeddedness, knowledge transfer, industry clusters and global competitiveness: a case study of the indian software industry. technovation, 22(9), 551-560. duysters, g., kok, g., & vaandrager, m. (1999). crafting successful strategic technology partnerships. r&d management, 29(4), 343-351. ethiraj, s. k., kale, p., krishnan, m. s., & singh, j. v. (2005). where do capabilities come from and how do they matter? a study in the software services industry. strategic management journal, 26(1), 25-45. highsmith, j. (2013). adaptive software development: a collaborative approach to managing complex systems. addison-wesley. kettunen, p. (2009). adopting key lessons from agile manufacturing to agile software product development—a comparative study. technovation, 29(6), 408-422. leonard‐barton, d. (1992). core capabilities and core rigidities: a paradox in managing new product development. strategic management journal, 13(s1), 111-125. lesca, h., & lesca, n. (2013). weak signals for strategic intelligence: anticipation tool for managers. john wiley & sons. 58 lesca, n., & caron-fasan, m. l. (2008). strategic scanning project failure and abandonment factors: lessons learned. european journal of information systems, 17(4), 371-386. lesca, n., caron-fasan, m. l., & falcy, s. (2012). how managers interpret scanning information. information & management, 49(2), 126-134. lindvall, m., & rus, i. (2002). knowledge management in software engineering. ieee software, 19(3), 0026-38. mcdowell, d. (2008). strategic intelligence: a handbook for practitioners, managers, and users. scarecrow press. meso, p., & jain, r. (2006). agile software development: adaptive systems principles and best practices. information systems management, 23(3), 19-30. pellisier, r. & kruger, j-p., 2011, ‘understanding the use of strategic intelligence as a strategic management tool in the long-term insurance industry in south africa’, sa journal of information management 13(1), doi:10.4102/sajim.v13i1.426 schoemaker, p. j. (2012). how to link strategic vision to core capabilities. sloan management. von krogh, g., nonaka, i., & aben, m. (2001). making the most of your company's knowledge: a strategic framework. long range planning, 34(4), 421-439. xu, m. (ed.). (2007). managing strategic intelligence: techniques and technologies. igi global. jisib-vol-12_nr-1(2022) (3).pdf journal of intelligence studies in business vol. 12 no. 1 (2022) open access: freely available at: https://ojs.hh.se/ pp. 6–19 relationship between emotional intelligence, emotional labour, job stress and burnout: does coping strategy work? banji rildwan olaleye abstract this study seeks to examine the mediation effect of surface acting (sa), deep acting (da), and job stress (js) between emotional intelligence (ei) and burnout (bo) and also the sequential mediation of sa-js and da-js between ei and burnout. it also deepens understanding of the moderating role played by mindfulness meditation (mm) as a coping strategy on the effect of js on burnout. a cross-sectional plan was designed, whereby a survey was randomly used to obtain data from 338 medical personnel from private hospitals in nigeria, and a partial least square structural equation modeling was used to test hypotheses contained and the moderating role of mindfulness meditation as a copying strategy, as well as conducting the study among medical personnel of privately-owned hospital in nigeria health care sector. keywords: emotional intelligence, emotional labour, job stress, burnout, mindfulness meditation, health sector 7 1. introduction emotion has been part of our daily lives, most especially when it comes to handling negative and even positive feelings. emotional intelligence (ei) has been a very key factor in determining employees who can handle stress in the workplace and those who cannot. meanwhile, ei could be either negative or positive, thereby necessary to maintain a moderating balance. extant literature opined on creating a considerate on how ei helps employees minimize emotional labour (el), job stress js, and burnout in an organization. the study conducted by (barchard, brackett, & mestre, 2016) as cited by (maría carmen, cándido, lucía, david, & josé manuel, 2019) shows traits and what controls the stable ability to be able to identify and act in emotive situations such as optimism, motivation, and enthusiasm. secondly, ei ability is mostly referred to as the use of emotions which enables individuals to adapt to their environment and situations, especially during decision making. according to the study conducted by jung tions that have employees with a high level of ei result in higher productivity and perengagement. meanwhile, cho, mohammad & kim (2019), focused on the mediation effect of el and js on ei and burnout with the moderation effect of some coping strategies like direct action, social support, and avoidant only the aforementioned coping strategy which warrants more study to be conducted using other forms of coping strategy as mindful mediation to serve as a moderator, also the study was restricted to only south korean front-line employees of hotels. this warrants broader research to be conducted in a different envithe subject matter, thereby the need for which this research is based. employee with a high incidence of emotional intelligence tends to be more productive in an organization due to their ability to minimize el, js, and burnout. this means employees with lower ei will bring the effect of low productivity. also (maría carmen, cándido, lucía, david, & josé manuel, 2019) with their view on ei as a trait in individuals, connotes that an employee can have the required skill set needed for a particular task, but having a lower level of ei, which brings about the need to balance the skills set with a good level of ei. therefore, a study is necessitated to proffer a solution on how this can be managed using some coping strategies such as mindful meditation as a moderator to help employees cope with el, js, and burnout. this paper discusses the relationship between ei and its effect on el, js, and ultimately burnout with the moderating factor of mindful meditation in employees with a focus on the workforce population of some private hospitals in nigerian. as studies have been conducted previously with restriction to only front-line employees, this is being replicated within the health sector, since staff from the hospital are expected and even demanded to show a happy and welcoming gesture irrespective of their inner feelings. therefore, this research seeks to offer quantitative ripostes to the following questions: a) is there any positive effect of ei on employees’ el and js? b) is ei only important for front-line employees or is it equally important to health workers? c) is there a moderating effect of mindful meditation on the nexus between js and burnout? to show the level of importance of ei and how it affects employees’ job stress magnitude, which will enable organizations to work towards training their employees on how to 2016) studied “why is employees’ emotional intelligence important? the effects of ei on stress-coping styles and job satisfaction in the hospitality industry” concentrating only ied emphasizing mindfulness meditation as an immediate way of moderating an employee’s el and js so as not to experience burnout and ultimately low harmonize diverse previous studies, and proceed further to cover the gap in the area of the health sector and within the african continent, especially focusing on nigeria, which will give a different viewpoint on the pressing matter in extant literature due to different beliefs and cultures. the present study is being made to provide a broader thoughtfulness of ei, and its connection to el, js, and the effect of 8 burnout in employees. this study will seek to understand the upshot of ei on el, js, and its effect on burnout, and also the moderation role of mindful meditation on the nexus between el and burnout. 2. literature review 2.1 conceptual review emotional intelligence (ei) ability to identify others’ emotions and also to of relating to others (salovey & meyer, 1990; ji, songshan & pingping, 2019). this entails an individual’s ability not only in recognizing his emotions but also that of others and make his/her emotions relate to others favorably, as there can be negative relationships and positive relationships. emotional intelligence (ei) is basically of two concerns; the trait and the ability view (barchard, et al., 2016; maria et al., 2019). the emotional intelligence trait is responsible for an individual’s personality which enables him/her to identify processes and action emotive situations such as enthusiasm, optimism, and motivation, while the ability ei is responsible for a personality’s capability to solve problems and adapt to a new or chang(2017), view ei as an individual’s capacity in dealing with shreds of evidence favorably and successfully. emotional labour (el) emotional labour (el) was outlined by cited by (nuran, serpil, & salih, 2012) that it’s the hassle a personal make in designing and dominant his emotions to bring on organizations needed show of emotions within the individual’s social relationship within the organization.) ji, songshan, and pingping (2019) submit that workers will manage their feelings to own a positive show of facial and bodily expressions and this can be done principally to secure a grip or to aim for a decent wage. also, (ji, songshan (sam), & pingping, 2019) cited (diefendorff, croyle, & gosserand, 2005) that el can be operational in three strategies of surface acting, deep acting, and, genuine acting. (1983) and ji, songshan, and pingping (2019), assumes that employee adjusts his/her facial and bodily expressions in step with the principles of the organization once in an exceptional real sense, the individual’s felt emotions don’t seem to conform to the organization’s performance rules required. according to grandey (2000), deep acting (da) occurs once an employee individual’s felt emotions don’t change to the organization’s needed performance, and this warrants the individual using imagination, deep psychological thinking, and memory to suppress the negative emotions to expertise the organizations needed emotions. job stress (js) the requirement of a job or task is more than the capabilities, resources, and needs of the worker (chien-wei, 2010). it is seen as the interface of work settings with workers’ personalities changing usual psychological roles and triggering limits and negative effects. js is a multi-faceted delinquent that incorporates an individual’s features, the sit (cullen et al., 1985; parker & decotiis, 1983; xiachong et al., 2017). summarily, factors relating to stress at work vary based on job nature, the exact stressor’s kind, and the scope of the relationship between stress, and strain. type, and stressor diverges based on job level and type (chien-wei, 2010). burnout burnout as opined by (grandey, 2000) is a situation where an employee experiences emotional exhaustion from a job due to the depletion of energy from an extensive task with a limited source of replenishing energy. also (grandey, 2000), opined that this connotes that employees experiencing burnout can make the individual lose a sense of esteem and accomplishment which will result in lower productivity to the organization. burnout is categorized into three groups; “ 9 ” (carlson, is also a resultant outcome of employee exhibition of emotions of brained emotional energy once a worker is saddled with a responsibila high rate of repetition. the repetitive nature of the work will lead to the employee experiencing burnout which will result in the feeling of a low sense of accomplishment (chiang & job stress, and they are very closely related as the former leads to the latter. 2.2 conceptual framework and hypotheses formulation emotional intelligence (ei) and emotional labour (el) deep acting (da) which is part of emotional labour (el) is affected by the employee’s use of emotions (uoe), which is under emotional intelligence (ei), thereby establishing a link between ei and el. consequently, the hypothesis below was considered. emotional intelligence (ei), job stress (js), and burnout in the study conducted by (lee & ok, 2012) that employees who lack emotional intelligence (ei) usually suffer from consistent job stress which eventually leads to burnout in such employees. this is an indication that there’s a link between ei and burnout through job stress and also considering the connection between ei and el (jung & kim, 2019). brotheridge and grandey (2002) and choi, mohammad, and kim (2019) consider ei as deep acting (da) and surface acting, since observations were made on workers with higher ei regulating their emotional behavior if the need arises. this goes to show that there is a mediating effect of el (da & sa) on ei and developed. mindfulness meditation (mm) as a moderator between job stress (js) and burnout different scholars have shown the moderation roles coping strategies have played on job stress; and burnout. among them are the contributions of various authors such as (devereux et al., 2009) who observed from their study how social support moderates the relationship among perceived job demands, and burnout among workers with disabilities. a study conducted by (wen et al., 2019) highlighted that social support and avoidant coping tend to increase stress in china rather than reduce it. choi et al. (2019), concluded that social support and avoidant coping are both effective coping strategies in their study conducted in south korea. charoensukmongkol (2013), stated that mindfulness mediation is when an employee observes an exercise of calmness by observing either his/her breathing and or walking step as a way of controlling stressful or negative emotions, and also stated that employees who adopt this coping strategy tend to focus more on problem-solving steps to cope with stress and enjoy (2019), stated that job stress in employees is a sign that the employees are about to experience burnout, and that to moderate or control this burnout, organizations should have a training and development program for their employees to teach them some coping strategies that will help them manage the job stress effectively. these coping strategies can be social support, direct action, avoidant coping, meditations, etc. considering the study focuses solely on mindfulness meditation as a coping strategy as a moderator for his study, the following hypothesis was considered. tantamount to erstwhile discussions on extant literature, given below is the heuristic model for the study: 10 2.3 theoretical framework in human resources management and social science in general, there are different theories of general management and human resources supporting ideas about emotions. these theories sometimes may not explain or give an accurate understanding of the concept under study, but they can serve as a basis or foundation upon which a concept is built. this is because they give a rationale for the interpretation of a concept or an ideology. in regards to this study, some theories were considered in understanding the relationship between ei, el, js, and burnout. conservation of resources (cor) theory is a major theory anchoring the connection with the present study, was being espoused by choi et al. (2019), which states that every employee pursues in protecting and conserving his/her resource and in this regard, the mental, physical and emotional energy of such an employee is the energy the individual seeks to protect, which will, in turn, engage the employee in emotional labor as he/she seeks to protect his/her collective energy. another theory that was adopted was the emotional theory of rationality (etor) that emotions are the integral part of humans that allows the brain to function at its highest and best possible level. this further explains why individuals as employees will seek to conserve their emotional energy as explained in the cor theory. 3. methodology participants and measures the study participants constituted a total of 2801 medical personnel from some private hospitals within six states in nigeria, which were recorded to have the highest number of hospitals or medical centers within the nation. ten private hospitals were randomly selected from domly selected to give a total of three hundred. afterward, the sample size determined was doubled, to resolve the non-response problem, questionnaires were valid for the study, implying a 56.3% response rate. a well-structured survey was designed in obtaining responses as adopted from the extant literature. emotional labor was operationalized using a dimensional context from diverse previous studies conducted by brotheridge & grandey (2002), with three items each for surface acting and deep acting. meanwhile, emoitems from the study conducted by chin-shan & ing strategy was measured with three items from a study conducted by irene, therese, and junvie (2019), while job stress was measured with three items (jin, sun, jiang, wang & wen, likert scale was adopted to elicit responses. h4 h1a h3a h2a h1b h3c h1c h2b h3b ei elsa js mindfulness burnout el-da research model. ei: emotional intelligence; el-sa: emotional laborsurface acting; el-da: emotional labordeep acting; js: job stress 11 data analysis the analytical procedure deployed in this study comprises both descriptive and inferential statistics. spss was utilized in describing the sample population frame, in terms of frequencies and percentages, while correlation analysis was run to ascertain the nature of the relationship between variables, and the proposed structural model was subjected to strings of tests; psychometric and multi-collinsquare structural equation modeling (plsexamined using the bootstrapping method. 4. results and discussion 4.1 findings descriptive statistics explored on respondents shows respondents’ appropriateness for the study. the sample comprises three hundred and thirty-eight (338) workers from federal hospitals in nigeria. out of this sample, there were 66.6% females and 33.4% males in this sample. the average age of respondents was 36%, the majority falling within 30-39 years, while the least age fell within the range of 50 years uate degree, while the least response (9.2%) accounted for postgraduate studies. meanwhile, the designation revealed that the majority interviewed were nurses, while an equal proportion (15.4%) came from physicians and therapists, correlational analysis the intercorrelations among the latent and observed variables; burnout, emotional intelligence, job stress, and emotional labour are shown in table 2. explicitly, uoe is positively connected to emotional labour (deep acting r = 0.30; surface acting r = 0.28, p < .01) and job stress (r = 0.21, p < .01), with a moderate and low correlation respectively. a moderate and positive relationship was found between sa (r = 0.36, p < .01), job stress (r = 0.38, p < .01) and burnout, while da had a positive, but low correlation with burnout (r = 0.29, p < .01). also, deep acting (r = 0.71, p .01), and surface acting (r = 0.69, p .01) are strongly and variables categories freq (n = 338) percentages gender male 113 33.4 225 66.6 age below 30 years 70 20.7 30–39 years 141 41.7 40–49 years 50 years & above 98 29 29.0 8.6 education graduate postgraduate 101 206 31 29.9 60.9 9.2 designation physician nurse therapist medical assistants 52 197 52 37 15.4 58.3 15.4 10.9 observed and latent variable correlation. variables mean sd burn da uoe js mm sa burnout 3.340 1.003 1 0.29** 0.45** 0.38** 0.03** 0.36** deep acting 3.644 1.087 1 0.30** 0.71** -0.00 0.77** emotional intelligence (uoe) 3.567 0.835 1 0.21** -0.03 0.28** job stress 3.607 1.186 1 0.02 0.69** mindfulness meditation 3.581 1.258 1 -0.02 surface acting 3.419 0.979 1 12 test of hypotheses the two-stage model of the partial least squares (pls) technique suggested by andersen and gerbing (1988), was used to assess both the structural model and the measurement model. the measurement model was sures the degree to which several items in an composite reliability (cr), were all examined to determine the convergent validity. as suggested by igbaria et al. (1995) and lin & wang (2012), all the items recorded outer loadings above 0.5 and for composite reliability and its sister metrics (cronbach’s alpha and rho a), all constructs measurement model. latent variables convergent validity internal consistency discriminant validity indicators ca rho_a cr ave f-l emotional labour (sa) 0.808 0.811 0.886 0.722 0.850 sa1 i resist expressing my true feelings 0.849 sa2 i pretend to have emotions i don’t have 0.856 sa3 i hide my true feelings about a situation 0.843 (da) 0.819 0.820 0.892 0.735 0.857 da1 i make an effort to feel the emotions that i need to display to others 0.870 da2 i try to experience the emotions that i must show 0.874 da3 i try to feel the emotions i have to show as part of my job 0.827 emotional intelligence 0.878 0.891 0.910 0.669 0.818 uoe1 i always encourage myself to try my best 0.817 uoe2 i am a self-motivated person 0.784 uoe3 i always set goals for myself and try my best to achieve them 0.827 uoe4 i can always calm down quickly when i’m angry 0.827 uoe5 i seek out activities that make me happy 0.833 job stress (js) 0.862 0.862 0.906 0.708 0.841 js1 there are a lot of aspects of my job that makes me upset 0.818 js2 when i’m at work, i often feel tense and uptight 0.823 js3 i am usually under a lot of pressure when i am at work 0.856 js4 a lot of time my job makes me very frustrated or angry 0.867 mindful meditation (mm) 0.912 0.806 0.931 0.817 0.904 mm1 you see for yourself? 0.948 mm2 enhanced your learning abilities? 0.845 mm3 mindfulness meditation? 0.917 burnout (burn) 0.827 0.835 0.884 0.657 0.810 burn1 i feel i treat some residents as if they were impersonal objects 0.775 burn2 i’ve become more callous towards people ever since i took this job 0.842 burn3 i worry that this job is hardening me emotionally 0.800 burn4 i don’t care what happens to some recipients 0.823 ca = cronbach’s alpha, cr = composite reliability, rho = rho_a reliability indices, ave (f-l) = 13 return values greater than the 0.70 thresholds, in the measurement model has converged. convergent validity is maintained, as demonvalues being over the 0.5 criteria (olaleye et al., discriminant validity discriminant validity, inter-construct correlalarcker’s approach (1981). meanwhile, in while the inter-construct correlation is shown larger than the inter-construct correlation of each construct, the measurement model is larcker’s criteria, which is used to determine discriminant validity, have recently been tive, a monte-carlo simulation was used to inant validity, the two-threshold proposed by values for all items fell below limits of less than 0.90, demonstrating a prevalence of discriminant validity among those constructs included in the model. structural model in addition to the measurement model, the structural model was evaluated in this study. causation constructs in an instrument are often tested using the structural model uses bootstrapping of 5000 re-sampling the r-squared, as well as other statistics such as t-statistics, p-value, and f2. direct and indirect effects using the predictor variable’s direct effects on the outcome variables, researchers discovered that emotional intelligence have a positive impact on emotional labour; surface acting 1a: = 0.279, t = 5.378, p < 0.05); deep acting 1b: = 0.298, t = 5.802, p < 0.05), but insignif1c: = -0.017, t = 0.646, p > 0.05). meanwhile, the indirect effect of emotional labor (surfaced acting and deep acting) on the relationship between emotional intelli2a: = 0.098, t = 3.857, p 2b: = 0.131, t = 4.753, p for the hypothesized indirect path contained 3, sa mediates the relationships of emotional intelligence and burnout, while deep acting and job stress could not play a mediating role between emotional intelligence and burnout. 3b 3c are rejected. interaction effect (moderation) mindful meditation (mm) indirectly moderates the direct effect of job stress on burnout was a graph, showing how mindful meditation mm values (-1 sd, mean, and +1 sd), the blue, red, and green lines show how mm affects the path. it becomes ostensible that high levels of mm involvement dampen the positive effect of job stress on burnout, while low levels of mm involvement strengthen the effect of job stress on burnout. variables burn da uoe js mm sa burnout deep acting 0.349 emotional intelligence 0.526 0.343 job stress 0.444 0.840 0.235 mindfulness meditation 0.042 0.029 0.045 0.031 surface acting 0.422 0.842 0.319 0.817 0.058 14 ) commonly referred to as the effect size, be reported in 2). using cohen’s (1988) threshold of 0.02, 0.15, and 0.35 as a standard, they also advocate interpreting the amplitude of effects of small, medium, and large in magnitude, respectively. 2 is greater than 0.15 but below 0.35), all reported effect sizes were of small magnitude, falling below the 0.15 threshold. path analysis result. relationship nfi = 0.809 srmr = 0.055 x2 = 849.050 hypotheses std. error t-value p-value f2 r2 decision direct effects h1a: ei 0.279 0.052 5.378 0.084 0.078 supported h1b: ei 0.298 0.051 5.802 0.097 0.089 supported h1c: ei indirect effects -0.017 0.037 0.460 0.646 0.001 0.548 not supported h2a: ei h2b: ei h3a: ei h3b: ei h3c: ei moderation effect h4: mod*js 0.098 0.131 0.062 -0.020 -0.004 -0.113 0.025 0.028 0.029 0.025 0.009 0.055 3.857 4.753 2.169 0.828 0.469 2.045 0.408 0.639 0.112 0.171 0.022 0.002 0.038 0.548 0.548 0.179 0.179 0.179 0.179 supported supported supported not supported not supported supported path analysis. 15 16 close to 1, and the srmr value of 0.055, which 4.2 discussion the works of previous scholars have established the different relationships between ei-el, ei-bo, ei-el-bo, ei-el-js-bo, ei-el-js-bo with the moderation of avoidant coping, active coping, and social support as moderation variables. with all these previous studies focusing previous study used mindfulness meditations as a moderation variable and also with no consideration to the health sector. therefore, this study focuses on the mediation of el and js on ei and bo with the moderation effect of mindfulness mediation on the health sector using nigerian hospitals as a case study. et al., 2019) on the mediation role js plays between el and burnout, this study also showed the mediation role js plays between ei, el, and burnout. as evidenced from the result, the effect of ei on burnout is mediated by js and also a sequential mediation of sa-js and da-js, revealing that el does not have a direct mediating effect between ei and burnout without the sequential support of js. this implies that without the effect of js, both sa and da do not result in burnout for the medical staff even though ei may impact a resulting sa and da on the staff. this means over-exhibition of ei will result in el i.e., both sa and da but not burnout, and a prolonged el that transfers into js can lead to burnout among medical personnel. in consideration of the previous study by (choi et al., 2019) who took into consideration three different coping strategies to alleviate the effect of js on burnout, i.e. they considered direct action, active and seeking social support. eration role of mindfulness meditation on js and burnout as was supported by the works of medical staff employ to conserve their energy, as explained by the conservation of resources theory (choi et al., 2019). the results showed that when the staff used a high level of mm, it helps in moderating the effect of js on burnout, contrarily, if they apply it at a lower level, it strengthens and increases the effect of js on burnout. 5. conclusion the present study remains high cognizance as it explores various connections between ei, el, js, and burnout and also tried to understand the moderation role mm plays in managing js, of not resulting in burnout among healthcare medical personnel in an african setting like nigeria. this will serve as a basis upon which scholars can investigate this phenomenon not only in asian or european or american countries, but in an african setting, and previously studied focused in the hospitality industry, but with now focusing on health care setting; gaining a wide range of area for further research. practical and managerial implications gested some practical steps for the health care practitioners. because health care work has a lot of emotional demand on the employees, managers need to bring up programs that will train employees on how to adopt and utilize various coping strategies in alleviating js, not only mm but also other coping mechanisms that will help them cope with the high emotional, mental and physical demand of the job. secondly, managers need to ensure in house interviews and reviews are conducted to understand the ei levels of their employees and to assign tasks that will be at a manageable level for such employees that are prone to js. this is because especially as the lives of the patients are at stake and an exhausted employee is a danger to a patient. thirdly, managers can support employees by encouraging them to have time for self-development on ei and also medical schools need to integrate the teaching of ei skills to students studytor and observe employees who are exhibiting signs of js and also advise employees to always speak up when they are experiencing js so that immediate intervention can be made, as js is a sign the employee will soon experience burnout which will impact negatively on the lives of patients, lastly, managers should also design rotations that will not be over tasking on the staff as that can help moderate the rate at which the employees will experience js and or burnout. 17 limitations and suggestions for future research despite all contributions from this study, limits such as a small number of hospitals were being sampled in nigeria, therefore, the cultural factor and the limited data from the few hospitals may have an impact on the conclusion, and focus can also be made on replicating the study in other sectors or country or continent. secondly, the research only focused on mm as the only coping strategy, therefore, future studies can be done integrating other forms of coping strategies like religious coping strategy, especially considering nigeria is a religious country. this will further broaden ies can investigate questions like how does ei tively can they use mm so as not to underuse it and increase their chances of burnout? with these questions answered, contributions will emanate not only to the african healthcare sector but extend to other parts of the world. lastly, the study is a cross-sectional design, with variables measured purely with a sura longitudinal study on a causal effect among variables for a long-range period of observation. references anderson, j. c., & gerbing, d. w. (1988). structural equation modeling in practice: a review and recommended two-step approach. barchard, k. a., b. m., & mestre, j. m. (2016). , 4–7. doi:https://doi.org/10.1177/ 1754073916650562 brotheridge, c. m., & grandey, a. a. (2002). emotional labor and burnout: comparing two perspectives of “people work”. , 19–35. ten, d. (2012). abusive supervision and emotional labor and burnout. , 1–11. ing job stress and burnout of hotel room attendants: internal marketing and organizational commitment as moderators. , 1–18. chien-wei, c. (2010). job stress, coping strategies, and burnout among hotel industry supervisors in taiwan. , 15. fect of job stress on self-reported safety behaviourin container terminal operations: the moderating roleof emotional intelligence. , 9–18 . tion, salience, and attitudes toward criminal sanc tioning. criminal justice and be havior, 12(3), 305–331. https://doi.org/ 10.1177/0093854885012003003 cohen, j. (1988), statistical power analysis for the behavioral sciences, lawrence erlas mediators or moderators of the impact of work stressors on burnout in intellectual disability support staff. opmental disabilities, p. 7 & 8. doi:10.1016/j. ridd.2008.07.002 antecedents of emotional labor strategies. , 1–3. retrieved 12 16, 2019, from http://isiarticles. com/bundles/article/pre/pdf/69853.pdf apeutic practice upon psychotherapists. (2), 174–182. https://doi.org/10.1037/ h0088488 structural equation models with unobror. journal of marketing research, 18: 39–50. grandey, a. a. (2000). emotion regulation in the workplace: a new way to conceptualize emotional labor. , 1–16. retrieved 12 16, 2019, from https://psycnet.apa.org/doigolafshani, n. (2003). understanding reliability and validity in qualitative research. m., sarstedt (2017). a primer on partial least squares structural equation 18 modeling (pls-sem), 2nd ed., sage, thousand oaks, ca. (2015). a new criterion for assessing discriminant validity in variance-based structural equation modeling. journal of the academy of marketing science, 43 (1), 115–135. tation as an on-the-spot workplace intervention. , 1–12. coping strategies, and burnout among hotel industry supervisors in taiwan. , 15. the impact of coping strategies on occupational stress and turnover intentions among hotel employees. , 11. is employees’ emotional intelligence important? the effects of ei on stress-coping styles and job satisfaction in the hospitality industry. , 1–6. retrieved from https://www.emerald.com/insight/content/ effects of mindfulness meditation on mindfulness, igbaria, m., iivari, j., & maragahh, mental wellbeing, and perceived stress. currents in , 4. (2019). emotional intelligence, emotional labor, perceived organizational support, and job satisfaction: a moderated mediation model. , 1–11. (2017). the relationships between job and organizational characteristics and role and job stress among chinese community correctional workers. , 7. role of hotel employees’ gender and job position on the relationship between emotional intelligence and emotional labor. , p2. doi:http://dx.doi.org/10.1016/j. ijhm.2014.08.003 kline, r. b. (2005). principles and practice of tional labor: the antecedents and effects on burnout. , 1–11. lee, j. (., & ok, c. (2012). reducing burnout and enhancing job satisfaction: critical role of hotel employees’ emotional intelligence and emotional labor. , p 3. doi: 10.1016/j.ijhm.2012.01.007 to continued intentions of adopting e-learning system in blended learning instruction: a contingency framework based on models of information system success and tion, 58(1), 88–99. levi, l., sauter, s. l., & shimomitsu, t. (1999). work-related stress – it’s time to act. (4), 394–396. https://doi.org/ 10.1037/1076-8998.4.4.394 maría carmen, m.-m., cándido, j. i., lucía, g., out, anxiety, depression, and stress in secondary education teachers. personality , 1–9. retrieved from https://www.sciencedirect.com/science/article/abs/pii/s0191886919300480 mensions, antecedents, and consequences of emotional labor. (4), 986–1010. https:// doi.org/10.2307/259161 maslach, c. (1982). burnout: the cost of carnuran, b., serpil, a., & salih, d. (2012). emotional labor and burnout at work: a study from turkey. ence, 1–6. ganizational determinants of job stress. formance, 32, 160–177. http://dx.doi.org/10. 1016/0030-5073(83)90145-9 olaleye, b. r., m. akkaya, o. l. emeagwastrategic thinking and innovation performance; the mediating role of absorptive capa bilities. revista argentina de clínica psico lógica, 29(5), 2030–2043. 19 olaleye, b. r., adeyeye, o. p., efuntade, a., arije, b. s. and o., anifowose (2021a). e-quality services: a paradigm shift for consumer satisfaction and e-loyalty; evidence from postgraduate students in nigeria. management science letters, 11(3), 849– 860. olaleye, b., anifowose, o., efuntade, a and arije, b. (2021b). the role of innovation a case study of tertiary institutions in nigeria. management science letters, 11(1), 297–304. salovey, p., & mayer, j. d. (1990). emotional intelligence. imagination, cognition and personality, 9(3), 185–211. https://doi. org/10.2190/dugg-p24e-52wk-6cdg sergio, m.-l., & natalio, e. (2017). emotional intelligence and teacher burnout: a systematic review. , 1–10. retrieved 12–16, 2019, from https://www.sciencedirect.com/science/article/pii/s0883035517 304214 enough. journal of graduate medical education, 4(3), 279–282. hun, w., & wen, s. (2017). the relationships between job and organizational characteristics and role and job stress among chinese community correctional workers. , 1–11. the relationships between teachers’ emotional labor and their burnout and satisfaction: a meta-analytic review. educational , 1–18. vol8no3paper3 to cite this article: garcia-garcia, l.a. and rodríguez-salvador, m. (2018) competitive and technology intelligence to reveal the most influential authors and inter-institutional collaborations on additive manufacturing for hand orthoses. journal of intelligence studies in business. 8 (3) 32-44. article url: https://ojs.hh.se/index.php/jisib/article/view/327 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index competitive and technology intelligence to reveal the most influential authors and inter-institutional collaborations on additive manufacturing for hand orthoses leonardo a. garcia-garciaa and marisela rodríguezsalvadorb* auniversity of sussex, school of engineering and informatics, england btecnologico de monterrey, escuela de ingenieria y ciencias, monterrey, n.l., mexico; *marisrod@tec.mx journal of intelligence studies in business please scroll down for article competitive and technology intelligence to reveal the most influential authors and inter-institutional collaborations on additive manufacturing for hand orthoses leonardo a. garcia-garciaa and marisela rodríguez-salvadorb* a university of sussex, school of engineering and informatics, england b tecnologico de monterrey, escuela de ingenieria y ciencias, monterrey, n.l., mexico corresponding author (*): marisrod@tec.mx received 5 august 2018 accepted 25 december 2018 abstract additive manufacturing (am) is revolutionizing the health industry, where it provides innovative solutions for the production of personalized devices, such as hand orthoses. however, the scientific research dynamics in this topic have not yet been investigated. this study aims to fill this gap through the application of a competitive and technology intelligence (cti) methodology enhanced by a scientometric and network map analysis. major advances in the fabrication of hand orthoses using am, the presence of collaborations, and the most influential authors were determined. specifically, network map analysis, bibliographic occurrence and bibliographic coupling were conducted on documents retrieved from scopus and the web of science (wos), and on patents from more than 104 authorities. results showed only nine published patent families and 34 research articles on this topic from 2006 to 2016. ten papers concern static orthoses, while 24 deal with dynamic orthoses and exoskeletons. the indegree and outdegree parameters and the betweenness centrality of these documents enabled us to determine the most cited authors and instances of collaboration (papers co-authored between institutions). dr. paterson a. m. j. was the most influential author, with four publications with the highest betweenness centrality in the network (189), which accounted for the most cited document with five citations. the institution with the most publications was loughborough university, with four papers, and the collaboration between affiliations was rare. these documents review important aspects of manufacturing orthoses using am, and additionally pay particular attention to the importance of personalised orthoses where am contributes. notably, these papers focused primarily on studies for the development of a methodology for the fabrication of hand orthoses using am, but they do not present any application. this research provides insights to better understand the dynamics of research and development in the orthopaedics domain, specifically for hand orthoses. keywords 3d printing, additive manufacturing, betweenness centrality, bibliographic coupling, competitive intelligence, hand orthoses, network map analysis, scientometrics 1. introduction the competitive and technology intelligence (cti) methodology is a process where information is systematically and ethically gathered to be analysed and further transformed into valuable results that can strengthen decisions for innovation and product development (rodríguez-salvador and journal of intelligence studies in business vol. 8, no. 3 (2018) pp. 32-44 open access: freely available at: https://ojs.hh.se/ 33 tello-bañuelos 2012). public documents, such as patents or scientific publications, represent useful sources of information for cti purposes. while patents register technological inventions (archibugi and pianta 1996), scientific documents aim to publish original research advances. both represent valuable resources to identify and monitor the progress of science and technology (s&t) including predominant research areas, emerging technologies, top researchers, most active institutions in the field and collaborations. they also support decision-making processes for research and innovation efforts (archibugi and pianta 1996; bonino et al. 2010; fabry et al. 2006; rodríguez-salvador et al. 2014). when analysing such documents, applying scientometric methods with cti can provide a better assessment of s&t production (bornmann and leydesdorff 2014; mingers and leydesdorff 2015). these methods use complex tools to process information from dozens to thousands of patents or scientific publications, not only from well-established research areas, but also for emerging technologies such as am (bakhtin and saritas 2016; leydesdorff et al. 2015; leydesdorff and milojević 2015; oldham et al. 2012; porter and youtie 2009; rotolo et al. 2015). although new developments have less information available than established technologies, using scientometric tools is required to significantly dispel the uncertainty surrounding emerging technologies. tools like bibliographic occurrence and bibliographic coupling can be applied to determine the impact, growth or evolution of science (biscaro and giupponi 2014; mccain 1990; white and griffith 1981; zhao and strotmann 2008). while bibliographic occurrence evaluates the presence of specific references contained in scientific documents, bibliographic coupling refers to the frequency of references shared between two or more scientific documents. the higher the bibliographic coupling, the higher the impact of the cited documents (biscaro and giupponi 2014). of the two tools, bibliographic coupling is more suitable for the identification of fundamental research domains (kuusi and meyer 2007; small 1973; zhao and strotmann 2008). additionally, the authors with more influence in a certain area of research can be determined using indegree and outdegree parameters or centrality measures, which are commonly applied in network map analysis. the indegree parameter counts the times that each analysed document is cited by other publications, and the outdegree counts the publications cited in the analysed documents. furthermore, the betweenness centrality measurement has high value for network map purposes. it enables grading of nodes according to their positions. a grade is applied based on the shortest number of paths that pass through a particular node. if a node is in a position that connects different aggregates of nodes, this node will have a higher betweenness centrality (brandes 2001). this measure was used in this research to determine the most influential author by noting if an author is connected to more authors, not only to documents in reference lists. institutional collaboration can be clearly visualised and analysed through network map analysis, which shows the interaction between them. recently, rodríguez-salvador et al. (2017) applied scientometric tools on scientific and patent literature from 2000 to mid-2016 to uncover the knowledge landscape of 3d bioprinting. we also presented a first approach to study the incursion of am on hand orthoses at the 3rd international conference on progress in additive manufacturing (pro-am) held in singapore in may 2018 (garcía-garcía and rodríguez-salvador 2018). this research determined that am is already used in the production of hand ortheses. materials, processes and methods for data acquisition were also detected. however, the current study focuses on the identification of the most influential authors and co-authoring institutions that have carried out research for the use of am in hand orthoses. such orthoses are of significant relevance for treating hand disabilities related to broken bones, congenital conditions or cerebrovascular diseases (colditz 1996; colditz 2002; coppard and lohman 2015; fess 2002; imms et al. 2016). they are used as part of rehabilitation programs to support the affected limb by immobilising it. the most common orthoses are static, but there is also another type of orthosis: the dynamic orthosis. this type of orthosis provides the patient with a limited amount of movement through a mechanical assembly— such as rods, pins, and springs connected to the orthosis’s main body—which is made using the same materials as conventional, static orthoses. static orthoses are fabricated using diverse materials. plaster of paris is the most common, but thermoplastics is also widely used (cassell et al. 2005; colditz 2002; coppard and lohman 2015; fess 2002; fess 2005; schultzjohnson 2002; schwartz and janssen 2005). 34 normally, orthoses can be manufactured in batches using standardised hand measurements (such as small, medium or large), but using personalised orthoses according to the patient’s anatomy and type of treatment, allow for better patient recovery (fess and mccollum 1998; kim and jeong 2015; paterson et al. 2015). am is a technology that can be used for the fabrication of personalised orthoses. am, also known as 3d printing, rapid prototyping or free-form fabrication (fff) (espalin et al. 2010; ventola 2014), is a novel manufacturing process used for fabricating objects by depositing materials in layers from digital models. the models can be generated either through computer aided design (cad) software or image acquisition methods, such as computerised tomography (ct) scans, magnetic resonance imaging (mri) or 3d scanning. am has many advantages over traditional manufacturing, such as reducing material waste, minimising manufacturing cost for complex parts and manufacturing unconventional, personalised shapes (banks 2013; basiliere and shanler 2015; davey et al. 2011; espalin et al. 2010; paterson et al. 2010; schubert et al. 2014; ventola 2014). this increases the attractiveness of am technology. it is a very versatile technology that has the potential to fabricate personalised medical devices, such as prostheses or orthoses. 2. methodology the scientometric tools of bibliographic occurrence and bibliographic coupling, as well as network map analysis, were used within the competitive and technology intelligence (cti) methodology of rodríguez-salvador et al. (2017), with the aim of determining the most active and most influential author and understanding the level of collaboration (coauthoring) between institutions working on the fabrication of hand orthoses using am. the process began with the determination of the most suitable keywords with which to build a search query for both scientific and patent databases. this stage included a review of publications on rehabilitation, therapy and orthopaedics (garcía-garcía et al. 2018). the terms obtained were then assessed by experts on hand therapy who asked to remain anonymous. four main keyword categories were determined as follows: anatomy (e.g., hand, finger, phalangeal), technology (e.g., 3d printing, am), application (e.g. rehabilitation for stroke) and medical devices (e.g. orthosis, splint). figure 1 shows a venn diagram of the keyword groups. these keywords were used to build a general search query in which boolean operators, proximity terms, truncators and wild cards were applied. a set of 100 searches was performed before arriving at a final search query approach. the general query used was based on the following: title-abstract-keyword(((("3d print*") or ("rapid prototyp*") or ("additive manufact*") or ("solid free form fabric*") or ("fuse deposit* model*") or ("selective laser sinter*") or (stereolithography) or (photopolymeri?ation) or "reverse engineering") and ((hand or wrist or finger or "upper limb") w/5 ("static progressive splint*" or "serial static splint*" or "casting motion to mobile stiffness" or orthos?s or orthotic* or orthop?edic or splint* or brace* or cast* or rehabili* or aid or paresis or "poststroke")) or ((dynamic w/10 orthos?s) and ("prototype")) or (dynamic w/10 splint*) or (exoskeleton)) where w/# indicates a search within a specified number of words. this general query was then modified according to each of the databases consulted. patseer, an online patent platform that covers more than 104 leading patent authorities, was used to collect and analyse patents (sinha and pandurangi 2016). to figure 1 main terminology categories. keywords grouped by anatomy, technology, applications and medical devices. 35 search for scientific documents, scopus and the wos were utilized (garcía-garcía et al. 2018). scopus, at the time of the search, contained information from more than 20,000 journals (elsevier 2016), while the wos covered information from more than 13,000 journals (thomson reuters 2011). the time frame to be searched was defined as 1980 to 2016 (2016 was the year in which the information gathering for this study concluded). the year 1980 was chosen because the first reported works on 3d printing technology were published in the 1980s (dormehl 2018). the next step in the methodology was the cleaning process, in which those publications not related to the topic of interest were discarded. during this step, publication titles and the names of authors and institutions were homogenised and the data deduplicated, eliminating repeated items from the data set. then, a bibliographic network map of the publications was generated to identify the most cited authors on the subject. this was achieved through bibliographic coupling, determining the betweenness centrality and finding the indegree and outdegree parameters. a collaboration analysis was also carried out using network mapping to find partnerships between the main affiliations advancing the fabrication of hand orthoses using am. 3. results the overall number of publications obtained from the searches of the three databases (scopus, wos and patseer) was lower than expected. only 15 published patent families were identified in patseer, while a total of 46 publications were obtained from scopus and 33 from the wos. a further cleaning process homogenised the titles of patents and articles, the names of the authors and inventors and the titles of affiliations or institutions. the cleaning process also eliminated duplicates and those patents and articles that, despite containing the terms of the query, were not related to the topic. after this process, a total of 9 published patent families were obtained from patseer and 34 research articles were obtained from scopus and the wos. figure 2 shows the number of publications per year, from 2006 to 2016 (1980 was considered initially, however no information was detected), for each database. the patent families are listed in reverse chronological order in table 1. seven patents were published between 2014 and 2016, one patent in 2010, and the remaining one in 2007. the analysis also showed that the united states has five patents published, making it the most prolific country in the field. from the patents retrieved, only two were closely related to orthoses: ‘methods for integrating sensors and effectors in custom three-dimensional orthosis’ from turkey and ‘systems and methods for generating orthotic device models by surface mapping and extrusion’ from the united states. only one author published more than one patent: james schroeder, whose patents were published in 2007 and 2010 and are related to the customization of implants, prostheses, and surgical instruments and methods of manufacture. of the 34 research articles from scopus and the wos, 24 were about developing dynamic orthoses or exoskeletons for rehabilitation, and only ten were related to static orthoses. as a preliminary result, it was observed that the article with the most citations was a. m. j. paterson’s, published in 2010 (paterson et al. 2010): ‘a review of existing anatomical data capture methods to support the mass customisation of wrist splints.’ a further bibliographic network map (figure 3) was generated to visualize the connection between the publications and their references, and to carry out bibliographic coupling. the map was plotted in gephitm, using the force atlas algorithm. this algorithm is commonly used to emphasise complementarities and to spatialise networks with a small amount of data (bastian et al. 2009; jacomy et al. 2014). figure 3 shows the network map of the documents and their references, where the size of the nodes is proportional to the indegree parameter, which displays the number of citations each document has (gmür 2003) and thus identifies highly cited publications. on the other hand, the outdegree parameter is proportional to the number of references contained in each document. figure 2 publications and patents per year for the wos, scopus, and patseer. 36 table 1 patent families gathered from the patent search in patseer. patent no (pub. date) title assignee inventor priority country br102014029649a2 (31 may 2016) manufacturing process articulated prostheses from a combination of rigid and flexible material in one piece (gomes da fonsêca et al. 2016.) fundaçao universidade de brasilía gabriela freitas gomes da fonsêca,jeferson andris lima lopes, jorge ribeiro cunha da silva, lucas coelho de almeida, marcelino monteiro de andrade brazil wo2016071773a2 (12 may 2016) methods for integrating sensors and effectors in custom three-dimensional orthosis (karasahin 2016) deniz karasahin deniz karasahin turkey us2016101571a1 (14 apr 2016) systems and methods for generating orthotic device models by surface mapping and extrusion ( schouwenburg et al. 2016) sols systems inc. kegan l. schouwenburg, daniel bersak, jeff smith, ciaran n. murphy united states us2015328840a1 (19 nov 2015) use of additive manufacturing processes in the manufacture of custom wearable and/or implantable medical devices ( zachariasen and cropper 2015) joseph t. zachariasen dean e. cropper joseph t. zachariasen, dean e. cropper united states wo2015095459a1 (25 june 2015) robotic finger exoskeleton ( deshpande and agarwal 2015) board of regents, the u. of texas system ashish deshpande, priyanshu agarwal united states jp2014533975a (18 dec 2014) customisable embedded sensors (ranky and mavroidis 2014) northeastern university richard ranky constantinos mavroidis richard ranky, constantinos mavroidis japan cn203935304u (12 nov 2014) novel bionic exoskeleton artificial limb controlled by cable wires (xiogjiao et al. 2014) xing xiongjiao yuan ning zheng haolin xing xiongjiao, yuan ning, zheng haolin china wo2010120990a1 (21 oct 2010) personalized fit and functional designed medical prostheses and surgical instruments and methods for making (schroeder 2010) james schroeder james schroeder united states wo2007045000a2 (19 apr 2007) personal fit medical implants and orthopaedic surgical instruments and methods for making (goodman et al. 2007) steven l. goodman, kyujung kim james schroeder vantus technology corp. steven l. goodman, kyujung, james schroeder, vantus technology corp. united states these categories have the highest frequency of occurrence. patents, letters, notes and standards were also cited in the documents obtained, but so infrequently that they are barely visible on the map. the higher numbers of nodes are for publications related to dynamic hand orthoses, as seen in figure 3. however, the analysis showed that bibliographic information related to am of dynamic hand orthoses came mostly from conference papers (80 percent), and the majority did not have citations up to 31 december 2016. the documents related to static orthoses were mostly journal articles, 37 and only ten percent were conference papers. these documents and their references are circled in figure 3. the lack of interaction between publications related to dynamic orthoses and those for static orthoses can also be seen in figure 3. only one such connection can be noted: ‘hopkinson (2006)’ (hopkinson et al. 2005), which is shown in light green, on the far-right side in the middle of the map. this single connection was cited by paterson et al. (2014) from the set of static orthoses and by madden and deshpande (2015) from dynamic orthoses. the most cited author from the analysed documents was paterson, who published four pieces across a six-year period: paterson et al. (2010), paterson et al. 2012), paterson et al. (2014) and paterson et al. (2015). these publications discussed methods for image capturing and fabricating orthoses using 3d printing. additionally, the betweenness centrality was estimated to identify the authors with more influence on the topic. this parameter is often used to grade nodes on network maps according to their spatial position, based on the number of shortest paths between two nodes that pass through a particular node (brandes 2001). for instance, a node has a high betweenness centrality if it connects different parts of the network to each other, like a train station—different trains from different places running through one centralized station. from the information retrieved, only eight nodes had a betweenness centrality value (table 2), while the value for the other nodes was zero. these eight nodes have an actual betweenness centrality value because they connect, not only to nodes of references, but also to some of the different publications retrieved. it should be noticed that paterson is displayed three times in this list—with values of 189.0, 130.0 and 34.5—which shows the notable influence of the author on the flow of the knowledge network. figure 3 bibliographic network map based on the indegree parameter and kind of document. the colours indicate document type. magenta = papers, dark green = conference papers, blue = websites, grey = manuals, orange = reviews, light green = books, turquoise = theses. the size of the nodes are proportional to their indegree parameters. 38 table 2 weighted indegree, weighted outdegree, and betweenness centrality of the eight nodes with a betweenness centrality value. times cited = times cited in retrieved documents only. publication label weighted indegree weighted outdegree times cited betweenness centrality paterson (2010) (paterson et al. 2010) 5.0 33.0 5 189.0 paterson (2012) ( paterson et al. 2012) 3.0 41.0 3 130.0 madden (2015) (madden and deshpande 2015) 1.0 27.0 1 44.0 weiss (2013) (weiss et al. 2013) 1.0 23.0 1 41.0 palousek (2014) (palousek et al. 2014) 3.0 15.0 3 34.5 paterson (2015) ( paterson et al. 2015) 1.0 44.0 1 34.5 velho (2011) (velho and zavaglia 2011) 1.0 11.0 1 11.0 tang (2013) (tang et al. 2013) 1.0 12.0 1 8.0 figure 4 shows the map of the bibliographic coupling carried out among the publications about static hand orthoses, while figure 5 shows the map of bibliographic coupling for dynamic hand orthoses. in both figures, the size and colour of the nodes are proportional to their indegree parameters; the higher the value, the bigger and darker the node. similarly, the citations received by each node are represented by incoming arrows, while the outgoing arrows are connected to the citing documents. the bibliographic coupling analysis observed that the highest number of coupled cites was 12, between paterson et al. (2014), shown on the right side of the map in figure 4, and paterson et al., (2015), located in the map’s upper corner. however, though the number of shared references was high, these sources were selected by the same author and were, thus, negated for our research purposes. the second set of documents coupled were paterson et al. (2015) and palousek et al. (2014), with four citations in common (namely, faustini et al. (2008), cook et al. (2010), mavroidis et al. (2011) and paterson et al. (2010)), as in figure 4. both paterson (2015) and palousek (2014) described methods for designing customised splints using 3d printing, while the cited papers from faustini (2008), cook (2010), and mavroidis (2011) dealt with the use of am for foot orthoses, serving as referents for figure 4 bibliographic coupling for publications in static orthoses for the hand. figure 5 bibliographic coupling for publications in dynamic orthoses for the hand. 39 researching methods applicable to personalised hand orthoses. for dynamic orthoses, there was a reduced number of papers coupled with their references. this was because there were no documents sharing more than two resources. as this resulted in a bibliographic coupling of less impact, the most cited documents were listed instead. table 3 lists the documents with more citations (4-5). from the documents listed in table 3, paterson et al. (2010) was the only one from the set of static hand orthoses, and this document was published by the institution with the most articles on the subject, loughborough university. the number of institutions with most publications was found to be limited. despite this, loughborough university had the most publications (four papers), followed by the national university of singapore and shanghai jiao tong university, with two articles each. 4. discussion this study applied the scientometric tools of bibliographic occurrence, bibliographic coupling and collaboration network analysis to identify the institutions working on the development of hand orthoses using am. results revealed that the implementation of am for developing personalised hand orthoses is not present in a high number of publications and collaboration between different institutions to publish jointly is rare. from the 34 scientific publications detected, a total of 42 affiliations were identified. a network map analysis was carried out using gephitm, in which only the affiliations with documents cited at least once were considered. this resulted in 20 affiliations. the highest number of affiliations working collaboratively was three: loughborough university coauthored with the university of manchester (paterson et al. 2015) and the royal derby hospital (paterson et al., 2014). this was considered an important collaboration, not only for the number of affiliations involved, but because one of them is a medical institution. a second collaboration with a medical affiliation was found in australia, where curtin university’s school of physiotherapy and exercise science partnered with the mechanical engineering department. these, however, were the only multidisciplinary collaborations the analysis discovered. the limitations of this study lie in the novelty of applying am to medical devices. while the first searches did not produce results when using terms related to dynamic orthoses, this changed after adding exoskeleton terms. exoskeletons provide enormous advantages as, in many cases, they include sensors and electronic systems to improve rehabilitation (iqbal et al. 2010; worsnopp et al. 2007). for this research, a co-citation analysis could not be carried out because of the small number of citations of the documents retrieved. further analyses might embrace a higher number of publications as the application of am in the development of orthopaedic devices is growing quickly. table 3 publications with four or more citations. reference (number of citations) title cited by: paterson et al. 2010 (5) a review of existing anatomical data capture methods to support the mass customisation of wrist splints ( paterson et al. 2012), (palousek et al. 2014), (kim and jeong 2015), ( paterson et al. 2015), (baronio et al. 2016) polygerinos et al. 2014 (5) soft robotic glove for combined assistance and at-home rehabilitation (cincotti et al. 2015), (low et al. 2015), (chin et al. 2016), (yap et al. 2016), (bianchi and buonamici 2016) worsnopp et al. 2007 (5) an actuated finger exoskeleton for hand rehabilitation following stroke (iqbal et al. 2010), (weiss et al. 2013), (tan and robson 2016), (chin et al. 2016), (bataller et al. 2016) bouzit et al. 2002 (4) the rutgers master ii: new design force-feedback glove (winter and bouzit 2006), (iqbal et al. 2010), (velho and zavaglia 2011), (weiss et al. 2013), (tang et al. 2013) schiele and van der helm 2006 (4) kinematic design to improve ergonomics in human machine interaction (reimer et al. 2014), (madden and deshpande 2015), (omarkulov et al. 2016), (bianchi and buonamici 2016) 40 5. conclusion the scientific documents and patents involved in the personalisation of hand orthoses using am were tracked back to 2006 through an enhanced cti analysis using scientometric and network map analysis tools. the main knowledge area involved in this technology was found to be engineering. this information was corroborated in the collaboration analysis, which also disclosed that there has been minor participation of medical affiliations. the analysis uncovered that the relevance of the information retrieved depends highly on the search strategy, which was carried out through the building and testing of different queries that were later validated by experts. despite the low number of publications and patents obtained, the tools used to perform the analysis were useful for identifying main authors, institutions, and collaboration networks. bibliographic occurrence and bibliographic coupling also constituted a valuable resource to understand knowledge diffusion through citations and to determine the dynamic of the research in a specific field. furthermore, network map analyses enabled identification of publishing collaborations among affiliations. the methodology presented in this paper can be implemented to obtain a more complete analysis of the institution’s research dynamics, particularly of emerging technologies. the tools used in this research can be applied over a wide range of areas to better understand the interaction between authors and affiliations, and to identify those most influential in their fields. the proposed method would require future improvement by comparing results with opinions of experts to validate the main outcomes. 6. acknowledgements this work was funded by tecnologico de monterrey through the escuela de ingenieria y ciencias, and it was also supported by a postdoctoral scholarship granted by the mexican national council for science and technology (conacyt). the funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript. 7. conflict of interest the authors declare that they do not have any conflicts of interest. 8. references archibugi, d. and pianta, m. (1996). measuring technological change through patents and innovation surveys. technovation, 16(9), 451468. http://doi.org/10.1016/01664972(96)00031-4 bakhtin, p. and saritas, o. (2016). tech mining for emerging sti trends through dynamic term clustering and semantic analysis: the case of photonics. in daim, t., chiavetta, d., porter, a. and saritas, o. (eds). anticipating future innovation pathways through large data analysis. new york: springer, 341-360. http://doi.org/10.1007/978-3-319-39056-7_18 banks, j. (2013). adding value in additive manufacturing. ieee pulse, 4(6), 22–26. http://doi.org/10.1109/mpul.2013.2279617 baronio, g., harran, s. and signoroni, a. (2016). a critical analysis of a hand orthosis reverse engineering and 3d printing process. applied bionics and biomechanics, 2016(july). basiliere, p., and shanler, m. (2015). hype cycle for 3d printing, 2015(july) , 1-26. bastian, m., heymann, s. and jacomy, m. (2009). gephi: an open source software for exploring and manipulating networks. third international aaai conference on weblogs and social media, 361-362. http://doi.org/10.1136/qshc.2004.010033 bataller, a., cabrera, j. a., clavijo, m. and castillo, j. j. (2016). evolutionary synthesis of mechanisms applied to the design of an exoskeleton for finger rehabilitation. mechanism and machine theory, 105, 31-433. http://doi.org/10.1016/j.mechmachtheory.2016 .06.022 bianchi, m., and buonamici, f. (2016). design and optimization of a flexion/extension mechanism for a hand exoskeleton system. in asme 2016. north carolina. http://doi.org/10.1115/detc2016-59466 biscaro, c., and giupponi, c. (2014). coauthorship and bibliographic coupling network effects on citations. plos one, 9(6). http://doi.org/10.1371/journal.pone.0099502 bonino, d., ciaramella, a. and corno, f. (2010). review of the state-of-the-art in patent information and forthcoming evolutions in intelligent patent informatics. world patent information, 32(1), 30-38. http://doi.org/10.1016/j.wpi.2009.05.008 41 bornmann, l. and leydesdorff, l. (2014). scientometrics in a changing research landscape. embo reports, 15(12), 1-6. bouzit, m., burdea, g., popescu, g. andboian, r. (2002). the rutgers master ii new design force-feedback glove. ieee/asme transactions on mechatronics, 7(2), 256-263. http://doi.org/10.1109/tmech.2002.1011262 brandes, u. (2001). a faster algorithm for betweenness centrality*. the journal of mathematical sociology, 25(2), 163-177. doi: 10.1080/0022250x.2001.9990249 cassell, e., ashby, k., gunatilaka, a. and clapperton, a. (2005). do wrist guards have the potential to protect against wrist injuries in bicycling, micro scooter riding, and monkey bar play? injury prevention, 11(4), 200203. cincotti, c. c., o’donnell, s., zapata, g. e., rabolli, c. m. and busha, b. f. (2015). strength amplifying hand exoskeleton. 2015 41st annual northeast biomedical engineering conference, nebec 2015. http://doi.org/10.1109/nebec.2015.7117082 colditz, j. (1996). principles of splinting and splint prescription. in peimer, c. a. (ed). surgery of the hand and upper extremity. new york: mcgraw-hill, 2389-2410. colditz, j. c. (2002). plaster of paris: the forgotten hand splinting material. journal of hand therapy, 15(2), 144-157. http://doi.org/http://dx.doi.org/10.1053/hanthe .2002.v15.015014 cook, d., gervasi, v., rizza, r., kamara, s. and liu, x.c. (2010). additive fabrication of custom pedorthoses for clubfoot correction. rapid prototyping journal, 16(3), 189-193. http://doi.org/10.1108/13552541011034852 coppard, b. m., and lohman, h. (2015). introduction to orthotics : a clinical reasoning & problem-solving approach. maryland heights, mo: mosby. da fonsêca, g. f. g., lopes, j. a. l., da silva, j. r. c., de almeida, l. c., and de andrade, m. m. (2016). br 102014029649 a2: manufacturing process articulated prostheses from a combination of rigid and flexible material in one piece. brazil. davey, s. m., brennan, m., meenan, b. j. and mcadam, r. (2011). innovation in the medical device sector: an open business model approach for high-tech small firms. technology analysis & strategic management, 23(8), 807-824. http://doi.org/10.1080/09537325.2011.604152 deniz, k. (2016). wo 2016071773 a2: methods for integrating sensors and effectors in custom three-dimensional orthosis. turkey. deshpande, a. (2015). wo 2015095459 a1: robotic finger exoskeleton. us. dormehl, l. (2018). 14 major milestones along the brief history of 3d printing. elmira, ny: weny news elsevier, b.v. (2016). scopus: content coverage guide. retrieved from https://www.elsevier.com/__data/assets/pdf_fi le/0007/69451/scopus_content_coverage_guide .pdf espalin, d., arcaute, k., rodriguez, d., medina, f., posner, m. and wicker, r. (2010). fused deposition modeling of patient-specific polymethylmethacrylate implants. rapid prototyping journal, 16(3), 164-173. http://doi.org/10.1108/13552541011034825 fabry, b., ernst, h., langholz, j. and köster, m. (2006). patent portfolio analysis as a useful tool for identifying r&d and business opportunities–an empirical application in the nutrition and health industry. world patent information, 28(3), 215-225. http://doi.org/10.1016/j.wpi.2005.10.004 faustini, m. c., neptune, r. r., crawford, r. h. and stanhope, s. j. (2008). manufacture of passive dynamic ankle-foot orthoses using selective laser sintering. ieee transactions on biomedical engineering, 55(2), 784-790. http://doi.org/10.1109/tbme.2007.912638 fess, e. e. (2002). a history of splinting: to understand the present, view the past. journal of hand therapy, 15(2), 97-132. http://doi.org/10.1053/hanthe.2002.v15.01500 91 fess, e. e., & fess, e. e. (2005). hand and upper extremity splinting : principles & methods. maryland heights, mo: mosby. fess, e., and mccollum, m. (1998). the influence of splinting on healing tissues. journal of hand therapy: official journal of the american society of hand therapists, 11(2), 140-147. http://doi.org/10.1016/s08941130(98)80012-4 garcía-garcía, l. a. and rodríguez-salvador, m. (2018). additive manufacturing knowledge incursion on orthopaedic devices: the case of 42 hand orthoses. in the 3rd international conference on progress in additive manufacturing. 571-576). gmür, m. (2003). co-citation analysis and the search for invisible colleges: a methodological evaluation. scientometrics, 57(1), 27-57. http://doi.org/10.1023/a:1023619503005 goodman, s. l., kim, kyujung andschroeder, j. (2007). wo 2007045000 a2: personal fit medical implants and orthopedic surgical instruments and methods for making. united states. hopkinson, n., hague, r. and dickens, p. (2005). rapid manufacturing: an industrial revolution for the digital age. hoboken, nj: john wiley & sons, ltd. http://doi.org/10.1002/0470033991.fmatter imms, c., et al.. (2016). minimising impairment: protocol for a multicentre randomised controlled trial of upper limb orthoses for children with cerebral palsy. bmc pediatrics, 16. iqbal, j., tsagarakis, n. g. and caldwell, d. g. (2010). a human hand compatible optimised exoskeleton system. 2010 ieee international conference on robotics and biomimetics, robio 2010, 685-690. http://doi.org/10.1109/robio.2010.5723409 iqbal, j., tsagarakis, n. g., fiorilla, a. e. and caldwell, d. g. (2010). a portable rehabilitation device for the hand. 2010 annual international conference of the ieee engineering in medicine and biology society, embc’10, 3694-3697. http://doi.org/10.1109/iembs.2010.5627448 jacomy, m., venturini, t., heymann, s. and bastian, m. (2014). forceatlas2, a continuous graph layout algorithm for handy network visualization designed for the gephi software. plos one, 9(6). http://doi.org/10.1371/journal.pone.0098679 schouwenburg, k. l., bersak, d., smith, j. and murphy, c. n.. (2016). us 20160101571 a1: systems and methods for generating orthotic device models by surface mapping and extrusion. us. kim, h. and jeong, s. (2015). case study: hybrid model for the customized wrist orthosis using 3d printing. journal of mechanical science and technology, 29(12). http://doi.org/10.1007/s12206-015-1115-9 kuusi, o. andmeyer, m. (2007). anticipating technological breakthroughs: using bibliographic coupling to explore the nanotubes paradigm. scientometrics, 70(3), 759–777. http://doi.org/10.1007/s11192-0070311-5 leydesdorff, l., de moya-anegõn, f. and guerrero-bote, v. p. (2015). journal maps, interactive overlays, and the measurement of interdisciplinarity on the basis of scopus data (1996-2012). journal of the association for information science and technology, 66(5), 1001-1016. http://doi.org/10.1002/asi.23243 leydesdorff, l. and milojević, s. (2015). scientometrics. international encyclopedia of the social & behavioral sciences (second edition), 322–327. http://doi.org/http://dx.doi.org/10.1016/b9780-08-097086-8.85030-8 low, j.-h., ang, m. h. and yeow, c.-h. (2015). customizable soft pneumatic finger actuators for hand orthotic and prosthetic applications. in ieee international conference on rehabilitation robotics (vol. 2015-sept). http://doi.org/10.1109/icorr.2015.7281229 madden, k. e. and deshpande, a. d. (2015). on integration of additive manufacturing during the design and development of a rehabilitation robot: a case study. journal of mechanical design, 137(11), 111417. http://doi.org/10.1115/1.4031123 matthew chin, h. c., hoon, l. j. and yeow, r. c. h. (2016). design and evaluation of rheumatoid arthritis rehabilitative device (rard) for laterally bent fingers. in proceedings of the ieee ras and embs international conference on biomedical robotics and biomechatronics. 2016(july).. http://doi.org/10.1109/biorob.2016.7523732 mavroidis, c. et al. (2011). patient specific anklefoot orthoses using rapid prototyping. journal of neuroengineering and rehabilitation, 8(1), 1. http://doi.org/10.1186/1743-0003-8-1 mccain, k. w. (1990). mapping authors in intellectual space: a technical overview. journal of the american society for information science, 41(6), 433-443. mingers, j. and leydesdorff, l. (2015). a review of theory and practice in scientometrics a review of theory and practice in scientometrics 1. european journal of 43 operational research, (1934), 1-47. http://doi.org/10.1016/j.ejor.2015.04.002 oldham, p., hall, s. and burton, g. (2012). synthetic biology: mapping the scientific landscape. plos one, 7(4). http://doi.org/10.1371/journal.pone.0034368 omarkulov, n., telegenov, k., zeinullin, m., tursynbek, i. and shintemirov, a. (2016). preliminary mechanical design of nu-wrist: a 3-dof self-aligning wrist rehabilitation robot. proceedings of the ieee ras and embs international conference on biomedical robotics and biomechatronics. 2016(july), 962-967. http://doi.org/10.1109/biorob.2016.7523753 palousek, d., rosicky, j., koutny, d., stoklásek, p. and navrat, t. (2014). pilot study of the wrist orthosis design process. rapid prototyping journal, 20(1). http://doi.org/10.1108/rpj-03-2012-0027 paterson, a. m., bibb, r., campbell, r. i. and bingham, g. (2015). comparing additive manufacturing technologies for customised wrist splints. rapid prototyping journal, 21(3). doi: 10.1108/rpj-10-2013-0099 paterson, a. m., bibb, r. j. and campbell, r. i. (2012). evaluation of a digitised splinting approach with multiple-material functionality using additive manufacturing technologies. in d. bourell (ed.), twenty-third annual international solid freeform fabrication symposium, 656-672. paterson, a. m., donnison, e. bibb, r. j. and ian campbell, r. (2014). computer-aided design to support fabrication of wrist splints using 3d printing: a feasibility study. hand therapy, 19(4), 102-113. http://doi.org/10.1177/1758998314544802 paterson, a. m. j., bibb, r. j. and campbell, r. i. (2010a). a review of existing anatomical data capture methods to support the mass customisation of wrist splints. virtual and physical prototyping, 5(4), 201-207. http://doi.org/10.1080/17452759.2010.528183 paterson, a. m. j., bibb, r. j. and campbell, r. i. (2010b). a review of existing anatomical data capture methods to support the mass customisation of wrist splints. virtual and physical prototyping, 5(4). http://doi.org/10.1080/17452759.2010.528183 polygerinos, p., wang, z., galloway, k. c., wood, r. j. and walsh, c. j. (2014). soft robotic glove for combined assistance and at-home rehabilitation. robotics and autonomous systems, 73, 135-143. http://doi.org/10.1016/j.robot.2014.08.014 porter, a. l. and youtie, j. (2009). how interdisciplinary is nanotechnology? journal of nanoparticle research, 11(5), 1023-1041. http://doi.org/10.1007/s11051-009-9607-0 reimer, s. m. f., lueth, t. c. and d’angelo, l. t. (2014). individualized arm shells towards an ergonomic design of exoskeleton robots. conference proceedings ieee international conference on systems, man and cybernetics, 2014–janua(january), 3958-3965. http://doi.org/10.1109/smc.2014.6974550 ranky, r. and mavroidis, c. (2014). jp 2014533975 a: customizable embedded sensors. japan. rodríguez-salvador, m. and tello-bañuelos, m. (2012). applying patent analysis with competitive technical intelligence: the case of plastics. journal of intelligence studies in business, 2(1), 51-58. retrieved from http://www.scopus.com/inward/record.url?eid =2-s2.0-84905713951&partnerid=tzotx3y1 rodríguez-salvador, m., rio-belver, r. m. and garechana-anacabe, g. (2017). scientometric and patentometric analyses to determine the knowledge landscape in innovative technologies: the case of 3d bioprinting. plos one, 12(6). http://doi.org/10.1371/journal.pone.0180375 rodríguez-salvador, m., cruz-zamudio, p., avila-carrasco s.a., olivares-benítez, e. and arellano-bautista, b. (2014). strategic foresight: determining patent trends in additive manufacturing. journal of intelligence, 4(3), 42-62. retrieved from http://scholar.google.comhttps//ojs.hh.se/index .php/jisib/article/view/104 rotolo, d., rafols, i., hopkins, m. and leydesdorff, l. (2015). strategic intelligence on emerging technologies: scientometric overlay mapping. journal of the association for information science and technology, (september), 1-38. http://doi.org/10.1002/asi.23631 schiele, a. and van der helm, f. c. t. (2006). kinematic design to improve ergonomics in human machine interaction. ieee transactions on neural systems and 44 rehabilitation engineering, 14(4), 456-469. http://doi.org/10.1109/tnsre.2006.881565 schroeder, j. (2010). wo 2010120990 a1: personal fit medical implants and orthopedic surgical instruments and methods for making. united states. schubert, c., van langeveld, m. c. and donoso, l. a. (2014). innovations in 3d printing: a 3d overview from optics to organs. the british journal of ophthalmology, 98(2), 159-61. http://doi.org/10.1136/bjophthalmol-2013304446 schultz-johnson, k. (2002). static progressive splinting. journal of hand therapy : official journal of the american society of hand therapists, 15(june), 163-178. http://doi.org/10.1053/hanthe.2002.v15.01501 6 schwartz, d. a. and janssen, r. g. (2005). static progressive splint for composite flexion. journal of hand therapy, 18(4), 447-449. http://doi.org/10.1197/j.jht.2005.07.005 sinha, m. and pandurangi, a. (2016). guide to practical patent searching and how to use patseer for patent search and analysis (second ed.). small, h. (1973). co-citation in the scientific literature : a new measure of the relationship between two documents, 265269. tan g., robson, n. and soh, g. s. (2016). dimensional synthesis of a passive eight-bar slider exo-limb for grasping tasks. in international design engineering technical conferences and computers and information in engineering conference, volume 5b: 40th mechanisms and robotics conference (p. 9). north carolina. tang, t., zhang, d., xie, t. and zhu, x. (2013). an exoskeleton system for hand rehabilitation driven by shape memory alloy. in 2013 ieee international conference on robotics and biomimetics, robio 2013. http://doi.org/10.1109/robio.2013.6739553 thomson reuters. (2011). web of science ®, 1–4. http://doi.org/10.1023/b velho, t. and zavaglia, c. (2011). a contribution to the development of a human-machine exoskeleton device using rapid prototyping technology. in proceedings of the 2011 ieee international conference on robotics and biomimetics.1789-1794. ventola, c. l. (2014). medical applications for 3d printing: current and projected uses. pharmacy and therapeutics, 39(10), 704-711. weiss, p., heyer, l., munte, t. f., heldmann, m., schweikard, a. and maehle, e. (2013). towards a parameterizable exoskeleton for training of hand function after stroke. ieee international conference on rehabilitation robotics. http://doi.org/10.1109/icorr.2013.6650505 white, h. d. and griffith, b. c. (1981). author cocitation: a literature measure of intellectual structure. journal of the american society for information science, 32(3), 163-171. http://doi.org/10.1002/asi.4630320302 winter, s. h. and bouzit, m. (2006). testing and usability evaluation of the mrages force feedback glove. in fifth international workshop on virtual rehabilitation, iwvr 2006 (pp. 82-87). http://doi.org/10.1109/iwvr.2006.1707532 worsnopp, t. t., peshkin, m. a., colgate, j. e. and kamper, d. g. (2007). an actuated finger exoskeleton for hand rehabilitation following stroke. 2007 ieee 10th international conference on rehabilitation robotics, icorr’07, 00(c), 896-901. http://doi.org/10.1109/icorr.2007.4428530 xiogjiao, x., ning, y. & haolin, z. (2014). cn 203935304 u: novel bionic exoskeleton artificial limb controlled by cable wires. china. yap, h. k., ng, h. y. and yeow, c.h. (2016). high-force soft printable pneumatics for soft robotic applications. soft robotics, 3(3). http://doi.org/10.1089/soro.2016.0030 zachariasen, j. t. and cropper, d. e. (2015). us 2015328840 a1: use of additive manufacturing processes in the manufacture of custom wearable and/or implantable medical devices. us. zhao, d. and strotmann, a. (2008). evolution of research activities and intellectual influences in information science 1996-2005: introducing author bibliographic-coupling analysis. journal of the american society for information science and technology, 59(13), 2070-2086. http://doi.org/10.1002/asi.20910 vol8no3paper5 to cite this article: ottonicar, s.l.c., valentim, m.l.p. and mosconi, e. (2018) a competitive intelligence model based on information literacy: organizational competitiveness in the context of the 4th industrial revolution. journal of intelligence studies in business. 8 (3) 55-65. article url: https://ojs.hh.se/index.php/jisib/article/view/329 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index a competitive intelligence model based on information literacy: organizational competitiveness in the context of the 4th industrial revolution selma leticia capinzaiki ottonicara*, marta lígia pomim valentima, elaine mosconib ainformation science department, graduate program in information science at sao paulo state university (unesp), marilia, brazil; bbusiness management department, graduate program in business management at université de sherbrooke (udes), sherbrooke, canada *selma.leticia@hotmail.com journal of intelligence studies in business please scroll down for article editor-in-chief: klaus solberg søilen included in this printed copy: mapping the structure and evolution of jisib: a biblipmetric analysis of articles published in the journal of intelligence studies in business between 2011 and 2017 exploratory study of competitive analysis in mexico eduardo rafael poblano ojinaga pp. 22-31 competitive and technology intelligence to reveal the most influential authors and inter-institutional collaborations on additive manufacturing for hand orthoses journal of intelligence studies in business v ol 8 , n o 3 , 2 0 1 8 j ou rn a l of in telligen ce s tu d ies in b u sin ess issn: 2001-015x vol. 8, no. 3 2018 leonardo a. garcia-garcia pp. 32-44 and marisela rodríguez characterizing business intelligence tasks, use and users in the workplace. leonardo a. garcia-garcia pp. 45-54 and marisela rodríguez josé ricardo lópez-robles, jose ramón pp. 9-21 otegi-olaso, rubén arcos, nadia karina gamboa-rosales, and hamurabi gamboa-rosales a competitive intelligence model based on information literacy: organizational competitiveness in the context of the 4th industrial revolution selma leticia capinzaiki ottonicar, pp. 55-65 marta lígia pomim valentim, and elaine mosconi a competitive intelligence model based on information literacy: organizational competitiveness in the context of the 4th industrial revolution selma leticia capinzaiki ottonicara*, marta lígia pomim valentima, and elaine mosconib a information science department, graduate program in information science at sao paulo state university (unesp), marilia, brazil; b business management department, graduate program in business management at université de sherbrooke (udes), sherbrooke, canada corresponding author (*): selma.leticia@hotmail.com received 12 may 2018 accepted 20 december 2018 abstract this paper investigated how information literacy and competitive intelligence are connected in business management and information science fields. it demonstrates the contribution of information literacy in the phases of the competitive intelligence process. this paper is relevant, since the model supports creativity and collaborative innovation in small businesses in the context of industry 4.0. furthermore, it contributed to connect the information science and business management fields, so it is multidisciplinary. it also proposes a theoretical model of information literacy and competitive intelligence in the context of industry 4.0, which can be used for applied research. the methodology was developed based on a systematic literature review (slr) of information literature and competitive intelligence. these concepts contribute to the development of a framework and a conceptual model in which the three themes are interconnected and demonstrate that information literacy can efficiently contribute to the competitive intelligence process, especially in the context of the fourth industrial revolution. keywords competitive intelligence; industry 4.0; information literacy; systematic literature review 1. introduction information literacy is understood as lifelong learning (belluzzo and feres, 2015; bruce, 1999; lloyd, 2017) and it is useful to competitive organizations. information literacy enables organizational individuals to better understand information and convert it into knowledge. the knowledge constructed during the professional life contributes to the densification of critical thinking about the consulted information, so individuals can understand their backgrounds (lloyd, 2017). competitive intelligence (ci) is based on scanning and monitoring information that significantly influences the market. in this perspective, the development of ci tools provides organizational individuals with more adequate conditions to face challenges. ci generates analyzed data and information that can be integrated into the organizational business (tisluk et al., 2015). it also provides insights from external contexts, supports decision-making, and contributes to medium and long-term strategies. ci reduces uncertainties about the competitive environment (valentim and souza, 2013). the competitive environment became more complex in the context of industry 4.0, which refers to the 4th industrial revolution. industry 4.0 is related to the digital journal of intelligence studies in business vol. 8, no. 3 (2018) pp. 55-65 open access: freely available at: https://ojs.hh.se/ 56 transformation and many technological drivers that allow organizations to create and innovate their products, services, and processes, whose differentials will be key to remaining in the marketplace (anderl and fleischer, 2015; schwab, 2016). an increased amount of data generated by different technologies becomes available for individuals, but the value creation coming from the usage of data needs more investigation (bordeleau, et al., 2018). moreover, individuals who are involved in this revolution need to know how to intelligently access, evaluate, and use data and information in the ci process in order to improve decision making and better orient business strategy. information literacy is a significant predictor of online information search competencies (çoklar et al., 2016), which is important to access information. however, having information access offers no guarantee that the information will be well evaluated and used by individuals. librarians pointed out the relevance of effective instructions in order to fill gaps in the curriculum and prepare students to improve their skills to get and use valuable information (howard and stonebraker, 2018). considering information literacy is a critical competency in digital age, it can help managers to identify relevant information for decision making in business management. this paper has three purposes: the first one is to investigate how information literacy and ci are connected in the business management and information science fields. the second one is to demonstrate the contribution of information literacy in the phases of the ci process, which supports creativity and collaborative innovation in small businesses in the context of industry 4.0. the third purpose is to propose a theoretical model of information literacy and ci in the context of industry 4.0, which can be used for applied research. in the context of industry 4.0 and digital transformation, a large amount of data and information is generated in all digital activities. managers and employees need to know how to search and use information to construct meaningful knowledge. they can construct knowledge through information literacy. this process also happens with ci professionals because they also need to access external information (ottonicar, 2016). information literacy and ci are relevant elements to industry 4.0 since they allow individuals to access different information sources. this paper is organized as follows. the next section discusses the concepts of information literacy, ci and industry 4.0. the subsequent section explains the methodology and shows some results of the slr. the discussions and results section show the inter-relation between information literacy and ci in the context of industry 4.0. furthermore, it demonstrates a conceptual model that can be applied in business as future research. the conclusions highlight the directions for further research, the limitations of the paper and its relevance to businesses management and information science. 2. theoretical references 2.1 information literacy the information literacy concept emerged parallel to social changes, which resulted from the renewal of means of production. these changes influenced educational systems and libraries, since they are both traditional environments of information storage and dissemination (gomes and dumond, 2016). furthermore, information literacy is fundamental to citizens and to their social integration. this literacy helps people to access, choose, manage and evaluate information (belluzzo and feres, 2015). information literacy is present in different organizations. it is related to individuals’ capabilities and behaviors which were developed in their lives (ottonicar et al., 2016). information literacy is studied in the field of information science, which is interdisciplinary. because of that, information literacy is related to the political, technological, educational and organizational context (ottonicar et al., 2016). furthermore, this literacy is connected to individuals’ experiences, since it shows how they seek, evaluate and create information (demasson et al., 2016). information literacy has become more than individuals’ abilities and skills. bruce et al. (acrl, 2014) demonstrated that information literacy is also relational. it depends on the context studied and described in a complex information environment. the advantage of this approach is the creation of many information literacy models in different fields. according to ala (2016, 3) information literacy is the set of integrated abilities encompassing the reflective discovery of information, the understanding of how information is produced and valued, and the use of information in creating new knowledge and participating ethically in communities of 57 learning. it is also understood as “the ability to think critically and make balanced judgements about any information we find and use. it empowers us as citizens to develop informed views and to engage fully with society” (cilip, 2018). in the context of the workplace, information literacy contributes to employability, and it helps individuals to develop work analysis, solve problems (cilip, 2018) and support efficient decision making (ottonicar, 2016; yafushi, 2015). these studies demonstrate that information literacy research is increasing in the field of business and management (rader, 2002). according to sproles et al. (2013, 409) “information literacy has become an integral part of the library literature and has been adopted and implemented outside the traditional venues of reference and instruction services”. information literacy is fundamental for business processes within organizations (jinadu and kiran, 2014, 2016). strategic, tactical and operational levels can benefit from identifying and using critical knowledge. this knowledge inspires creativity, innovation and competitiveness (ottonicar, 2016). 2.2 competitive intelligence the term competitive intelligence (ci) was coined in 1980 and its purpose was to monitor the external environment. this process allows the integration of information and data in real time and influences decisions that are useful, considering time and speed in data generation nowadays (souza, 2016). information and data are different. data is understood as facts, measurements and statistics. information is defined as the action of informing, and knowledge involves the development of experience through learning. intelligence is the ability to understand and use knowledge practically (bouthillier and shearer, 2003). the main purpose of ci is to access, interpret, evaluate and disseminate information. this information is gathered in the external context of the organization. the analysis of external information is fundamental to the process, since intelligent information contributes to product and service innovation. furthermore, it influences innovation speed and the quality of the final products (hassani and mosconi, 2017). ci is a continuous process, since it has no beginning, middle or end. that process works in a business environment continuously (valentim, 2004). it allows the explanation of data through graphics, charts and tables, so individuals can construct knowledge from that information (teixeira, 2014). other professionals such as business managers also need to understand the opportunities and threats that influence organizations (hoffmann and chemalle, 2006). innovative technologies contribute to ci since a professional can use potential information available in social media and in emergent technologies that are catalyzers of the 4th industrial revolution (hassani and mosconi, 2018). in the past few years, only formal information sources were analyzed, but it is not enough anymore (tisluk et al., 2015; cubillo, 1997). according to jin and ju (2014) the complexity of the task influences the professional to access more information sources, making information literacy fundamental to guide individuals to analyze the quality of these sources. calof (2016, p. 48) explains that: “competitive intelligence assists organizations in developing a proactive approach that identifies and responds to changes in the competitive environmental, helping organizations (companies, governments, universities, associations and others) thrive in turbulent times”. this intelligence is useful for many kinds of organizations. ci has many concepts in both the business management and information science fields. in this paper, ci is understood as a process that is the result of individuals’ actions. professionals need to access and evaluate data to transform it into information. the use of that information allows for knowledge construction, decision making, problem solving and innovation. 2.3 industry 4.0 the first industrial revolution occurred through steam engines in 1784. the second one started in 1870 because the machines worked with electrical power. the third industrial revolution started in 1969 with the arrival of electronics and information technology. this technology evolved and connected to cyberphysical systems (cps), so those connected technologies became more complex. it includes the internet of things (iot) of objects and services. (kagermann et al., 2013). therefore, industry 4.0 is an ongoing process (kagermann et al., 2013). xu et al. (2018, 2942) agree with kagermann et al. (2013), since they emphasize: “during the fourth industrial revolution, the use of cyber 58 physical systems (cps) has triggered a paradigm shift in industries, in particular the manufacturing sector” (xu et al. 2018, 2942). industry 4.0 is a current phenomenon and it will influence the production of society. cps are a fuel that encourages that revolution. cps are objects with software and computer skills, so the products are smart. the objects are based on connectivity and self-management (almada-lobo, 2015). mass production is disappearing; there are more and more customized products based on clients’ needs. the production chain is becoming transparent and its elements are becoming integrated, since the physical fluxes are controlled by digital platforms (almadalobo, 2015). because of that, industry 4.0 will influence business in a positive way, and it can be used in developing countries (silva et al. 2018). in this paper, the iot is not understood as a synonym of industry 4.0, because it involves objects and biological technology. the iot is part of the industry 4.0 processes. the iot allows the dissemination of electronic information between objects. therefore, the family, logistics and public management will be affected by those changes (dutton, 2014). industry 4.0 is transforming individuals’ lives (schwab, 2016), and furthermore, it encourages competitiveness and process improvement (anderl and fleischer, 2015). 3. methodology this methodology was developed based on a systematic literature review (slr) of information literacy and ci (sampaio and mancini, 2007; cook and mulrow, 1998). the primary study is the first step of the slr, in which we analyzed the title and the keywords of papers. they were “information literacy” and “competitive intelligence”. table 1 shows the protocol of the slr followed by the authors to get the results. table 1 – the connection between information literacy, competitive intelligence and industry 4.0. the information on literacy standards, indicators and expected results developed by belluzzo (2007), the steps of competitive intelligence based on concepts and results of industry 4.0 to business and society. this table allowed to connect these three themes, and also demonstrate the importance of competitive intelligence based on information literacy. therefore, information literacy can help in every step of competitive intelligence, so information can be gathered in a more effective way. information literacy contribute to competitive intelligence because it helps individuals to find quality information and evaluate the information source critically. the context of industry 4.0 ci steps information literacy standards, indicators and expected results the context provides a lot of information identify the niches of external and internal intelligence. s1 individuals identify the nature and extent of the information need. i. 1.1 define and recognise information need; i. 1.2 identify a variety of formats and potential information sources; i. 1.3 consider the costs and benefits of information acquisition; smart and connected technology emergence, such as smart factory prospect, access and gather data, information and knowledge in the internal and external context of the organization. s2 individuals access needed information effectively; i. 2.1 select the appropriate research methods or information systems; i. 2.2 construct and implement search strategies established effectively; i. 2.3 seek information electronically or with people. use a variety of methods; i. 2.4 rework and improves the search strategy when it is needed; i. 2.5 extract, register and manage information and its sources. the information sources are humans, technology, biological and digital elements select and filter data, information and knowledge relevant to people and organizations s3 individuals evaluate information and its sources critically; i. 3.1 demonstrate knowledge about the information gathered; i. 3.2 apply evaluation criteria to information and its sources; the smart technology transforms data in information adding value to the information treat and add value to data, information and knowledge i. 3.3 compare the new knowledge of the previous knowledge to determine the value added, contradictions, or other characteristics of information; new systems of information storage in groups of technology in real time store data, information and knowledge through technology focusing on quality and safety s4 individuals use information effectively to reach a goal or a result individually or in a group; i. 4.1 individuals are capable of synthesising information to complete a project, activity or task; the smart technology and factory share information in a massive way disseminate data, information and knowledge through services and high valueadded products r. 4.1.2 understand how to use an author’s citations, paraphrases or texts to support ideas and arguments. this item is used for writing activities, reports, documents and manuals; i. 4.2 communicate the results of the projects, activities or work effectively; r. 4.2.1 use documentation norms and formats properly to develop a project, activity or work task. the smart technology and factory bring new issues to be debated. for example, the disappearing of some professions and unemployment create mechanisms of feedback to generate new data, information and knowledge s5 individuals understand economic, legal and social issues of information use. also, they access and use information ethically and legally. i. 5.1 understand the legal, ethical and socioeconomic issues which involve information, communication and technology; i. 5.2 respect laws, rules, institutional policies and guidelines related to information access and information source use. i. 5.3 indicate the information source in the communication of results; 59 the downloaded papers fulfilled the inclusion and exclusion criteria described in table 1. the search terms constructed used the keywords described in table 1. after the transcription of keywords in search mechanisms, we read the title and keywords to apply the inclusion and exclusion criteria. extracted information referred to contributions of information science and business management in the competitive context. the information search was performed in five databases: scopus, web of science, proquest library and information science abstracts (lisa), proquest central and ebsco library, and information science and technology abstracts (lista). table 2 results of rsl. the quantitative results of the systematic literature review. the papers were found in 4 data bases: scopus, web of science, proquest library and information science abstracts (lisa), proquest central and ebsco library, information science and technology abstracts (lista). the first column shows the names of the data bases, and the second one shows the numbers of papers found. after an analysis of the title and key words, we showed the quantitative results. after, the authors read the abstract and selected the papers that studied both information literacy and competitive intelligence in a multidisciplinary perspective. articles database total found chosen (based on title, keywords) total (after abstract review) scopus 42 10 3 web of science 0 0 0 proquest (lisa) 161 58 2 proquest central 39 16 0 ebsco (lista) 65 3 2 in the second phase of the slr we analyzed the content of the abstract to identify information literacy and ci in a business context. most papers that were selected referred to libraries and students, and only a few focused on business or innovation. the slr found a total of 7 articles related to the theme published in academic journals. in the end, there were only 4 articles, because three of them were duplicated. the slr shows that information literacy and ci are not studied very often by researchers. there is a gap of knowledge about the theme, especially in the context of industry 4.0. 4. results and discussion the connection between ci and information literacy is fundamental to competitive businesses (ottonicar, 2016; silva et al. 2016, ottonicar et al., 2018). this happens because information literacy guides the ci process (teixeira, 2014) and focuses on quality information and its sources. the ci process contributes to organizational survival in the market (tarapanoff et al. 2016; souza, 2016; teixeira, 2014). companies are essential to the economy of a country (porter, 1998), since they create wealth and employ people. small businesses need to develop processes to add value to products and services, so they can use ci (hassani and mosconi, 2016; hoffmann and chemalle, 2006) based on information literacy (silva et al. 2016; ottonicar et al, 2018) to achieve competitiveness, as well as larger companies. the paper “how information literate are you?” is a self-assessment by students enrolled in a ci elective authored by barbie e. keiser. the text was published in the journal of business and finance librarianship in 2016. this paper studied students’ information literacy in a ci course. the results demonstrated the use of information literacy to learn and develop skills influenced by the information behavior of students (keiser, 2016). the paper was focused on the field of education, but it was considered in the slr because the appropriate information literacy can be used by individuals who work with ci processes. furthermore, the paper values the librarian profession as fundamental to information access, especially in companies. the paper also pointed out that students have difficulties to learn which information can help them to face challenges (keiser, 2016). the second paper perceived environmental uncertainty, information literacy and environmental scanning towards a refined framework focuses on the context of businesses and uses the term environmental scanning, which is also understood as ci. it was written by zhang et al. and it was published by information research in 2012 (zhang et al., 2012). forty-two travel agents in singapore answered the questionnaire. the authors found out that information literacy is fundamental to the steps of ci. furthermore, they showed that information quality is not related to information quantity. the quality of information is based on the process, 60 organization, dissemination and evaluation in an effective way (zhang et al., 2012). these same authors also published another two papers that are based on information literacy in the context of businesses and environmental scanning. the first paper, entitled the role of information literacy in environmental scanning as a strategic information system a study of singapore smes, was published in 2010. zhang et al. (2010) explained the importance of information literacy to business management in a practical context. in that paper, environmental scanning is understood as a strategic information system and they discuss information literacy in small and medium-size companies. they researched smes in singapore thorough a questionnaire which guided the quantitative analysis and an interview which contributed to a qualitative analysis (zhang et al, 2010). another paper was published in 2010 in the journal of information science with the title environmental scanning: an application of information literacy skills at the workplace. the authors studied information literacy to monitor the external environment of organizations to achieve a competitive advantage (zhang et al. 2010). there are only a few researches that connect the scan of external context and information literacy. furthermore, few researches have studied information literacy as a tool to achieve businesses competitiveness. the authors applied information literacy in every step of environmental scanning. they concluded that scanning can be used by every organizational level, it is not limited by the strategic one (zhang et al., 2010). the slr showed that there are no researchers who focus on ci and information literacy in an interdisciplinary perspective. because of that, this study is fundamental, since it aims to use concepts from information science and business management. we strongly recommend that those fields should work together in order to share knowledge and apply research through research groups and researchers. information literacy needs to be incorporated in the business management field, since studies have demonstrated its relevance to improve processes and competitive advantage (yafushi, 2015; ottonicar, 2016; santos, 2014). other researches have emphasized the applicability of information literacy for decision-making (yafushi, 2015) and for creativity and innovation (ottonicar, 2016; ottonicar et al., 2018). we would like to emphasize the importance of zhang et al.’s work (2012, 2010, 2010) as an international parameter to connect information literacy and ci to others researchers in the field. furthermore, this paper developed an interdisciplinary connection between information literacy and ci to help business in the context of industry 4.0. the results were based on valentim’s (2002) ci steps, since it explains seven main actions developed in this process. belluzzo’s (2007) information literacy standards and indicators were chosen, since it was based on international standards from the international federation of library associations and institutions (ifla). according to valentim (2002), ci has the following steps: identify the niches of internal and external intelligence; prospect, access and gather data, information and knowledge; select and filter data, information and knowledge which are relevant to people and organizations; treat and add value to data, information and knowledge which are mapped and filtered in order to seek interactions language of users and systems; store data, information and knowledge in information technology focusing on quality and safety; disseminate and transfer data, information and knowledge through services and high-value-added products. the goal is to develop people and organizations; create mechanisms of feedback in order to generate new data, information and knowledge to feed back to the system. the information literacy standards and indicators can be used as a tool to evaluate the process. they serve as a guide of the activities developed during the process. the context of the fourth industrial revolution allows physical and biological technology to produce data and information in real time (schwab, 2016). during the ci process, the professional must understand information needs to identify the ‘niche’ of external and internal intelligence (valentim, 2002). therefore, professionals can develop a 61 strategy to define a research topic or information. they verify the value and potential information sources, and they seek information in several formats through a checklist (belluzzo, 2007; ottonicar, 2016). after that, there is information access (ottonicar, 2016). in industry 4.0, access occurs through smart and connected technology. that technology is capable of producing information and disseminating it to other platforms (almada-lobo, 2015). the ci professional needs to prospect and monitor internal and external data (valentim, 2002) which are shared by iot and other tools. the professional selects information systems that are available, observes the type of information in smart technology, creates keywords based on specific vocabulary and uses people, services and other media to access information (belluzzo, 2007; ottonicar, 2016). it is fundamental to be attentive to the information source, because information sources are people, objects and biological technology in the context of industry 4.0. because of that, the professional selects and filters data to create smart information and to contribute to competitiveness (valentim, 2002). the information needs to be created based on the quality of sources. individuals need to read and learn from gathered information, develop criteria to evaluate information sources, observe the hidden intentions and understand the factors that influence information sources such as culture, geography and history (belluzzo, 2007; ottonicar, 2016). there is the information treatment and addition of value in ci (valentim, 2002). therefore, professionals can aggregate their previous knowledge and new information during information seeking (belluzzo, 2007; ottonicar, 2016). they need to understand the language used between the user and system (valentim, 2002), and furthermore, they understand the information dissemination through smart technology. they compare the knowledge constructed with other information, which is a result of different sources to learn a new perspective (belluzzo, 2007). in the context of industry 4.0, systems are integrated and store information together. because of that, professionals understand how to store data securely (valentim, 2002). they synthesize and organize information and also understand smart technology to adjust it based on its structure (belluzzo, 2007; ottonicar, 2016). the convergence of smart technology allows the systems to share information in real time and make people’s lives easier. the ci professional uses those technologies to share smart information in order to contribute to organization members’ decisions (valentim, 2002). therefore, individuals need to understand the ideas developed based on reports, manuals and documents. furthermore, they need to communicate intelligent information through systems and technology. they respect the rules of documentation in businesses (belluzzo, 2007; ottonicar, 2016). the ci professional must know the legal and ethical issues of information use (belluzzo, 2007; ottonicar, 2016). they create new mechanisms of feedback to retrieve smart and ethical information in the future (valentim, 2002). after the professional understands the context, he or she can realize the impacts of actions on competitiveness, innovation and creativity. in industry 4.0, technology has been replacing some jobs, especially the ones that can be replaced by smart machines. an individual who works with ci understands the impact of the profession on society. therefore, information must be made available in an ethical and legal way. the connection shown in figure 1 allowed the construction of a theoretical model to demonstrate how information literacy can contribute to every step of competitive intelligence in the context of industry 4.0. information literacy is present in every step of the ci process, so it can contribute and guide this process during the new changes resulting from iot and other technologies of industry 4.0. the first phase of the ci process is to identify the ‘niche’ of internal and external intelligence. that is equivalent to the ‘information need’ phase of information literacy. professionals need to observe the information they need to explain the context of the organization and competitors in terms of production, services and competitiveness. in the context of industry 4.0 there is a lot of information available through technology, so the challenge is to identify information needs. the next step is the storage of accessed information in physical and biological technology. the purpose is to know how to access technology and use strategy to find information. the most useful information is 62 chosen and filtered. this process is based on information quality through the evaluation of the source. after that, information is treated and new knowledge is added to it to add value. in that moment, the organization and information systems are connected in every organizational level. the goal of this process is to use information efficiently through creativity, innovation, problem solving and decision making. smart information also needs to be used by other people, so it is disseminated through communication. professionals share information with people and smart systems, following documentation rules. they evaluate the performance of the process and create mechanisms of feedback in order to criticize the ci process. therefore, individuals need to understand the economic, social and legal results of that process to smart organizations. 5. conclusions the slr showed that information literacy and ci need the development of interdisciplinary studies between information science and business management. the concept of information literacy should be studied in the business management field in order to develop practical studies. this literature review showed that the theme is emergent, so both fields can improve their body of knowledge. the information literacy standards and indicators can be useful in the ci steps, especially in the context of industry 4.0. in that context, biological and physical technology are the main sources of information to understand the demands and variations of the market, as well as the main channels of communication and dissemination of their products and services. businesses that use information literacy and ci can find market opportunities in the 4th industrial revolution. the model of information literacy and ci in the context of industry 4.0 can guide both small and large businesses to have better information quality. information quality is essential to solve problems and take decisions in an effective way. managers may work based on information literacy concepts and standards, especially when monitoring competitors. therefore, reliable information can contribute to decision making, problem solving and innovation. future research may use the model as a guide to develop a practical study, for example, creating a ci process based on information literacy to encourage innovation and creativity. furthermore, academics may investigate if the technology of ci will be capable of analysing the information source. researchers may analyze this gap of information literacy. artificial intelligence modernized some figure 1 competitive intelligence and information literacy in industry 4.0. information literacy is represented by the standards and indicators in yellow, and the steps of ci are demonstrated in green. this shows a conceptual model that can be used by business and competitive intelligence professionals to guide the information seeking process about competitors. there are 7 green rectangles that represent competitive intelligence. the yellow contains information literacy standards, indicators and results based on the table 3 (third column). industry 4.0 is represented as the context in which firms operate nowadays. the words around industry 4.0 represent keywords extracted from the first column of the table 3. these words can be connected to a technology, a process of the consequences of transformation to society. 63 technologies, so maybe it will be capable of doing ci. also, managers can use information literacy models and adapt them into their context, especially in developing countries. future studies could address this aspect and adapt tools such as trails 9 (syazillah et al., 2018), which guides the translation and adaption of information literacy models. 6. funding we would like to thank the coordenação de aperfeiçoamento de nível superior (capes) and the fonds de recherche du québec nature et technologie (frqnt) for supporting this research. 7. references american library association (ala). 2018. framework for information literacy for higher education. http://www.ala.org/acrl/standards/ilframewor k almada-lobo, f. 2015. the industry 4.0 revolution and the future of manufacturing execution systems (mes). journal of innovation management, 03 (4), pp. 16-21. anderl, r., and j. fleischer. 2015. guideline industrie 4.0: guiding principles for the implementation of industry 4.0 in small and medium sized businesses, paper presented at the vdma industries 4.0 forum. belluzzo, r. c. b. 2007. construção de mapas: desenvolvendo competências em informação e comunicação. bauru: cá entre nós. belluzzo, r. c. b.; feres, g. g. 2015. competência em informação, redes de conhecimento e as metas educativas para 2021: reflexões e interrelações. in: belluzzo, r. c. b; feres, g. g.; valentim, m. l. p. (eds.). redes de conhecimento e competência em informação: interfaces da gestão, mediação e uso da informação/organização. rio de janeiro: interciência. bouthillier, f. shearer, k. 2003. assessing competitive intelligence software: a guide to evaluate ci technology. new jersey: information today, inc. bordeleau, f. e., mosconi, e., and santa-eulalia, l. a. 2018. business intelligence in industry 4.0: state of the art and research opportunities. paper presented at the 51st hawaii international conference on system sciences. bruce, c. s. workplace experiences of information literacy. 1999. international journal of information management, 19, pp. 33-47. calof, j. 2016. government sponsored competitive intelligence for regional and sectoral economic development: canadian experiences. journal of intelligence studies in business vol. 6, no. 1, pp. 48-58. cubillo, j. 1997. la inteligencia empresarial en las pequeñas y medianas empresas competitivas de américa latina: algunas reflexiones. ciência da informação, brasília, 26 (3), pp. 260-267. cook, d.; mulrow, c. 1998. systematic reviews: synthesis of best evidence for health care decisions. library of congress cataloging-inpublication data. philadelphia, usa. çocklar, a. m.; yaman, n. d.; yurdakul, i. k. 2017. information literacy and digital nativity as determinants of online information search strategies. computers in human behavior, 70, pp. 1-9. demasson, a.; partrıdge, h.; bruce, c. 2016. information literacy and the serious leisure participant: variation in the experience of using information to learn. information research, 21(2), paper 711. dutton, w.h. 2014. "putting things to work: social and policy challenges for the internet of things", info, 16 (3), pp. 1-21. gomes, m.a.; dumond, l.m.m. 2016. a noção de competência em informação e a de sociologia da educação e do trabalho: embate epistemológico. revista de ciência da informação e documentação, ribeirão preto, 6 (2), pp. 84-105. hassani, a; mosconi, e.p. 2017. la relation entre l’intelligence compétitive et la performance de l’innovation : une revue systématique de littérature. paper presented at the association des sciences administratives au canada (asac), asac2017, montreal, quebec, canada. hoffmann, w. a. m.; chemalle, k. e. 2006. acesso e uso de inteligência competitiva em micro e pequena empresas de arranjos produtivos locais. paper presented at the vii encontro nacional de pesquisa em ciência da 64 informação (enancib), marília, são paulo, brazil. jin, t.; ju, b. 2014. the corporate information agency: do competitive intelligence practitioners utilize it? journal of the association for information science and technology, 65 (3), pp. 589–608. jinadu, i., and kiran, k. 2014. information literacy at the workplace: a suggested model for a developing country. international journal of libraries and information services, 64 (1), pp. 61274. jinadu, i., and kiran, k. 2016. practices leading to information literacy development among nigerian undergraduates. malaysian journal of library and information science, 21 (1), pp. 109–121. keiser, e. b. 2016. how information literate are you? a self-assessment by students enrolled in a competitive intelligence elective. journal of business and finance librarianship, 21 (3-4), pp. 210-228. kagerman et al. 2013. industrie 4.0 in a global context: strategies for cooperating with international partners. acatech study, november 23. https://www.acatech.de/publikation/industrie -4-0-in-a-global-context-strategies-forcooperating-with-international-partners/ lloyd, a. 2017. information literacy and literacies of information: a mid-range theory and model. journal of information literacy 11 (1), pp. 91-105. ottonicar, s. l. c.; bassetto, c. l.; nascimento, n. m. 2018. o comportamento informacional e a competência em informação: uma abordagem para geração de inovação em micro e pequenas empresas. encontros bibli: revista eletrônica de biblioteconomia e ciência da informação, 23 (52), pp. 18-33. ottonicar, s. l. c. 2016. análise teóricodescritiva da competência em informação de gestores como fator de competitividade das indústrias de eletroeletrônicos da cidade de garça/sp. master’s diss., universidade estadual paulista (unesp), marilia, sao paulo, brazil. ottonicar, s.l.c.; valentim, m.l.p.; feres, g.g. 2016. competência em informação e os contextos educacional, tecnológico, político e organizacional. revista ibero-americana de ciência da informação, brasília, 9 (1), pp. 124142. porter, m. e. 1998. clusters and the new economics of competition. harvard business review, 76 (6), pp. 77–90. rader, h.b. 2002, “information literacy 19732002: a selected literature review”. library trends, 51 (2), pp. 242-259. sampaio, r.f.; mancini, m.c. 2007. estudos de revisão sistemática: um guia para síntese criteriosa da evidência científica. revista brasileira de fisioterapia. são carlos, 11 (1), pp. 83-89. schwab, k. 2016. the fourth industrial revolution. crown business, new york. santos, v. b. dos. 2014. competência em informação na construção da inteligência competitiva nas organizações: o caso da empresa mizumo. master’s diss., universidade estadual paulista (unesp), marilia, são paulo, brazil. silva, e. da.; bassetto, c. l.; ottonicar, s.l.c; yafushi, c. a. p. 2016. o processo de inteligência competitiva e sua relação com indicadores de inovação e competência em informação. perspectivas em gestão & conhecimento, 6, pp. 240-262. silva, v. l. kovaleski, j. l., pagani, r. n. 2018. technology transfer in the supply chain oriented to industry 4.0: a literature review, technology analysis & strategic management, doi: 10.1080/09537325.2018.1524135. souza, j. s. f. de. 2016. teoria dos jogos aplicada à inteligência competitiva organizacional no âmbito da ciência da informação. master’s diss., universidade estadual paulista (unesp), marilia, são paulo, brazil. sproles, c.; detmering, r; johnson, a. m. 2013. "trends in the literature on library instruction and information literacy, 2001-2010". reference services review, 41 (3), pp. 395412. stonebraker, i.; howard, h. a. 2018. evidencebased decision-making: awareness, process and practice in the management classroom. the journal of academic librarianship, 44 (1), pp. 113-117. syazillah, n. h., kiran, k., chowdhury, g. 2018. adaptation, translation, and validation of information literacy assessment instrument. 65 journal of the association for information science and technology, 69 (8), pp. 996–1006. tarapanoff, k.; valentim, m. l. p.; álvares, l. 2016. trajetórias terminológicas relacionadas à inteligência competitiva. paper presented at the v seminario hispano brasileño de investigación em información, documentacion y sociedad. facultad ciencias de la documentación universidad complutense, españa. teixeira, t. m. c. 2014. inteligência competitiva organizacional: um modelo apoiado nos comportamentos de busca, compartilhamento e uso de informação e de tic. phd diss., universidade estadual paulista (unesp), marilia, são paulo, brazil. the library and information association (cilip). 2018. cilip definition of information literacy 2018. librarians’ information literacy annual conference – lilac, liverpool. https://www.cilip.org.uk/page/informationliter acy? tisluk, g., mosconi, e. chamberland-tremblay, d. 2015. divergence, convergence et confusion au sein des processus de l’intelligence d’affaire et de l’intelligence compétitive : une analyse des implications pour les chercheurs et les praticiens. paper presented at the administrative sciences association of canada asac conference. valentim, m. l. p. 2002. inteligência competitiva em organizações: dado, informação e conhecimento. datagramazero, 3 (4), pp. 1-30, a02-0. valentim, m. l. p. 2004. gestão da informação e gestão do conhecimento: especificidades e convergências. infohome, november 30. http://www.ofaj.com.br/colunas_conteudo.php ?cod=88. valentim, m.l.p, souza, j.f.s. 2013. fluxos de informação que subsidiam o processo de inteligência competitiva. encontros bibli: revista eletrônica de biblioteconomia e ciência da informação, 18 (38), pp. 87-106. xu, l. d., xu e. l., li, l. 2018. industry 4.0: state of the art and future trends, international journal of production research, 56:8, 29412962, doi: 10.1080/00207543.2018.1444806 yafushi, c. a. p. 2015. a competência em informação para a construção de conhecimento no processo decisório: estudo de caso na duratex de agudos (sp). master’s diss., universidade estadual paulista (unesp), marilia, são paulo, brazil. zhang, x.; majid, s.; foo, s. 2010. environmental scanning: an application of information literacy skills at the workplace. journal of information science, 36 (6), pp. 719–732. zhang, x.; majid, s.; foo, s. 2010. the role of information literacy in environmental scanning as a strategic information system: a study of singapore smes. paper presented at the international symposium on information management in a changing world, pp. 95-109. zhang, x.; majid, s.; foo, s. 2012. perceived environmental uncertainty, information literacy and environmental scanning: towards a refined framework. information research, 17 (2). jisib-vol-12_nr-1(2022) (3).pdf journal of intelligence studies in business vol. 12 no. 1 (2022) open access: freely available at: https://ojs.hh.se/ pp. 4–5 expand the scope of competitive intelligence in today’s fast-paced business environment, having a strong understanding of the competitive landscape is more important than ever. as the old saying goes, “knowledge is power,” and this is especially true when it comes to staying ahead of the competition. competitive intelligence is the process of gathering, analyzing, and disseminating information about the products, services, and strategies of a company’s competitors in order to gain a strategic advantage. it involves studying the strengths and weaknesses of competitors, as well as trends and developments in the industry, in order to inform business decisions and strategies. the scope of competitive intelligence is broad, and can include a wide range of activities and sources of information. some common sources of competitive intelligence include public information, such as company websites, press releases, and industry reports, as well as private information, such as sales data, market research, and customer feedback. that can be gained in shaping the environment in which organizations operate. competitive intelligence can also be a valuable tool in the development of a company’s strategic plans and decision-making processes. by providing a comprehensive view of the market and the competition, competitive intelligence can help a company to make more informed decisions about where to allocate its resources and how to position itself for success. recent research shows that competitive intelligence is beginning to cover an ever wider range. source: web of science (14.12.2022) editor’s note vol 12. no. 1 (2022) 5 in this issue, the authors propose to consider various aspects related to the work environment, e.g. emotional intelligence, emotional labor, work stress and burnout. the impact of which can be seen in different ways. the study was conducted to analyze the situation and identify approaches to reduce fraud. a number of studies have been conducted on knowledge management as one of the ways to increase the level of work performance and support the entrepreneurial orientation of companies. by referring to the company’s goal, customers, entrepreneurial orientation can modify and innovate another study was conducted on the impact of information and communication technology on new product competitive advantage and new product vision through the partial mediating role of organizational learning capability. decision making and understanding of ict behavioral approaches and business model innovations. i would like to especially thank the authors for their contributions to this issue of jisib. on behalf of the editorial board, prof. dr. andrejs cekuls university of latvia, latvia editor-in-chief, jisib o p i n i o n s e c t i o n 61 a survey of users’ perspectives and preferences as to the value of jisib a spot-check klaus solberg søilen 1 , 1 school of business and technology, halmstad university, sweden email: klasol@hh.se submitted november 10, accepted november 20, 2014 abstract: the journal of intelligence studies in business (jisib) has performed a survey, or done a spot-check, to learn more about its users at the end of three years of publications. users were found via the journal’s site on linkedin and a web-survey was sent from there as an announcement. 18 respondents answered completely. this was only 3,2% of the total member group, but we still think we can draw a number of conclusion from it, also as compared to feedback gathered during the years. users are looking for more case study material in the articles. there is an even balance between those who think there is too much technical material and too little. the discussion about what languages to publish articles in is likely to continue. it is not given that this should be exclusively english in the future. at the same time publishing non-english articles present a number of challenges. keywords: the journal of intelligence studies in business, jisib, spot-check, annual report 1.0 introduction the journal of intelligence studies in business (jisib) has now existed for three years. during that time it has been accepted to ebsco and scopus. as journal is opens source it is also available over doaj. as its platform it uses the software system open journal system (ojs). the content and format of the journal was much decided based on previous experience with other similar journals. the process to start up the journal took about two years. during that time the available for free online at https://ojs.hh.se/ journal of intelligence studies in business vol 4, no 2 (2014) 61-66 https://ojs.hh.se/ o p i n i o n s e c t i o n 62 failure with the previous journal was much discussed and a consensus was formed around the possibilities to form a new journal. the most important venues for these discussions were competitive intelligence (ci) conferences. users’ preferences and perspectives were not considered simply because there were none. to find out what users think a survey was conducted. by “users” we refer to a large group then “readers” even though the latter is a more common term for these surveys. many contributors are not necessarily ardent readers of the journal. consultants likewise, may just check out a model in an article. some companies may be interested in the journal more for publicity, etc. similar article are also often referred to as “reader spotchecks” or “report to readers”. 2.0 theory and method there cannot be said to be much relevant theory for this field, as it is highly applied. jisib has previously published an article about a review of two previous ci journals (solberg søilen, k., 2013), but that was by no means an analysis of users or readers. other papers have found that readers want more material that is interesting for practitioners, but also more case studies, for example fairlie, r., & holder, d. (2010). some journals operate with a kind of annual report to readers where surveys are a part, for example sullivan, r. n. (2014). there are many potential dimensions which can be surveyed. anonymous. (2003) lists high marks for "article length," "career applicability," and "timeliness of topics." the survey went out by email to 569 members of the jisib group on linkedin. after 1 week 18 users had responded with complete answers to the survey table. that is a 3,2% response rate. this is a low rate, also considering that the users were well targeted, as all were members of the jisib site on linkedin, and the questions to be answered were few. the introduction letter asked for 5 minutes time from the users. the first four questions were about the value of jisib. answers were given by likert scale of five grades. the second question was about what topics users would like to see in the journal. the third question was about how to improve the quality (not popularity) of the journal. the last quest was about the role the user could imagine playing for the journal, for example to be an author, reviewer or to get involved during conferences. 3.0 results and discussion the average score for “the value of the siib journal to me” was 3,78 which means that most users think that the journal has value to them. the average score for the value of the journal for the development of intelligence studies was even higher, 4,22. this was the highest score for the survey. for the moment there are two other journals which focus specifically on intelligence in business; both are open source. there are also journals on intelligence studies in the political field and of course in the military domain. we do not know if the users are familiar with these or if they thought that the question was only for business related journals. the lowest score was given to the question if the journal was of value to their company/organization, with average of 3,28. even though this was the lowest score it was still positive/above neutral (=3). the second highest score was related to whether or not jisib publishes good science. the average here was 3,89. it is clear that questions 2 and 4 assume the respondents know what good science is. from question 4 we could see that most users were in fact academics and researchers themselves (the survey was anonymous, but here users could write their contact info if they wanted to and many did). many have also contributed directly to the journal. o p i n i o n s e c t i o n 63 table 1: answers on value of jisib the second question was about what topics users would like to see published in the journal. the information given here was very useful and again showed that the users who answered were in many cases at least experts; working with/in intelligence related areas. one response was given two times, which indicated it was same person. the most common request was to publish more case studies. secondly it is not clear whether or not users want to see it related material in the journal, as has been the tendency so far. one user says he is against it, while another user wants to see more on big data. other suggestions include: articles on competitive strategy, more related to developing countries, more critical studies (critical theory) and more articles related to innovation. all of these topics have indeed been covered in the journal. we have also published case studies, including in this issue. one conclusion could be to try to find even more case studies. this has also been requested by ci consultants. there is one problem with critical theory and case studies from a scientific perspective and that is that it tends to become more difficult to be acknowledged as a scientific. in most ratings and evaluations scientific implies a dominance of empirical articles. we have solved this question by divining the articles into articles and “opinions”. in some recent issues the number of “opinion” articles has been rather large. this may be a difficult trade off, as many readers want “opinions” and evaluators/peers want science/empirical material. o p i n i o n s e c t i o n 64 table 2: user preferences as to jisib content the third question was about quality improvement. it is implicit here that a comparison between the answers of question two and three is interesting as it shows if suggested improvements for better quality is the same as the material users want to see more of in the journal. we see that for most part this is not the case. instead there is a list of specific suggestions directly related to quality. the first point is the editing and implicitly the grammar and syntax. this has been a major issue for the journal. if we should reject articles which are not written in proper english we would have to disregard a large amount. this would also have the effect that most articles would be from authors form anglo saxon countries. too a certain extent we have tried to help some authors, but this has also been difficult due to time restraints. we will continue to make efforts to improve this part. another user suggests the invitation of guest editors. this is absolutely a possibility and the same person got an invitation directly, as he has also published with us before and have been active in the community for many years. the next suggestion is to expand the editorial committee. it is quite possible that this can be done, and we will loom into it, but at the same time, few journals have a more diverse editorial committee. in addition jisib has an active co-editor on each continent. committee members are evaluated every second year based on their net contribution. new members will then have the possibility to enter and contribute. it is probably only healthy for the wellbeing of the journal with a certain turnover here. another suggestion is to allow for more articles in more languages. at the start of jisib there was some talk of having a bilingual journal, french and english. it is still an open question. at the same time the language of science tends to be english, even though there are a growing number of articles in other languages, first of all chinese. if we play with the idea of having articles in several other languages it is a question how many of our users would in fact be able to read the articles. one user also wants us to use more appealing images in the articles. this is possible, but normally not associated with scientific articles. it also takes many resources, which we do not have. there are some good exceptions to, like the journals “science“ and “nature”, but these stand in a class by themselves. o p i n i o n s e c t i o n 65 table 3: user perceptions about quality improvements of jisib the last question was more an open invitation to get users more involved with the journal. when the journal started it was clear that it was only going to be possible if a large number of people volunteered with their own free time. this is still the building block for the journal five years down the road. as the survey was anonymous we could not see who sent in the different answers. we used the web service qualitrics to gather the actual data, and it shows the approximate gps coordinate for the ip number only. i personally consider this information not to be acceptable, but did not know about the function before afterwards, as i have used other services before. still it was not possible for us to see who the respondents were. however, in question four the respondents could disclose who he was, and many did. their information is not presented i the table below, which is then more of a figure. many users showed here that they are already active, writing articles, being reviewer and participating at conferences. some users also volunteered to do work (write, review and even edit) which is a great thing for the journal. figure 1: what role users would like to fill in jisib 4.0 conclusion to keep the conclusion short users think the overall value of the journal is high, but they are looking for more case study material in the articles. there is an even balance between those who think there is too much technical material and too little. one conclusion that is not suggested by any one user, but which could be explored is to invite guest editors to publish a whole issue in their own language. there could be a special french issue, as many contributions continue to come from france and a spanish special issue, as we have several contributions from mexico and spain. it could also o p i n i o n s e c t i o n 66 be imagined that we do a portugese issue, to accompany the interest in portugal and brazil. it can be a good idea to do a users survey every three years or so, also to see how the journal changes and to see to what extent it is following recommnedations by users. references anonymous. (2003). journal readers share their opinions. information management journal, 5. fairlie, r., & holder, d. (2010). readers' views: idm journal: survey of readers. journal of direct, data and digital marketing practice, 11(4), 265-267. doi:10.1057/dddmp.2010.8 solberg søilen, k. (2013). an overview of articles on competitive intelligence in jcim and cir. journal of intelligence studies in business vol 3, no 1, pp. 44-58. sullivan, r. n. (2014). 2013 report to readers. financial analysts journal, 70(1), 10. 63 disruptive intelligence how to gather information to deal with disruptive innovations dirk vriens 1 , klaus solberg søilen 2 1 radboud university, netherlands email: d.vriens@fm.ru.nl 2 halmstad university, sweden email: klasol@hh.se received november 15, accepted december 5 2014 abstract: disruptive innovations are innovations that have the capacity to transform a whole business into one with products that are more accessible and affordable (cf. christensen et al. 2009). as christensen et al. argue no business is immune to such disruptive innovations. if these authors are right, it might be relevant to be able to recognize these innovations before they disrupt a business. incumbents may use this information to protect their business and others may use it to participate in the disruption. either way, gathering information about potential disruptive innovations is a relevant activity. the production of this information (we call this information “disruptive intelligence”) is the topic of this paper. in particular, we analyze disruptive innovation theory and formulate several intelligence topics which may help in predicting disruptive innovations. in addition, we formulate several ‘biases’ which may impair the production of ‘disruptive intelligence’. keywords: disruptive intelligence, disruptive innovation, business models, disruptive blindness available for free online at https://ojs.hh.se/ journal of intelligence studies in business vol 4, no 3 (2014) 63-78 mailto:d.vriens@fm.ru.nl mailto:klasol@hh.se https://ojs.hh.se/ 64 1. introduction disruptive innovations are innovations that have the capacity to transform a whole business into one with products that are more affordable, convenient and accessible (cf. christensen et al. 2009). the idea of “disruptive innovation” (and its related theory) was developed by christensen and colleagues (e.g. christensen, 1997, christensen and raynor (2003), christensen (2006), christensen, grossman and hwang (2009) christensen and eyring, (2011)) and has attracted attention by scholars and practitioners alike. a disruptive innovation, as christensen defines it, is initially a new product or service with inferior performance on the attributes most appreciated by mainstream customers of the old product or service and, hence, it doesn’t appeal to these customers. it does, however, attract the less demanding, more price sensitive customers of the old product and/or customers who value the innovation’s other performance attributes. in time, the innovation improves in such a way that it also appeals to mainstream customers of the old product (cf. christensen and raynor, 2003; christensen et al., 2009, govindarajan and kopalle, 2006b or schmidt and druehl, 2008 for a similar description of disruptive innovations). as pointed out by christensen (christensen 1997; christensen and raynor, 2003 or christensen et al., 2009) “[…]incumbent firms often fail to recognize the threat posed by a disruptive innovation.” (schmidt and druehl, 2008). as disruptive innovations target “less profitable customers in less attractive tiers of the markets” (christensen et al. 2002, p. 23) or even nonconsumers of the old product, incumbents lack the motivation to compete. the effect is often that incumbents, when the disruptive innovation has evolved into a product that appeals to their mainstream customers, are too late to react and may even lose the competitive struggle. in such a case a disruption of the business has occurred. christensen and his colleagues give many examples of disruptive innovations that had a dramatic impact on incumbents. for instance, in the 1950s sony’s portable transistor radio disrupted the then existing radio-business; in the 1970s the mainframe business was disrupted by the invention of the micro-processor enabling the production of pc’s; amazon.com has (to some degree) disrupted the traditional bookstores and ebay disrupted (to some extent) the traditional auction-business (examples taken from christensen et al. 2003, who provide an extensive list of disruptive companies – e.g. pp. 56-65). as christensen et al. (2009) argue, no business is immune to disruptive innovations. if this is true, then, of course, it is of utmost relevance to be able to recognize these innovations before they start to disrupt a business. this is true for incumbents who may want to prevent their demise and for those who want to launch or participate in disruptive innovations. either way, gathering information about actual or potential disruptive innovations is a highly relevant activity – a notion that has been put forward by other authors as well (e.g. christensen et al., 2002; adner, 2002; paap and katz, 2004, danneels, 2006; schmidt and druehl, 2008). we call this information “disruptive intelligence” and the main question for this paper is how to produce such intelligence. to understand the production of disruptive intelligence, it is necessary to understand the nature of disruptive innovations. that is, we need to understand what a disruptive innovation is (which is a difficult task in itself, as danneels (2006) points out) and, as adner, 2002, noted, we need “… an understanding of the conditions that give rise to disruptive technologies […]” (p. 667). based on “disruptive innovation theory” as developed over the past decades we can gain such understanding and use it to guide the production of disruptive intelligence. it should be noted that gaining insight into information needed to deal with disruptive innovations is a topic that has already been addressed by several authors (e.g., paap and katz, 2004; christensen et al., 2002, christensen et al., 2003). however, since these attempts, disruptive innovation theory has matured (cf. christensen 2006 about the development of the theory, and christensen et al., 2009 for an updated version). in newer versions the understanding of the relevant characteristics of disruptive innovations and their drivers has evolved. based on this improved understanding we are able to give an updated version of the required “disruptive intelligence”. the main question of our paper is important, not only because of its relevance for strategy formulation (fighting or engaging in disruption), but also because a systematic, up-to-date attempt at answering it seems to be lacking in the existing literature. 65 to deal with the question of producing disruptive intelligence, this paper is organized as follows. first, we summarize disruptive innovation theory (section 2). this will present us with a description of disruptive innovations and with an overview of their drivers. in section 3, we use relevant aspects from disruptive intelligence theory to discuss three important topics related to the production of disruptive intelligence: (1) how do we know whether a market is prone for disruption? (2) how do we know whether disruption is going on?, and (3) how can we prevent blind spots in gathering disruptive intelligence? 2. disruptive innovation theory to understand how intelligence needed to deal with disruptive innovations can be produced, we first need to describe disruptive innovations in some more detail. in particular, based on an understanding of (1) the concept of disruptive innovations and (2) their drivers we will be in a position to direct intelligence efforts. this section discusses disruptive innovations and their drivers based on disruptive innovation theory as it has been developed over the last twenty years. section 3 will go into disruptive intelligence. 2.1 disruptive innovations to explain what disruptive innovations are, christensen often starts with explaining so-called sustaining innovations (e.g. christensen et al., 2003; christensen et al., 2009). a sustaining innovation is an innovation that improves the performance of an existing product or service “[…] with success measured along dimensions historically valued by their customers” (christensen et al., 2009, p. 4). these innovations set out to improve the performance on the attributes valued by mainstream customers (cf. govindarajan and kopalle, 2006b, p. 27). typical examples are innovations leading to faster cars, disk drives with better storage capacity, or radio’s and tv’s of better quality (cf. ch 2003; 2009) as christensen explains, a series of sustaining innovations typically results in products and services that “over-serve” costumers they lead to a performance that most customers can no longer utilize (christensen et al., 2009, p 5). at some point, for instance, faster cars don’t really make sense given the constraining circumstances for using this speed (christensen et al., 2003, p. 32-33; christensen et al., 2009, p. 4). as the market for particular customers can be divided into different tiers, christensen et al., (2003, p. 33) explains that the degree of over-serving is different for each tier. typically, the low-end, less demanding and/or price sensitive part of the market may be “over-served” sooner than the high-end part of the market. the reason for the focus on sustaining innovations is that incumbents “[…] are striving for better products that they can sell for higher profit margins to not-yet-satisfied customers in more demanding tiers of the market” (christensen et al., 2003, p. 34). in all, “[…] a sustaining innovation targets demanding, high-end customers with better performance than what was previously available”. (p. 34). given this explanation, disruptive innovations are contrasted to sustaining innovations. disruptive innovations do not aim to make existing products better, rather, they introduce products that actually underperform compared to existing products (cf. christensen et al., 2003, p. 34). yet, “[…] they offer other benefits – typically they are simpler, more convenient, and less expensive products that appeal to new or less-demanding customers” (christensen et al., 2003, p. 34) and not to mainstream customers. some of the examples christensen and his colleagues provide us with are: disk drives with less storage capacity but increased portability; cheap, portable computing devices with less computing power (early “pc’s”), and cheaper cars with less functionalities. as christensen et al., 2009 argue, these disruptive innovations offer “affordability, accessibility and convenience” over the performance attributes that are valued by the mainstream customers. now, as disruptive products gradually improve – due to their own sustaining innovations, they eventually appeal to the mainstream customers of the old product. (christensen et al., 2003; christensen et al., 2009). in terms of the examples christensen provides: personal computers improved up to the point that they appealed to the users of mainframes; transistor radios improved to match the quality of the large vacuum tube radios, the storage capacity of portable disk drives increased to match the performance of their less portable predecessors. the improvement of a disruptive product may eventually lead to a disruption of the business: which starts to occur when mainstream customers prefer the new product. in his earlier work, christensen et al. made a distinction between “new market disruptions” and 66 “low-end disruptions” (christensen et al., 2003). a low end disruption targets at the low end tiers of the market – costumers who are less demanding and more price sensitive. these are the customers with a high degree of “over-serving” who are quite willing to buy a product with less functionalities – they would buy less powerful cars; disk drives with less storage capacity, pc’s with less processing speed, etc. gradually, the product improves “from the lowend up” and starts appealing to more demanding tiers of the market. a typical feature of low-end disruptions is that they “grow by picking off the least attractive of the established firms’ customers”. (christensen et al., 2003, p. 46). christensen discusses the example of “so-called steel minimills”, mills that were able to produce steel far more efficiently in far smaller settings than the established steel mills. at the outset, the new technology enabled these mini-mills to produce steel of a quality that only appealed to the least demanding tier of the market. however, as technology improved, mini-mills were able to produce steel of a quality that also appealed to the more demanding tiers (christensen et al., 2003 pp. 35-39). a new market disruption introduces products that “compete against non-consumption” (christensen et al., 2003, p. 45). that is, they open up for a new market of customers who couldn’t afford the old product and/or who are attracted by the new product’s additional performance attributes. the first portable sony transistor radios were of less quality than the existing “table top” radios. however, their low cost and portability appealed to a new type of customer: teenagers who could now listen to music whenever and wherever they pleased (cf. christensen, et al. 2003, p. 104/5). in general, christensen argues, new customers are attracted by affordability and or additional attributes like accessibility and convenience. in his language: the products enabled new customers to realize a job they wanted to have done, something the old product couldn’t. after a series of sustaining innovations, these products improve and start to appeal to customers of the old product. it should be noted that disruptions can also be “hybrids’ (christensen et al., 2003, p. 47). for instance, the introduction of the cheap toyota corolla (made possible because of toyota’s efficient production-system) is an example of a hybrid as it appealed to low-end “over-served” price-sensitive customers, while it also attracted new customers who previously couldn’t afford a car (christensen et al., 2003, p. 64). an important aspect of christensen’s work is that incumbents fail to react adequately to disruptive innovations. when a low-end disruption occurs, stealing away their less profitable customers, incumbents are often not willing to compete. in such a case, they will be motivated to focus on the more profitable tiers of the market (cf. christensen et al., 2002, p.23) – a reaction they may later regret. when a new-market disruption occurs they may have even more trouble to react, as the product doesn’t even target their existing customers. govindarajan and kopalle (2006b) list several reasons why incumbents have a hard time reacting to disruptive innovations. for instance, the new product does not appeal to mainstream customers because it has a different “package of performance attributes at the time of introduction” (p. 191), and because it performs less on the attributes valued by them; moreover, the new product may be “[…] introduced in an emerging or insignificant niche market” and “[…it…] offers a lower margin” (p. 191). as a result, a recurrent theme in the history of disruptive innovations is that incumbents often realize too late that their business is being disrupted. 2.2 drivers of disruptive innovations after having discussed the idea of disruptive innovation, a next question is how these innovations are brought about. to answer this question christensen et al. (2009) identify three drivers or enablers: a “technological enabler”, a suitable “business model” and an adequate “value network” (2009, p. xx ff). 2.2.1 technological enablers a technological enabler of a disruptive innovation refers to “sophisticated technology whose purpose it is to simplify, it routinizes the solution to problems […] (christensen et al., 2009, p. xx). technology is taken to be a broad concept, as it refers to any “[…] way of combining inputs […] into outputs of greater value” (christensen et al., 2009, p. 1). and if such a “way of combining inputs” is simpler and/or more affordable than the existing technology, then it is a potential enabler for a disruptive innovation. defined this way, a technological can refer to a technical innovation (e.g. the micro-processor – making the task of 67 “computing” simpler and more affordable) or to a specific organizational structure and way of performing tasks (e.g. the toyota production system – making the production of cars more efficient and hence the cars themselves more affordable). a technological enabler can be used to make products simpler, more convenient or more affordable (e.g. the micro-processor enabling the production of personal computers which were much simpler devices than mainframes) and/or it can make the process of production simpler and more cost-efficient and hence, its resulting products more affordable (e.g. the toyota-production system made production more cost-efficient, and as it happened, the micro-processor also simplified the process of design and assembly – christensen et al., 2009). as a final remark, it should be noted that disruptive technology doesn’t always need to be a new technical invention – it can also refer to a new use of existing technology (e.g. using the internet in a way that may disrupt a business, like ebay did according to christensen et al., 2009, p. 31). 2.2.2 business models as enablers of disruptive innovations. in the course of developing disruptive innovation theory, business models became more central (christensen, 2006). in later versions of the theory, it is argued that disruptive innovations can only come about if there is a “supportive” business model. a relevant question then becomes: what is a business model and how does it enable disruption? business models christensen identifies a business model as a particular arrangement of four components: a value proposition, processes, a profit formula and the organization’s resources (cf, stabell & fjeldstad, 1998; christensen et al., 2009, p. 9). a value proposition, in essence, refers to the value offered to customers. it indicates how a product or service may help “[…] customers do more effectively, conveniently, and affordably a job they have been trying to do” (p. 9). although each firm has its own specific value proposition, christensen discusses three types of value propositions (following thompson (1967) and stabell and fjeldstad (1998)). he identifies a “value adding process” (with its basic value proposition to transform inputs into outputs – e.g. retailing, restaurants, or car-manufacturers) a “solution shop” (with its basic value proposition to solve clients’ unstructured problems – e.g. a professional service firm) and a “facilitated network” (with its basic value proposition to link clients / supply and demand – e.g. a bank) 1 . the processes-part of a business model refers to the primary process activities and how they are related (stabell and fjeldstad; 1998) – although christensen et al. define it broader (including the primary and secondary “way[s] of working together to address recurrent tasks in a consistent way” (2009; p. 9, 10). as stabell and fjeldstad (1998) argue, three different types of process-activities and relations can be identified (related to the three types of value propositions discussed above). if a value proposition falls in the class of “value adding process”, its primary process activities are typically those of porter’s value chain: inbound logistics, operations, outbound logistics, marketing and service (porter, 1985, 39-40). these activities are mainly related sequentially and contribute – in sequence – to the final product or service. as thompson (1967) explains, these activities and their sequential ordering make sense if the process is structured; well understood, predictable and/or routine to a considerable degree. if a value proposition aims at dealing with unstructured problems (a solution shop), then the main process activities are diagnosis (problem finding), design (propose a solution to the problem), implementation (of the proposed solution), and evaluation (of the implemented solution) (cf. stabell and fjeldstad, 1998, p. 415). moreover, as these problems are unstructured, the activities are mostly carried out in a “cyclical or spiraling” way (cf. stabell and fjeldstad, 1998, p. 415). that is, carrying out activities is based on the feedback received during or after the execution of activities, and based on that feedback it may be necessary to redo those activities (cf. thompson’s (1967) description of intensive technology). if the value proposition is to link clients (facilitated network), the main primary activities are network promotion, service provisioning and infrastructure operation (stabell and fjeldstad, 1998, p. 415). moreover, as the authors point out, these activities can be carried out in parallel. so, each of the three types of value 1 even though the basic distinctions derive from thompson ‘s technology typology identifying long linked, intensive and mediating technology, we will refer to the three labels used by christensen et al. (2009, p. 20 ff). 68 proposition is related to its own set of processactivities. a profit formula refers (1) to the profit and cost drivers, and (2) to the way customers pay for products and services. with respect to the first aspect of the profit formula, christensen et al. write: that it “[…] defines the required price, markups, gross and net profit margins, asset turn, and volumes necessary to cover profitably the costs […]” (2009, p. 9). it refers, for instance, to the choice to make products in large volumes with low margins or in small volumes with a high margin. christensen further specifies the way customers pay for products and services into three classes: fixed price, fee-for-service and membership fee. again, dependent on the type of value proposition, a particular profit formula is more or less suitable. as a value adding process relates to predictable routine processes, its key profit drivers are (economies of) scale and a fixed price can be charged. similarly, as a solution shop deals with unstructured, hence unpredictable problems, charging a fee-for service is more appropriate moreover, given their unstructured nature, processes cannot profit from capacity utilization made possible by routinization. instead, they depend on the (expensive) human expertise with carrying out unstructured processes. therefore, a key profit driver is the reputation of those involved in the process while a cost driver is their expense (cf. stabell and fjeldstad, 1998). the mediating value proposition may also profit from scale and capacity utilization (as it can, for instance, use the same technical network to connect many clients) and it can and often does supply its services for a membership fee (see christensen et al. 2009, p. 20 ff.). the last element of a business model, as described by christensen et al. 2009, refers to the resources that are employed to carry out the processes and deliver the value proposition – including both human and other resources (tools, ict, machinery, etc.). again, a difference can be made according to the type of value proposition. in a value-adding process the focus is on technology enabling the swift sequential operation of activities (e.g. conveyer-belt technology, or systems optimizing the work-flow) and on low cost human resources. in a solution shop, human expertise is the most valuable asset (although tools and equipment are not unimportant either). in a mediating value proposition the focus is on the infrastructure enabling the network (e.g. ict/internet and those facilitating the network). in all, as stabell and fjeldstad (1998) describe, three basic business models can be identified, each having their own characteristic business model components: (1) a value adding process business model (with as its value proposition: transforming inputs into outputs; with porter’s value chain process-activities, with standardization and economies of scale of profit drivers, charging on a fixed price basis and with the focus on resources enabling standardization and low cost). (2) a solution shop business model (value proposition: solving unstructured problems; process activities related to iteratively dealing with unstructured problems (diagnosing them, designing and implementing solutions and evaluation); relying on expensive experts of good reputation and charging on a fee-forservice basis). (3) a mediating business model (with its value proposition to link clients; process activities related to promote, operate and facilitate the network linking clients; with capacity-utilization of the network as its profit-driver and charging a membership fee). business models as enablers of disruptive innovations after describing business models, it is relevant to discuss how they enable disruption. as christensen argues, disruptive innovations always entail a change in a business model (i.e. a change of one or more of their constituent components). they always entail the change of the value proposition. that is, based on some disruptive technology, a new value proposition is to bring to the market a product or service that can help customers to do more effectively, affordably, conveniently a job they have been trying to do than the products or services that are currently available. this is the case in lowend disruptions, in which the new value proposition is to sell more affordable products with less functionalities to “over-served” customers. it is also the case in new-market disruptions, in which the new value proposition is to target new customers with a product that helps them to do a job that the old product wasn’t able to do. 69 following a change in value proposition, processes and resources should be formulated and aligned to fit the new value proposition. if the new value proposition is to serve the low-end, price sensitive part of the market, the business model typically needs to allow a firm to “compete profitably while pricing at deep discounts” (christensen et al., 2002, p. 26). this, in turn, requires a different profit formula, more efficient processes and/or resources than what incumbents have. a different alignment of business model components is also required if a value proposition targets at new customers with a product having other performance characteristics. in fact, one of the important “lessons” from disruptive innovation theory is that disruption always needs a change in business model. according to christensen, a common theme concerning disruptive innovations is that incumbents are often aware of the disruptive technology but refuse to change their business model, because it is – to them a sound way of making money. the new technology doesn’t serve their mainstream customers as good and profitably as the products they currently produce. so, why change their value proposition, processes and resources? even if the new technology starts to lead to better products taking away customers at the low end of the market – incumbents tend to stick to their business model in the hope to make money by serving the more demanding customers (with sustaining innovations). as christensen (2006) summarizes: “[…] a disruptive innovation is financially unattractive for the leading incumbent to pursue, relative to its profit model and relative to other investments that are competing for the organization’s resources” (p. 49). in other words, a business model may present a form of “disruptive blindness” on the part of incumbents. in fact, christensen’s advice to incumbents, who want to react properly to a disruptive threat, is to start a new business unit with a different business model tied to products with the new disruptive technology. so, disruptive innovations require a change in business model. in this way, they enable disruption. christensen et al. (2009) go on to discuss two different types of disruptive business model change: one in which the type of value propositions stays the same, and one in which the type of value proposition changes. a disruptive business model change that doesn’t lead to a new type of value proposition is one in which a firm either attracts the low end of the existing market or targets at non consumers with a similar type of value proposition but with a different profit formula, different resources or more efficient processes. examples of such a business model change regarding low end disruptions include the steel mini-mills or toyota (see earlier examples). their basic value proposition remained the same (value adding process), but a new processtechnology (efficient mills) or a more efficient way of relating process activities (toyota) made (low end) disruption possible. an example of a change in business model within the same type of value proposition attracting non-consumers might be sony’s transistor radios appealing to a new type of customers: a new market disruption in a business with a “value adding process” value proposition. a business model change can also result in a new business model with a value proposition of a different type – for instance hbo and netflix are currently disrupting the home-video market. until recently, this market was dominated by dvdproducers (with sustaining innovations like blue-ray dvd). hbo and netflix offer customers to watch movies and series whenever they want by offering them access to their network containing movies and series. in essence, their value proposition belongs to the facilitated network type while the dvdproducers had a value-adding process business model. amazon did something similar for the business of selling books, taking it from a value adding process to a facilitated network business, serving the low end of the market according to christensen et al. (2009). christensen et al., 2009, argue that a business model change which succeeds in moving from a solution shop business to a value adding process or a facilitated network business are especially powerful. solution shop value propositions are – given their nature – business models leading to expensive products that can only be made by experts. if a technology becomes available which enables doing solution shop activities in a predictable, routine way, a business may be disrupted. this is so because making these products no longer relies on complex esoteric knowledge and experience of expensive experts, but based on the new technology, it becomes possible to standardize and routinize production, requiring less expertise. an example may be the diagnosis of infections (example adapted from christensen et al., 2009). once, this was the exclusive realm of medical specialists who might determine the type of infection based on trial and error and their vast 70 body of experience. as such it was a solution shop activity. once diagnostic tests became available based on which a range of infections could be determined with certainty – the process of determining infections became much more affordable and accessible. most of these tests can now be administered routinely by less expensive medical staff, taking less time to determine the result (although of course, specialists are still needed if standard tests yield no results). christensen argues that ford did something similar for the automobile industry: by standardizing the process of assembling cars he changed from a solution shop activity to a value adding process (resulting in much cheaper cars). something similar holds for changing from a value adding process business to a facilitated network – which often allows for delivering services at lower production and overhead cost. so, disruptive innovations always need a change in business model, so as to support the potential of the disruptive technology. in the first place, a disruptive innovation always entails a change in value proposition (as simpler, more convenient and/or more affordable products are offered). this change can result in a different type of value proposition. next, a disruptive innovation requires a reformulation and realignment of business model components (relative to the business model of incumbents) so as to make sure that the disruptive product can be brought to the market as a low-end or new-market innovation. in fact, as christensen et al., 2009 argue: to make disruptive innovations succeed, they require their own proper business model (which should be different from the business model of incumbents). in christensen, grossman and hwang, 2009, the above logic of business models as enablers of disruption is further extended. the authors argue that organizations trying to mix different types of business models are at a disadvantage. in such a case, an organization may produce a product requiring solution shop activities and one which can be produced with value adding process activities. if they use the same resources and the same profit formula with respect to both types of products, then the value adding process product may become too expensive. in general, christensen et al. (2009) argue that mixing types of business models in this way often leads to less affordable and accessible products. as a simple example, consider a group of psychologists offering two types of services: tailormade psychological counseling to deal with difficult psychological disorders and more routine services like administering iq-tests. the first type of activity is a solution shop activity requiring expertise and iterative problem solving, while the latter is a routine value adding process activity requiring far less expertise. now, if both types of activities are carried out by the same set of specialists charging a fee for service, the routine activity ends up being relatively expensive. a better idea is to make sure that the two types of activities have their own “business model” – e.g. their own set of resources, activities and profit formula. one line of business would be tied to routine activities (like iq tests). the associated business model has a value adding process proposition, routine and standardized activities, relatively inexpensive personnel and it could charge a fixed price. the other line of business would house the solution shop activities carried out by the more expensive experts. iq tests can become cheaper and experts can focus on delivering complex counseling. both lines of business may improve. although this is a simple example, christensen et al. (2009) explains that “disentangling” business models, as he calls it, and making sure that value propositions of a different type are served by different business models is a powerful way of improving business models (one he uses to “disrupt healthcare institutions”, christensen et al., 2009). by discussing disentangling business models, christensen argues that if you mix business models, you may not reap the benefits of a potentially disruptive innovation. this is a specific reformulation of the adage that “disruptive innovations need their own proper business model” – as discussed above. however, given existing technology, disentangling business models may sometimes itself be a way to make products more affordable and accessible (as the example above shows – and christensen et al., 2009 provide many more in the context of health care disruptions). 2.2.3 a value network as enabler of disruptive innovations a disruptive innovation does not only require disruptive technology and a supportive business model – it also needs a “value network”. a value network is a “commercial infrastructure” […] through which […the disruptive product or service…] is delivered. (christensen et al., 2009, p. xx and p. xxviii). it consists for instance of companies that help to market, produce, sell and 71 provide services for the new product; a network of e.g. producers, suppliers, service-companies, and vendors. selling mainframes, for instance, relied on a different value network than selling pcs (which could, for instance, be sold by retailers). as christensen et al. argue disruption innovations need a fitting (and often different) value network. producing and selling in high volume and low margin (low end disruption) requires a value network aimed at low cost. similarly, attracting new customers (new market disruption) requires at least a value network with access to these new customers. a change in value proposition type (e.g. moving from a value adding process to a facilitated network business) also means a different value network (e.g. one helping to build and maintain the facilitated network instead of one sustaining production processes). to summarize, this section discussed both a description of disruptive innovations (as an innovation leading to more affordable, accessible and convenient products) and their three drivers (technological, business model and value network) – see table 1. in section 3, we use these ideas to discuss disruptive intelligence. table 1: description and drivers of disruptive innovations. 3. disruptive intelligence the goal of this paper is to understand the production of “disruptive intelligence” that is, information that may help to see whether a disruption is possible or whether a business is being disrupted. to structure the discussion of disruptive intelligence, it is helpful to see that the main question concerning disruptive innovations is: is (will) a technological innovation (be) available that can be used, along with an appropriate business model and value network, to bring a product or service to the market that may eventually grow into a product that is more affordable, accessible and/or convenient than the products that are currently available? we will call all information that may help to answer this question (before a business is actually disrupted) “disruptive intelligence”. this intelligence is relevant for incumbents as they may want to protect themselves against and make sure they react adequately to disruptions. it is also relevant for those considering participating in disrupting a business as they may want to know whether a potential disruptive innovation may stand a chance. regarding the production of disruptive intelligence, three related questions are relevant. the first is: are disruptions possible in this business? this question relates to whether a particular business is susceptible to disruption. based on this information it becomes possible to anticipate a possible disruption and pro-actively deal with it. this information is also relevant for those planning a disruptive attack; the prospects of such an attack are of course better in a disruptionprone business. the second question revolves around finding out whether a disruption may currently be happening. have new entrants (or disruptive innovation drivers of disruptive innovations description: an innovation eventually leading to more affordable, accessible and convenient products types: low-end (starting at low end of existing market); new market (attracting nonconsumers of old product) 1. technological innovation (making products or processes simpler) 2. business model ch components value proposition processes -resources -profit formula 3. value network (for making and selling the new products) type of business model -solution shop -value adding process facilitated network 2. business model change 72 incumbents) introduced a disruptive innovation? obviously, the sooner incumbents have this information, the sooner they can react. moreover, for those who are engaged in a disruptive attack, it is relevant to have an idea of the potential competition and whether their innovation is indeed a disruptive innovation. a last question relates to “disruptive myopia” – a bias in the capacity to produce disruptive intelligence. it seeks to make clear whether incumbents (and even the disruptive aggressor) may have (developed) systematic barriers preventing them from seriously answering the two above questions (and hence from discovering disruptive intelligence). below, we will deal with each of these questions and in doing so we will present some intelligence-topics that could be pursued to answer the question. we want to note, however, that we don’t claim that these intelligence topics form a complete list – but we do argue that these topics will help to increase the possibility to deal with disruptions. 3.1 are disruptions possible in this business? finding out whether a business is “disruptionprone” it is relevant for two (related) reasons. the first is that you may want to know whether a business is susceptible to a disruption at all (this knowledge can raise ‘the level of disruption awareness’ – which may help incumbents to be alert and would-be entrants to discover opportunities). the second is that you may want to find out whether a particular innovative idea has a disruptive potential. 3.1.1 is any disruption possible in this business? following christensen and his colleagues, a business may be disrupted if its existing products or services are expensive, difficult to access and/or may not be convenient. christensen et al. hold that “nearly every industry, at their outset […offered products and services…] that only people with a lot of money can afford them, and only people with a lot of expertise can provide or use them.” (2009, p xix). so, nearly every industry was or is disruptionprone. moreover, after a disruption occurs, a business may be disrupted even further… leading to more affordable, and accessible products. so, a first – very crude – indicator of “being disruptive-prone” is the degree to which a business has products or services that are not affordable and inaccessible. with respect to the degree of unaffordability we need to identify whether the products “can only be bought by people with a lot of money. ”here, we need to be careful though, because (as a disrupted business may be disrupted again) “a lot of money” seems to be a relative measure. in disruptive innovation theory, the degree of accessibility relates to several ideas. it sometimes refers to the degree to which a product can be provided by people with a lot of expertise (like eye-surgery once was), sometimes to the degree to which a product can be used by people with a lot of expertise (like mainframe computers), and sometimes to the degree to which customers can get access to a product or service (e.g. if one has to buy it at some central location, or if acquiring it means waiting – like many healthcare services). often, difficult-toprovide and difficult-to-use products have these characteristics because they rely on ‘solution shop’ activities. an innovation transforming these activities into a value-adding process or facilitated network business may be disruptive (e.g. innovations have made certain eye-operations routine-activities decreasing their cost dramatically cf. christensen, 2009). a facilitated network may help to solve problems with acquiring products (e.g. access to films and series via hbo solves going to a retailer). so – a first indicator is the degree to which a business provides expensive and inaccessible products / service. a second indicator refers to the degree to which current products and services help clients to “do a job they have been trying to do” (cf. christensen et al. 2003, christensen et al. 2009). this is an extremely relevant point but also difficult to examine. if an existing product doesn’t help clients to do their job properly – the introduction of a product that does, may disrupt the business. this is, of course, a truism, but as it turns out many companies have a hard time pinning down the job of customers as they often frame their markets in terms of productor client-characteristics (which are categories used by those selling the products), while the “job” “should be the fundamental unit of marketing analysis” (christensen, et al. 2009, p. 11) as it represents that for which “customers hire a product or service”. so, markets shouldn’t (only) be analyzed using lists of productand customer categories as they may miss the job customers hire a product for (this was already pointed out by early intelligence authors, like geroski, 1988). discovering the true “job” requires a different approach than existing marketing techniques. it requires a deep understanding of the life of 73 customers and the role existing products have therein, which calls for a more ethnographic approach in which customers’ socially embedded desires and actions are related to the use of products. a further indicator of a disruption-prone business is the degree to which customers are “over-served’ as christensen et al. 2009 call it. as discussed, this refers to the difference between the functionalities offered by a particular product or service and the functionalities that costumers are able to utilize. the higher this ‘value’, the more susceptible the business is for a low-end disruption. this indicator may even be determined for different tiers of the market; and especially relevant information would be how many of the current customers would be willing to buy a product with less functionalities. another related idea is to determine how many customers would still be interested in buying the product if it was stripped of its non-essential, excess functionalities (some research shows how markets can be approached in this way – e.g. adner, 2002) establishing whether a new market disruption might be possible is difficult as it needs to research the demands and behavior of non-consumers. for a part this overlaps with the indicators stated above for low-end disruptions (as current non-consumers may be non-consumers because they don’t have enough money to buy the product). however, if a product is to appeal to non-consumers for other product characteristics – one needs to find them. this, in turn, means gaining an understanding of the ‘job’ of (non) customers in order to identify possible other contexts of use or competing products. an idea might be to identify groups of non-consumers and ask under which conditions they would use a similar product (again, other authors have put forward “methods” that can be used to identify relevant non-consumers – e.g. geroski, 1988). if such products can be identified (and if these conditions include the use of products with less functionalities than the current ones) it may indicate that a business is disruption-prone. an example in this case would be the discovery that portable radios could be used by teenagers who were happy with them because it meant that they could listen to music whenever and wherever they wanted – which they valued more than quality of the transmission. a related indicator relating to a low-end and new-market disruption may be the degree of saturation of the “dominant product characteristic” – the characteristic most valued by mainstream customers (cf. paap and katz, 2004). the saturation-value is the value above which “more of the characteristic” doesn’t present extra value to a customer (in fact, this value may be one way of operationalizing the degree of “over-serving”). paap and katz (2004) give the example of storagecapacity of disk-drives. at some point it exceeded the capacity that customers could use and valued. hence, they argued, other characteristics may be introduced that can be of value (in the example: the portability of disk-drives). so, the moment saturation is reached, a business may become vulnerable to disruption. in all – to determine whether a business is “ready to be disrupted” one might consider the following indicators: 1. the degree to which a business revolves around expensive products; 2. the degree to which a business revolves around inaccessible products; 3. the degree to which a business delivers products that do not completely fit the “job” customers are trying to do; 4. the degree of “over-serving” of products in a business; 5. the degree to which consumers would be willing to buy the product if it were stripped of its non-essential functionalities; 6. the degree to which other contexts of use can be identified for simpler versions of the product; 7. the degree of saturation of the dominant product-characteristic (relates to 4). 3.1.2 is this innovation potentially disruptive? the above indicators give a general impression of the possibility that a business can be disrupted, creating a certain “disruption-awareness”. the question we now turn to starts off with an idea for an innovation and aims at finding out whether this particular innovation might be a disruptive innovation. in part, this question has already been addressed by christensen et al. (2002, 2003). in these texts, he gives so-called ‘litmus-tests’ for determining whether an innovation is potentially a low end disruption or a new market disruption. here, we briefly summarize these tests, as they may be guiding the production of disruptive intelligence. 74 in a new market situation, christensen et al. (2002) give three tests (1) the innovation must be a simple product appealing to non-consumers (p. 2425) (as the authors write, the apple ii was introduced as a toy for children; ibid p. 25); (2) the innovation should help customers to do a job they have been trying to do “more easily and conveniently” (p. 25). for instance, people have for a long time been trying to get rid of goods they no longer needed (e.g. through garage sales or occasional flee-markets), and applications offering online auctions (e.g. ebay) were a way of helping people to do get rid of their stuff more conveniently, reaching a far larger audience (cf. christensen et al., 2009, p. 31). (3) the innovation should target customers who were unable to do a particular job because of “lack of money or expertise”. (c 2004, p. 24). the online auction-sites offered mentioned above offered the majority of people who could not afford the services of a real auction-company to participate in an auction. (cf. christensen et al., 2003 and christensen et al., 2002, p. 24-25. for the three tests). according to christensen et al. 2002, if an innovation is to bring about a low-end disruption it should pass the following two tests: (1) the degree of “over-serving” should be high enough and (2) it should be possible to make a low-cost business model (“[…] one that enables entrants to compete profitably while pricing at deep discounts” (christensen et al. 2002, p. 26). so – given an innovative product of service (based on some technical driver) the above tests can direct intelligence efforts. but besides these tests, disruptive innovation theory presents more clues to determine whether some innovation may disrupt a business. these clues relate to the possible changes in the business model an innovation may bring about (christensen et al. 2009). for instance, if a particular innovation enables the routinization or standardization of solution shop activities, then a business will most probably be disrupted. something similar holds for an innovation that enables a change to a facilitated network business. a helpful question here is whether an innovation may help customers to help themselves (e.g. by some online or network service). yet another clue relating to business model change is whether a disentanglement of a particular business model (of form of business model innovation, as christensen et al. 2009 call it) may help to offer products or services more affordably. as we discussed earlier, making sure that different types of value propositions are served by different business models can often make products more affordable and accessible. so, disruptive intelligence can entail a form of “business model introspection” with the aim of trying to find out whether disentanglement is possible in your company. so, topics for disruptive intelligence regarding the question whether a particular innovation (either a new product or service or a business model innovation) is potentially disruptive are: 1. “is the innovation a simple product appealing to non-consumers?” 2. “does the innovation allow customers to do a job more easily and conveniently?” 3. “does the innovation target at customers who haven’t been able to do a job themselves because of lack of money or expertise?” these 3 topics are christensen’s (christensen et al., 2002, p. 24-25) “litmus tests” for new market disruptions. 4. does the innovation target at a market in which the current products have a high degree of ‘over-serving?’ 5. can the supportive business model be changed in one that produces at low prices? these 2 topics are christensen’s (christensen et al., 2002, p. 26) “litmus tests” for low-end disruptions. 6. does the innovation make a change in business model type possible (e.g. by routinization or by offering a mediating network)? 7. is it possible to disentangle the current business model? 3.2 is disruption going on? in this section we deal with information that may help to establish whether a business is currently being disrupted; i.e. whether some disruptive innovation has been launched. this is a difficult question: others may introduce some innovation sharing the characteristics of a disruptive innovation (e.g. it may underperform and only appeal to some of your customers) but it may well be that this product just doesn’t turn into a disruptive product. that disruptive innovations 75 have certain characteristics on the outset, doesn’t mean of course, that all innovations sharing these characteristics will be disruptive. the problem of predicting whether an innovation which is launched is potentially disruptive has been noticed by several authors (e.g. christensen et al., 2003; danneels, 2006; govindarajan and kopalle, 2006a, b). yet, based on disruptive innovation theory we feel that some clues may help to increase the possibility of establishing an answer to the question whether a business is being disrupted. first of all, it should be noted that all information gathered to answer the question from the previous section (is our business a disruptiveprone business?) is helpful to answer the question in this section. if we know that we operate in a disruptive-prone business then we need to be extra alert and take threats of disruptive candidates seriously. moreover, if we notice that an innovation has been launched sharing some of the characteristics of a disruptive innovation, we may want to acknowledge whether it passes christensen’s “litmus tests”. if so (combined with knowing that the business is a disruptive-prone market) we should be very alert. on top of this information some other clues may be helpful. for instance, if an innovation seems promising one may expect a certain number of start-up firms (christensen, et al. 2011). what may even be more telling is when an incumbent starts a different business model tailored to this innovation. as christensen et al. argue an incumbent cannot incorporate a disruptive innovation in its current business model; it needs to launch it from a different business model (like ibm who started a separate business unit to produce pcs – cf. christensen et al. 2009). so, information on incumbents starting up a new business unit with a new business model is relevant disruptive intelligence’. an interesting technique for predicting the disruptiveness of an innovation that has been introduced is using s-curves which describe the sales-pattern of most disruptive innovations (e.g. paap and katz, 2004; christensen and eyring, 2011). sales of disruptive innovations usually follow an s-curve pattern, with few, but steadily growing number of sales at the beginning, followed by a abrupt growth in sales, again stabilizing eventually. if sales of a new product have reached the steep part of the s-curve, it may be too late. so, the trick is to predict whether some sales-growth (at the start of the s-curve) will turn into a sudden growth in sales (in the middle of the s-curve). one method that may shed light on this issue is to rescale sales on a logarithmic scale. as christensen (2011, 96) shows, the s-curve then turns into a linegraph based on which it may be easier to see whether the initial sales fit in an s-curve, and hence are predictive of a sudden growth. another relevant indicator has to do with losing tiers in a market. finding out that incumbents have lost the least-demanding low-end tiers of the market and concentrate on the more profitable tiers is a relevant indicator of a disruption. in fact, the more tiers that are lost, the more one can be sure that the innovation is disrupting a business. unfortunately, this information may be a very late warning signal. yet another indicator has to do with a change in value-network. as the disruptive innovation targets at different customers or may entail a change in business model, one may expect a change in firms that are part of the value network. once, for instance, retailers are willing to give the new product a chance, this may signal such a change. one may also expect a growth of start-up firms in the value network. a last indicator we want to mention here is a change in business model of (new) competitors. it may be a sign of disruption if new entrants have a different type of business model, or if competitors disentangle their business model. so, in order to determine whether a business is being disrupted, the following indicators (besides the ones mentioned in the previous section) may be relevant: (1) the number of start-up firms (2) are incumbents starting up a new business unit with respect to the new innovation? (3) are sales of the innovation following the usual pattern of disruptive innovations? (4) are incumbents losing (low-end) tiers of the market? (5) is the value network changing? (6) do new entrants have different (types of) business models? (7) are competitors disentangling their business models? 3.3 do we suffer from disruptive blindness? the last intelligence related topic we want to discuss in this paper is whether a company may have developed systemic biases preventing it to produce disruptive intelligence and act on it. following disruptive intelligence theory, 76 incumbents are often not motivated to react to disruptive attacks as they aim for the least attractive tiers of the market. in the face of such attacks, incumbents are motivated to focus on the more attractive, profitable tiers of the market. moreover, as christensen and raynor, 2003, argue, incumbents favor sustaining innovations as they target at the profitable tiers of the market, and hence, increase (short-term) share-holder appreciation. investments in (uncertain) innovations that target at less profitable tiers simply do not appeal to shareholders. so, the current way of doing business may prevent incumbents to engage in disruptive innovations and often realize that they should have reacted when it’s too late. phrased differently, because their way of doing business is deeply rooted in one particular business model, they fail to see the threat of disruption. this is a common theme in disruptive innovation theory and if incumbents want to protect themselves against disruption, it is relevant to investigate to what extent they suffer from such ‘disruptive blindness’. in this section, we suggest some indicators of this blindness, which can be used to create a certain awareness of existing biases. before we discuss some indicators of “disruptive blindness” we would like to point out that some of the “business blind spots” that were put forward by gilad (1996) in the context of competitive intelligence, can be reframed in terms of the reaction-pattern of incumbents to disruptive innovations. gilad (1996) discusses, for instance, “false or biased assumptions” as a blind spot which may impair strategic decision making. an example he gives is the biased assumption of many large firms that they do not have to pay attention to smaller players on the market. but often, as he describes, large players pay dearly for this blind spot when a small player launches a successful product. based on disruptive innovation theory, it becomes possible to better understand this blind spot. in fact, disruptive innovation theory shows that this assumption may in fact be a valid assumption with respect to sustaining innovations. it also shows that new entrants (often small players) most of the time win the battle for disruptive innovations, because incumbents are stuck to their business model (in which the newly introduced, inferior product, not appealing to their mainstream customers doesn’t make much sense). so, based on disruptive innovation theory it can be understood that “not paying attention to small players” may not be a bias per se, but that it fits a response pattern of incumbents to disruptive innovations. a first indicator of “disruptive myopia” might the answer to the following question: “do we actively try to answer the above two questions (3.1 and 3.2) related to disruptive intelligence?” obviously, if no effort is put in answering these questions, one probably has no clue about whether one operates in a disruptive-prone market, whether particular innovations have a disruptive potential, or whether a disruption may be going on. in fact, in order to produce disruptive intelligence, one needs to make an effort, which should translate itself in an infrastructure related to producing intelligence. it should, for instance, be someone’s responsibility; and time and resources should be made available. not having an infrastructure tailored to producing disruptive intelligence is an indicator of disruptive blindness. another indicator of disruptive blindness relates to the “forces that shape the process of innovation” as christensen and raynor 2003 (p. 9 ff.) describe. as these authors argue, innovative ideas are “sifted and shaped” by middle managers in many organizations, who “typically hesitate to throw their weight behind new product concepts whose market is not assured” (christensen and raynor, 2003, p. 11). they need to be as sure as possible about a product’s potential (as both budget decisions and their career depend on it) and often rely on the feedback of “significant customers”. but as a disruptive innovation often does not appeal to these customers, disruptive ideas tend to be deselected. sustaining innovations, however, do appeal to this set of customers, thus having a tendency of being preferred. so – the process of innovation of incumbents has a bias towards sustaining innovations (and against disruptive ones). to deal with this blindness (i.e. to at least become aware of it) it may be an idea to keep track of the innovative proposals and the reasons for their selection or rejection. this list may indicate the degree to which sustaining innovations are preferred over potentially disruptive ones. and, against the background of knowledge about the degree of disruptive-proneness of a business (e.g. operationalized by the degree of over-serving customers) one may decide whether the actual proportion of sustaining/potentially disruptive ideas is dangerous or not. another idea might be to make sure that reasons for selection/rejection do not only refer to the feedback of significant customers, but also to a kind of ‘disruptive reasoning’. ideally such 77 reasoning includes an (“job-to-be-done”-related) analysis of the appeal of the idea to the low-end of the market or to non-consumers and an analysis of the potential of the product in appealing to mainstream customers. a third indicator relates to the reaction if one is confronted with losing a part of the (low end of) the market. often, as christensen and raynor, 2003, describe, incumbents are quite happy to focus on the more profitable tiers of the market. however, precisely this attitude is an important indicator of disruptive blindness. a fourth bias that incumbents often display may be called the “business cycle fallacy” which roughly goes like this: if business is booming, we don’t need to invest in innovations whose prospect is unclear and if business is in a slump we can’t afford to invest in innovations whose prospect is unclear”. this, again, is a “disruptive innovation de-selection”-mechanism. as christensen et al. 2002 argue it should be the other way around: if things are looking good – see if a separate business unit around a potential disruptive innovation can be set up; if things look bleak, you may well be too late. a last indicator, related to disruptive blindness we want to mention in this section has to do with knowledge about disruptive innovations. the degree to which all involved in the process of innovation has knowledge about disruptive innovations and their drivers is an important indicator of blindness. without such knowledge, one cannot help to fall into the traps of biases deselecting disruptive innovations (cf. christensen et al., 2002, p. 30). 4. conclusion in this paper, the idea of ‘disruptive intelligence’ is presented. basedon disruptive innovation theory, we discussed the nature of disruptive innovations and their drivers. it is apparent that if one wants to deal with the threat (or opportunity) of a business disruptions one needs to produce “disruptive intelligence”. that is, one needs to produce information about (1) whether a particular business is “disruptive-prone” and (2) whether a disruption may be happening. in this paper, which is purely analytical and descriptive, we have provided several indicators that can be helpful in answering these two questions. in fact – these indicators can be taken to be helpful indicators in producing disruptive intelligence. moreover, we discussed some indicators that may reveal if companies are suffering from “disruptive blindness” – i.e. indicators showing that companies may have difficulties producing disruptive intelligence. even though we think that our paper contributes to a more systematic description of the information needed to deal with disruptive innovations, we are not there yet. in particular, the list of indicators can be extended – based on further conceptual and practical explorations. empirical studies should also follow. 5. literature adner, r., 2002, when are technologies disruptive? strategic management journal 23(8): 667-688. christensen, c.m., 1997. the innovator’s dilemma. boston ma: harvard business school press. christensen, c.m., 2006. the ongoing process of building a theory of disruption. journal of product innovation management 23: 39-55. christensen, c.m., and eyring, h.j., 2011, the innovative university. san fransisco (ca): jossey-bass. christensen, c.m., grossman, j.h., and hwang, m.d., 2009, the innovator’s prescription. new york: mcgrawhill. christensen, c.m., johnson, m.w., and rigby, d.k., 2002.. foundations for growth: how to identify and build disruptive new business. mit sloan management review. (spring 2002): 22-31. christensen, c.m., and raynor, m.e., 2003, the innovator’s solution. boston (ma): harvard business school press. danneels, e., 2004, disruptive technology reconsidered: a critique and research agenda. journal of product innovation management 21: 246-258. geroski, p., 1988, thinking creatively about your market: crisps, perfume and business strategy. business strategy review 9(2): 1-10. gilad, b., 1996., business blindspots (2 nd edition). calne (gb): infonortics. govindarajan, v., and kopalle, p.k., 2006a. the usefulness of measuring disruptiveness of innovations ex post in making ex ante predictions. journal of product innovation management 23: 12-18. govindarajan, v., and kopalle, p.k, 2006b. disruptiveness of innovations: measurement and an assessment of reliability and validity. strategic management journal 27: 189-199. 78 paap, j., and katz, r., 2004, anticipating disruptive innovation. research technology management (sept-okt 2004): 13-33. porter, m., 1985, competitive advantage: creating and sustaining superior performance. new york: free press. schmidt, g.m., and druehl, c.t., 2008. when is a disruptive innovation disruptive? journal of product innovation management 25: 347-369. stabell, c.b, and fjeldstad, ø.d., 1998. configuring value for competitive advantage: on chains, shops and networks. strategic management journal 19: 413-437. thompson, j.d., organizations in action. new york: mcgrawhill. issn: 2001-015x v o l 5 , n o 2 ( 2 0 1 5 ) c o n t e n t s g. scott erickson and helen n. rothberg a longitudinal look at strategy, intellectual capital and profit pools pp. 5-13 a.s.a. du toit competitive intelligence research: an investigation of trends in the literature pp. 14-21 amine aziza, mourad oubrich and klaus solberg søilen the impact of crm on qoe: an exploratory study from mobile phone industry in morocco pp. 22-35 lucie šperková, petr škola, tomáš bruckner evaluation of e-word-of-mouth through business intelligence processes in banking domain pp. 36-47 gianita bleoju and alexandru capatina leveraging organizational knowledge vision through strategic intelligence profiling the case of the romanian software industry pp. 48-58 ~ 2 journal contact: mailing address: jisib halmstad university box 823 301 18 halmstad sweden principal contact: prof. dr. klaus solberg søilen school of business and engineering (sbe) email: klaus.solberg_soilen@hh.se copyright © 2015 jisib, halmstad university. all rights reserved. 3 e d i t o r i a l t e a m founding editors prof. henri dou (france), groupe escem prof. per jenster (china), nimi honorary editors prof. john e. prescott (usa), university of pittsburgh prof. bernard dousset (france), toulouse university editor-in-chief prof. klaus solberg søilen (sweden), halmstad university regional associated editors america: prof. g. scott erickson (usa), ithaca college europe: prof. sahbi sidhom (france), nancy university asia: prof. xie xinzhou (china), beijing university africa: prof. adeline du toit (south africa), university of johannesburg nordic editorial advisory board: prof. svend hollensen, university of south denmark (denmark) prof. göran svensson, markedshøyskolen (norway). t h e e d i t o r i a l b o a r d : dr. mark xu, university of portsmouth, uk dr. subir ranjan das, university of petroleum & energy studies, india associate professor dirk vriens, radboud university, netherlands professor karim baina, école nationale supérieure d'informatique et d'analyse des systèmes (ensias), morocco professor uwe hannig, fachhochschule ludwigshafen am rhein, germany dr. klaus solberg søilen, halmstad university, school of business and engineering, sweden dr. eduardo flores bermudez, bayer schering pharma ag, germany professor kingo mchombu, university of namibia, namibia professor adeline du tout, university of johannesburg, south africa professor pere escorsa, school of industrial engineering of terrassa, politechnical university of catalonia, spain associate professor per frankelius, örebro university, sweden professor malek ghenima, l'université de la manouba, tunisia professor blaise cronin, indiana university, united states dr. john e. prescott, university of pittsburgh, united states dr. michael l neugarten, the college of management, rishon lezion, israel professor mika hannula, tampere university of technology, finnland professor kamel smaili, université nany 2, france professor henri jean-marie dou, atelis competitive intelligence work room of the groupe escem, france professor bernard dousset, toulouse university, france professor g. scott erickson, ithaca college, united states professor sahbi sidom, université nancy 2, france professor xinzhou xie, beijing science and technology information institute, china associate professor jonathan calof, telfer school of management at university of ottawa, canada professor per v. jenster, nordic international management institute, china professor alfredo passos, fundação getulio vargas, brazil professor brigitte gay, esc-toulouse, france professor sophie larivet, ecole supérieure du commerce extérieur (esce), paris, france t h e m a n a g e r i a l b o a r d : way chen, china institute of competitive intelligence (cici) raíner e michaeli, director institute for competitive intelligence gmbh, germany philippe a. clerc, director of ci, innovation & it department at the assembly of the french chambers of commerce and industry, france alessandro comai, director of miniera sl, project leader in world-class ci function, spain pascal frion, director acrie competitive intelligence network, france hans hedin, hedin intelligence & strategy consultancy, sweden mourad oubrich, president of ciems, morocco javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/49') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/18') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/20') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/19') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/21') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/3') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/22') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/23') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/24') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/25') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/26') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/27') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/28') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/6') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/29') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/17') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/16') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/4') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/7') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/8') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/9') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/10') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/12') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/31') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/13') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/14') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/15') 4 journal of intelligence studies in business halmstad, october 15th 2015 e d i t o r i a l n o t e v o l 5 , n o 2 ( 2 0 1 5 ) it is always a pleasure to realize, at the time of writing this editorial note, that the articles published by jisib come from many parts of the world and from many industries. this is not intentionally even though we strive for diversity as we do not know what articles actually make it through the review process for each issue. our rejection rate is now more than 80%. some see that as a sign of quality. in this issue of jisib we publish three articles on intelligence studies presented at the eckm 2015 conference. there is also an article by oubrich et al. presented at the aim 2015 conference. in addition asa du toit gives an updated analysis of the intelligence studies field. as always we would first of all like to thank the authors for their contributions to this issue of jisib. on behalf of the editorial board, sincerely yours, prof. dr. klaus solberg søilen editor-in-chief halmstad university i box 823 i s-301 18 halmstad, sweden i tel: +46 35-16 71 00 editor-in-chief: klaus solberg søilen included in this printed copy: social competitive intelligence: socio-technical themes and values for the networking organization lars degerstedt pp. 5-34 a place for intelligence studies as a scientific discipline klaus solberg søilen pp. 35-46 intelligence as a discipline, not just a practice magnus hoppe pp. 47-56 journal of intelligence studies in business v ol 5 , n o 3 , 2 0 1 5 j ou rn a l of in telligen ce s tu d ies in b u sin ess issn: 2001-015x vol. 5, no. 3 2015 the journal of intelligence studies in business (jisib) is a double-blind peer reviewed, open access journal published by halmstad university, sweden. its mission is to help facilitate and publish original research, conference proceedings and book reviews. focus and scope the journal includes articles within areas such as competitive intelligence, business intelligence, market intelligence, scientific and technical intelligence and geo-economics. this means that the journal has a managerial as well as an applied technical side (information systems), as these are now well integrated in real life business intelligence solutions. by focusing on business applications, this journal does not compete directly with the journals that deal with library sciences or state and military intelligence studies. topics within the selected study areas should show clear practical implications. open access this journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge. there are no costs to authors for publication in the journal. this extends to processing charges (apcs) and submission charges. copyright notice authors publishing in this journal agree to the following terms: authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a creative commons attribution license that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal. authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal. authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (see the effect of open access.) publication ethics the journal’s ethic statement is based on cope’s best practice guidelines for journal editors. it outlines the code of conduct for all authors, reviewers and editors involved in the production and publication of material in the journal. an unabridged version of the journal’s ethics statement is available at https://ojs.hh.se/. publication decisions: the editor is responsible for deciding which of the articles submitted to the journal should be published. the editor may be guided by the policies of the journal's editorial board and constrained by such legal requirements as shall then be in force regarding libel, copyright infringement and plagiarism. the editor may confer with other editors or reviewers in making this decision. fair play: an editor will evaluate manuscripts for their intellectual content without regard to race, gender, sexual orientation, religious belief, ethnic origin, citizenship, or political philosophy of the authors. confidentiality: the editor and any editorial staff must not disclose any information about a submitted manuscript to anyone other than the corresponding author, reviewers, potential reviewers, other editorial advisers, and the publisher, as appropriate. disclosure and conflicts of interest: unpublished materials disclosed in a submitted manuscript must not be used in an editor's own research without the express written consent of the author. duties of reviewers promptness: any selected referee who feels unqualified to review the research reported in a manuscript, is aware of a personal conflict of interest, or knows that its prompt review will be impossible should notify the editor and excuse himself from the review process. confidentiality: any manuscripts received for review must be treated as confidential documents. standards of objectivity: reviews should be conducted objectively. referees should express their views clearly with supporting arguments. acknowledgement of sources: reviewers should identify relevant published work that has not been cited by the authors. disclosure and conflict of interest: privileged information or ideas obtained through peer review must be kept confidential and not used for personal advantage. duties of authors reporting standards: authors of reports of original research should present an accurate account of the work performed as well as an objective discussion of its significance. fraudulent or knowingly inaccurate statements constitute unethical behavior and are unacceptable. data access and retention: authors are asked to provide the raw data in connection with a paper for editorial review, and should be prepared to provide public access to such data (consistent with the alpsp-stm statement on data and databases). originality and plagiarism: the authors should ensure that they have written entirely original works, and if the authors have used the work and/or words of others that this has been appropriately cited or quoted. multiple, redundant or concurrent publication: an author should not publish manuscripts describing essentially the same research in more than one journal or primary publication. submitting the same manuscript to more than one journal concurrently constitutes unethical publishing behaviour and is unacceptable. acknowledgement of sources: proper acknowledgment of the work of others must always be given. authorship of the paper: authorship should be limited to those who have made a significant contribution to the conception, design, execution, or interpretation of the reported study. the corresponding author should ensure that all appropriate co-authors and no inappropriate co-authors are included on the paper, and that all co-authors have seen and approved the final version of the paper and have agreed to its submission for publication. disclosure and conflicts of interest: all authors should disclose in their manuscript any financial or other substantive conflict of interest that might be construed to influence the results or interpretation of their manuscript. all sources of financial support for the project should be disclosed. fundamental errors in published works: when an author discovers a significant error or inaccuracy in his/her own published work, it is the author’s obligation to promptly notify the journal editor or publisher and cooperate with the editor to retract or correct the paper. archiving this journal utilizes the lockss system to create a distributed archiving system among participating libraries and permits those libraries to create permanent archives of the journal for purposes of preservation and restoration. publisher halmstad university, sweden first published in 2011. issn: 2001-015x. owned by adhou communications ab journal of intelligence studies in business editorial team editor-in-chief prof klaus solberg søilen (sweden), halmstad university founding editors prof henri dou (france), groupe escem prof per jenster (china), nimi honorary editors prof john e. prescott (usa), university of pittsburgh prof bernard dousset (france), toulouse university regional associated editors africa prof adeline du toit (south africa), university of johannesburg america prof g scott erickson (usa), ithaca college asia prof xinzhou xie (china), beijing university europe prof sahib sidhom (france), nancy university nordic prof svend hollensen (denmark), university of south denmark prof goran svensson (norway), markedshøyskolen editorial board prof karim baina, école nationale supérieure d'informatique et d'analyse des systèmes, morocco dr eduardo flores bermudez, bayer schering pharma ag, germany assoc prof jonathan calof, telfer school of management, university of ottawa, canada prof blaise cronin, indiana university, usa dr sbnir ranjan das, university of petroleum & energy studies, india prof henri jean-marie dou, atelis competitive intelligence work room of the groupe escem, france prof bernard dousset, toulouse university, france prof adeline du tout, university of johannesburg, south africa prof g scott erickson, ithaca college, usa prof pere escorsa, school of industrial engineering of terrassa, politechnical university of catalonia, spain assoc prof per frankelius, örebro university, sweden prof brigitte gay, esc-toulouse, france prof malek ghenima, l'université de la manouba, tunisia prof uwe hannig, fachhochschule ludwigshafen am rhein, germany prof mika hannula, tampere university of technology, finland prof per v jenster, nordic international management institute, china prof sophie larivet, ecole supérieure du commerce extérieur, paris, france prof kingo mchombu, university of namibia, namibia dr michael l neugarten, the college of management, rishon lezion, israel prof alfredo passos, fundação getulio vargas, brazil dr john e prescott, university of pittsburgh, usa prof sahbi sidom, université nancy 2, france prof kamel smaili, université nancy 2, france prof klaus solberg søilen, school of business and engineering, halmstad university, sweden assoc prof dirk vriens, radboud university, netherlands prof xinzhou xie, beijing science and technology information institute, china dr mark xu, university of portsmouth, uk managerial board way chen, china institute of competitive intelligence (cici) philippe a clerc, director of ci, innovation & it department, assembly of the french chambers of commerce and industry, france alessandro comai, director of miniera sl, project leader in world-class ci function, spain pascal frion, director, acrie competitive intelligence network, france hans hedin, hedin intelligence & strategy consultancy, sweden raíner e michaeli, director institute for competitive intelligence gmbh, germany mourad oubrich, president of ciems, morocco copyright © 2015 jisib, halmstad university. all rights reserved. editor’s note vol 5, no 3 (2015) a review of competitive intelligence as a discipline this is a special issue of jisib where the discipline is allowed to reflect on itself. included are three articles that aim to take a new, critical look at the discipline of competitive intelligence and its equivalents in other cultures. degerstedt rethinks the whole discipline of ci and is, as seen from a larger sociological and technical perspective, which in many ways resembles ideas of social intelligence introduced by stevan dedijer. solberg søilen bases his reflections about the scientific standing of intelligence in business around a survey with two questions: what is unique for ci and is as disciplines and what analyses are unique for ci and is? the article by hoppe was presented at the ecis conference in stockholm in 2009 and was submitted to the new journal of jisib in 2011. the article is a call for a new research agenda for the study of intelligence in business. the author wants to move away from a narrow perspective on practice to pursue a broader understanding of intelligence as a discipline. finally, as always, we would first of like to thank the authors for their contributions to this issue of jisib. on behalf of the editorial board, sincerely yours, prof. dr. klaus solberg søilen halmstad university, sweden editor-in-chief copyright © 2015 jisib, halmstad university. all rights reserved. journal of intelligence studies in business vol. 5, no 3 (2015) pp. 4 open access: freely available at: https://ojs.hh.se/ journal cover vol 5 no 3 page 2 to 4 jisib-vol-12_nr-3(2022).pdf journal of intelligence studies in business vol. 12 no. 3 (2022) open access: freely available at: https://ojs.hh.se/ pp. 18–26 intelligence on the hiring process mohamed beraich imane amouri cheklekbire malainine abstract: in this paper, we proposed a decision support tool for recruiters to improve their the process opted by the methods and techniques related to data mining. as a result, after completing the modelling process, we were able to obtain a model capable of obtained a model with an accuracy of 99% as well as with a very low error rate. support tool for recruiters while minimising the cost and time of processing applications and maximising the accuracy of the decisions made. keywords: (ai), digital enterprise, recruitment 19 introduction in the current era of globalisation and the emergence of new technologies, as well as the competition of the global business market, companies cannot afford to continue to adopt traditional methods in the various business the smooth running of the company, especially the hiring process follows important steps such as the selection and appointment of suitable candidates for such a vacancy post. every enterprise invests a lot of money and and wastes resources in searching for potential candidates. the total investment becomes a loss if the selected candidates do not meet the company’s requirements after completing the whole hiring process. therefore, the objective of this empirical study is to propose a decision support tool to improve the hiring process neural network (ann) method to build a predictive model of the decision in the hiring process. our methodology consists of adopting the process applied by data mining techniques, starting with a pre-processing and exploratory analysis of the data, then building our model uating the model using the proportion of test data, using the various validation metrics emanating from the confusion matrix. 1. literature review the importance of exploiting new methods from ciplines. to build a model capable of analysing the performance of students’ academic records as well grade in different classes (excellent, average, poor), however the results obtained revealed the robustness of these methods. in the employment market, and more intelligence techniques in the hiring process, several studies have been carried out in this sense in order to improve the said process. therefore, the study conducted by (d. alao et al., 2013), the authors constructed a set of rules using the decision tree method in order to build a model capable of predicting new employee attrition, however, the results obtained yielded a model with an accuracy of 74%. a decision support model for ranking candidates in the employee hiring process using a variachieved a maximum accuracy of 88.24% using the decision tree method. 2. hiring process sound tactics into the hiring process. owever, the hiring process can be internal or external, therefore, it can take many forms that differ from one company to another, but remains faithful to the single purpose of choosinterview is a crucial step and represents more than 50% of the rating assigned to the pre-selected candidates. 3. artificial neural network (ann) research that deals with learning and reasonniques, unlike parametric techniques, anns neural networks, as systems capable of learning, implement the principle of induction, i.e., learning from experience. by confrontagrated decision system whose generic character depends on the number of learning cases encountered and their complexity in relation to the complexity of the problem to be solved. ally composed of a succession of layers, each of which takes its inputs from the outputs of the previous layer. each layer i is composed of ni neurons, taking their inputs from the n 1 20 called the input layer and the last layer, composed of a single neuron, is called the output layer. the intermediate layers are called hidden layers. networks (ann) posed of a succession of layers, each of which takes its inputs from the outputs of the previous layer. each layer i is composed of ni neurons (nr) taking their inputs from the neucalled the input layer and the last layer, consisting of a single neuron, is called the output layer. the intermediate layers are called hid 3.2 structure and operation of an that receives input from other neurons and weights it with real values called synaptic coefconsider the neuron of a layer i. let us note x , x , ..., x the n 1 inputs from the layer i–1 to the neuron of the layer i. we also consider the n 1 weights denoted , , ..., . the neuron calculates the sum of its inputs cients, to which it adds a constant term called the bias b . this gives the formula: = + the bias is an external parameter of the neuron . it can be integrated into the weighted sum, as the signal which takes the value 1, weighted by the weight whose value is equal to the bias : the sum can thus be written as: = + 1 2 0 1 2 1 2 3 the hidden layer or the i-layer the output layer (s) 0 0 1 2 21 to this sum the neuron applies an activation or transfer function to obtain an output the output (output) of the neuron neuron in the i layer is sent to other neurons or to the outside. 3.3 matrix writing we consider the layer i layer composed of m1 neurons. with 1 < < mi we put: so: = = . = . we pose: so: we put: so: the outputs of the mi neurons of the layer are then written: + + the weighted sum the applica on of the ac va on func on the predic on of the neuron ( ) 22 so: the transfer function = . the summation function architecture and functioning of ann (source : author). the list of activation functions (source: author). the function title the function the graphic representation sigmoid relu 23 3.4 activation function the transfer function or activation function or thresholding function, also called the activation function, is the function used to propagate information from layer to layer. the most common functions cited in the literature are listed in the following table (table 1): 3.5 error functions to calculate the correct weights (parameters), the error between the expected output and the output produced by the network must be calculated. methods for calculating the error include: • : with: • : m the number of individuals or objects to be predicted or the number of observations. : network the vast majority of neural networks have a “training” algorithm which consists of modifying the synaptic weights according to a set of data presented as input to the network. the purpose of this training is to allow the neural network to learn from the examples. if the training is carried out correctly, the network is able to provide output responses very close to the original values of the training dataset. but the interest of neural networks lies in their ability to generalise from the test set. it is therefore possible to use a neural network to ory. supervised learning occurs when the netstate as it is presented with a pattern. in contrast, in unsupervised learning, state when presented with a pattern. ann learning can be achieved, among other things, by: i) changing weights, (creation or deletion of neurons or connections, or layers), iii) the use of appropriate attractors or other appropriate steady state points, iv) the choice of activation functions. since backpropagation training is a gradient descent process, it can get stuck in local minima in this weight space. it is because of this possibility that neural network models are characterised by high variance and instability. back-propagation backpropagation consists of backpropagating the error committed by a neuron to its synapses and the neurons connected to gation of the error gradient is usually used, which consists of correcting errors according to the importance of the elements that have actually participated in the making of these errors: the synaptic weights that contribute to ated a marginal error. how to choose the number of layers and neurons the number of neurons and layers directly of prediction quality. indeed, to determine the number of hidden layers, we can follow a process that consists in starting with a single hidden layer and adapting it to reach the ideal architecture. so if one layer does not produce satisfactory results, then we automatically have to think about adding another until we get satisfactory results. the same goes for the number 24 of neurons, we try to modify it until we get the desired results. the number of neurons in each layer must not exceed the number of input variables. so, you have to think about doing several tests to arrive at a relevant and powerful ann in terms of accuracy in predicting the output variables. on the other hand, the more layers you increase the capacity of the network, the more you risk overlearning if you exaggerate in terms of the number of layers or neurons, and the same thing if you decrease the number of layers, you risk underlearning. to avoid the problem and we try to divide the data into 4 parts and try to alternate the combinations between these parts. by applying this technique, we will have a perfect test of the data since all parts will be used for the test. 4 methodology, metrics and data 4.1 methodology the aim of this empirical study is to build a model that can be implemented as a decision support tool for recruiters to effectively hire intelligence, for which we adopted the process of data mining techniques. this process is initially based on the preparation of the data, followed by the splitting intended to train the prediction model, while the second serves as a test proportion for the accuracy of the resulting model. 4.2 metric to evaluate the model obtained from the modmetrics to assess the performance of the model sion matrix using the test data set. given that the test data set represents 25% of the overall data and the training set represents 75% of the overall data. allows us to indicate the number of correct predictions for each class and the number of incorrect predictions for each class organised according to the predicted class. each row of the table corresponds to a predicted class, and each column corresponds to an actual class. confusion matrix. true positives (tp) true negatives (tn) with: applicant database (accepted or rejected) the entry layer training the neural network 1 2 3 predict whether a candidate will be accepted or rejected 25 ratios can be calculated: 4.3 data in the data preparation stage, we used a database that includes 1000 rows of applicants from a recruitment agency. in addition, this database has 8 explanatory variables and only one dichotomous variable to be explained which takes 2 binary values (accept / reject), so we coded all categorical variables according to the table below (see table 3): 5. results after preparing the data for the modelling, the function function is used to train our model over 50 iterations, allowing us to coding of explanatory variable values. code 1 2 3 4 5 speciality computer science secretariat management right current status unemployment assets french level a1 a2 b1 b2 c1 english level a1 a2 b1 b2 c1 computer level beginner medium advanced excellent decision reject (0) accept (1) the architecture of our neural network. figure 6. the evolution of the error of our model. figure 7. the evolution of the accuracy of our model. 26 choose the right values for the weight matrix w. the calculations are performed using the gradient descent method. the training data used are stored on (starting values) and the evolution of the accuracy and the error (loss) of the model in the training phase. decreases and the accuracy increase with iterations, as the training algorithm continuously updates the weights and biases in the neural network according to the training data. we curves (blue and orange) are very close for both test and train data sets, which means that the model has been well trained. we also notice the test and train data sets decrease towards 0, which means that the model performs well. thus, we calculated the metric for the training and test data and obtained an accuracy equal to 99,33% using the test data indeed, according to the value of the metric obtained, we can conclude that our model has a fairly high level of predictability, which will help us to make accurate predictions of the recruitment decision. 6. conclusion selecting and hiring the right candidate is a daunting task for the company. therefore, companies are looking for tools that can collect, sort and analyse a large amount of information about candidates to assess their personintelligence provides to improve this hiring process. it is in this context that our paper is written, we have tried to detect the importance of using these techniques in the construction of a model capable of predicting the recruitment decision of new candidates for a company. so we have exploited a database that includes a range of explanatory variables that describe the level of competence of candidates. after following the process adopted by data mining techniques, we were able to achieve racy obtained at the end of the modelling process, which exceeds 99%, reveals the robustness of the model obtained, which will improve the hiring process for companies. references [1] c. e. a. pah and d. n. utama, “decision support model for employee recruitment tional journal, vol. 8, no. 5, 2020. [2] d. alao and a. adeyemo, “employee attrition analysis using decision tree algorithms”,computing, information systems, development informatics and allied research journal, vol. 4, no. 1, pp. 17–28, 2013. [3] dana pessach, gonen singer, dan avrali, irad ben-gal, “employees recruitment: a prescriptive analytics approach via machine learning and mathematical programming”, decision support systems 134 (2020). ligence to recruit employees”, citations ume 18, 2021. enterprise human resource management computer hardware”, microprocessors and microsystems 82 (2021). gineering students’ performance for retechniques”, international journal of computer science, engineering and technology, vol. 3, no. 2, p. 31, 2013. mance analysis of engineering students mining techniques”, samrat singh et. al 31–37. o p i n i o n s e c t i o n 41 intelligence analysis and cognitive biases: an illustrative case study pierre memheld 1 1 institut de traducteurs, d'interprètes et de relations internationales, university of strasbourg, france email: pierre@exmergere.info received october 25, accepted november 3 2014 abstract: this case study is foremost an educational tool. it involves two european and asian multinational tires manufacturer for otr, off the road, or “off road” and a problem of price competition. it shows how an initial intelligence effort is led astray. instead the solution is a combination of approaches, better known as competitive intelligence. it is built on the external vision of the company craft, the use of all information sources characteristics of an intelligence field dedicated to the business world. it is not a new discipline but a transdisciplinary approach for information exploitation which is using elements from financial analysis, swot (strengths, weaknesses, opportunities, threats) matrixes, and value chain analysis. in the above case, the company eurotires used mostly the following sources: internet, scientific and patent databases; public administrative sources; customers interviews, industrial experts (manufacturing and distribution), and marketing analysis. keywords: intelligence analysis, competitive intelligence, cognitive bias, case study 1.0 introduction “cognitive bias is a common tendency of filtering input through one’s own likes, dislikes, and experiences to acquire, retain, and process information » (black, 2014). this phenomenon is well documented, studied, and identified, but is it known by most of the people having to make decisions? in order to limit the range of what ‘making a decision’ is, we will focus on a specific available for free online at https://ojs.hh.se/ journal of intelligence studies in business vol 4, no 2 (2014) 41-50 https://ojs.hh.se/ o p i n i o n s e c t i o n 42 case: information analysis in a commercial environment. this case study is illustrative as it groups analytic methods’ applications and several biases. the author, when conducting a competitive intelligence project, was confronted with a double cognitive bias syndrome: personal biases but also ones indigenous to his customer’s culture. recent researches have been conducted on how a second language reduces bias in analysis (wheaton, 2013). language is part of people’s culture and education. but a company’s culture is more complex because, in addition to the employees’ backgrounds and educations, a company creates a specific environment: employees from various regions, educational tracks, working on various issues and markets. in this case study, the origin of the bias was the organization’s behavior, another important factor. the analytic methods themselves can create a bias: they have their own history, origins and applications. does a military intelligence method apply to economic issues? does a scientific method apply to international relations? in this case, the methods first used were technologically oriented when the solution was organizationally, logistically and commercially oriented. we can call this difference of original field of application a dimensional difference. despite the fact that involved employees, mainly engineers, and analysts master these various methods, the cultural and dimensional factors became predominant resulting in four months of vain research, misunderstandings and time/money spending, a common problem in the business world. the full case study will present all the factors, reflections, methods used and a posteriori (by observation) noticed biases in a cultural perspective, from language to education, behavior, interactions and finally how the solution was found. but this case study is foremost an educational tool as it allows us to cover various issues from analytic methods to intelligence production, and from organizational behavior to personal/group/corporate biases. solving this case is not a question of mastering analytic methods or having an experience in the industry or as an engineer. we have conducted this case study with students of different levels (from bachelor to master/mba) several times and the solution can be found without any experience of tires manufacturing or supply chain management. surprisingly, students with a basic training in information collection and an access to information sources are the least efficient or effective in finding the solution. this is because they are searching without clear instructions, tasks sharing, and never stop (which can become a bias by itself), they don’t produce even partial outcomes which is an essential part of the intelligence cycle. from our experience the best results from this test were obtained by using five groups of four or five students without any access to information sources. instead of searching, the students were exchanging ideas, testing solutions between themselves with similar perceptions among the different groups, a kind of competition or comparison. this business case, from which we deduced some practical tips for further analytic case studies, should lead to further research on other actual cases and comparisons. from a research perspective, it would be useful to compare engineers, production managers or decision makers’ personality profiles and their ability to analyze problems from different domains. but as noted, the most interesting lesson of this scenario based training is the collaborative analysis of the students without information. students and groups were sharing information, despite the fact it was not authorized by the trainer: as quoted in a recent publication analysts, using “effects of implicit sharing in collaborative analysis” (goyal, 2014), were, in our case, more efficient in finding the solution than other teams working alone in structured and separated groups. based on this experience, we could hypothesize that analysts without information access or inferred biases may be more efficient than skilled and trained ones. the case study is structured as a didactical scenario to be played during one or two full days. the first day is dedicated to the presentation of the base assessment; the challenge being for each group to follow the initial research phase. this generally leads to a similar conclusion: the students don’t find the solution. from time to time, the author delivers information inputs, answers some questions and even tries to lead students down wrong tracks. as already noted, the most interesting phenomenon is not the research’s results, but how the students reflect and interact as teams. some search endlessly o p i n i o n s e c t i o n 43 for solutions; some state hypotheses; some inject their own experiences: but most of them don’t cast doubt on the base statement nor the research logic. as we will see, this reaction follows what happened during this case study. the second part of the day, or the second day, it is necessary to give students clues not to solve the case, but to eliminate different hypotheses. most of these hypotheses are linked to the low costs production issue as the most logical explanation. the case is structured to make students react, make them think about how they reflect, and create frustration in them. as stated, not all the students find the solution, or even a part of it. the limit of this approach is the constrained training period. at the end of the day, or day two of the session, there is a mandatory evaluation phase and the conclusion giving the solution. as much as possible, these phases must remain interactive, as the previous ones: the solution is not just released but the students might deduce it from more and more precise information or clues. the case below might be seen as the transcript of these training sessions, from the beginning to the conclusion. the authors gave different type of training sessions, from a more lecture-oriented session to this interactive approach. it groups together research techniques--inputs to analysis and evaluation-based on a real case. students can discover information, enhancing their involvement. they interact and it is interesting to see how groups are formed: if the mix of student competencies are arranged randomly or based on persons’ proximity and personalities. is it possible, inside a company, or a governmental body, to mix various backgrounds and personalities in order to optimize the brainstorming? the answer is logically yes but as we will see, some biases were induced by the variety of backgrounds and professional behaviors involved. putting the participants in a ‘think out of the box’ situation would be the solution: outside of the organization; making hierarchy a low priority and using an engaging situation such as war games or serious games. 2.0 the otr case study 1 1 disclaimer: despite the fact that the facts and details presented in this article are realistic, as is the in 2003, a european tires manufacturer (”eurotires”) was hoping to understand how one of its asian competitors (“eastires”) offers to its customers “40% discounts on sales prices for the off the road (“otr”) segment”. otr is a small business segment, compared to other companies’ segments, but very competitive and the technical: tires for mining or construction machines have specific characteristics. in this case, for eurotires, the logical explanation was that eastires has invented a new manufacturing process, but after several months of internal technological and industrialization research, this explanation appeared as not true. eastires did not invent a new process, did not modify its manufacturing lines, and had not changed its suppliers. but a 40% discount is a significant drop on the sales prices if we consider the normal industry profit margins of a few percent. eurotires interacted with customers in order to see if the tires themselves have changed. from brazil to australia, usa to japan, the main customers were contacted, including construction and mining companies and airlines companies; airplane tires being a subsegment of the otr market. research was conducted with the end users, mine managers or airlines technical services. once again this track did not lead to an explanation. users did not observe radical changes in the tires technical characteristics: eurotires considered that, due to specific constraints these tires support, technical changes were the explanation. eurotires is a company of engineers; thus the solution was necessarily inside the tires. thanks to publicly available information, eurotires was able to analyze the chemical rejections of one competitor’s factory. this analysis did not show particular elements for the r&d department. so a reverse engineering approach to solving the mystery was not successful. studying the scientific and professional publications made by eastires inside industry or research centers journals revealed there was no particular tires’ components change. then researchers tried to determinate if the analysis based on them, the names, industry and locations have been changed due to confidentiality issues, but chosen because they present the same characteristics as the original case. similarly, the expressed opinions are only the ones of the author. o p i n i o n s e c t i o n 44 mechanical characteristics of the tires were changed, using laser testing benches. they did this with the belief that, you can gain in productivity by automating the testing process. eastires’ suppliers for raw material and machinery were well known and often the same used by eurotires. previous research phases showed that no particular changes occurred for supplies or manufacturing lines. eurotires did not succeed in analyzing this 40% discount. at this stage a consultant suggested to widen the research outside the engineering approach. the idea was to analyze the whole value chain of the manufacturing of the tires from conception to raw materials, to manufacturing, to sales, to distribution and to services. the first three steps were analyzed without finding enough factors explaining this price drop. could the solution be in the following steps? in fact the attention of eurotires was focused on the production costs while the customers were speaking about sale prices. otr tires, due to their specific uses are distributed through specialized resellers (independent or brands owned) or directly shipped when orders are important enough. for example, mining and airlines companies are regular users of otr tires. airlines are submitted to security constraints which oblige them to change tires when they reach a determined level of wear. mines don’t have the same constraints but must reach production and profitability objectives. mines have a specific characteristic as their own supply chain is constrained: ores are transported either by trains or ships from often isolated regions (southern chile or north west australia). in both airlines and mines cases, too frequent tires replacements, or not planned ones, lead to delays, production decrease and thus exploitation losses or even financial penalties from their customers. these two industries have a common characteristic: they can precisely plan the utilization of their equipment and then the tires’ wear. planes’ rotations are planned on long term, so the number of take offs and landings, the main wear factor, and the runway rolling distance are known. a mine can be compared to a manufacturing line: each machine has a determined function and does not change; trucks have always the same itinerary, loads the same weight, on known distances and grounds (more or less abrasive). these two industries can coordinate with their suppliers, including tires manufacturers, precise replacement parts needs on a long term basis (depending on the economic activities: evolution of flights programs or variation of the ores demand). maintenance services of concerned companies have tires stocks but limited in order to optimize stocks costs. in these conditions, a tires manufacturer can offer a ‘just in time’ service, the exact number of tires being delivered ‘on time’ based on the constrained replacement program. this planning can be done for existing customers and large quantities, emergency replacement or new customers/sites being specific cases. the ‘just in time’ service presents advantages both for the customer and the supplier. the customer is ensured to not suffer delays in a plane’s rotation or production interruption. the supplier can plan its own supplies, manufacturing programs and products delivery. all these elements can be translated in financial terms. has eastires been able to precisely simulate its activity in order to offer such a discount representing an optimization of its production and post-production costs? eurotires discovered that its competitor, present in asia, north america and europe has gone further with this planning approach, making concurrent commercial strategy, supply chain and production. in fact eastires has changed its function. instead of selling a number of tires, eastires offers a service, providing for a predetermined period, a permanent availability of tires, delivered on time at the right site to synchronize with its customers’ business cycles. from a commercial point of view, eastires offers its customers multi-year service contracts in return for which the manufacturer negotiates a significant unit price discount. more than production, and supplies, including its own raw materials and transport prices negotiation, eastires can guarantee to its shareholders several years of visibility in terms of turnover. 2.1 analysis methods convergence this case study demonstrates the necessity to use varied analytic methods since a strictly scientific approach (r&d, components, processes, patents) was not appropriate as the solution was outside this domain. tires’ performance and wear indexes were known due to manufacturing monitoring; the manufacturer can predict the replacement time. this technical factor, despite not explaining the price o p i n i o n s e c t i o n 45 discount, was essential to define the commercial strategy and negotiations. the upstream supply chain analysis did not show changes explaining the price drop (same raw material, same transport means, and same delivered quantities). it’s possible to find the solution by combining these different approaches, the specific needs and constraints of the customer. this combination of approaches, this external vision of the company craft, this use of all information sources, are the characteristics of an intelligence field dedicated to the business world; competitive intelligence. it is not a new discipline but a trans-disciplinary approach for information exploitation which is using either financial analysis, swot (strengths, weaknesses, opportunities, threats) matrix, or value chain analysis. in the above case, eurotires used the following sources: internet, scientific and patent databases; public administrative sources; customers interviews, industrial experts (manufacturing and distribution), marketing analysis. this approach allowed the company to reconstruct its otr distribution organization, from manufacturing factories to resellers stocks, distributors and users. otr tires have long life cycles, low margins, good planning potential, a second hand market and a constant demand. eastires objective was to effectively provide a solution for this predictable demand at the best price. it’s a supply chain re-engineering with economies of scale, precise planning, which leads to upstream and downstream logistical chain organization. these supply chain levers have direct consequences on financial results: logistical costs optimization, negotiations on large amounts of raw materials, production planning depending on the country and demand’s cycle; stocks optimization and human resources organization. the ‘just in time’ organization has another consequence: there is no more delay between orders and deliveries as eastires anticipate needs and on site deliveries. eastires has also improved the after sales services: used tires are collected, new ones are mounted on site and there are fix or mobile recasting units to reuse the tires: refitted tires are authorized for planes and it’s a useful option for mines, when security criteria are respected. the supply chain management is optimized by influencing costs, prices and services. thanks to this, eastires won market shares by differentiating from its competitors while improving its profitability. for otr tires, heavy and bulky, logistic costs are high (factory, transport, distributor, and user). eastires, considering its quality of services strategy, should even internalize distribution under its own brand in order to lower some costs and improve its image. one way to reduce costs is to optimize huge shipments towards important market areas and then break down the distribution to specialized companies: to identify these portions is also possible. 2.2 open information and anticipation existing customers, and their premises, are well known: an airline is not created from one day to another and a mine does not appear from nowhere. more, due to heavy competition and economic situation, we can observe a concentration phase in the airline and mining industries. means of production and routes of shipment are easily identifiable, due to the specificities of otr tires. many logistic companies’ records, and even customs data, are made available on internet or through industries experts. even if this market is specific, we can extend this analysis to various sectors. monitoring information sources to identify new commercial leads, best practices benchmarks and innovative strategies is a permanent task that any company might conduct using legal and ethical methods, which are the characteristic of competitive intelligence. why was eastires able to identify key success factors, while eurotires took so long to identify the same information? eastires succeeded because the company took into account all possible elements and sale steps, not only production issues. this strategy can be duplicated because: it is not dependent on technology; the number of actors is limited, as the number of suppliers and services providers. similarly, tires for transport trucks are not anymore seen as products but services, the user paying a fee based on kilometers and the manufacturer being in charge of regular maintenance and replacement. this service approach is also used in the heavy machinery business: caterpillar also offers its customer to anticipate their needs and replace/repair parts in their machines. o p i n i o n s e c t i o n 46 3.0 analytic cultures and biases despite the fact that eurotires lost some market share in the otr segment, the company is a leader on the global tires market. once the key success factors and organization used by eastires were known, eurotires set up the same kind of pivotal logistic centers; specialized distributors that were able to repair and recast tires, and adapted its contracts with customers. with its important industrial capacities, present worldwide, eurotires has rapidly regained the lost terrain. however, we can state that eurotires faced a strategic surprise and, without external intelligence, would not have been able to adapt its organization in the long run. eurotires engineers and researchers are at the top of their profession, with universities r&d collaborations worldwide. commercially speaking, they are in contact with their customers. so why was this leading company surprised? we can assert that such kind of strategic move is not really a surprise which is by definition something we cannot imagine and thus anticipate. was that the case for eastires? no, the company had simply reorganized its existing means of production and distribution to articulate a new sales strategy. as we saw the company did not invent a new manufacturing process, did not change its production lines, its suppliers and service providers. at the beginning, eastires did not gain new customers but consolidated and retained existing ones. and eastires did not communicate it’s reorganization. so, was it eastires that took the initiative or eurotires that did not watch its competitors’ moves and customers’ needs? at this stage of the case it could be helpful to stress how the initial information was collected and analyzed, along the lines of cognitive bias and information collection (margit and grosjean, 2012) the information source was a commercial agent visiting prospective customers who told him that eastires was offering a 40% discount on sale’s price. but when expressed inside the competitive intelligence request, this was redacted as: ‘a 40% decrease of the sale’s price because eastires has a new manufacturing process’. this is not a bias by itself but a falsification of the information which resulted in useless research and internal misunderstandings. but this can also be seen as a ‘framing effect’, the fact to elaborate “different conclusions from the same information, depending on how or by whom that information is presented” (ackerman, 2003, p.7). the consultant did not collect himself the raw data but received an interpretation from eurotires management. the first error was to not request a direct contact with the source. from a consultant perspective, it can be hard to cast doubt on a customer’s opinion and request. the customer, in that case the r&d director, was using misinterpreted information as true and expressed his opinion as a logical conclusion. this can be seen as ‘subjective validation’ the “perception that something is true if a subject’s belief demands it to be true” (iverson, brooks and haldnack, 2008, p. 248). in that case, as quoted, the customer was an industrial company focused on its technology. so for the r&d director, the obvious solution for a price change is technical and this despite the fact that the information was clearly commercial or at least financial. so for him, any other explanation does not satisfy his belief, or personal explanation. so even the absence of confirmation, from his initial research, and the consultants, was not a noticeable fact. this can be seen as a reversed confirmation bias, the “tendency to search for, interpret, focus on and remember information in a way that confirms one's preconceptions” (tversky and kahneman, 1974, p.430). at each mission’s intermediary report, the absence of facts was confirming the belief of the director that eastires has really innovated in a secret way. so it was necessary to keep on searching and using different sources and methods, as described. and despite the fact the initial mission’s request was apparently erroneous; all parties decided to keep on spending money and time to look after the hidden innovation. the economic relation between the customer, an industry leader, and the consultant, a specialized but much smaller company, also played a role. it’s a question of technology knowledge, the gap between industrial experts and management consultants. even if these last can improve their sector’s learning curve for each new mission by interacting with experts, they don’t have the experience and the education background to understand all facts and data. this can be seen as a ‘curse of knowledge’ “when better-informed people find it extremely difficult to think about problems from the perspective of lesser-informed people” (ackerman, 2003, p.7). each collected element was judged as irrelevant by the customer, as not as o p i n i o n s e c t i o n 47 technical as expected, and not confirming the director’s belief. the main mismatch was the fact that the initial information, the technology belief and the real explanation were not in the same domain. due to his educational background, and company culture, the r&d director did not find the information, or the lack of information, relevant. in a way, the solution had technology factors since eastires would not have reached this result without an efficient manufacturing line, able to produce requested quantities, a complete information system from customers to distributors and support companies to the manufacturer, and the ability to recast used tires. even if tires are simple products, their production and quality proofing are based on technology. in these conditions, why would the solution not have been technological? this can be seen as an anchoring bias, the “tendency to rely too heavily, or anchor, on one trait or piece of information when making decisions” (iverson, brooks and haldnack, 2008, p.248). this preconception led to a misinterpretation of the collected information. the technological explanation and the logistical/commercial explanation can be seen as two unrelated elements so there was not a correlation in terms of analysis (tversky and kahneman, 1974, p.430). 3.1 analysis and organizational behavior why did such an experienced manager not look into account disconfirming evidences? despite the fact that the collection methods were all legal and ethical, as the society of competitive intelligence professionals define it in competitive intelligence best practices it publishes, they covered a large array of means and variety of information sources (fehringer and hohhof, 2006). the fact that no patent, scientific publication or industry journal was evocating any specific innovation should have been a disconfirming evidence for the initial intelligence statement. this is defined as the ‘backfire effect’ “when people react to disconfirming evidence by strengthening their beliefs” (sanna, schwartz and stocker, 2002, p. 497). it took four months for the consultant to explore all possibilities, write several detailed but meaningless intermediary reports and finally conclude there was a problem of mission’s request. the consultant and the customers were also confronted to the ‘observer-expectancy effect’), “when a researcher expects a given result and therefore unconsciously manipulates an experiment or misinterprets data in order to find it” (skepdic, 2014). as the collected elements were not confirming the initial request, they were misinterpreting these in order to keep the request as the only relevant information. the most interesting point is that the answer was “obvious” and was even given by one contacted source, an industry journalist who gave the consultant a clue when discussing the price’s drop statement. since the initial request was considered as valid, it was used as a ‘key intelligence topic’ (kit) in order to determine the consecutive ‘key intelligence questions’ (kiq) and thus list the intelligence indicators which are the possible elements to answer the questions (herring, 2005). so the whole collection plan has been determined and planned by the initial request. this having been proved as erroneous and misleading, the whole intelligence process, from planning to analysis, production and dissemination was going on the wrong track. in addition to the other biases of the collector/analyst/consultant, we can quote the ‘congruence bias’ the “tendency to test hypotheses exclusively through direct testing, instead of testing possible alternative hypotheses” (iverson, brooks, and haldnack, 2008, p. 248). all the collected elements were tested following one unique hypothesis: a technological innovation has allowed eastires to reduce its production cost and thus lower the sale’s price. before the four months of endless research for the mysterious innovation, no other hypothesis derived from the initial request has been tested, without even casting doubt on the request itself as expressed by the customer. this is also a form of ‘conservatism’, the “tendency to insufficiently revise one's belief when presented with new evidence” (ducharme, 1970, p. 66). we stated that this phenomenon was reinforced by the financial relation between the consultant and the customer, the technological aspects mastery and the wrong orientation of the intelligence process. the conservatism, respect of beliefs and conclusions of an older and more experienced person, can be explained by the initial education of any person: it’s a form of social bias. in the hierarchical organization of any company, whatever be the model, there is a structure, especially in old heavy industrial companies, which has a direct impact on the information circulation, sharing and analysis (fischoff and chauvin, 2011). if eurotires is since a o p i n i o n s e c t i o n 48 long time a globalized company, with suppliers, factories and customers worldwide, it remains a traditional company with a strong national identity. most of the main managers and executive directors are from the same culture, educational background and even often from the same school. this organizational behavior, engineers selling technological products with a long history of successes and innovations logically is a specific approach to any problem, even more with this ‘mate’s community’ managing the company (watkins, 2013). the consultant, while not from the same background, was from the same culture and using different languages to collect elements and redact reports. all elements and sources were in english, or else, speaking and thinking while the ‘intelligence’ was produced in french. the clue given by the journalist was translated in french and then sidelined as to confirm the initial request and kit. next we have to ask, what would have been the methods to improve or prevent these biases, from a consultant and a company perspective? 4.0 how to educate decision makers the consultant, while not having a long experience, was aware about intelligence analysis and used many information sources. most of all, he collected the clue from the industry journalist who said, during a phone interview, that eastires reorganized its distribution, support and services systems in order to lower the delivery time and offer a prospective planning. this indication did not clearly state that reorganization had an impact on the sales price. the fact that this clue was not determinant as an indicator to answer the kiqs lowered its relevance. moreover, the source being a journalist, not a manufacturer or a customer, this also lowers the subjective relevancy of his information. it’s clearly an error if we consider the information and its sources to be quoted independently. but the answer being out of the initial request domain was the most important factor to sideline this information. another factor was the necessary translation of the information to meet the customer’s language request. does the language have an impact on analysis? the recent "reduce bias in analysis by using a second language" article quoted a study that presents essential points when put in perspective with our case: “emotion, language processing and cognitive biases aside, the intriguing question remains: would you make the same decision in english as you would in, say, chinese?”…being less risk averse means that people more systematically assessed the problem and came to a more rational conclusion…the ability to make decisions driven more by rational thought and less by emotion” (kaiser and hayakawa, 2012). in the above situation, the difference was between collecting in english, whatever can be the mother tongue of the sources, analyzing and reporting in french. the sources were thinking in their own languages before giving information and because of these differences, cultural and educational, they already analyzed from a different perspective. the consultant was reporting intelligence through all these deforming lenses. if analysis methods are widely used, when redacting a document, each ‘culture’ has its own logic: french is using longer sentences, longer texts’ structures and a different logic: the conclusion, the real intelligence input is most of the time at the end of the text following an ‘introduction, thesis, antithesis, synthesis, and conclusion’ model. if the introduction, kit, thesis, kiq are erroneous, how could antithesis, synthesis or conclusion have been relevant? with a clue not complying with the kiq, kit and belief, it was difficult to test different hypothesis and use critical thinking to call into question the whole process and mission. all these factors are directly linked to culture: language, education, experience, hierarchy, logic, and writing. the consultant was also facing a biases’ blind spot: the “tendency to see oneself as less biased than other people, or to be able to identify more cognitive biases in others than in one’s self (pronin and kugler, 2007, p. 565). is it possible to prevent these syndromes by education? inside intelligence oriented diplomas, the answer is yes because this is the place but even this depends of the intelligence culture of the considered country. we can testify that inside french competitive intelligence curriculums, the biases’ issue, or the blind spots one, are rarely addressed because they cast doubt on the ability of students, and teachers, to call into question their own competencies, studies and experiences, not from a skills’ perspective but from a personal and psychological perspective. if we consider that culture and education build up from the very o p i n i o n s e c t i o n 49 beginning, in childhood, then changing the curve of learning is difficult. when analysts, or engineers, and managers reach their positions of responsibility, where what they say, write and decide, have practical and financial consequences, we should say it’s already too late: some biases and education/work behaviors are set up. at that stage, and depending on the level of decision, there are a few solutions to solve the problems we faced: for analysts, trainings on biases and cases, or even psychological profiling to assess potential blockages and blind spots; for managers, similar trainings and for decision making profiling, it’s possible to rely on standard human resources management tools as the myers briggs type indicator (mbti) or fundamental interpersonal relations orientation (firo) personality tests. the training of analysts must include intelligence dissemination skills and needs assessment method or the mastery of tools like the analysis of competing hypotheses. the trainings of managers should include intelligence process understanding and ‘think outside the box’ tools as scenario analysis or war gaming in order to make analysts live such actual cases. bibliography ackerman, m.s. (ed) (2003). sharing expertise beyond knowledge management. cambridge, massachusetts: mit press. black’s law dictionary, 2 nd online edition, accessed 15 march 2014 from http://thelawdictionary.org/cognitive-bias/. cognitive bias – see http://www.princeton.edu/~achaney/tmve/wiki1 00k/docs/cognitive_bias.html ducharme, w.m. (1970) "response bias explanation of conservative human inference". journal of experimental psychology. goyal, n., leshed, g., cosley, d. and fussell, s.r.. (2014). “effects of implicit sharing in collaborative analysis” department of information science, department of communication, cornell university. fehringer, d. and hohhof, b. (2006). competitive intelligence ethics: navigating the gray zone. society of competitive intelligence professionals. fischoff, b. and chauvin, c. (eds.) (2011). intelligence analysis: behavioral and social scientific foundations. washington, dc: committee on behavioral and social science research to improve intelligence analysis for national security, board on behavioral, cognitive, and sensory sciences, division of behavioral and social sciences and education, national research council. herring, j.p. (2005). "defining your intelligence requirements" accessed 16 march 2014 at http://units.sla.org/division/dci/conf_presentati ons/2005/defining_your_intelligence_require ments.pdf. heuer, jr. richard j. (1999). "psychology of intelligence analysis" (chapter 9: what are cognitive biases?). washington, dc: center for the study of intelligence. iverson, g., brooks, b. and holdnack, j. (2008). "misdiagnosis of cognitive impairment in forensic neuropsychology" in r.l. heilbronner, neuropsychology in the courtroom: expert analysis of reports and testimony. new york: guilford press. keysar, b., & s.l. hayakawa (2012). “the foreign-language effect: thinking in a foreign tongue reduces decision biases”. psychological science. margit, m.f. and s. grosjean (2012). "confirmation bias". in pohl, r. f. cognitive illusions: a handbook on fallacies and biases in thinking, judgment and memory. new york: psychology press. pronin, e., and kugler, m. (july 2007). "valuing thoughts, ignoring behavior: the introspection illusion as a source of the bias blind spot". journal of experimental social psychology. sanna, l.j., schwarz, n., stocker, s.l. (2002). "when debiasing backfires: accessible content and accessibility experiences in debiasing hindsight." journal of experimental psychology: learning, memory, and cognition. the skeptic’s dictionary. "the experimenter effect". accessed 16 march 2014 from http://skepdic.com/experimentereffect.html. thomas, a. k. and millar, p. r. (2011). "reducing the framing effect in older and younger adults by encouraging analytic processing". tolk, a. (2012). "ontology, epistemology, and teleology for modeling and simulation: philosophical foundations for intelligent m&s applications". new york: springer. tversky, a. and d. kahneman (1974). "judgment under uncertainty: heuristics and biases illusory correlation: inaccurately perceiving a http://thelawdictionary.org/cognitive-bias/ http://www.princeton.edu/~achaney/tmve/wiki100k/docs/cognitive_bias.html http://www.princeton.edu/~achaney/tmve/wiki100k/docs/cognitive_bias.html http://units.sla.org/division/dci/conf_presentations/2005/defining_your_intelligence_requirements.pdf http://units.sla.org/division/dci/conf_presentations/2005/defining_your_intelligence_requirements.pdf http://units.sla.org/division/dci/conf_presentations/2005/defining_your_intelligence_requirements.pdf http://skepdic.com/experimentereffect.html o p i n i o n s e c t i o n 50 relationship between two unrelated events” (september 27). science (american association for the advancement of science). watkins, m. (2013). "what is organizational culture? and why should we care?" accessed16 march 2014 from http://blogs.hbr.org/2013/05/what-isorganizational-culture/ wheaton, kristan. (2013). «reduce bias in analysis by using a second language« retrieved 13 march 2014 from http://www.sourcesandmethods.blogspot.fr/201 3/11/reduce-bias-in-analysis-by-usingsecond.html http://blogs.hbr.org/2013/05/what-is-organizational-culture/ http://blogs.hbr.org/2013/05/what-is-organizational-culture/ http://www.sourcesandmethods.blogspot.fr/2013/11/reduce-bias-in-analysis-by-using-second.html http://www.sourcesandmethods.blogspot.fr/2013/11/reduce-bias-in-analysis-by-using-second.html http://www.sourcesandmethods.blogspot.fr/2013/11/reduce-bias-in-analysis-by-using-second.html vol8no2paper3bisson_etal to cite this article: bisson, c. and tang tong, m.m. (2018) investigating the competitive intelligence practices of peruvian fresh grapes exporters. journal of intelligence studies in business. 8 (2) 43-61. article url: https://ojs.hh.se/index.php/jisib/article/view/309 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index investigating the competitive intelligence practices of peruvian fresh grapes exporters christophe bissona,b*, maria mercedes tang tongc adicen, site val d’europe cité descartes 5 bd descartes 77454 marne-lavallée cedex 2; bessec, 3 avenue bernard hirsch, 95021 cergy-pontoise, france; cuniversidad de lima, peru *christophe.bisson@essec.edu journal of intelligence studies in business please scroll down for article investigating the competitive intelligence practices of peruvian fresh grapes exporters christophe bissona,b and maria mercedes tang tongc a dicen, site val d’europe cité descartes 5 bd descartes 77454 marne-la-vallée cedex 2; b essec, 3 avenue bernard hirsch, 95021 cergy-pontoise, france; c universidad de lima, peru corresponding author (*): christophe.bisson@essec.edu received 17 may 2018 accepted 15 august 2018 abstract this paper reports an empirical study of peruvian fresh grapes exporters with the aim of delineating the behavioral and operational typology of their competitive intelligence practices. cluster analysis was used as an exploratory tool to determine the correlation, if any, between the size of the company, grapes exports share of total exports, the percentage of the red globe variety in total grapes exports and the size of the grape farm with the typology and the average price received at export between august 2016 and july 2017. the behavioral and operational typology of competitive intelligence practices model, developed by wright et al, (2012), was used. the findings reveal that exporters have a positive behavior towards competitive intelligence practices, but cannot make good use of them due to a lack of knowledge, and deficiencies in organization and in technological and it systems support. as 37 companies participated in this experiment, this study could be extended to all non-traditional peruvian agricultural exports. it has been possible to identify areas where changes are needed to enable these exporters to perform at a higher level of competence. in addition, it appeared that a slightly higher level of attitude and it systems support pays off as medium-sized companies achieved a higher price per ton compared to big companies. this study is the first to present a typology of competitive intelligence practices in peru and is one of the very first to study competitive intelligence in this country and agriculture. keywords behavior, competitive intelligence, grapes exporters, peru, typology 1. introduction as companies face fiercer competition and a more uncertain environments, competitive intelligence (ci) is gaining ground (blenkhorn and fleisher 2005; bisson and yasar diner, 2017). the global intelligence alliance (gia), using data from surveys done on the same sample in 2009 then in 2011, reported that the percentage of companies integrating ci functions increased from 63% to 76% in this period (gia, 2011) and that decision making was 15% more efficient in companies that utilize ci functions (gia, 2013). ci originated from military intelligence and dates back to sun tzu and is thereby an art in addition to being a science (prescott, 1999). its systematic use in the commercial and business world is fairly recent and many academics have studied their country’s ci practices (calof et al., 2015). soilen (2013) reviewed fifty-one articles written by eighty-three authors, mostly from the united states, canada and the united kingdom, published in the journal of journal of intelligence studies in business vol. 8, no. 2 (2018) pp. 43-61 open access: freely available at: https://ojs.hh.se/ 44 competitive intelligence and management (jcim) between 2004 and 2008. he found that the main topics of research were the development of ci in general or in specific countries, followed by studies defining ci and studying its growth in time, and finally, business intelligence and its applications. little research has been conducted on the application of ci in developing countries (ifan et al., 2004; zhan and chen, 2009; wright et al., 2013; du toit, 2013; du toit and sewdass, 2014; rodriguez salvador and salinas casanova, 2012; rodrigues and thome e castro, 2017) with only a few isolated efforts focusing on the spanish speaking communities of south america (aguirre, 2015; guarrochena and paul, 2013; salazar et al., 2014; villaroelg et al.,2015). thus, this study explores for the first time the ci practices of export companies in the fresh grape sector in peru. hence, it could inspire peruvian companies and promote more studies of ci in south america. in addition, very few studies about ci in agriculture have been undertaken (bisson 2014). the purpose of this study is to create a typology of peruvian fresh grapes exporters’ ci practices and to investigate the relationship between the size of the company, the share of grapes exports in total exports, the percentage of the red globe variety in total grapes exports and the size of the farm with their ci practice levels and the average price received at export. the remainder of the paper is organized as follows: we first provide a brief comparison of the conception of competitive intelligence in english and spanish literature, then we deal with ci in peru followed by the importance of fresh grapes in peruvian exports. the methodology used in this research is described and the results are then presented and discussed. finally, we conclude with an examination of the implications and limitations of this research and suggest further research that may be undertaken. 2. theoretical background 2.1 the competitive intelligence conception in english and spanish literatures in the english literature, there is no universal definition of ci accepted by all (du toit, 2015; wright et al., 2009). haddadi et al. (2010) emphasize that the lack of an accepted definition renders this field unstable. ci was developed in the early 1980s (presscot, 1999) in the us, focusing originally on competitors under the influence of porter (1980) and was then broadened to include all actors in the market. although it is commonly accepted that ci makes use of information from outside the organization (and is thereby based on monitoring or scanning the organization’s environment), some authors (e.g. wright, 2011) consider that ci should also encompass internal information to fulfil the needs of decision makers. calof et al. (2015) categorize the definitions by those who focus on the objectives of ci, i.e. to enlighten decision makers and those who explain it by how ci is performed thereby centered on the intelligence cycle. this cycle has four steps (kahaner, 1997): i) planning and direction; ii) collection; iii) analysis; and iv) dissemination. thus, after defining the key intelligence topics, information is gathered, analyzed and the results are disseminated to people who triggered the cycle. pellissier and nenzhelele (2013) studied 50 ci definitions and determined that 38 referred to ci as a process and 4 as a product. in terms of its objectives, ci has been defined by du toit (2013, 30) as “… a strategic tool to facilitate the identification of potential opportunities and threats”. in the same vein, presscott and miller (2001) define it as any actionable intelligence that could provide a competitive edge. as a process, kahaner (1998, p.16) states that “competitive intelligence is a systematic program for gathering and analyzing information about your competitors' activities and general business trends to further your own company's goals”. likewise, fleisher (2004, 56) defines it as a “… systematic process by which organizations ethically gather and analyze actionable information about competitors and the competitive environment and, ideally, apply it to their decision-making and planning processes to improve their performance”. in contrast, rouach and santi (2001, p.553) suggest it is a creative process, or “the art of collecting, processing and storing information to be made available to people at all levels of the firm to help shape its future and protect it against current competitive threats: it should be legal and respect codes of ethics; it involves a transfer of knowledge from the environment to the organization within established rules”. soilen (2016) argue that definitions of ci and marketing intelligence are quite similar and overlapping, addressing the same phenomenon, but studied by different academic 45 disciplines. du toit (2015), based on 338 published peer-reviewed articles from 1994 to 2014 in the abi/inform database, found that the most popular term used in the literature is ci, followed by business intelligence and marketing intelligence. compared to the english literature, the main difference in the spanish literature is that competitive intelligence is linked to the term ‘technological watch’ in accordance with the norm une 166006:2011 (the spanish association for standardization and certification [aenor 2018]) and has risen in the spanish speaking community independently to the english speaking ci and marketing intelligence academic communities. for instance, professor escorsa has written numerous articles in spanish about technological watch while dealing with ci (see, for example, escorsa and maspons, 2001). in a similar vein rodriguez salvador and slinas casanova (2012) suggest that the ultimate objective of ci is to support innovation. 2.2 competitive intelligence in peru in peru, based on the largest number of publications found by the search engine of the peruvian repository for theses and academic papers, the most common terms associated with ci are business intelligence followed by marketing intelligence (concytec, 2018). from the total of 375 titles that appear in a search carried out on march 27th 2018, all were monographs or news items and there were only nine peer-reviewed articles, from which only two are related to the research topic. these two articles are a study that covers ten in-depth interviews about factors needed to promote foresight and competitive intelligence in 2040 (inche mitma et al., 2016) and a survey of 28 peruvian exporters and importers about implementations of market intelligence programs in their companies (tang tong, 2015). the lack of peer-reviewed articles about intelligence processes or programs to scan the environment in order to be more competitive in peru reflects the poor efforts to promote ci as well as the lack of human resources needed to develop ci as stated in the report by the national council of science, technology and technological innovation (concytec, 2017): i) there are only two public institutes of research which have technology transfer units and that perform activities of technological surveillance; one of these is the peruvian technological institute of production (itp). itp has been recognized as the first organization in latin america to obtain a certification for technological watch and ci according to the norm une 166006:2011 (aenor, 2018); ii) only two companies are offering this service of technological surveillance in the domestic market; iii) there are very limited educational offerings at universities and institutes. recently, concytec launched a five yearprogram (2017-2021) to promote capabilities in technological watch and ci as a means to achieve higher innovation, following the successful experiences observed in argentina and colombia. indeed, these two countries have set up technological observatories, providing access to scientific, technological and competitive knowledge that can be adopted nationally (concytec, 2017). some efforts to help exporters have been made through the peruvian export and tourism promotion agency (promperu), providing research studies of main export markets, which were developed by the market intelligence unit and are available on their web site (promperu, 2018). however, there are no reports monitoring the main markets. 2.3 the importance of fresh grapes in peruvian exports since the beginning of the 21st century, peru has emerged as one of the fastest-growing and most stable economies in latin america, with an average annual growth rate of 5.1% between 2007 and 2016 (the central reserve bank of peru [bcrp], 2018; world bank group, 2017). non-traditional agricultural exports, with fresh grapes making up the largest share, have shown an impressive compound annual growth rate (cagr) of 13.4% in the same period, accounting for 13% of total exports in 2016 (the national superintendence of customs and tax administration [sunat], 2017). the peruvian fresh grapes exports sector has been developing since the end of the 1990s and has grown at double digit rates driven by private investments and modern technologies, and the sector is vertically integrated and created with the sole purpose of serving the exports market (meade et al., 2010; world bank group, 2017). as a result, peru is the world’s fifth largest exporter of fresh grapes, accounting for 6.3% of worldwide grape exports in 2016 (international trade center [itc], 2017). the ministry of agriculture and irrigation of peru (minagri, 2017) estimated that the total production was 689,800 metric tons (mt) in 46 2016. this number has more than doubled since 2010, as a consequence of a wider growing area. the last census in 2012 estimated there to be about 43,800 hectares dedicated to grapes, covering both wine production and fresh grapes for consumption (the national institute of statistics and information [inei], 2013). this figure is likely to have also increased and it is estimated that there are 30,000 hectares in peru dedicated to fresh grapes, where the red globe variety is the most common with 80% of the total production (fernandez-stark et al., 2016). the increase in growing areas is mainly due to the perfect match between the peruvian production months and the months of lower production in the northern hemisphere. almost half of the production is exported during the higher production season i.e. from august to april, when the export price is on average three times higher compared to the local price (bcrp, 2018; minagri, 2017; sunat, 2018). as more companies got involved in exporting grapes due to higher prices, peruvian exports grew rapidly with a cagr of 24.2% between 2010 and 2016, impacting the world supply and leading to lower prices in recent years (itc, 2010-2017). 3. methodology 3.1 sample and procedure for the purposes of this study the model developed by wright et al. (2012) is used, a behavioral and operational typology of ci practice applied to smes and construed as being robust (ross et al., 2012; gaspareniene et al., 2013; smith, 2012; bisson, 2013; toker et al., 2016). this model was itself adapted from the study of wright et al. (2002) of ci active firms in the uk which addressed four strands: attitude, gathering, use and location. this model has inspired further work and replication studies carried out by adidam et al. (2009), april and bessa (2006), bouthillier and jin (2005), dishman and calof (2008), liu and wang (2008), oerlemans et al. (2005), priporas et al. (2005), rodrigues and thome e castro (2017) and wright et al. (2009). wright et al. (2012) added two new strands: technological support (“as degree of investment made to assist with gathering competitive information”) and it support (“as the type of systems used to manage the flow of competitive information”). in this way each strand is related to specific questions that later can be translated into a typology verdict for each exporter. a questionnaire using both closed and open questions was used to gather the data set. selfdeclared position statements were also included in the questionnaire to either confirm or contradict answers given within each section. the latter served as a clarification mechanism to identify any contradiction in a typology verdict. the questionnaire was available on-line in spanish and a secured link was created for each exporter. the target group was the peruvian grape exporters that had exported grapes according to the harmonized tariff code 08.06.10.00.00 in 2016 available in sunat (2017). peruvian customs provided a list of exporters that was then cleaned for the purposes of this research. the eligible sample comprised 80 export companies. all companies were contacted by telephone and/or reached by e-mail to be invited to take part in this study between october 2017 and march 2018. a total of 37 questionnaires were completed. the sample used in this research represents more than 60% of the total exporters (detailed in table 1). the unit price achieved by the companies of the sample was higher than the average for all companies. companies were classified as being a big, medium, small or micro company using as a reference the european union definition of an sme in terms of turnover and employee numbers (eu commission, 2003). table 1 characteristics of the sample size no. of companies total exports$ exports $/mt size no. of companies total exports$ exports $/mt big 14 8% 280,716,249 40% 2,267 big 8 22% 187,290,212 44% 2,336 medium 26 15% 191,600,688 28% 2,404 medium 15 41% 167,838,700 39% 2,518 small 51 30% 175,494,106 25% 2,080 small 10 27% 60,790,851 14% 2,309 micro 81 47% 46,430,922 7% 1,922 micro 4 11% 9,639,173 2% 1,988 total 172 100% 694,241,965 100% 2,225 total 37 100% 425,558,936 100% 2,391 the season starts in august and finishes in july the following year. universe season 2016/17 sample season 2016/17 47 more than half of the interviewees were top management, holding positions of ceo or chairman of the board, one fourth were management positions reporting to the ceo, and the remaining respondents were those reporting to first line management. most companies stated that they exported more than 75% of their sales and 32 out of 37 companies were vertically integrated throughout the main steps of cultivation, harvesting, processing and export. five of the companies did not cultivate grapes but acted as processors and exporters on behalf of other producers. the size of the farm was asked to those involved in cultivation and most companies stated they had more than 100 hectares for grapes cultivation. according to the last farm structure survey carried out in the european union in 2013, the largest agricultural holding size was found to be more than 100 hectares and these made up 2.7% of 12 million farms accounting for over 30% of standard output across the eu (european commission, 2013). similarly, in the latest peruvian agriculture census carried out in 2012, the largest farms were also found to be larger than 100 hectares and they were estimated to be 0.9% of 2.2 million farms (inei, 2013). 3.2 analytical approach the same set of descriptors utilized by wright et al. (2012) was used (see appendix 1), and the findings from this study were applied to this behavioral and operational typology of ci to reach verdicts regarding levels of gathering, attitude, use, location, it systems and technology support. furthermore, cluster analysis was used as an exploratory tool (kaufman and rousseeuw, 2005) to investigate whether there was any correlation between the size of the company, grapes exports share of total exports, the percentage of the red globe variety in total grapes exports and the size of the grape farm with the typology and the average price received at export between august 2016 and july 2017. 4. results and discussion 4.1 gathering this section asked about the type of information they collected, the sources they used, how much competitive information they obtained from their own employees, how they prepared their employees to address competitors, what type of financial return they expected from their ci effort and how much financial support was provided for ci activities. with regards to the type of information they collected, 284 responses were recorded, with customers, competitors, products in their market, suppliers and scientific articles and publications taking the top five places, closely followed by job market, laws, economy, politics and taxation policies. the items that were revealed as being of less interest were iso standards, patents, industrial processes, social and finance. interestingly, only one respondent included weather information, which is of utmost importance in agriculture, another respondent included certification requirements, which are compulsory for this kind of business due to food safety and traceability issues, and another respondent included yields in other countries, and phytosanitary barriers among non-tariff as well as tariff trade barriers. the most popular source of information was stated to be trade fairs followed by industry experts and industry magazines. this is indicative of reliance on a well-informed set of sources. an additional source of information was input received from employees, as 86% of respondents stated that they obtained either a moderate or high amount of competitive information from their own employees. however, the most sophisticated sources such as written evidence from verified sources, competitor research obtained from an external source, media analysis, management consultants and forecasting models were the least used. about 70% of respondents stated that they always or often trained and prepared their employees before they went to trade shows, exhibitions, conventions and other public events to make them aware of the type of information they should look for. however, the remaining 30% did this only ‘occasionally’ or ‘never’. only 59% of respondents said that they always or often briefed their employees on what they should not talk about to competitors, which demonstrates that companies are paying less attention to this area. this leaves 41% who are either naive or reckless about the importance of protecting the company’s sensitive information. considering that 81% of respondents stated that they evaluated the reliability of their sources of information, it is interesting to note that this task is not an easy one as the top three barriers to effective competitive information 48 gathering in the open question section, were reported as: i) access to the information; ii) reliability of the information; iii) lack of resources (mostly time) which were indicated by 57%, 54% and 38% of the respondents, respectively. concerning the financial support given by the organization for the task of monitoring the competitive environment, about 57% of respondents considered the support given to be adequate to do a reasonable job or enough to do a good job. on the other hand, 30% stated that: i) no funds were available as the tasks were done by interested people rather than intelligence experts; ii) funds were provided if an immediate financial benefit could be produced; iii) minimal support was provided to cover the basic tasks and simple gathering. the remainder stated that the activity received a set budget or that funds were available on request. based on the provided answers, the overall verdict inclined towards a hunter gathering level. however, the self-declared control statement showed that the verdict may be more nuanced as half of the companies used only public domain sources for their competitive information. thus, the verdict is hunter gatherer, but several of these companies take their desire for real as they are not using sophisticated ways to collect information. 4.2 attitude regarding how often the firm collected information about competitors, technologies and customers, the most frequent answer was weekly for customers and competitors while both monthly and irregularly were answered ‘when it becomes available or required for a project’ for technology. even though there seems to be a regular process to gather data, 41% agreed that it is not an organized process, and only 5% of the companies had a written process and a system dedicated to ci. therefore 95% of firms have no formalized process or dedicated system to handle gathered information. furthermore, 11% claimed that their companies provided ‘full commitment for understanding competitors’ and 70% stated that there was either ‘active support for current activities’ or ‘just about sufficient for immediate needs’. these findings are in line with the self-declared control statement in which 30% ‘try to understand specific questions for one-off projects’, 41% ‘try to understand the market in the short term’ and 22% had an integrated competitive information process where competitors were monitored to anticipate their moves and to plan a reaction. only 8% agreed that ‘we are too busy thinking about today to worry about tomorrow’. here the verdict was a task-driven attitude but significantly biased towards both an immune and operational stance. 4.3 use when asked how they used the collected information, 68% of respondents stated that they use it for both short and long-term decision making and 54% for scenario planning, leading to a verdict of strategic user. however, 41% stated that ‘there is no organized process for feeding ci output into the decision-making processes, leading to a verdict of joneses user. concerning the impact different factors have in the company decision making, ‘customer demands’ was the most frequent choice, followed by ‘competitors’ long term predicted behavior’, ‘competitors’ short term predicted behavior’ and ‘technological/technology standard changes’. these are congruent with the self-declared control statement in which 38% ‘use competitive information to help make decisions about price changes and promotional efforts’ and 46% use competitive information to identify opportunities and threats as well as to build scenarios. these findings suggest a verdict of strategic user but with a strong tendancy towards a joneses user stance. 4.4 location in this section, participants were asked whether employees knew who to pass information on to when they acquired it, and 92% of respondents stated either ‘always’ or ‘often’, with only 8% stating they knew ‘occasionally’. the top four departments that took responsibility for collecting ci were first sales (59%) and then general management (43%), followed by manufacturing & production (27%) and research & development (22%) with 22% of respondents stating also that all departments take responsibility. the latter response suggests that some companies work in a loose manner as they do not have a clear idea of who should take overall responsibility. when asked whether a dedicated intelligence unit is essential to successfully accomplish the monitoring task, only 16% responded with ‘always’ and 30% ‘sometimes’ 49 while 38% stated this to be ‘a good idea but not always essential’. the remainder responded with either ‘not needed at all’ or ‘it seems to work well without a dedicated unit’. based on the above findings, it came as no surprise that 89% of respondents stated that they did not have a dedicated intelligence unit, although 54% did have a person in their firm whose job is to gather, analyze, disseminate and store the competitive information, and in 65% of the cases this person participated in senior management meetings. in sum, the verdict was an ad-hoc location approach. 4.5 technology support this strand deals with the type of tools used by the companies to gather information. the most frequently used tools were websites (92%) and google (86%), followed much less frequently by specialized databases such as derwent, dun & bradstreet and euromonitor (41%) and specialized websites, for example espacenet for patents (22%). this is in line with the selfdeclared control statement in which 72% of respondents stated they ‘use common, freely available tools for web searching, such as google’. however, 14% of respondents ‘use full versions of meta-search engines and are also familiar with specialist databases for patent and financial information’ and 14% ‘use software that allow users to collect, analyze and disseminate information automatically’. the verdict was overwhelmingly a simple technology support stance. 4.6 it systems this section addresses the it systems used to manage competitive information in the companies. about 49% of the respondents stated that they did not use any systems at all to manage their competitive information and agreed with the statement that ‘it is in our minds and we rely on our memories’. this contrasted with the next largest categories, chosen to a much lesser extent, with 16% stating that ‘we use it systems to manage competitive information but to ensure the safety of our information we prefer paper records and do not really like relying on computers, or somebody else’, 19% stating they used off-the-shelf and 14% stating they used a bespoke development. this is in line with the control selfdeclaration in which 38% agreed they did not use it systems to manage competitive information and ‘rely on our memories and the good will of staff to share what they learn’ and 22% stating they ‘prefer to stick to traditional methods of managing competitive information by using paper records’ and agreed with the statement that they ‘do not really trust computers’. however, this is in contrast to the 22% which claimed to have designed their own in-house system unique to the firm and its needs. here the verdict was a dismissive it systems stance with a strong tendency towards bespoke it systems. 4.7 the typology of peruvian grape exporters’ ci practice levels the verdicts for each strand i.e. gathering, attitude, use, location, it systems and technology support are summarized in figure 1. the peruvian grape exporters appear to be aware of the importance of ci but they lack knowledge, organization and dedicated it. hence, thanks to the evaluation carried out in this study, companies can see the path to follow that should lead them towards higher ci practice levels to help them better address a faster and harsher competitive environment. 4.8 cluster analysis by size of company with regards to the six strands of the ci typology studied, practices among big, medium, and small & micro companies are rather similar to the findings for the total sample as shown in table 2 (for more details, see appendix 2). however, big companies have a more immune attitude compared to the task driven attitude of medium companies and the operational attitude of small companies. furthermore, about the use of information, if big and small & micro companies are at a strategic level, medium companies are the lowest one. in general, for all the ci strands, the percentage of small & micro companies are at higher levels. one can construe that these small & micro companies need to be more aggressive to survive as they compete with bigger companies and that consequently they seem to be more aware of the value of information for competitiveness. despite this, medium companies registered higher average prices (free on board [fob] peruvian port us$ 2,518 per metric ton) compared to big companies (fob us$ 2,336 per metric ton). the small & micro companies registered the lowest average price (fob us$ 2,259 per metric ton). this cannot be interpreted to mean that big companies have a 50 more challenging job placing their grapes in the market compared to medium sized companies as it is shown later that the larger the grape farm the better results in price per ton. this suggests that a positive behavior towards ci pays off as medium sized companies show a higher level in this strand compared to big companies, with more cases of technology and it support being utilized. this also suggests that the ci level is independent of the size of the company in line with the results of priporas et al. (2005). 4.9 cluster analysis by percentage of grapes exports in total exports this cluster confirms that those companies that do not concentrate primarily on grapes, with grapes representing less than 75% of their total exports, have a stronger attitude towards an operational stance compared to those which are less diversified and tend towards a taskdriven attitude. however, it shows that a concentration as opposed to a diversification strategy pays off as the price per ton is significantly higher in those companies concentrating on grapes (fob peruvian port us 2,677 per metric ton) compared to those that do not (fob us$ 2,133 per metric ton). 4.10 cluster analysis by percentage of red globe variety in total grapes exports companies with a concentration of the red globe variety higher than 50% received a significantly lower price (fob peruvian port us$1,881 per metric ton) compared to those that have less concentration in this variety (fob us$ 2,605 per metric ton). however, this cluster shows homogeneous results compared to the sample. it is worth noticing that higher value grapes increase the labor and handling costs, which moderate the variety choice (fernandez-stark et al. 2016). 4.11 cluster analysis by size of farm this cluster was analyzed based on those companies that have grape cultivation. it indicates that the companies with less than 100 hectares and more than 501 hectares behave differently from the average sample. indeed, those companies with less than 100 hectares show a stronger attitude towards an operational stance, which somehow is figure 1 the behavioral and operational diagnostic typology of peruvian grape exporters’ competitive intelligence practice. 51 translated into a higher level of it systems use, and the use of the information strategically. on the other hand, those companies with more than 501 hectares also show a stronger attitude towards an operational stance, which is also translated into different levels of higher it systems with more technology support, but they do not use the information strategically. this cluster confirms that the largest grape farms, with more than 501 hectares, obtained a better price (fob peruvian port us$ 2,444 per metric ton) compared to the lower prices seen for 101-500 hectare grape farms (fob us$ 2,413 per metric ton) and much higher prices than 100 hectares grape farms (fob us$ 1,932 per metric ton). this can be interpreted to indicate that there is an advantage in having a higher critical mass volume for exports, since some importers prefer larger volumes from a few growers that can ensure quality consistency, food safety and traceability. 5. conclusion this paper aims to create a typology of peruvian fresh grapes exporter ci practices. overall, this sector shows positive behaviors towards ci but cannot make the most of it due to the lack of technological and it systems support, lack of knowledge and dedicated organizational structures. the first verdict is that this sector displays the hunter gathering stance, which is a key indicator to engage in ci practice. however, evidence also suggests that there is still too much effort spent on easy gathering from public sources producing volume, not value. the second verdict is that exporters show a task-driven attitude where questions are asked and answered with little value added. in order to reach the ideal state of a strategic attitude, top management should embrace ci as essential for future success, addressing ‘what if’ questions for both short and long-term decisions, anticipating changes and planning possible courses of action. the third verdict is that this sector is a strategic user, which is the optimum state but is strongly biased towards joneses user as the knowledge learnt is not retained for the future. the fourth verdict is ad-hoc location instead of dedicated location for ci practice, despite the fact that almost half of respondents have a person who gathers, analyzes, disseminates and stores competitive information. in order to have a successful ci program, it is necessary to define roles and responsibilities with a specific location within the organization. this way strand gathering attitude technology information system use location cluster verdict verdict verdict verdict verdict verdict company size* big g2 a1 ts1 is1 u4 l1 medium g2 a2 ts1 is1 u1 l1 small & micro g2 a3 ts1 is1 u4 l1 % of grapes exports in total exports** higher than 75% g2 a2 ts1 is1 u4 l1 lower than 75% g2 a3 ts1 is1 u4 l1 % of red globe in total grapes** lower than 50% g2 a2 ts1 is1 u4 l1 higher than 50% g2 a2 ts1 is1 u4 l1 total g2 a2 ts1 is1 u4 l1 grapes farm size lower than 100 hectares g2 a3 ts1 is1 u4 l1 between 101 and 500 hectares g2 a2 ts1 is1 u4 l1 higher than 501 hectares g2 a3 ts1 is1 u1 l1 total g2 a2 ts1 is1 u4 l1 sources: * peru: top publications (2018) ** sunat (2016-2017) table 2 cluster analyses. 52 redundant work is avoided and it empowers the person in charge to develop technical and cognitive skills to deliver the right ci to the right person at the right time. the fifth verdict is that this sector uses very simple tech support, which does not require specific knowledge, commonly using spreadsheets for their analysis and accessing web sites displaying old information that provides limited value. with globalization, increasing data complexity and speed of change, it is of the utmost importance to invest in integrated systems (e.g. scanning systems) that provide information in real time and allow this information to be aggregated. the last verdict is dismissive it systems support as companies do not use any it systems to manage strategic information. the second aim of this paper explored whether the size of the company or the export level of these companies impact their ci practice level. according to the cluster analysis by size of company, ci practice level is independent of the size of the company as big, medium and small & micro companies show almost homogeneous results among the six strands. however, it seems that a slightly higher level of attitude and it systems support pays off as medium companies show a higher price per ton compared to big companies. this does not mean that large companies have to struggle more to place more volume as cluster analysis by size of farm makes it clear that the larger the grapes farm size the higher the price per ton. the cluster analysis of grapes exports in total exports suggests there are advantages to specialization instead of diversification, as companies with grapes exports representing more than 75% of their total exports receive a higher price per ton compared to those whose grapes exports were below 75% of their total exports. finally, the cluster analysis of the ratio of the red globe variety in total grapes exports, shows that significantly lower prices are received by companies that have more than 50% red globe in their total grapes exports. however, this cluster shows homogeneous results compared to the sample. the results of this study provide empirical evidence to the peruvian government authorities about the need to promote training and the adoption of dedicated technology among companies in order to achieve higher levels of ci practices. furthermore, peruvian authorities as well as other south american governments can benefit from the experience of other countries that have government sponsored ci programs, specifically canada (brouard, 2006; tanev and bailetti, 2008; tarraf and molz, 2006), france (bisson, 2010, 2013; salles, 2006; smith et al., 2010) and switzerland (begin et al., 2007). 5.1 limitations and further research as the sample size is limited, this experiment could be extended, for example, to all nontraditional agricultural peruvian exports to confirm the findings reached in this study and to be able to address smes, which are known as pymes in latin america, to help peruvian authorities to better address their needs. based on the experiences in canada, evaluations of ci programs do not measure the direct economic impact and calof (2017) points out that this needs to be addressed in future research. therefore, it could be quite interesting to create a longitudinal analysis of this non-traditional agricultural peruvian exports sector to measure the impact of ci workshops, training and dedicated it tools on the competitive and financial performances of these companies. 6. references adidam, p., gajre, s. and kejriwal, s. (2009). cross-cultural competitive intelligence strategies. marketing intelligence and planning, 27(5), 666-680. aguirre, j. (2015). strategic intelligence: a system to manage innovation. estudios gerenciales, 31(134), 100-110. april, k. and bessa, j. (2006). a critique of the strategic competitive intelligence process within a global energy multinational. problems and perspectives in management, 4(2), 86-99. asociacion española para la normalizacion y certificacion (2011). norm une 166006:2011. retrieved from: http://www.aenor.es/aenor/normas/normas/fic hanorma.asp?tipo=n&codigo=n0046930#.wp mn1jnuai4 asociacion española para la normalizacion y certificacion (2016). aenor perú otorga certificado de vigilancia tecnológica a itp. retrieved from: http://www.aenor.es/aenor/actualidad/actuali dad/noticias.asp?campo=1&codigo=43184&tip on=1#.wpmi8jnuai6 banco central de reserva del perú (2017). exchange rate. retrieved from: 53 https://estadisticas.bcrp.gob.pe/estadisticas/se ries/ begin, l., deschamps, j. and madinier, h. (2007). an interdisciplinary approach of competitive intelligence. cahiers de recherche du crag, no. hes-so/heg-ge/c-07/4/1-ch. bisson, c. (2010). development of competitive intelligence tools and methodology in a french hightech sme. competitive intelligence magazine, 13, 18-24. bisson, c. (2013). guide de gestion stratégique de l’information pour les pme. montmoreau: les2encres. bisson, c. (2014). exploring competitive intelligence practices of french local public agricultural organisations. journal of intelligence studies in business, 4(2), 5-29. bisson, c. and yasar diner, o. (2017). strategic early warning system for the french milk market: a graph theoretical approach to foresee volatility. futures, 87, 10-23. blenkhorn, d. and fleisher, c. (2005). competitive intelligence and global business. westport: praeger. bouthillier, f. and jin, t. (2005). competitive intelligence and webometrics. journal of competitive intelligence and management, 3(3), 19-39. brouard, f. (2006). development of an expert system on environmental scanning practices in sme: tools as a research program. journal of competitive intelligence and management, 3 (4), 37-55. calof, j. (2017). reflections on the canadian government in competitive intelligence programs and impacts. foresight, 19(1), 31-47. calof, j., richards, g. and smith, j. (2015). foresight, competitive intelligence and business analytics tools for making industrial programmes more efficient. foresight-russia, 9(1), 68-81. comisión de promoción del perú para la exportación y el turismo (2018). inteligencia de mercados. retrieved from: http://www.siicex.gob.pe/ consejo nacional de ciencia, tecnología e innovación tecnológica (2017). programa especial de prospectiva y vigilancia tecnologica. retrieved from: https://portal.concytec.gob.pe/images/noticias/ programavt_docfinal_vr12_consultapublic a.pdf consejo nacional de ciencia, tecnología e innovación tecnológica (2018). national digital repository of science, technology and innovation. retrieved from: https://alicia.concytec.gob.pe dishman, p. and calof, j. (2008). competitive intelligence: a multiphasic precedent to marketing strategy. european journal of marketing, 42(7/8), 766-785. du toit, a. (2013). comparative study of competitive intelligence practices between two retail banks in brazil and south africa. journal of intelligence studies in business, 3(2), 30-39. du toit, a. (2015). competitive intelligence research: an investigation of trends in the literature. journal of intelligence studies in business, 5(2), 14-21. du toit, a. and sewdass, n. (2014). competitive intelligence practices in brazil: an exploratory study. mousaion, 32(1), 84-97. escorsa, p. and maspons, r. (2001). de la vigilancia tecnológica a la inteligencia competitiva. madrid: prentice-hall. european commission (2003). commission recomendation of 6 may 2003 concerning the definition of micro, small and medium-sized enterprises. official journal of the european union, 124, 36-41. european commission (2013). structure and dynamics of eu farms: changes, trends and policy relevance. retrieved from: https://ec.europa.eu/agriculture/sites/agricult ure/files/rural-areaeconomics/briefs/pdf/09_en.pdf fernandez-stark, k., bamber, p. and gereffi, g. (2016). peru in the table grape global value chain. retrieved from: http://www.cggc.duke.edu/pdfs/2016%20duke %20cggc%20grape%20gvc%20report%20 peru.pdf fleisher, c. s. (2004). competitive intelligence education: competencies, sources, and trends. information management journal, 38(2), 56-62. gaspareniene, l., remeikiene, r. and gaidelys, v. (2013). the opportunities of the use of competitive intelligence in business: literature review. journal of small business and entrepreneurship development, 1(2), 9-16. global intelligence alliance (2011). market intelligence in global organizations: survey 54 findings in 2011. retrieved from: https://www.mbrain.com/wpcontent/uploads/2 015/04/10852.pdf global intelligence alliance (2013). the state of market intelligence in 2013: global mi survey findings. retrieved from: http://www.biia.com/the-state-of-marketintelligence-in-2013-global-mi-surveyfindings guarrochena, m. d. a. and paul, l. m. (2013). strategies of information management associates with competitive intelligence: appropriation practice in support exporters organizations. vision de futuro, 17(2), 168185. haddadi, a., dousset, b. and berrada, i. (2010). xplor everywhere — the competitive intelligence system for mobile. retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp =&arnumber=5945635&isnumber=5945564 ifan, h., dou, j. m., manullang, s. and dou, h. (2004). developing competitive technical intelligence in indonesia. technovation, 24 (12), 995-999. inche mitma, j. l., chung pinzas, a. r. and ruiz lizama, e. (2016). prospective and competitive intelligence in 2040 to promote programs innovation in peru. industrial data, 19(1), 38-44. instituto nacional de estadistica e informatica (2013). resultados definitivos iv censo nacional agropecuario 2012. retrieved from: http://proyectos.inei.gob.pe/web/documentosp ublicos/resultadosfinalesivcenagro.pdf international trade centre (2008-2017). list of exporters of selected product 080610 grapes, fresh. retrieved from: http://www.trademap.org kahaner, l. (1997). competitive intelligence. how to gather, analyze and use information to move your business to the top. new york: touchstone. kahaner, l. (1998). competitive intelligence. new york: touchstone. kaufman, l. and rousseeuw, p. (2005). finding groups in data: an introduction to cluster analysis. new york: wiley-interscience. liu, c. h. and wang, c. c. (2008). forecast competitor service strategy with service taxonomy and ci data. european journal of marketing, 42 (7/8), 746-765. meade, b., baldwin, k. and calvin, l. (2010). peru: an emerging exporter of fruits and vegetables. retrieved from: http://www.ers.usda.gov/media/134648/fts345 01.pdf ministerio de agricultura y riego del perú (2017). boletín estadístico de producción agrícola, pecuaria y avícola diciembre 2016. retrieved from: http://www.minagri.gob.pe/portal/download/p df/herramientas/boletines/prod-agricolapecuaria-avicola/2016/boletin-produccioncomercializacion-avicoladiciembre2016_020317.pdf oerlemans, l., rooks, g. and pretorius, t. (2005), does technology and innovation management improve market position? empirical evidence from innovating firms in south africa. knowledge, technology and policy, 18(3), 3855. pellissier, r. and nenzhelele, t. (2013). towards a universal definition of competitive intelligence. sa journal of information management, 15(2), art.#559, 7 pages. porter, m. (1980). competitive strategy. new york: free press. prescott, j. e. (1999). the evolution of competitive intelligence: designing a process for action. proposal management, apmp, vol. spring, 37-52. prescott, j. and miller, s. h. (2001). proven strategies in competitive intelligence. new york: john wiley & sons, inc. priporas, c., gatsoris, l. and zacharis, v. (2005). competitive intelligence activity: evidence from greece. marketing intelligence & planning, 23(7), 659-669. rodrigues, v. z. and thome e castro, l. (2017). competitive intelligence within the telecommunication industry. business practices in brazil under the wright-pickton framework. rege revista de gestao, 24, 110-121. rodriguez salvador, m. and salinas casanova, l. f. (2012). applying competitive intelligence: the case of thermoplastics elastomers. journal of intelligence studies in business, 2(3), 41-47. ross, p., mcgowan, c. and styger, l. (2012). a comparison of theory and practice in market intelligence gathering for australian microbusinesses and sme's. proceedings of the 19th 55 international business research conference, monash university, melbourne. rouach, d. and santi, p. (2001). competitive intelligence adds value: five intelligence attitudes. european management journal, 19 (5), 552-559. salazar, k. o., cardona, m. j. m., ocampo, o. l. l. and ovalle, a. m. c. (2014). technology watch cycle analysis in the textile companies of south central caldas. sciencia et technica, 19(1), 35-41. salles, m. (2006). decision making in smes and information requirements for competitive intelligence. production planning and control, 17(3), 229-237. smith, j, wright, s., and pickton, d. (2010). competitive intelligence programmes for smes in france: evidence of changing attitudes. journal of strategic marketing, 18(7), 523-536. smith, j. (2012). competitive intelligence behaviour and attitude antecedents in french small and medium sized enterprises in a funded intervention environment. (doctorate thesis). de montford university, uk. soilen, k. s. (2013). an overview of articles on competitive intelligence in jcim and cir. journal of intelligence studies in business, 3(1), 44-58. soilen, k. s. (2016). a research agenda for intelligence studies in business. journal of intelligence studies in business, 6(1), 21-36. superintendencia nacional de aduanas y de administracion tributaria del perú (2017). exportaciones p.a. 0806.10.00.00. retrieved from: http://www.aduanet.gob.pe/ superintendencia nacional de aduanas y de administración tributaria del perú (2018). anuarios. retrieved from: http://www.sunat.gob.pe tanev, s. and bailetti, t. (2008). competitive intelligence information and innovation in small canadian firms. european journal of marketing, 42(7/8), 786-803. tang tong, m. m. (2015). el rol de la inteligencia de mercados en las empresas exportadoras e importadoras en el perú. ingeniería industrial, 33, 71-97. tarraf, p. and molz, r. (2006). competitive intelligence at small enterprises. sam advanced management journal, 71(4), 24–34. toker a, seraj m., kuscu a., yavuz r., koch s. and bisson c. (2016). social media adoption: a process based approach. journal of organizational computing and electronic commerce, 26(4), 344-363. top publications (2018). peru: the top 10,000 companies. retrieved from: http://www.toponlineapp.com tryfonas, t. and thomas, p. (2006). intelligence on competitors and ethical challenges of business information operations. proceedings 5th european conference, information warfare and security, june 1-2, national defense college, helsinki. villaroelg, c., comai, a., karmelic-pavlov, v., fernandez, a.o., and arriagada, c.v. (2015). design and implementation of a technological surveillance and competitive intelligence unit. interciencia, 40(11), 751-757. world bank group (2017). gaining momentum in peruvian agriculture: opportunities to increase productivity and enhance competitiveness. retrieved from: http://documents.worldbank.org/curated/en/1 07451498513689693/pdf/p162084-06-262017-1498513685623.pdf world bank (2017). gross domestic product. retrieved from: http://databank.worldbank.org wright, s. (2011). a critical evaluation of competitive intelligence and insight management practice. (doctorate thesis). de montfort university, uk. wright, s., pickton, d. w. and callow, j. (2002). competitive intelligence in uk firms: a typology. marketing intelligence & planning, 20(6), 349-360. wright, s., bisson, c. and duffy, a. (2012). a behavioural and operational typology of competitive intelligence practices in turkish smes. journal of strategic marketing, 20(1), 19-33. wright, s., bisson, c. and duffy, a. (2013). competitive intelligence and information technology adoption of smes in turkey: diagnosing current performance and identifying barriers. journal of intelligence studies of in business, 3(2), 5-29. zhan, x. and chen, m. (2009). competitive intelligence monitoring in the risk prevention of sme's. journal of service science and management, 2(3), 230-235. 56 7. acknowledgement the authors thank all participants who helped in the study and the universidad de lima, peru which supported the fieldwork of this research. 8. appendi̇ces attitude immune attitude a1 task driven attitude a2 operational attitude a3 strategic attitude a4 too busy thinking about today to worry about tomorrow. thinks that the firm is either so small, so big or so special that it enjoys immunity from competitors and thus ci is a waste of time. minimal or no support from either top management or other departments. finding answers to specific questions and extending what the firm knows about its competitors, usually on an ad-hoc basis. departments more excited about ci than top management who don’t see the benefits. a process, revolving around the company as its centre, trying to understand, analyse and interpret markets. top management usually trying to develop a positive attitude towards ci because they can see it might increase profit, and therefore personal bonuses. unwilling or unable to think about the application of ci for the long term. an integrated procedure, in which competitors are determined as those who are satisfying our customer's needs, current and/or future. monitoring their moves, anticipating what they will do next and working out response strategies. receives both top management support, cooperation from other departments and is recognised by all as essential for future success. 57 gathering easy gathering g1 hunter gathering g2 firms which use general publications and/or specific industry periodicals and think these constitute exhaustive information. unlikely to commit resources to obtain information which may be difficult or costly to obtain. always looking for an immediate return on investment. firms knowing that easy gathering information is available to all who care to look. realise that if ci is to have a strategic impact then additional, sustained effort is required. resources are available which allow researchers to access sources within reasonable cost parameters, back their instinct, follow apparently irrelevant leads, spend time talking, brainstorming and thinking about ci problems without always being pressured for “the answer”. firms which appreciate and support intellectual effort. 58 use joneses user u1 knee jerk user u2 tactical user u3 strategic user u4 firms trying to obtain answers to disparate questions with no organisational learning taking place. has commissioned a ci report from a consultant because that is what everybody else has done. firms which obtain some ci data, fail to assess its quality or impact, yet act immediately. can often lead to wasted and inappropriate effort, sometimes with damaging results. such firms are most vulnerable to planted mis-information by competitors who are more ci aware. ci used mostly to inform tactical measures such as price changes, promotional effort. some firms can successfully argue that ci loses its impact and timeliness if it gets stuck at the strategic level but are, nevertheless, acutely aware of its potential value to the business. ci is used to identify opportunities/threats in the industry and to aid effective strategic decision making. all levels of staff, both management and operational, are aware of csf’s and their attendant ci requirements. continuous, legal measures are used to track competitors, simulate their strengths and weaknesses, build scenarios, and plan effective counter attacks. decision makers are involved in a high number of “whatif?” discussions to which ci data is applied. contingency planning and counter intelligence is a part of normal strategic thinking. action plans are implemented and mistakes are seized upon as learning rather than firing opportunities. open and facilitative management culture which displays trust and encourages involvement. 59 location ad-hoc location l1 designated location l2 firms with a specific intelligence unit, full time staff, dedicated roles, addressing agreed strategic issues. staff have easy access to decision makers, status is not a barrier to effective communication. no dedicated ci unit. intelligence activities, where undertaken are on an ad-hoc basis, subsumed into other departments, with intermittent or non-existent sharing policies. technology support simple technology support ts1 average technology support ts2 advanced technology support ts3 high technology support ts4 the company is just using the free web such as a search engine or looking at some web sites which require no specific knowledge. also use general office software such as spreadsheet. using “off the shelf” products such as meta-search engines which simply reorganise publicly available information for the firm use. the company might use web site which require specific knowledge (e.g. espacenet) and pay to use some specialised websites and databases (e.g. patent and finance). this information system holds vital and high level information as well as operational and tactical material. is fully integrated across the business and continually evolves to meet the firm’s requirements. content analysis (e.g. statistical analysis) provided. in addition to advanced tools, firms use “clever” algorithms aimed at understanding automatically the competitive information collected. these algorithms are based on semantics. 60 it systems dismissive it systems its1 sceptic it systems its2 standardized it systems its3 hosted it systems its4 tailored it systems its5 bespoke it systems its6 a standard existing system is purchased from a software vendor and installed on computers located within an organization. a standard system is used, but it is not managed by the company itself (e.g. pay per view system). in a tailored development, an off-the-shelf system or hosted solution is tailored according to an organization’s needs regarding its competitive information. unique to the firm system which has been designed in-house and aiming at collecting, analyzing and disseminating competitive information. does not use any it system to manage competitive information has a system to manage competitive information but prefers to use paper based records. does not trust it systems sufficiently and is wary of their reliability 61 page 4 editors note vol 10 no 3 editor’s note vol 10, no 3 (2020) labeling or science-by-buzzwords: the semantic trap in academic research and how to get out of it the social sciences are drowning in new fancy academic terms or buzzwords, labels with unprecise definitions, rebranding phenomenon that somehow seem familiar. we are all surrounded by smart cities, innovation, and sustainability. what do these terms mean that we could not express earlier? introducing them also raises new questions, which at first may seem provocative: are there dumb cities too, if so where? do we carry out research at our universities that is not innovative? does the literature on sustainability make our products more sustainable? above all, these new fields are formulated in almost suspiciously positive terms attracting the attention of our politicians and echoed everywhere. how can anyone be against smart cities, innovation and sustainability? it must be good, important and therefore it deserves funding. creating new terms to describe what is mostly old and familiar problems (relabeling) is not helping move science forward but instead hindering its development as it leads the researcher to believe he or she is setting out on a new quest, while often just ignoring past literature, especially that written in french and german languages, which then suddenly does not apply. the same is true for intelligence studies. “research” today is too often reduced to searching for articles in one of two commercial databases: web of science (clarivate analytics) or scopus (elsevier), basically consisting of articles that has been written during the past two generations. here we are supposed to cite the most cites articles, even though the same ideas (but with different words) have been expressed numerous times before in older articles, books or are just common sense, so that whoever wrote the first article become popular. this then is the pyramid scheme of the brave new world of the social sciences, a system that creates academic peacocks the majority of social science researchers today are not first of all knowledgeable in say economics or business, but of how to produce articles. that is a skill that has less to do with what is happening in the real world of social behavior. that is the price we must pay, some say, but the actual production of research also attracts very little attention outside of the circle of academics who contribute to it. moreover, it makes our business education less relevant. ask yourself, if today’s business education was relevant, why are the chinese outperforming the west? why are there so few famous business schools in economically successful countries like germany, taiwan, or south korea? who teaches you how best to succeed in business life, the authors of the most cites scientific articles in business and management or the chinse classic authors, like confucius or sun tzu? when i got interested in intelligence as a business student it was based on the notion that better information can make organizations more competitive. this was still during the first generation after the start of what was called the information age, when companies realized that information and knowledge, not physical assets, were the most important ingredients for business success. there was no internet, nor mobile phones. i was interested in the following questions: 1. how do organizations work with information? 2. what is the most effective way for organizations to work with information to obtain a competitive advantage? 3. why are organizations not working more effectively with information? i was interested in these questions from an international perspective, curious about the relationship between specific cultures and production. so, much like marco polo, i asked myself: journal of intelligence studies in business vol. 10, no 3 (2020) p. 4-7 open access: freely available at: https://ojs.hh.se/ 5 4. what can we sell to other countries and what can we buy from them? 5. what is the best way of doing this? i am still predominantly interested in these questions and marco polo seems to follow me in my thoughts wherever i go and seek new knowledge. i am not interested in the semantics surrounding these questions, the new terms that are introduced more as labels than to give a more exact definition of the underlying phenomenon we are looking at. to make things even worse, these new labels change, and quite frequently, in what looks like ever-shorter life cycles of social science research fields, replacing each other after quick overlaps. it is much like watching trends in the clothing industry. suddenly you realize that your corduroy pants that work perfectly and have no holes in them need to be changed out. your surroundings demand it. to take a more fitting example: i was interested in how people work together with information as we started a research project on why employees hide information. here, i am not interested in collective intelligence, competitive intelligence, co-creation, wisdom of crowds, knowledge management, complex systems, or systems theory, just to take some examples. i am first of all interested in the problem. many academics mix labels with theory. theory does not mean to name labels, but to present similar problems in other studies, to say if they reached similar or different results and to try to explain why this may have been the case and what it means for our own study. this can be done almost completely without using labels. still, i tend to spend more time on semantics than on actual problems, very much against my own will. it’s like my academic surroundings impose this on me. it seems that most business researchers fall into the same semantic trap. it’s not only due to how we label problems with key words in databases, but also to the way we organize ourselves as researchers. the process can be explained as follows: business researchers quickly try to own the terms that they become interested in instead of focusing on the problems and problem areas that they are interested in. instead of broadening the field, we narrow it, becoming specialists in ever smaller parts, all with their own labels. after a few rounds we are no longer in contact with business life anymore. there is another variation of this problem and that is when the academic discipline is in close contact with industry even though it is erroneous. to me the scariest example of this is the study of economics after keynes, which is sometimes referred to as neoclassic economics. it seems clear to me that the major reason that banks, the financial sector and the organizations supporting this industry pay lip service to the study of modern economics is that it legitimizes a corrupt and close to bankrupt system that does little good to others outside of its own members. any problem can be studied from the perspective of numerous terms. often it does not matter which term we use as there are many terms that overlap and can be relevant simultaneously. instead of accepting this, academics strive to own the terms they chose to use and to disown others, especially those that are closely linked. as soon as we identify ourselves with one term, we start to oppose other, similar terms, treating them almost as competitors, as we often compete for the same or similar research positions and grants. new academics come along and pick their label, often by accident, for example, when adopting the preferred label of a supervisor, until each term forms or constitutes an academic tribe. these academic tribes then develop their own conferences and journals, and an internal struggle finds place, a race to establish legitimacy around an internal hierarchy most often built on the popularity (impact) of articles, and less so on the quality of the content or its relevance. it’s also possible to be in several tribes at the same time, even though academics normally have a clear preference of one above the other, simply because it’s difficult to excel in more than one area. as an example, authors in the field of collective intelligence also study artificial intelligence, collective behaviour, swarm intelligence, complex systems, machine learning, human-computer interaction, multiagent systems, sustainability, information systems design, crowd work, evolutionary computation, social decision making, empathy justice, foresight, futures research, crowdsourcing, information systems network, and/or democratic theory. collective intelligence is used synonymously or in combination with co-creation, wisdom of crowds, opens source, social systems, and social complexity, all with their own tribes. within intelligence studies we have sub-tribes in the form of competitive intelligence, market intelligence, competitor intelligence, business intelligence, enterprise resource planning, social intelligence, all of whom deal with the problem of collective intelligence. close by there are the tribes of futures studies and foresight. in a corner sits the library sciences. across the road there are the tribes of decision making, decision sciences, information sciences. all are quite familiar with the same phenomenon studied as collective intelligence. in other disciplines there are similar labels and key words, for example collective behavior in the study of sociology. the problem is that researchers seldom direct their attention outside of their own tribe. this is not only an odd scientific process, but we are witnessing an enormous waste of intellectual ability and potential. so, how do we solve it? 6 to become more relevant academic research must redirect its focus from buzzwords to problems, not just smart “research gaps” in the literature. instead of listing keywords, researchers, academic journals and academic databases should list problems (1), and the problems should be stated in full sentences (2) using as few (3) and as simple words as possible (4). we should also insist on clear, mutually exclusive definitions. by searching for problems instead of labels it will become much easier to find relevant research across different labels and disciplines. we need to be much stricter when admitting new labels. if a new term is not exact and not much different from a previous term it should be declined. focus should be on what the germans since the 19th century understand by “verstehen”, as the "interpretive or participatory" examination of social phenomena, not on coining new terms. today new terms often come to life because we did not read enough, or we thought more about internal marketing and our own self-promotion instead of focusing on problems that are important for humanity. we are all guilty of this to a certain degree as it’s difficult to escape the logic trap that is our current social science research system. we need to instill a new critical process of thinking by asking: what problem does this field of study lay claim to? are there other studies that lay claim to the same problem? if yes, go back to the previous field. if it does not exist anywhere, and if you are 100% certain, only then can you coin a new term after consulting with your peers. this process would lead to the merger of most of all existing social science research today. the same could then be done with conferences and academic journals. larger academic groups will again improve the quality of journals and conferences, thus improve the advancement of science. to complicate things further labels are sometimes decided outside of academia. the world of business is basically changed by its practitioners, not by academics. as an example, competitive and market intelligence is now often replaced by competitive and market insights (cmi) in many major companies. the intelligence label was always problematic and the association to the world of spying never quite washed off. it did not help that many successful business intelligence companies functioned more as private eyes with aggressive methods despite organizations like scip setting standards to the contrary. many were also skeptical to what they understood as an anglo-saxon and predominantly american agenda to spread the practice of industrial espionage advocated by consultants centered around langley. the difference between the term intelligence and insights is not significant. it basically means the same: valuable information, need-to-know for the competitiveness of the firm. put differently, there is hardly any part of insights that cannot be seen as intelligence and vice versa. however, it could be argued that market insight is a broader take on business information. it could be said that it brings together a wider group of fields, both practitioner and academics, some of whom were left behind in the process when smaller academic tribes were created. market researchers, business intelligence specialists and all kinds of information scientists are now lured back together under the umbrella of earlier pioneers like the visionary businessman alvin toffler, the mathematician claud shannon, and gabriel naudé, the father of library sciences, just to give a few examples. the “insight people” have already started to form their own group. academics are likely to follow. other academics are already finding themselves sitting in groups that are no longer relevant wondering what happened. the academic projects that are the most successful will always be those that follow the development in business life. the discipline of digital marketing is a good example. digital marketing is fundamentally different from the old “brick marketing,” to the point that if you do not understand its logic today then your education is not relevant any longer. it took academia a long time to understand this and for a few years the whole discipline of marketing was terribly far behind reality. the advancement of the field still almost exclusively finds its place in business organizations. academics are mostly trying to run after and catch up with the practitioners in this field of study. one reason for this is that advancements in digital marketing demand substantial it infrastructure that academics do not have easy access to. the situation is similar in business intelligence, which is basically about new software today. the leading ai experts do not work in academia but in the major tech companies. it is all about being relevant and useful. in intelligence studies there is a demand on us that we integrate business practices with more technology (hardware and software). only then can we hope to make real academic contributions in this field. we stand in front of an almost awkward situation: the intelligence field has never been more relevant in the history of mankind as information has become the most important ingredient for competitive advantage. and the more information, and the better information, the more valuable the company. all the new and major mnes around us are living proof of this, whether it be alphabet (google), netflix, spotify, facebook or alibaba. to understand and be able to contribute to this domain we must be interested in the same problems that they are trying to solve. to this aim the labels are often just distractions, asemantic trap. the first three articles in this issue deal with different forms of literature and domain analysis, linking competitive intelligence to other fields of study. 7 the article by miguel-ángel garcía-madurga and miguel-ángel esteban-navarro entitled “a project management approach to competitive intelligence” examines the relationship between competitive intelligence (ci) and project management (pm). the article by mouhib alnoukari is entitled “an examination of the organizational impact of business intelligence and big data based on management theory”. according to a literature analysis done by the authors, both the dynamic capability view and resource based theory are the most dominant organizational theories that have been used to investigate bi & bd related issues. the article by stefan zwerenz is entitled “the linkage between competitive intelligence and competitive advantage in emerging market business a case in the commercial vehicle industry”. the results of this case help businesses to improve ci, its constructs, its products and process for a better linkage to competitive advantage and firm performance. the last two articles are related to accounting. the article by phan thi bao quyen and nguyen phong nguyen entitled “the impact of perceived accounting benefits on the enterprise resource planning success: the mediating role of effective system use” studies the accounting benefits of adopting erp systems. the authors conclude that there is support for perceived accounting benefits of erp systems on enterprise success. they also argue that this conclusion is supported by effective system use. the article by muhammad ikbala, irwansyaha irwansyaha, ardi pamintob, yana ulfaha, and dio caisar darmac entitled “financial intelligence: financial statement fraud in indonesia” deals with the problem of financial fraud in indonesia. the results of the non-parametric relationship analysis show that although there is a possibility that the more experienced the auditor will be the more able to detect fraud and manipulation in the organization, the relationship is relatively weak. findings also show that all auditors who have a cfe certificate find it easier to find fraud in the company. with this issue jisib celebrates 10 years of publications. during the first years it was difficult to get enough quality articles for every issue, but now we get interesting and relevant articles submitted every week and reject more than 80%. as always, we would above all like to thank the authors for their contributions to this issue of jisib. thanks to dr. allison perrigo for reviewing english grammar and helping with layout design for all articles. take care in these strange times when a new virus, covid-19, is ravaging the planet. on behalf of the editorial board, sincerely yours, prof. dr. klaus solberg søilen halmstad university, sweden editor-in-chief copyright © 2020 jisib, halmstad university. all rights reserved. o p i n i o n s e c t i o n 51 patents used by npe as an open information system in web 2.0 – two mini case studies abdelkader baaziz 1 , luc quoniam 2 1 aix-marseille university, france 2 university of sud toulon var, france email: kbaaziz@gmail.com, mail@quoniam.info received september 23, accepted november 1 2014 abstract: the information systems around patents are complex, their study coupled with a creative vision of “out of the box”, overcomes the strict basic functions of the patent. we have, on several occasions, guiding research around the patent solely-based on information, since the writing of new patents; invalidation of existing patents, the creation of value-added information and their links to other information systems. the traditional r&d based on heavy investments is one type of technology transfer. but, patent information is also, another powerful tool of technology transfer, innovation and creativity. indeed, conduct research on the patent, from an academic viewpoint, although not always focusing only on financial revenue, can be considered as a form of “non practicing entities” (npe) activity, called rightly or wrongly “patent trolls”. we'll see why the term “patent troll” for this activity is controversial and inappropriate. the research we will describe in this paper falls within this context. we show two case studies of efficient use of patent information in emerging countries, the first concern the pharmaceutical industry in brazil and the second, the oil industry in algeria. keywords: open information system; open data sources; knowledge database discovery (kdd); patent information; patent invalidation; patent troll; non practicing entities (npe); reverse engineering. available for free online at https://ojs.hh.se/ journal of intelligence studies in business vol 4, no 2 (2014) 51-60 mailto:kbaaziz@gmail.com https://ojs.hh.se/ o p i n i o n s e c t i o n 29 1.0 introduction “whoever finds what he seeks, he has done generally a good job as a schoolboy, focusing on what he wants, he often neglects the signs, sometimes small, that bring something over than the object of his forecasts. the true researcher must pay attention to signs that reveal the existence of phenomenon that he does not expect.” (1) this quote (freely translated) of the french physicist louis leprince-ringuet (1957) shows perfectly the research that can be conducted on open data and particularly on “patent” information. the information systems around the patents are complex, their study is coupled with a creative vision of “out of the box” (swinner & briet, 2004), overcomes the strict basic functions of the patent. we have, on several occasions, guiding research around the patent since the writing of new patents, invalidation of existing patents, the creation of value-added information and their links to other information systems (quoniam, 2013). the patent is undeniably one of the more important tools of technology transfer, innovation and creativity. indeed, talking about patent is talking about research & development (r&d). however r&d without marketing is expensive. marketing is also expensive, where the needed steps of “licensing” are worth to dispense with r&d or marketing. this is one kind of technology transfer. but “generic”, “public domain”, “open data” and “reverse engineering” are other forms of technology transfer, without necessarily financial reward. thinking that way is looking at the patent with other eyes (quoniam, 2013). those who act in this manner are called rightly or wrongly, “patent trolls” or, in less pejorative term “non practicing entities (npe)”. 2.0 patent trolls & non practicing entities a non practicing entity (npe) is a person or company that amasses patent rights. the patents typically belong to a single technological field, or a grouping of related technologies. the npe does not practice the patents, meaning that the npe does not 1 louis leprince-ringet in “des atomes et des homes”, fayard, paris, 1957, page 57. produce any goods or provide any services based on the patents rights that are held (halt & al., 2014). a patent troll is defined as one type of npe. patent trolls use the licensing and patent litigation as a business model (quoniam, 2013). they purchase large numbers of patents, often from bankrupt firms, with the intention of launching patent infringement suits against companies and individuals that they maintain have illegally used some element of something for which they hold the patent. a highly publicized case was that of research in motion (rim), manufacturer of blackberry mobile phones, which was ordered to pay $ 612.5 million to new technology products (ntp) to stop the litigation instigated to the courts. however, patent trolling is not a new phenomenon. already in 1878, senator issac christiancy seemed to have patent trolling in mind. he rightly noted: “among a host of dormant patents, some will be found which contain some new principle … which the inventor, however, had failed to render of any use in his own invention. and some other inventor, ignorant that such a principle had been discovered . . . had the genius to render it of great practical value … the patent-sharks among the legal profession, always on the watch for such cases, go to the first patentee and, for a song, procure an assignment of his useless patent, and at once proceed to levy blackmail upon the inventor of the valuable patent.” (2) in fact, the term “patent troll” appeared in the late 1990s and was used at least once in 1993 with a different meaning, to describe countries that file aggressive patent lawsuits. excessive patent protection by the big firms may hamper further innovation, especially when they limit access to essential knowledge, as in the case of emerging technological fields. in this context, too broad a protection on basic inventions can discourage follow-on inventors if the holder of a patent for an essential technology refuses access to 2 as quoted in gerard n. magliocca, blackberries and barnyards: patent trolls and the perils of innovation (2007), notre dame law review, june 2007. available online: http://ssrn.com/abstract=921252. o p i n i o n s e c t i o n 53 others under reasonable conditions. this concern was often expressed for new technologies in the fields of genetics and software (oecd, 2004). 3.0 “the good, the bad and the ugly” conduct research on patents, from an academic viewpoint, although not always focusing on financial revenue, can be considered as a form of npe activity (quoniam, 2013). the research that we will describe in this paper falls within this context. we'll see why the term “patent troll” for this activity is controversial and inappropriate: first, this activity may be described as "soft research and development" because it relates to innovation i.e., conducting r&d, discovering and creating new knowledge without the traditional r&d laboratories, but solely from the information available in open data sources including the patent databases; second, from research based solely on the information, it can lead us to invalidate existing patents or write new patents in a given technical field; third, this research could be described as research social responsibility (rsr), with legal and legalistic action, similar to corporate social responsibility (csr) activities for academic research; fourth, it refers to an unconventional form of thinking “out of the box” by setting strong links between “hard technologies” and “soft technologies” (jin, 2005), and establishing transitions from one to the other and vice versa, based on open data sources and patent information. shrek, a good friendly ogre and famous in the movies industry, has supplanted all the bad ogres and other ugly trolls of medieval legends. this caricatured picture illustrates the differences between the forcing exerted by the bad ogres (the big firms that create barriers to innovation), the blackmail used by ugly patent trolls in the common sense of the term (licensing with purely financial goal), and actions taken by the good patent trolls (technology transfer mediator, knowledge disseminator and know-how sharer). we therefore suggest a new term for naming the good trolls, why not patent robin-hoods? 4.0 conceptual frameworks and foundations intellectual property consists of two parts: copyright and industrial property rights. the latter includes inventions (patents), trademarks, industrial designs and indications of geographical origin. the relationship between intellectual property and economic development is obvious and has been the subject of many publications. it is part of the tangible manifestations of intangible activities related to “knowledge societies” (binde, 2005). in industrial property, patent plays a key role, by its strategic importance as it represents a property right for an invention, for a product or process that provides a new technical solution to solve a problem. the conditions for obtaining such ownership, conditions of validity of these rights and how to enforce them, are described in the literature (quoniam, 2013). we are interested here in a patent from a strictly informational viewpoint and opportunities for exploitation thereof for purposes other than strict property rights. the patent is seen as a way to communicate to the market purely technical and technological research. we show that the patent can be a way to conduct research, well beyond strict technical research. it allows you to work on many fields related to “soft technologies” (jin, 2005) and put into perspective the evolution of “hard technologies” to “soft technologies”. 5.0 criticism of maslow’s model (1943) & aziz ungku’s model (1983) o p i n i o n s e c t i o n 54 fig. 1. maslow’s pyramid (1943) fig. 2. ungku aziz’s pyramid (1983) the main criticism of maslow's model is based on the assumption that the individual pass from one level to another only once he has satisfied the needs of lower level, yet every human being does not necessarily have this mode of prioritization of needs, not in his personal or professional life. observations in organization show inversion or coexistence of levels. also, maslow's model cannot explain the lack of motivation. thus, according to this model, it‘s not possible to do a good job with a small salary. conversely, an excellent salary does not guarantee a strong motivation. in our humble opinion, the same main criticism is opposable to the aziz’s model. this means that the organization pass from one stage to another only once satisfied with the requirements of a lower stage. each of the stages of technological evolution considered as a prerequisite to the successful realization of the preceding stage. thus, according to this model, there is no way of jumping straight into the higher stages and bypassing the earlier preparatory stages (idris, 2000). using patent information integrated in information systems field, we demonstrate the invalidity of these models. in “the creative evolution”, the french philosopher henri bergson (1907) defines the concept of “homo faber” as (freely translated): “… intelligence, in its original sense, is the faculty of creating artificial objects, especially tools to make tools, and to vary indefinitely its makings.” (3) this approach applies to patents and was adopted by the world intellectual property office (wipo) which accurately describes the ultimate stage of technological development as defined by ungku aziz (idris, 2000; idris, 2003): “the sixth stage consists in learning to make machines that produce machines, as well as learning to innovate and being ready to approach the frontiers of modern technology in such fields as computers, robotics and biotechnology, using energy and raw materials without causing irreparable damage to the environment, and becoming an exporter of high technology products. the intellectual property system is already integrated into r&d activities.” (4) 3 henri bergson in “l’évolution créatrice”, p. 100, originally published in 1907. les presses universitaires de france, 1959, available online: http://classiques.uqac.ca/classiques/bergson_henri/e volution_creatrice/evolution_creatrice.html 4 ungku aziz, “must patterns of change in developing countries follow the west? what other possible patterns?” in technological innovation: universities of the commonwealth, birmingham (august 1983). cited by kamil idris (wipo) in “a brochure on intellectual property rights for self-actualisation self-esteem love, affection & belongingness safety physiological or survival construct machines that produce others. innovate skills to support the entire production for the local needs adapt imported techniques & organization to local context repair & replace imported technology learn technical maintenance & repair handle & use simple imported machines http://classiques.uqac.ca/classiques/bergson_henri/evolution_creatrice/evolution_creatrice.html http://classiques.uqac.ca/classiques/bergson_henri/evolution_creatrice/evolution_creatrice.html o p i n i o n s e c t i o n 55 “tool to make tools transform its environment, shapes it with his feeling and his hands”. this brings us closer to the concept of “stigmergy” (5) , addressed by charles victor boutet for the information sciences in light of the web 2.0 (boutet, 2011), and defined as a form of selforganization that produces complex, seemingly intelligent structures, without need for any planning, control, or even direct communication between the agents (wikipedia). to use the patent as an object of research, we need to mobilize these concepts to overcome the available tools for the patent analysis and create other tools, to analyze machines that create tools and increase the degree of complexity. the european patent office proposes its base (over 70 million patents) and an application programming interface (api), a tool which has already created many tools but offer to researchers in information systems the ability to create tools to create tools that help understand and transform the environment. the only limit to analysis with the api is our own imagination. it is therefore not necessary to follow all the stages recommended by ungku aziz to reach the ultimate stage. for us, a research activity is situated around the concept of “homo faber”, so as not to confine research activities to the role of passive spectator, without interaction with the society that houses them. it also responds to the need to conduct research into multi-skilled teams. in the field related to patents, it quickly becomes indispensable. we will show along this paper, the contribution of science information, but also knowledge on law of industrial property, analyzed technical field (chemistry, materials, pharmaceuticals, medicine), information technology, corporate social responsibility, sustainable development, innovation, creativity, without being exhaustive, are quickly needed, forcing them to work in multi universities and r&d institutions in african countries”, june 2000, isbn 92-805-1097-7 5 the term "stigmergy" was introduced by french biologist pierre-paul grassé in 1959 to refer to termite behavior. he defined it as stimulation of workers by the performance they have achieved, and captures the notion that an agent’s actions leave signs in the environment, signs that it and other agent’s sense and that determine and incite their subsequent actions (wikipedia). skilled teams, which often justifies multi-author approaches in the literature. 6.0 patent information as open information system the international patent classification is a unique system to show technology. each patent must be described in it. as a corollary everything "patentable" is described by it. it was set-in place by the strasbourg agreement concerning the international patent classification of march 24, 1971, amended september 28, 1979. ipc was developed in two “official languages: french and english”, divides technology into eight sections with approximately 70,000 subdivisions described by symbols. this classification is useful to search on patent documents in the context of research on the “state of art”. a patent database, free and freely accessible online, allows to do research in this classification. thesaurus allows browsing in the classification with 22798 english keywords and 25676 french keywords. ipc is the core of an interface between different languages for describing “patentable subject matter”. it is the means to see what is patented around a subject matter in another language without knowing the language. it can also enable quick dialogue between experts communicating in different languages, in the same field. generalizing a little more, it is technically possible to describe an entire problematic. this is the case of the green inventory according to ipc, developed by the experts committee of ipc union based on climate change mitigation technologies (ccmts) in order to facilitate the search for information on patents related to environment technology. this green inventory was built with a list of terms established by the united nations framework convention on climate change (unfccc). this application is proof of using ipc as a pivot system between societal and environmental issues and their declination to industrial realities, providing tracks of application into the market realities of societal evolution as “sustainable development” or “corporate social responsibility”. this is also a crossing point between “hard technologies” and “soft technologies”. o p i n i o n s e c t i o n 56 fig. 3. patenting activity is taking off in several green-tech sectors. (source: wipo, 2014). this example is adaptable to many other sectors. it could be an investigation framework of reconciliation between public and private sectors, in order to search funding under development based on the “triple helix” model (etzkowitz, 2008) where synergies “government research private sector” are sought. during his study of the bibliography of a theses sample (586 from brazil and 580 from u.s.) in the field related to technology research, juliana ravaschio found only 15% of theses that have patent citations (ravaschio, 2010). this result shows the lack on “patent” knowledge in the academic world. lack in part, due to the use of different vocabularies and concepts, cleavage of communication. it was on this ground that the research “automatic mapping of scientific and technical bibliographies databanks using the international patent classification (ipc): contribution to the rapprochement between sciences and technology” was developed by pascal faucompré. this research considers the ipc as a pivot system with keywords for indexing scientific databases, has set glances descriptions of academic research with an industrial description of these research (faucompré, 1997). a patent granted is legally valid at a given period. beyond this period, the patent becomes invalid. wanise barroso (2003), a patent examiner in the patent office in brazil upon completion of her research, worked on the subject. she proposed the creation of a sub-base of this patent office, containing only “public domain patents” for distribution to smes in order to facilitate technology transfer. this was possible by querying the database on the field which informed the legal status of the patent. she showed that more than 30% of the brazilian patent base became in public domain in 5-6 years and around 40% of the base was in public domain which may be used freely as technological support, since applications patent must be written to be able to reproduce what is claimed. if we assume on equal proportions in other available databases, would bring to 28 million, the number of available patents in full text and freely “reusable” in the world as “technical and technological encyclopedia”. this number does not include the geography to the territory for which it was filed and paid patent rights. although having no precise estimate, the number becomes really significant. this fact can be used systematically to try for example to develop natural products or to add value to them. there is a source of development assistance, regardless of the country. at least it represents a source of inspiration and creativity almost without limit. indeed, the free use of a patent is legal from the moment it falls into the public domain or is invalidated by the courts. technology disclosed in a patent document may be in the public domain if: o p i n i o n s e c t i o n 57 the patent application has not been filed in a given country; the patent has not been granted; the patent term has expired, or the patent has not been renewed; the disclosed information is not covered by the claims. in any case, the information is always in the public domain. according to karnik (2008), the strategies for the invalidation of a patent which are followed by attorneys in the judicial courts are: invention claimed in the patent is not novel; subject of the claim of the patent is not an invention; patent was wrongfully obtained by a person other than the person entitled; insufficient disclosure of the invention; obviousness; the claims included in the patent are not fully substantiated by the description provided; failure to disclose information relating to foreign applications; principle of “first to file – first to invent”; patent holder did not exercise diligence in pursuing the patent application process (patent grace period). 7.0 patent information as knowledge database discovery to respond to this problematic: “how to find substances that interact with all the symptoms of a disease without anyone had made the relationship between these substances and disease?” jean dominique pierret (pierret, 2006; pierret & al., 2010) conducted research on “methodology and structure of a knowledge discovery tool based on the biomedical literature”. this research led to filing four new patents based on new medical indications of molecules previously patented in order to reach the market. this proves that it is even possible to “invent” and “patent” by a recombination of existing knowledge on technical documentary barely developed. this kind of methodology could be generalized to materials, processes, etc. the experience of jean dominique pierret is to our knowledge, the first creation of “patentable subject matter” starting from documentary research. to go further in this field it will be necessary again to use the concept of “homo faber” to improve document interfaces to systematize this kind of queries. the methodology called “diseases physiopathology molecules (dpm)” is part of methods grouped under the term “knowledge database discovery (kdd)”. this is indeed, weak signals which pierret (2006) attempted to show through the kdd process. the results are spectacular as they allowed jean-dominique pierret and his colleagues of galderma r&d, to file five (05) new patents based only on information: titles publication numbers publication date use of a dipyridyl compound for treating rosacea us20120322829-a1, ca2782048-a1, ep2506851-a1, wo2011064508-a1 20/12/2012 administration of tropisetron for treating inflammatory skin diseases/disorders us2009048289-a1, ca2644458-a1, ep1993542-a1, wo2007099069-a1 19/02/2009 use of azasetron for the treatment of rosacea, and pharmaceutical compositions wo2007138234-a1 06/12/2007 use of zatosetron for the treatment of rosacea, and pharmaceutical compositions wo2007138233-a3, wo2007138233-a2 06/12/2007 use of granisetron for the treatment of sub-types of rosacea, and pharmaceutical compositions wo2007138232-a3, wo2007138232-a 06/12/2007 table 1. patents list filed by galderma r&d based on pierret’s works o p i n i o n s e c t i o n 58 8.0 case studies: proof by doing “i hear and i forget. i see and i remember. i do and i understand.” confucius, chinese philosopher (551 bc 479 bc) 8.1 the tenofovir case study (health / medicine fields) the federal constitution of brazil establishes, in article 196, that health is a right of all and that it is the duty of the state to do this right to be guaranteed. this constitutional right is regulated by a 1990 law that, among other regulates the unified health system (uhs) to ensure full therapeutic assistance, including pharmaceutical assistance (miguel & al., 2010). the cost of this legal provisions exceed r $ 1.4 billion (580 million €), with a number of pharmaceutical products distributed evolving from 15 in 1993 to 243 in 2007 (carias & al., 2011). brazilian scientists were early interested in this (2003), using information systems to find ways in order to contain costs (barroso & al., 2004) by a joint team of brazilian and french researchers. they were interested in the tenofovir case and they filed an opposition on patent application in conjunction with a research team in india for the antiretroviral used in the treatment of aids (barroso & al., 2010). the patent was invalidated and the implications of the research disclosed in the press (6) . it was important to manufacture this drug in a generic form, at significantly lower costs (50%), so more patients treated by the free health system and more released resources (r$ 110 million saving in 4 6 various press: “blanver entrega ao governo os primeiros lotes de genérico contra aids” in “tribuna da bahia online”, available online: http://www.tribunadabahia.com.br/news.php?id atual=81752 , may 2011. “sida: le prix des médicaments baisse dans les pays pauvres” in « le figaro.fr », available online: http://sante.lefigaro.fr/actualite/2011/07/12/110 13-sida-prix-medicaments-baisse-dans-payspauvres , july 2011. “funed produzirá genérico contra aids” in “o reporter”, available online: http://www.oreporter.com/detalhes.php?id=402 02 , february 2011. years) could be allocated for other types of free health access. “for the first time, aids patients in developing countries will have access to the same drugs as those living in rich countries”, says philippe douste-blazy, unitaid director. this research, conducted without any funding since the financing was refused in france by the national agency for research on aids and viral hepatitis (believing that the research does not lead), was awarded an innovation prize in brazil (quoniam, 2010). 8.2 drill-bit design case study (mechanical engineering / oil & gas fields) this work conducted on behalf of an algerian stateowned firm specialized in drilling tools manufacturing, led to a publication that shows the innovation opportunities offered by the use of reverse engineering combined with patent information in the oil & gas industry. a case study of drill bits design and optimization for oilfield drilling was proposed with outlining a parallel cognitive process associated to the technical process of reverse engineering (baaziz & al., 2014). the results of this work is a significant performance achieved during drilling operation of 12 ¼ section of brnp#1, an exploration oil well located in berkine east basin. on may 2014, the pdc tool 12 ¼ diameter, designed by the engineering team according to the process described above, has achieved this performance by drilling 769 meters in less than 34 hours and the rate of penetration (rop) has approached the threshold of 23 meters per hour and peaked at 22,92 m/h without additions (connection). this is the best performance to date for such tools in berkine basin area. the tool wear parameters were acceptable given the performance achieved which allowed to the client to reduce non-productive time (npt) and costs of drilling operations. this study had multiple benefits for the firm and its client and, following the performance achieved: the used pdc tool is in its third remodelling (repair), which represents a saving of 40% of the price of a new drill bit; cost savings for the client are of the order of usd 137,000.00 for 12¼ phase; time recovery is over three days of drilling. this study identified 7259 patents on the matter “drill bit” for the period from 1907 to 2013 http://www.quotationspage.com/quotes/confucius/ http://www.tribunadabahia.com.br/news.php?idatual=81752 http://www.tribunadabahia.com.br/news.php?idatual=81752 http://sante.lefigaro.fr/actualite/2011/07/12/11013-sida-prix-medicaments-baisse-dans-pays-pauvres http://sante.lefigaro.fr/actualite/2011/07/12/11013-sida-prix-medicaments-baisse-dans-pays-pauvres http://sante.lefigaro.fr/actualite/2011/07/12/11013-sida-prix-medicaments-baisse-dans-pays-pauvres http://www.oreporter.com/detalhes.php?id=40202 http://www.oreporter.com/detalhes.php?id=40202 o p i n i o n s e c t i o n 59 including 2442 patents fallen into the public domain due to expiration of the protection period. baaziz & al. (2014) have rightly noted that it is interesting to verify the legal status of the patent legacy of firms currently being acquired or merged. this information can be verified by looking inpadoc legal status of patents. indeed, the successive mergers and acquisitions incurred by the firms may generate dysfunctions in the intangible assets management. patents can fall into the public domain due to these legal flaws. 9.0 conclusion this paper gives two examples from the field of information systems. it is for readers who would be interested to evoke new insights in patent matter and reciprocally, who in the field of industrial property would like to gain a deeper understanding of what could bring him the prism of information systems. it is also a plea for those who believe that there are alternative voices for technology transfer and innovation in both developed and developing countries through the use of patent information. we’ve tried to demonstrate the usability of patent matter as a field of research in information systems, by restricting around research experience and research directions that we may have in this field. it is obvious that given the vastness of the subject and its interconnections, it is not treated exhaustively here. the integration of patent studies in information systems field had the potential to support a development strategy that burns stages and borrows shortcuts in order to avoid heavy investments like “hard r&d” processes. this contributes to reduce the gap between developed countries and developing countries. looking to the future, it seems that the possibilities of burning stages are even more promising through the opportunities offered by web 2.0 technologies, which facilitate the flow of information. many constraints of time and distance are abolished due to the variety of “open” formats used to disseminate knowledge and create links between researchers and professionals. references baaziz, abdelkader; quoniam, luc ; khoudi, abdenacer (2014), « l’information brevet au service de l’industrie pétrolière : cas de conception et optimisation des trépans par reverse engineering », accepted paper @ journal of information systems and technology management (jistem), sao-paulo (br), issn 18071775, 2014 barroso, wanise b. g. (2003), « elaboration et mise à disposition d’une base de données de documents de brevet tombés dans le domaine public », université du sud toulon-var (fr), ph.d. thesis, 2003. barroso, wanise b. g.; amaral, luciene; quoniam, luc; faria, leandro i. l.; penna, ely; queyras, joachim (2004), « elaboration d’une base de données de médicaments pour faciliter la prise de décisions », vsst-2004: toulouse (fr), dousset bernard (ed.), 2004 – isbn 2952032653. barroso, wanise b. g.; queyras, joachim (2010), « propriété industrielle : arme de la compétitivité 2.0, le cas du tenofovir », quoniam, l. ; lucien, a. ; papy, f (ed.), « intelligence compétitive 2.0, traité des sciences et techniques de l’information », hermès-lavoisier: paris (fr), 2010 – isbn 978-2-7462-2366-0. bergson, henry (1907), “l’évolution créatrice”, originally published in 1907. les presses universitaires de france, 1959. available online: http://classiques.uqac.ca/classiques/bergson_he nri/evolution_creatrice/evolution_creatrice.html binde, jérôme (2005), « vers les sociétés du savoir », unesco: paris (fr), 2005 – isbn 92-3-204000-x. available online: http://unesdoc.unesco.org/images/0014/001419/ 141907f.pdf boutet, charles victor (2011), « le cycle de l’information en intelligence économique, à la lumière du web 2.0 », université du sud toulon-var (fr), ph.d. thesis, 2011. carias, claudia m.; vieira, fabiola s.; giordano, carlos v.; zucchi, paola (2011), “exceptional circumstance drug dispensing: history and expenditures of the brazilian ministry of health”, revista de saúde pública, vol. 45, 2, april 2011. etzkowitz, henry (2008), “the triple helix: university-industry-government innovation in action”, taylor & francis (ed.): londres (uk), february 2008 – isbn 9780415964500. http://classiques.uqac.ca/classiques/bergson_henri/evolution_creatrice/evolution_creatrice.html http://classiques.uqac.ca/classiques/bergson_henri/evolution_creatrice/evolution_creatrice.html http://unesdoc.unesco.org/images/0014/001419/141907f.pdf http://unesdoc.unesco.org/images/0014/001419/141907f.pdf o p i n i o n s e c t i o n 60 faucompre, pascal (1997), « la mise en correspondance automatique de banques de données bibliographiques scientifiques et techniques à l’aide de la classification internationale des brevets : contribution au rapprochement de la science et de la technologie », aix-marseille university (fr), ph.d. thesis, octobre 1997. halt, gerald b. jr.; fesnak, robert; donch, john c.; stiles, amber r. (2014), “nonpracticing entities”, chapter of “intellectual property in consumer electronics, software and technology startups”, springer, new york (usa), 2014 – doi: 10.1007/978-1-46147912-3_20, print isbn: 978-1-4614-7911-6, online isbn: 978-1-4614-7912-3. idris, kamil (2003), “intellectual property: a power tool for economic growth”, wipo: geneva (ch), 2003 – isbn 9280511130. idris, kamil (2000), “a brochure on intellectual property rights for universities and r&d institutions in african countries”, wipo: geneva (ch), 2000 – isbn 92-805-1097-7. jin, zhouying (2005), “global technological change: from hard technology to soft technology”, intellect (uk), january 2005 – isbn 1841501247. karnik, kuldeep d. (2008), “methods for patent invalidation”, august 2008, available online: http://ezinearticles.com/?methods-for-patentinvalidation&id=1386769 meredith, william (2009), “using patent information for policy and business analysis”, wipo: geneva (ch), 2009. available online: http://www.wipo.int/edocs/mdocs/pct/en/wipo_ pct_nbo_09/wipo_pct_nbo_09_www_121096.p pt miguel do nascimento junior, josé; fernandes alexandre, r. f. (2010), “da excepcionalidade às linhas de cuidado: o componente especializado da assistência farmacêutica”, série b. textos básicos de saúde. secretaria de ciência., tecnologia e insumos estratégicos departamento de assistência famacêutica e insumos estratégicos. ed. ministério da saúde: brasilia (br), 2010 – isbn 978-85-334-17458. available online : http://portal.saude.gov.br/portal/arquivos/pdf/da _excepcionalidade_as_linhas_de_cuidado_o_ce af.pdf oecd (2004), “patents and innovations: trends and policy challenges”, organization for economic co-operation and development, 2004. available online: http://www.oecd.org/science/scitech/24508541.pdf pierret, jean-dominique; dolfi, fabrizio (2010), « innovation, sérendipité 2.0, dépôt de brevets à partir de l’exploration de la littérature biomédicale », quoniam, l. ; lucien, a. ; papy, f (ed.), « intelligence compétitive 2.0, traité des sciences et techniques de l’information », hermès-lavoisier: paris (fr), 2010 – isbn 978-2-7462-2366-0. pierret, jean-dominique (2006), « méthodologie et structuration d’un outil de découverte de connaissances basé sur la littérature biomédicale : une application basée sur l’exploitation du mesh », université du sud toulon-var (fr), ph.d. thesis, february 2006. quoniam, luc (2013), « brevets comme outil d’innovation, de créativité et de transfert technologique dans les pays en voie de développement », 9èmes journées scientifiques et techniques (jst’9) : oran (dz), april 2013. quoniam, luc (2010), « oposições a pedidos de patente de medicamentos », concurso inovaçao na gestao publica federal, escola nacional de administraçao publica; brasilia, brasil, wanise barroso (coord.), 2010 ravaschio, juliana; faria, leandro; quoniam, luc (2010), « o uso de patentes como fonte de informação em dissertações e teses de engenharia química: o caso da unicamp », revista digital de biblioteconomia e ciência da informação, vol. 7, 2, p. 219-232, march 2010. ringuet-le prince, louis (1957), « des atomes et des hommes », fayard : paris (fr), 1957. swiners, jean-louis; briet, jean-michel (2004), « l’intelligence créative : au-delà du brainstorming, innover en équipe », maxima: paris (fr), june 2004 – isbn 2840013851. wipo (2014), “renewable energy: new study shows patenting growth”, wipo: geneva (ch), june 2014, available online: http://www.wipo.int/pressroom/en/stories/green _tech.html. see also: https://webaccess.wipo.int/green/ http://rd.springer.com/search?facet-author=%22gerald+b.+halt+jr.%22 http://rd.springer.com/search?facet-author=%22robert+fesnak%22 http://rd.springer.com/search?facet-author=%22john+c.+donch%22 http://rd.springer.com/search?facet-author=%22amber+r.+stiles%22 http://rd.springer.com/book/10.1007/978-1-4614-7912-3 http://rd.springer.com/book/10.1007/978-1-4614-7912-3 http://rd.springer.com/book/10.1007/978-1-4614-7912-3 http://ezinearticles.com/?methods-for-patent-invalidation&id=1386769 http://ezinearticles.com/?methods-for-patent-invalidation&id=1386769 http://www.wipo.int/edocs/mdocs/pct/en/wipo_pct_nbo_09/wipo_pct_nbo_09_www_121096.ppt http://www.wipo.int/edocs/mdocs/pct/en/wipo_pct_nbo_09/wipo_pct_nbo_09_www_121096.ppt http://www.wipo.int/edocs/mdocs/pct/en/wipo_pct_nbo_09/wipo_pct_nbo_09_www_121096.ppt http://portal.saude.gov.br/portal/arquivos/pdf/da_excepcionalidade_as_linhas_de_cuidado_o_ceaf.pdf http://portal.saude.gov.br/portal/arquivos/pdf/da_excepcionalidade_as_linhas_de_cuidado_o_ceaf.pdf http://portal.saude.gov.br/portal/arquivos/pdf/da_excepcionalidade_as_linhas_de_cuidado_o_ceaf.pdf http://www.oecd.org/science/sci-tech/24508541.pdf http://www.oecd.org/science/sci-tech/24508541.pdf http://www.wipo.int/pressroom/en/stories/green_tech.html http://www.wipo.int/pressroom/en/stories/green_tech.html https://webaccess.wipo.int/green/ knowledge and social networks: new dimensions of economic interaction between firms michael steiner * and michael ploder ** * university of graz, department of economics, universitätsstr. 15 f/4, 8010 graz, austria ** joanneum research, institute of technology and regional policy, elisabethstr. 20, 8010 graz, austria michael.steiner@uni-graz.at michael.ploder@joanneum.at received 20 august 2011; received in revised form 20 november 2011; accepted 29 december 2011 abstract: the paper explores the form and content of economic interaction of firms based on various concepts of agglomeration and social networks. it uses a case study of the machinery sector in the region of styria as empirical background. starting with types of clustering – the model of pure agglomeration, the industrial-complex model and the social-network model the paper argues that certain geographical agglomerations allow different types of networks and different patterns of behaviour. thus different forms of learning, knowledge sharing and knowledge creation. some “stylized facts” in support of this perspective are derived from an analysis of a regional network. this network comprises individualistic open systems consisting of several areas which overlap. physical linkages between these networks are weak, but intersections based on cooperative r&d and r&d infrastructure, qualification and informal exchanges are evident. from a regional perspective it can be seen to dominate. despite evident sectoral concentrations direct links to the prevailing science base appear more significant as binding factors than long term supplier networks. these relationships are interpreted in terms of their need for proximity, their durability and above all their direction of knowledge dependency. keywords: agglomeration, knowledge transfer, social networks, co-evolutionary development available for free online at https://ojs.hh.se/ journal of intelligence studies in business 1 (2011) 49-60 mailto:michael.steiner@uni-graz.at mailto:michael.ploder@joanneum.at https://ojs.hh.se/ 50 1. introduction while we are well aware that it is most likely impossible to provide one single theory of clusters and their networks there is nevertheless a certain consensus that several elements of specific theories may help us understand their forms and functions. they offer a certain unity of approach in identifying the important elements which are needed for explaining the changing character of the innovation process. recent debate has begun to focus more on how far, and in which ways, clusters foster knowledge creation and organizational learning. it has also emphasized the organic-evolutionary dimension of cluster-based industrial agglomerations. knowledge has been recognized as a major source of competitive advantage in an increasingly integrated world economy (dosi and malerba 1996, grant 1996, foss 1999, nonaka et al. 2000). the most successful regions are perceived to be those whose firms display innovative capacity, i. e. those whose firms are able to adapt to a rapidly changing marketplace and stay one step ahead of competitors. the emphasis of cluster interpretation has changed from an analysis of forces of agglomeration to the various forms and contents of organizational learning and knowledge exchange. the original concentration on clusters as mere geographic concentrations of sectors and firms has been transformed into a search for institutions for knowledge management and organizational learning emphasizing the organic-evolutionary dimension. growth of the knowledge base depends on intended and unintended individual processing of experiences. i.e. ‘learning’, while the interpretation, transfer and use of experiences is influenced by interaction between individuals and between organizations (cohen and levinthal 1989, andersen 1995, hartmann 2006). these insights have shifted the emphasis from material links to immaterial knowledge flows within clusters. they have also pointed to the need for connectivity between different agents concerning knowledge creation and diffusion. this has led to further questions concerning the degree to which clusters are to be regarded as non-market devices, by which firms may seek to coordinate their activities with other firms and knowledge-generating institutions. ongoing learning processes between firms and within clusters stress the importance of institutional arrangements for the generation of knowledge and learning networks which are not available in markets (maskell and malmberg 1999). since the necessary knowledge may lie outside a firm’s traditional core competence, interfirm alliances and networks are widely recognized as an important organization form of innovative activity (gay and dousset 2005). in this paper, we emphasize the ideas of agglomeration and knowledge exchange.we discuss to what extent this approach has specific regional or spatial dimensions while focussing on the necessity and forms of proximity, especially with respect to knowledge exchange. by means of network analysis we develop some “stylized facts” for the various dimensions of interaction within a given network of medium-tech firms in styria, one of the nine provinces (regions) of austria. the final section is used to interpret the findings. 2. geographical agglomeration and local networks since marshall (1890), weber (1929) and hoover (1948), many authors have dealt with the phenomenon of geographical agglomeration. in the discussions of ‘clusters’, ‘networks’ and agglomerations, and particularly in those relating to ‘industrial districts’ and agglomerations, there are certain common traits and frequently terms are only weakly differentiated. the basic idea of geographical agglomeration was presented by marshall (1890) and the three sources of economies of agglomeration he mention is input sharing, labor market pooling, and knowledge spillovers, correspond with the core-elements of the current cluster-concept. in this form it has been discussed since the early nineties in industrial countries. a more recent attempt to distinguish various cluster forms has been made by belussi (2006) by contrasting geographical agglomeration and active clustering (as policy or firm-driven strategy). while implicitly focusing on geographical agglomeration and economies of agglomeration we stress a dimension of externalities beyond the tangible dimension of direct co-operation. on extending the basic idea of economies of agglomeration, we see that externalities are widely enforced by informal and non-economic dimensions. amin and thrift (1995) use the term “institutional thickness” to address the existence of a supporting environment beyond firms (institutionalized cooperations and networks). geographic agglomeration (and concentrated versus dispersed location patterns) set a framework for economic interaction and material and immaterial linkages between economic actors. the existence of a cluster doesn’t necessarily imply the coexistence of all defining characteristics of a geographical agglomeration. on the other hand, a geographical agglomeration may also exist in the absence of a cluster or network. while the existence of a pure geographical agglomeration (e.g. a city) favours the development of clusters; growing networks and clusters can also cause the emergence of a geographical 51 agglomeration. this was the case perhaps in silicon valley in california. myrdal’s (1957) idea of cumulative causation corresponds with a dynamic view of a co-evolutionary development of economies of agglomeration and growing clusters (without yet formalizing interdependency as was done by kaldor (1972) and dixon and thirlwall (1975). in other words, additional local linkages and relations strengthen tendencies of concentration and agglomeration. networks and clusters are possible means of overcoming constraints of exchange within and between geographical agglomerations and also facilitate the definition and defence of rules of exclusion, as already pointed out by marshall (1890). yet, what is still an open question is the micro-perspective. economies of agglomeration and dimensions of interaction could be selective in respect to the actors since they regulate the extent to which the latter are able to participate or gain from externalities: e.g. with respect to exchange of physical goods versus r&d, or labour market pools for blue collar workers or engineers. in addition to direct physical exchange, input sharing and common labour market pools, systematic knowledge exchange and knowledge spillovers have gained considerably in importance as an argument for geographical concentrations of activities. a frequently used argument is that the collaborative nature of innovation processes has reinforced tendencies toward geographical clustering because of the advantages of locating in close proximity to other firms in specialized and related industries (storper, 1995 and 1997). transaction costs such as transportation costs and spatial communication costs in particular, reinforce the relationship between individual environment and the development of embedded social networks (granovetter 1994). firms establish a variety of types of interactions and relationships each of them having different impacts on the knowledge generation and diffusion process. mariotti and delbridge (2001) speak of the necessity for firms – in the face of knowledge ambiguity, knowledge related barriers, tacitness and complexity of knowledge to engage in the management of a portfolio of ties. organizations are therefore likely to engage in inter-organizational relations that show a variety of types of ties. they can have quite different dimensions and can be defined according to the character of social relations between actors, the regulation of the relationship, frequency of use, length and duration of the relationship, and also in terms of the nature of the information exchange itself (mariotti and delbridge 2001). it is also important to distinguish between both content (i.e. the type of relation) and the form (i.e. the social structure of relations), as has been outlined by powell and smith-doerr (1994). one additional question that needs to be addressed in this context concerns the legitimacy of a pure micro-level, individual firm approach in analysing the incentives for clustering. individuals and firms alone are, from an economic point of view, not capable of delivering sufficient amounts and varieties of knowledge. we are confronted here with one of “the most troublesome issues in the social sciences …” (felin and foss 2006, 1). the question of the adequate level and unit of analysis. a question of whether the individual or social collectives (firms, networks, regions …) have explanatory primacy is of course part of an old debate in economics, sociology and the philosophy of science and is often now dealt with under the heading of “methodological individualism” versus “methodological collectivism” (hayek 1945, popper 1957, coleman 1964, douglas 1986). further potential for conceptual differentiation relates to the forms, channels and mechanisms of knowledge exchange. as this exchange occurs through interaction, the structure of the interaction therefore influences the extent of knowledge diffusion (gay and dousset 2005). this coincides within the view that “spatialities and temporalities are not neutral frames, but constitutive elements of socioeconomic transformation” (colletis-wahl et al. 2008). the cross-sectoral dimension of knowledge spillovers is also a source of contention in the literature. following marshall (1890) and arrow (1962) knowledge is predominantly industryspecific. knowledge spillovers may therefore arise between firms within the same industry. jacobs (1969), on the other hand, mentioned the significant fact that knowledge may spill over between complementary rather than similar industries. the significance of geographical agglomeration and networking is strongly determined by the particular sector (industry) and the leading technology. there seems to be a clear agreement in the recent literature about cross-sectional differences in agglomeration forces: as has been emphasized by botazzi et al. (2001 and 2002) and also gordon and mccann (2000), huge intersectoral differences in spatial agglomeration outcomes can be identified. following gordon and mccann (2000) agglomeration economies appear particularly relevant in “scale-intensive sectors” hinting at the forms of hierarchical agglomeration discussed above and in “supplier-dominated sectors”. conversely, they appear the least relevant in “science-based” sectors. the importance of agglomeration depends on the prevailing sectoral and technological pattern. the following argumentation takes up two approaches to differentiating typologies and focuses on the different dimensions of agglomeration and 52 clustering viewed as helpful guidelines in the discussion of the network observed in styria and in answering the key-questions of the empirical analysis. an attempt is also made to combine and differentiate the “agglomeration” approach with the additional insights mentioned above. gordon and mccann (2000, 15) define and discuss three theoretical approaches for industrial clustering which reflect different (more or less idealized) perspectives on agglomeration: the model of pure agglomeration, the industrialcomplex model and the social-network model. the phenomenon of economies of agglomeration as an intrinsic motive for clustering, in the sense of spatial concentration of economic activity, is attributed more or less exclusively to the traditional idea of marshallian industrial districts. following in the footsteps of thünen in the field of locational economics, and smith’s idea of division of labour, the model of pure agglomeration – which in the tradition of marshall (1890) is based on a local pool of specialized labour, on the increased local provision of nontraded input specific to an industry, and on technological spill-overs may contribute to an “evolving localized environment of learning” (gordon and mccann 2000, 517). the marshallian approach was quickly developed and extended by hoover (1948) by distinguishing between localization economies and urbanization economies. following marshalls (1890) positive externalities of agglomerations are defined by regional non-traded inputs, knowledge and information spill-overs, and a local pool of skilled labour. from the perspective of knowledge flows and learning processes favoured by agglomeration, such externalities occur more or less unheard of and unseen. knowledge exchange and learning occurs unconsciously via transfer of human or material resources. the most important point seems to be that the approach is not bound to the idea of direct supplyrelationships among the bulk of actors involved. following the traditional idea of marshallian industrial districts, interaction is primarily led by the needs of industrial production. a second group of approaches pooled by gordon and mccann (2000, 517) under the term of industrial complex models systematically tries to justify spatial concentration by the quantification and minimization of spatial transaction costs (reflecting of the origins of the approach, primarily transportation costs). the industrial complex model is associated with cumulative learning from sources inside the industry, non-transferable experience, the role of leading firms and power asymmetries (iammarino and mccann 2005). although the implicit concealment of (unplanned) economies of agglomeration didn’t mean that they were not relevant. attention shifted nevertheless to innovation as an interactive process involving the sharing and the exchange of different forms of knowledge between actors (lawson and lorenz 1999) – knowledge and competence as developed interactively and within subgroups of a (regional) economy (freeman 1979, lundvall 2002). the critique here has been concerned with the question of whether this interaction is an outcome of (neoclassical) rational behaviour or the result of a more ‘associative-relational’ mode of organization, or what has been termed ‘associative governance’, leading to the creation of clubs, forums, consortia and other institutional schemes of partnership (cooke 1998; cooke and morgan 1998). there are elements of knowledge sharing in the sense that adopting the perspective of specific clusters represents a quasi-monopoly for the internalization of the benefits of innovation created within (more or less) “closed club”. the social-network model as the third type – relying on trust and social embeddedness as the dominant link between the cluster firms (and therefore not on deliberate economic decisions based on the minimization of different transaction costs) – also favours the exchange of knowledge. however, such exchange is here based on strong interpersonal relationships that transcend firm boundaries and allow for diverse forms of knowledge sharing. following iammarino and mccann (2005) traditional and recent approaches of social networks may be differentiated. the traditional approach corresponds to the ‘marshall-stimulated’ industrial districts where knowledge is mainly codified and oriented to process innovation transferred by personal contacts and social and political lobbying. while in the traditional approach the network seems to be based on geographical proximity rooted in historical experience, the new approach of social networks seems to be 53 based on relational and organizational proximity. the links between actors are then all the stronger the more they are based on elements of social embeddedness: norms, sets of common assumptions, habits formed by culture, history, and of course (but not necessarily) spatial proximity. they form social capital that favours the explicit and implicit sharing of knowledge. new physical technologies are not just there, innovations do not just happen, but need social technologies as pathways to coordinate human action. as iammarino and mccann (2005) mention, much of the discussion in the literature is based on ideal types, whereas in reality all spatial clusters and industrial agglomerations will contain more or fewer of the above characteristics. furthermore, clusters may mutate from one typology to another. from another perspective this is also outlined by rychen and zimmermann (2008, 768): the concept of cluster “usually considered as a spatial concentration of industrial and technological activities” has to be enriched. “it is more important to understand how and why firms build links and how the structure of links will give sense to the colocation of actors.” it is therefore important to incorporate the dimension of collaboration, the basic conception of firms is a “network-driven economic strategy built on collaboration among the participants” (reid et al. 2008, 2). the following section is dedicated to interpreting the case network investigated in the light of the approaches discussed above. the suppositions that context, typology and significance of geographical agglomerations and embedded networks change, seems to be reflected in the case of the machinery sector in the region of styria. 3. the empirical analysis – a qualitative context oriented approach based on social network analysis the empirical analysis starts with an analysis of relevant regional data and expert interviews and then continues with a case study analysis of the relations of engineering firms in styria. 3.1 interaction in the observed network network analysis is a well established method in the social sciences. recently, the method has also been applied to the analysis of production clusters (krätke 2002), innovative activity and knowledge exchange (giuliani 2005), and alliance networks (gay and dousset 2005) or r&d networks. social network analysis is a helpful tool for discussing the structure of networks since it allows the mapping and measuring of the relationships (communication and transaction) between different actors, i.e., the existence, context and portfolio of relations between actors in a regional network. it is a method for revealing relations between different actors. such relations are phenomena that cannot be reduced to the properties of individual actors or firms themselves and thus need to be interpreted as properties of systems than of individual actors. 3.2 the empirical database the present network analysis is based on an empirical sample of firms identified by a snowballing method of sampling in cluster and network investigation. this corresponds with the relational approach and is developed by means of the references to actors as revealed by previous respondents (frank 1979, scott 2000). our starting point was a large system supplier in the automobile sector located in the region of styria/austria. the snowball method produced firms belonging to different sub-sectors of the manufacturing sector and related supply-chain and innovation-strategies. starting with the initial firm, a sample was developed. following a citation path of regional suppliers (production or commercialization of goods and services) and of regional partners in the field of research and development (cooperative r&d and related activities and exchange). in this way the database for the subsequent network analysis was extended to 23 firms, of which 18 are producers (with different positions in the supply-chain such as system-suppliers, component suppliers and tollmanufacturers). the remaining 5 are technical business services. additionally nine r&d institutions (universities, co-operative r&d institutions) are included. the information and data collected are based on extensive qualitative interviews and supported by a quantitative survey concerning specific data. 3.3 indicators of interaction qualitative indicators revealing individual strategies of innovation are helpful discussing individual strategies and their aggregation at the level of networks. they are selectively used here to find – via network analysis the structural features of the network of 32 actors. the selected indicators of the relations cultivated by the organizations cover three dimensions of interaction: direct delivery relations, r&d, and technological innovation in a competitive and a pre-competitive context. (deliv): the firms were questioned concerning direct delivery relations (goods or services) to clients, suppliers or partners (in the case of synergetic product bundles)..the direct delivery 54 of goods and services is not reduced to the material dimension since it also covers questions of innovation in information management or capacityextending investments. (pre-comp): the dimension of interaction in the context of pre-competitive r&d was also analysed. pre-competitive research and development aim to extend the product spectrum, as well as introduce new processes and alternative materials. pre-competitive research includes fundamental research, which is an activity designed to broaden scientific and technical knowledge not necessarily linked to industrial or commercial objectives, as well as industrial research, i.e. research aimed at developing or improving new or existing products, processes or services in so far as it is also not directly connected with a client tender, offer or an existing business relation. (comp): competitive research and development and innovation processes are short and medium term oriented and mostly associated with direct expectations of return or with a direct tender or offer etc. in contrast to pre-competitive r&d which is long-term oriented. 3.4 structure of the network and network density following the socio-centric approach, the density of a network is given by the ratio of relations realized to the total number of potentially maximum possible relations. we dichotomized the relations in that we only differentiated between existence and non-existence of a relation between two actors [0; 1], and therefore disregarded the intensity of the relations (in our case the frequency of interaction) surveyed. this enabled us to avoid the problems typically associated with the measurement of the intensity of evaluated graphs (scott 2000). network density yields information on the general structure of the network as a whole. one of the core features of an actor identified in network analysis is its centrality. using the concept of centrality (in different forms) we gain insights into the specific features of the interaction of the actors in the network and their specific position and/or embeddedness in the network. while density focuses on the properties and general structure of the network as a whole, centrality tries to capture the position of individual actors or groups of actors within the network. this is again based on the relations revealed by the actors, where the relations are valued ordinally in terms of frequency of interaction. the potential centrality of an actor is determined by a broad range of industry or sectorspecific factors (cohen et al. 2000), by capacity and individual motivation (bayona et al. 2001, theter 2002). a high centrality is positively associated with multiple possibilities for receiving and generating knowledge. keeping in mind that interregional and international relations exist and may be of major priority, e.g. direct delivery relations the analysis below focuses on regional interaction. table 1 presents the density measure for the three dimensions of relations between the actors. relational dimensions density (deliv) direct delivery relations 0.068 (precomp) interaction in the context of precompetitive r&d 0.143 (comp) interaction in the context of competitive r&d and 0.074 table 1: density of the observed dimensions of networking direct delivery relations have the weakest density. although the datasets have been dichotomized and therefore relations with a very low frequency of interaction have been “up-graded” the density of the network of direct delivery relations is lower than the density of knowledge intensive innovationrelated interaction. regional input-output relations were reduced in order to focus attention more on international markets. while competitive r&d and innovation processes, especially in the case of domestic system suppliers, are partially similar in density to direct delivery relations, the regional density of the network in pre-competitive r&d is much higher. r&d institutions are of negligible significance in respect of direct delivery relations, the network is based to a considerable degree on relations with cooperative r&d institutions. the relational data can be used to provide a graphical representation of the transaction network for the organizations observed. while network diagrams offer a traditional and basic methodology for formalizing network analysis, and are a very helpful mean of interpretation and discussion, clarity suffers greatly as the number of actors observed increases. a quite useful method of graphical representation which is implemented in most software packages follows the approach of the kamada and kawai (1989) spring embedding algorithm. this is employed below. 55 gives an overview of all relations recorded and combines the three dimensions discussed above. it also takes into account the valuation of the relations in terms of frequency of interaction. the shape of actors (nodes) corresponds with the different types of organizations. the size of the nodes corresponds with the size of the organisation, and the length of lines corresponds with the distance between the actors observed. figure 1: network of firms and knowledge generating institutions figure 2: legend a further interesting dimension of network analysis is ‘coreness’, which follows basically the idea of core and periphery. here we use the concept of the k-core (seidman 1983, scott 2000). a k-core is a sub-graph in which each actor is adjacent to at least k other actors in the sub-graph. that is, for all nodes in the sub-graph minimum the number of the actors’ direct relations within the sub-graph is k (in our case eight). k-core analysis complements the measurement of density, since the latter is not able to reflect structural features of the network. the kcore is an area of relatively high cohesion. as can be seen at first glance, we can differentiate between those actors in the core of the network (coloured black) and those actors more or less on the periphery of the network (coloured white). the diagram reveals the high density of the realized relations calculated in the previous paragraphs. in the k-core of the diagram we find a group of institutions that seem to interact multilaterally. in the “core” of the network we find r&d institutions, large system suppliers and toll manufacturers (surface-treatment, heating etc.) which maintain multiple but weak relations with a broad range of regional clients. 3.5 spotting a leading firm in the network here we focus on a specific firm, ss 20 in the total network. this is a highly specialized manufacturer who measures equipment for science and industry. their success is based on the direct application and transfer of scientific knowledge gained in the measurement of physical or chemical phenomena. the firm is highly vertically integrated and is embedded in smaller network following niche strategies. the partners of the firm in direct delivery (component and toll-manufacturers) and its partners in competitive and pre-competitive research and development (key clients, highly specialized business services, universities) are not identical. on the delivery side, the observed firm interacts with component suppliers in the field of die casting, spray casting, plastics processing, electronics, sheet metal forming, and manufacturing of high performance glasses. originally, the firm was a pure converter, producer and specialist in marketing. this division of labour has changed since the 1980s. a well established cooperative base allows access to university partners and to an independent research laboratory which provides exclusive science driven r&d. the firm enjoys a relatively high in-degree systems supplier component supplier toll manufacturer technical business services r&dinstitutions systems supplier component supplier toll manufacturer technical business services r&dinstitutions2 1 56 centrality in respect to direct deliveries. the outdegree centrality of the firm in the region, with respect to deliveries, is low owing to the high export intensity. a high share of the turnover is reinvested in r&d activities, 10% for intramural r&d and an additional 10% of the turnover for external r&d. the degree centralities in respect to r&d (precompetitive and competitive) are higher than for the average of the leading firms in the network. the core competences of the firm are based on combining and applying findings from basic research, in precision engineering and electronics. while radical innovations and market novelties mostly emanated from r&d or client-partners, incremental improvements are promoted by internal r&d. r&d and production and marketing of new products are concentrated within the region. as the firm is not located in the core of vehicle manufacturing but in the interface with other sectors such as manufacturing of plastic products or measurement techniques it has a relatively high value for betweenness centrality. the findings for this specific firm serve to strengthen the thesis that firms acting in market niches demanding highly specialized cooperation tend to work for long-term cooperation. 3.6 the historical background and changing role of geographic agglomeration in the medium-technology sector in styria the majority of the observed firms have been in the region for more than 10 years. the current situation and recent developments cannot therefore be adequately analysed without considering the historical background and structural change of the regional industry over the last few decades. in the late 1960s and 1970s the networks in the medium-technology sector were dominated by large state-owned firms that were highly vertically integrated and had lost their headquarter functions to the city of vienna. while supply-side linkages to the region still existed agglomeration took a very limited traditional form. in most cases, planning, r&d and marketing/distribution functions, i.e. those functions responsible for the monitoring of markets and technology, had been lost. clearly observable lock-in effects had let to agglomeration becoming a mere by-product of path-dependence with none of the advantages of agglomeration mentioned by botazzi et al. (2001). against the background of a history of outward dependence and nationalized standardized mass production the traditional indicators used to measure the strength of social networks had become weak. according to iammarino and mccann (2005) social networks exhibit the following characteristics: knowledge is largely codified and mature and mainly oriented to process innovation, transmitted essentially by way of personal contacts; there is extensive social and political lobbying, backward and forward linkages. as far as social networks still existed (e.g. in the machinery and the automobile sector) they became a fruitful base for the restructuring in the 1990s. during the developments of the last few decades the typology of agglomeration and the role of networks have changed considerably. many large firms were re-privatized and downsized at the end of the 1980s. firms thus needed to learn to collaborate and develop their potential for innovation as a strategic resource. this entailed abrupt and long overdue changes from a fordist to a more flexible mode of production. a massive structural change took place, beginning in the 1990s, especially in sectors related to steel production such as mechanical engineering and the automotive industry. high degrees of diversification and broad unspecified clients were replaced by a focus on market niches and technological specialization, while higher lot sizes enabled higher cross-functional integration and raised flexibility by leaving a scope for automation. technological upgrading (including the introduction of quality and measuring standards) opened doors to new clients. this was accompanied by extending their responsibilities for tool making and sourcing capabilities and also by shifting the responsibility for quality and price from clients to suppliers. innovations in these sectors were influenced by applications of specialized knowledge in the field of materials, tooling and processing techniques, or by the need to solve very specific problems in the machinery sector. on the supply side, hierarchical, spatially localized relations were developed. these have been formed around elite r&d-intensive export-oriented large firms. 3.7 human resources and the regional labour market a typical characteristic of agglomerations, in the sense of the model of pure agglomeration mentioned by gordon and mccann (2005), following botazzi et al. (2001) namely, a more or less common labour market pool – was not observed. for the investigated component supplier firms (here in more or less rural and isolated areas) it is still the case that they operate with reference to very local labour markets, binding traditions and a low mobility of employees. small and medium sized supplier firms exhibit family-based traditional structures, sometimes over generations. concerning the qualification structure, there are deep differences between original equipment manufacturers or system-suppliers with r&d units on the one hand, and basic technology providers, 57 extended work-benches or third party subcontractors on the other hand. this is true for both lower as well as high skilled workers, where employee turnover is normally a more or less excepted instrument of knowledge transfer and networking among firms. because of the immobility of the local labour force and the restricted capacity of the regional labour market most of these firms were able to retain keypersonnel and competences and the regionally integrative potential of their personnel. yet, by the same token, this implies only little mobility of qualified personnel coming from europe (for language reasons, predominately from germany). also due to official restrictions labour inflow from the new eu member countries remains limited. 3.8 discriminative capabilities and heterogeneous strategies in the case of r&d and innovation as already mentioned, leading firms do not play a dominant role on the demand side. the broad range of material input-output linkages is directed outward and direct material linkages on the regional level areweak. in fact the opposite seems to be true. in the case of large firms, agglomeration phenomena based on knowledge complementarities (botazzi et al. 2001) seem to be clearly evident. the r&d capacities of the observed firms were highly varied. nearly half of the investigated firms (mostly smes) do not employ permanent r&d staff. the leading firms have intensified r&d activities and formal co-operation with knowledgegenerating institutions since the mid of the 1990s. especially in the case of pre-competitive r&d cooperative publicly supported projects or participation in cooperative r&d institutions has gained an increasing role as a policy measure during the last decade. in respect to knowledge-driven activities, elements of agglomeration phenomena based on knowledge complementarities were observed (following botazzi et al. 2001). these were also in line with the exclusivity characteristics suggested by the industrial complex model (gordon and mccann 2005). the large r&d intensive firms observed here, constantly seek forms of regional pre-competitive r&d cooperation. this may result in the formation of “clubs” (gordon and mccann 2005, cooke 2000) of closer interaction especially in respect of r&d, or in some cases cooperative r&d institutions. while material input-output linkages are spreading widely and are outward oriented the r&d-oriented sphere is concentrated on the local context. this to a large extent supported by intensive direct and indirect social interaction (informal exchange, contacts in the local technical community). during the past few years, in terms of innovation firms already active in r&d have undergone a shift from being demand pull driven (responding to market demands) to technology push driven (firms have become proactive in their search for new technologies and usps). this has increased the motivation to be integrated in the regional (technical) science community. the main spheres of economies of agglomeration have shifted considerably during the last few decades. the newly identified research ‘clubs’ in publicly supported r&d-projects are able to utilize economies of agglomeration primarily concentrated in the field of r&d and science. as long as natural spill-overs are high and competitive conflicts are manageable (e.g. in the case of material sciences) larger firms accept weaker partners and smaller firms and are willing to integrate them into their activities. low spill-overs and a higher market orientation favour more restrained, sometimes exclusive behaviour from the stronger party. this corresponds with the findings in the literature for partner selection in r&dcooperations (atallah 2005). this form of agglomeration, partially taking place beyond formal networks, also corresponds with the idea of a new type of social network mentioned by iammarino and mccann (2005). firms engaging in cooperative pre-competitive r&d and knowledge generation appeared to seek suitable equal partners. the qualitative interviews strengthened the notion that firms attempt to generate a portfolio of cooperative partners which consciously combines specialization and flexibility. in terms of knowledge generation and exchange, the geographic dimension is relevant as long as the actors are able to utilize knowledge potential. while larger firms with noticeable r&d-capacities are able to utilize international contacts in research and development activities, smaller lowor mediumtech firms stick to the region and to their regional partners. smaller firms are confronted with a selfreinforcing combination of low r&d capability on the one hand, and limited market demand on the other. in agreement with the concept of absorptive capacity, it was found that firms with low r&d and innovation potential (mainly component suppliers, where innovation is predominately directed by investment) found it difficult to build up and retain adequate relations with knowledge generating organizations. the medium-tech component suppliers observed here, proved to be unable to maintain continuous relationships with knowledge generating institutions. they were not capable of defining, setting up and managing relevant projects. these low and medium-tech firms did, however, partially utilize opportunities to establish long-term contacts with individual public or semi-public r&d-institutions (dealing with basic technologies 58 such as material sciences). they also tried to gain from possible spill-overs from appropriate events or informal inquiries. here we found that, in direct delivery and in competitive and pre-competitive research and development (as far as existent) is not identical. in addition, two interesting long-term partnerships between small knowledge intensive technical business services and large systems and component suppliers were observed, in the network analysed here. they were based on long-term trust and informal exchange. 4 final remarks the roles of clusters, networks and geographical agglomeration are subject to considerable coevolution. different approaches concerning forms, channels and mechanisms of knowledge exchange offer different conclusions with respect to the significance of geographical agglomeration in knowledge exchange. in the case study analysis different dimensions of interaction can be observed. there are networking-dimensions of material, supply-oriented transactions and networking-dimensions of knowledge sharing. the first belongs to the process of division of labour dealing with the exchange of goods and services, the second with knowledge. the main differences reside in the form of interaction and in the impact of interaction. the spheres of physical interaction (subcontracting relations) differ considerably from the spheres of knowledge intensive and r&d-driven interactions. they are different in respect to actors involved, spatial extension, and significance of geographic agglomeration. the observed network is, in its regional dimension, dominated by knowledge intensive relations. the qualitative evidence gathered by numerous in-depth interviews reveals that the highest number of interactions was reached in precompetitive r&d knowledge exchange and that immaterial dimensions dominate the material ones. the (industrial) firms do have extensive supplier relations but only to a very limited extent within the region and within the network. there is no automatic parallelism of interactions. this does not necessarily exclude automatic spill-over of knowledge connected with supplier relations, but it does emphasize that higher intensities of knowledge exchange, as indicated by the revealed forms of interaction are actively chosen and not a mere byproduct. knowledge oriented relations within the network are to a large degree regionally concentrated. proximity per se is not sufficient to generate knowledge between firms. the diffusion of knowledge within clusters is highly selective and depends strongly on the position of firms within networks and their absorptive capacity. especially in pre-competitive research, local universities and cooperative r&d institutions play a dominating role and assume gatekeeper functions. firms with a relatively high r&d capacity also take up such a role, thus indicating the necessity of a welldeveloped internal knowledge base. the dominating role of the newly founded cooperative r&d institutions (competence centres) can be taken as an indication that this kind of network relation is rather new and that the pattern of interaction has a temporary character and depends of the existence of specific kinds of knowledge generating institutions. in the styrian case, the main dimensions of economies of agglomeration have changed considerably during the last few decades. the portfolio of interactions and the meaning of agglomeration for the observed firms cannot be reduced to specific dimensions taken as a given or not. to this extent that they are determined by firm capabilities and firm behaviour, not all dimensions of agglomeration and thus economies of agglomeration are accessible for all agents. while small and medium sized firms partially gain from economies of agglomeration in the field of basic technologies such as material sciences or tool making, large firms concentrated pre-competitive research in the region in order to gain from economies of agglomeration in the field of science and r&d. these agglomeration effects still seem to be concentrated around certain insider ‘clubs’. a considerable share of the firms investigated is not able to participate and gain from economies of agglomeration. while there is a long tradition of pro-active cluster and network promotion in styria sectorial diversity (i.e. a low critical mass of actors) and relatively low absorption capacity serve to hamper the potential gains from economies of agglomeration for a considerable number of smes. references amin a. and thrift n. 1995. globalisation, institutional ‘thickness’ and the local economy. in healy p., cameron s., davoudi a., managing cities: the new urban context. wiley, chichester. arrow k. 1962. the economic implications of learning-by-doing. review of economic studies 29: 155-173. atallah g. 2005. partner selection in r&d cooperation. cirano – centre interuniversitaire de recherche en analyse des organisations, montréal. bayona c., garcia-marco t., huerta e. 2001. firms' motivations for cooperative r&d: an empirical analysis of spanish firms. research policy 30: 1289-1307. 59 belussi f. 2006. in search of a theory of spatial clustering: agglomeration versus active clustering. clusters and regional development. routledge, london. botazzi g., dosi g., fagiolo g. 2001. on the ubiquitous nature of the agglomeration economies and their diverse determinants: some notes, lem laboratory of economics and management working paper 10. st. anna school of advanced studies, pisa. botazzi g., dosi g., fagiolo g. 2002. mapping sectoral patterns of technological accumulation into the geography of corporate locations. a simple model and some promising evidence. lem laboratory of economics and management working paper 21. st. anna school of advanced studies, pisa. cohen w.m. and levinthal d.a. 1989. innovation and learning. the two faces of r&d. the economic journal 99: 569-596. cohen w.m., nelson r.r., walsh j.p. 2000. protecting their intellectual assets. working paper. national bureau of economic research. coleman j.s. 1964. collective décisions. sociological inquiry 34: 166-81. colletis-wahl k., corpataux j., crevoisier o., kebir l., pecqueur b., peytache-gadeau v. 2008. the territorial economy: a general approach in order to understand and deal with globalization. aranguren querejeta m.j., networks, governance and economic development. edward elgar, cheltenham. cooke p. 2000. structural competitiveness and learning régions. enterprise & innovation management studies 1. cooke p. 1998. regional innovation systems. the role of governances in a globalized world. ucl press, london. cooke p. and morgan k. 1998. the associational economy: firms, regions and innovation. oxford. dixon r.j. and thirlwall a.p. 1975. a model of regional growth-rate differences on kaldorian lines. oxford economic papers 27: 201-14. dosi g. and malerba f. 1996. organization and strategy in the evolution of the enterprise. macmillan, london. douglas m. 1986. how institutes think. syracuse university press. syracuse, ny. felin t. and foss n.j. 2006. individuals and organizations: thoughts on a microfoundations project for strategic management and organizational analysis. druid working paper: 06-1. foss n.j. 1999. the use of knowledge in firms. jite – journal of institutional and theoretical economics 155: 458-486. frank o. 1979. estimation of population totals by use of snowball samples. perspectives on social network research, 319–347. new york. freeman l.c. 1979. centrality in social networks: conceptual clarification. social networks 1: 215-239. gay b. and dousset b. 2005. innovation and network structural dynamics: study of the alliance network of a major sector of the biotechnology industry. research policy 34 (10): 1457-75. giuliani e. 2005. the structure of clusters. knowledge and networks: uneven and selective, not pervasive and collective. druid working paper 05-11. gordon i.r. and mccann p. 2005. innovation, agglomeration, and regional development. journal of economic geography 5 (5): 52343. gordon i.r. and p. mccann 2000. industrial clusters: complexes, agglomeration and/or social networks? urban studies 37: 513-532. granovetter, m. 1994. business groups. the handbook of economic sociology, 453-475. princeton. grant, r.m. 1996. towards a knowledge-based theory of the firm. strategic management journal 17: 109-122. hartmann c. 2006. die lernfähigkeit von clustern. eine theoretische und empirische betrachtung. leykam, graz. hayek f.a. 1945. the use of knowledge in society. university press. chicago. hoover e. 1948. location of economic activity. macgraw hill book company, columbus, ohio. iammarino s. and mccann p. 2005. firm location and technology: stylised constructs and illusory policies. paper presented at the 4th european meeting on applied evolutionary economics (emaee). utrecht, 18-25 mai. 60 jacobs j. 1969. the economy of cities. random house. new york. kaldor n. 1972. the irrelevance of equilibrium economics. the economic journal 82. kamada t. and kawai s. 1989. an algorithm for drawing general undirected graphs. american sociological review 33: 499-517. krätke s. 2002. network analysis of production clusters: the potsdam/babelsberg film industry as an example. european planning studies 10: 27-54. lawson c. and lorenz e. 1999. collective learning, tacit knowledge and regional innovative capacity. regional studies 33: 305-317. mariotti f. and delbridge r. 2001. managing portfolios of ties in inter-firm networks. paper presented at the nelson and winter conference. aalborg, denmark. marshall a. 1890. principles of economics. macmillan, london. maskell p. and malmberg a. 1999. localized learning and industrial competitiveness. cambridge journal of economics 23: 167185. myrdal g. 1957. economic theory and underdeveloped regions. gerald duckworth & co., london. nonaka i., toyama r. and nagata a. 2000. a firm as a knowledge-creating entity: a new perspective on the theory of the firm. industrial and corporate change 9: 1-20. powell w.w. and smith-doerr l. 1994. networks and economic life. the handbook of economic sociology, 386-402. princeton. popper k.r. 1957. science: conjectures and refutations. the growth of scientific knowledge, 33-65. routledge, london. reid n., smith b.w. and carroll m.c. 2008. cluster regions. a social network perspective. economic development quarterly. rychen f. and zimmermann j.b. 2008. clusters in the global knowledge based economy: knowledge gatekeepers and temporary proximity. regional studies 42(6). scott j. 2000. social network analysis – a handbook. sage, london. seidman s.b. 1983. network structure and minimum degree. social networks 5: 269287. storper m. 1995. the resurgence of regional economies ten years later: the region as a nexus of untraded interdependencies. european urban & regional studies 3: 191221. storper m. 1997. the regional world: territorial development in a global economy. guildford press, london. theter b.s. 2002. who cooperates for innovation, and why: an empirical analysis. research policy 31: 947-67. weber a. 1929. theory of the location of industries. the university of chicago press. chicago. issn: 2001-015x v o l 3 , n o 2 ( 2 0 1 3 ) c o n t e n t s sheila wright, christophe bisson and alistair duffy competitive intelligence and information technology adoption of smes in turkey: diagnosing current performance and identifying barriers pp. 5-29 a.s.a. du toit comparative study of competitive intelligence practices between two retail banks in brazil and south africa pp. 30-39 zhanna abzaltynova janice williams developments in business intelligence software pp. 40-54 francisco carlos paletta brazil evolutions in ci and some aspects of a current scenario pp. 55-61 o p i n i o n s e c t i o n francisco carlos paletta and nilson dias vieira junior ict lifecycle and its major role in the development of strategic intelligence pp. 62-78 ~ 2 journal contact: mailing address: jisib halmstad university box 823 301 18 halmstad sweden principal contact: dr. klaus solberg søilen school of business and engineering (sbe) email: klaus.solberg_soilen@hh.se copyright © 2013 jisib, halmstad university. all rights reserved. 3 e d i t o r i a l t e a m founding editors prof. henri dou (france), goupe escem prof. per jenster (china), nimi honorary editors prof. john e. prescott (usa), university of pittsburgh prof. bernard dousset (france), toulouse university editor-in-chief dr. klaus solberg søilen (sweden), halmstad university regional associated editors america: prof. g. scott erickson (usa), ithaca college europe: prof. sahbi sidhom (france), nancy university asia: prof. xie xinzhou (china), beijing university africa: prof. adeline du toit (south africa), university of johannesburg t h e e d i t o r i a l b o a r d : dr. mark xu, university of portsmouth, uk dr. subir ranjan das, university of petroleum & energy studies, india assistant professor dirk vriens, radboud university, netherlands professor karim baina, école nationale supérieure d'informatique et d'analyse des systèmes (ensias), morocco professor uwe hannig, fachhochschule ludwigshafen am rhein, germany dr. klaus solberg søilen, halmstad university, school of business and engineering, sweden dr. eduardo flores bermudez, bayer schering pharma ag, germany professor kingo mchombu, university of namibia, namibia professor adeline du tout, university of johannesburg, south africa professor pere escorsa, school of industrial engineering of terrassa, politechnical university of catalonia, spain assistant professor per frankelius, örebro university, sweden professor malek ghenima, l'université de la manouba, tunisia professor blaise cronin, indiana university, united states dr. john e. prescott, university of pittsburgh, united states dr. michael l neugarten, the college of management, rishon lezion, israel professor mika hannula, tampere university of technology, finnland professor kamel smaili, université nany 2, france professor henri jean-marie dou, atelis competitive intelligence work room of the groupe escem, france professor bernard dousset, toulouse university, france professor g. scott erickson, ithaca college, united states professor sahbi sidom, université nancy 2, france professor xinzhou xie, beijing science and technology information institute, china associate professor jonathan calof, telfer school of management at university of ottawa, canada professor per v. jenster, nordic international management institute, china professor alfredo passos, fundação getulio vargas, brazil professor brigitte gay, esc-toulouse, france professor sophie larivet, ecole supérieure du commerce extérieur (esce), paris, france t h e m a n a g e r i a l b o a r d : way chen, china institute of competitive intelligence (cici) raíner e michaeli, director institute for competitive intelligence gmbh, germany philippe a. clerc, director of ci, innovation & it department at the assembly of the french chambers of commerce and industry, france alessandro comai, director of miniera sl, project leader in world-class ci function, spain pascal frion, director acrie competitive intelligence network, france hans hedin, vice president business development at global intelligence alliance group, sweden dr. sofiane saadi, directeur général du laboratoire en organisation et gestion des entreprises (loge) algeria. managing director nt2s consulting inc. north vancouver, bc, canada javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/49') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/18') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/20') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/19') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/21') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/3') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/22') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/23') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/24') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/25') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/26') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/27') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/28') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/6') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/29') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/17') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/16') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/4') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/7') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/8') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/9') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/10') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/12') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/31') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/13') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/14') javascript:openrtwindow('https://ojs.hh.se/index.php/jisib/about/editorialteambio/15') 4 journal of intelligence studies in business halmstad, august 25 2013 e d i t o r i a l n o t e v o l 3 , n o 2 ( 2 0 1 3 ) the sixth issue of jisib marks the journal’s second anniversary. again we are delighted to welcome contributions by academics from so many different countries, with so many different backgrounds. the academic contributions of our female authors continue to show also in this issue. if this issue should have one common theme it would be related to brazil. it is not a special issue on brazil, but we saw the possibility to include three articles which relates to the experience of competitive intelligence in this country. however, the first article by sheila wright, christophe bisson, and alistair duffy entitled “competitive intelligence and information technology adoption of smes in turkey: diagnosing current performance and identifying barriers“ is on another topic and deals with smes need to improve intelligencebased output to decision-makers. based on empirical findings the aim has been to identify and classify ci behaviour and attitudes of smes in turkey. the second article by a.s.a. du toit is entitled “comparative study of competitive intelligence practices between two retail banks in brazil and south africa” , where it is concluded that respondents in the bank in brazil cope better with changes in the external environment. the next article by zhanna abzaltynova and janice williams entitled “developments in business intelligence software” is an evaluation of bi vendors and software with extensive rankings. the article by francisco carlos paletta entitled “brazil evolutions in ci and some aspects of a current scenario”, is a summary of research done on the introduction of competitive intelligence in brazil. the article also gives a brief idea about its current status. in the opinion section we have included an article by francisco carlos paletta and nilson dias vieira junior entitled “ict lifecycle and its major role in the development of strategic intelligence”. it is an evaluation of the existing ict framework for competitive intelligence in brazil. as always we would first of all like to thank the authors for their contributions to this issue of jisib. on behalf of the editorial board, sincerely yours, dr. klaus solberg søilen halmstad university i box 823 i s-301 18 halmstad, sweden i tel: +46 35-16 71 00 pp. 5-29 francisco carlos paletta francisco carlos paletta and nilson dias vieira junior vol6no2paper2 salmas et al to cite this article: salmasi, m.k., talebpour, a., and homayounvala, e. (2016) identification and classification of organizational level competencies for bi success. journal of intelligence studies in business. 6 (2) 17-33. article url: https://ojs.hh.se/index.php/jisib/article/view/157 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index identification and classification of organizational level competencies for bi success maryam khalilzadeh salmasia, alireza talebpoura and elaheh homayounvalaa acyberspace research institute, shahid beheshti university, iran journal of intelligence studies in business please scroll down for article identification and classification of organizational level competencies for bi success maryam khalilzadeh salmasia, alireza talebpoura and elaheh homayounvalaa* acyberspace research institute, shahid beheshti university, iran *corresponding author received 14 june 2016; accepted 25 august 2016 abstract business intelligence is a technology-oriented solution that businesses need to survive in today’s competitive and constantly changing market. to gain the benefits of bi systems, it is important to evaluate, assess, and improve factors that have an influence on bi success. organizational competencies can provide answers to the question of how companies could gain more benefits from bi systems. while investment in bi systems is increasingly growing, measures to evaluate effective organizational competencies leading to bi success are gaining more importance. therefore, this research identified a number of effective organizational competencies that contribute to bi success. using the developed questionnaire for determining the effect of organizational level success on bi success, the research data was gathered for the study. a chi-square test confirmed the effectiveness of all nineteen identified competencies. then, an exploratory factor analysis (efa) was carried out on the data in order to identify the underlying dimensions. in addition, competencies were grouped into six categories, namely data management, information system/information technology (is/it) development, financial resources, relationship management, is strategy and human capital policies. as a result, these competencies can be used as a measure to evaluate an organization’s status in holding some of the effective factors for bi success. keywords bi success, business intelligence, exploratory factor analysis, organizational level competencies 1. introduction 1.1 bi success business intelligence (bi) is a modern information technology that helps organizations to collect, manage and analyze structural or non-structural data (lin, tsai, shiang, kuo, & tsai, 2009) (nyblom, behrami, nikkilä, & solberg søilen, 2012). bi has a fast growing market (abzaltynova & williams, 2013) that continuously introduces new trends such as cloud bi, social bi, and mobile bi and in the future “customized” bi (wang, 2015). nowadays, business environments are constantly changing (hoppe, 2013), highly competitive, and increasingly uncertain (banerjee & mishra, 2015) that organizations’ solutions for avoiding bankruptcy depend on successful bi (ranjan, 2008). in addition, organizations that utilize bi successfully can gain competitive advantages. in successful bi, information technology and the business process and strategies must be aligned together, so enterprises can manage and benefit from their investments in bi by allocating bi resources, prioritizing projects, and minimizing the risk associated with bi implementations (ranjan, 2008). successful business intelligence can help organizations to make the best decision at the best time through integrating and analyzing data with decision support systems (muntean, gabriel cabau , &rinciog, 2014). furthermore, successful bi provides the right information to the right people throughout the organization to improve strategic and tactical decisions (li, shue, & journal of intelligence studies in business vol. 6, no. 2 (2016) pp. 17-33 open access: freely available at: https://ojs.hh.se/ 18 lee, 2008). company return from it investment is an important part of successful bi. in other words, when a bi system is successful, the company gains tangible benefits from their investments in it. the opposite side of successful bi implementation is bi failure. reports of bi failures can highlight the importance of successful bi. about 50%80% of business intelligence applications fail due to technological, organizational, cultural and infrastructural issues (adamala & cidrin, 2011). in addition, they report that most bi failures happened because of a number of issues, such as ignoring bi as a cross organizational business initiative, lack of management and sponsor commitments, lack participation of the business side and representatives, unavailable skilled staff, ignoring business analysis activities, lack of appreciation of the impact of dirty data on business profitability and lack of understanding of the necessity for and the use of meta-data (chuah & wong, 2013). all the failure reasons show that a number of organization and staff characteristics, which are called ‘competencies,’ play a crucial role for bi success. competencies are related characteristics that prepare an organization to attain certain objectives. these characteristics can be categorized in two levels: organizational and individual. the effect of organizational level competencies on bi success is the topic of our study. as worley et al. (2005) mentioned “competencies can be analyzed at the level of an individual, gathering all the techniques allowing to facilitate the emergence, maintenance and development of personal competencies, but also at a collective level or even at an organizational level” (worley, chatha, weston, aguirre, & grabot, 2005). individual competencies are human resource capabilities that lead to better achievement of the predetermined objectives such as human resource skills, motivations, and behaviors that influence their performance and at least productivity. although individual competencies are also very important in applying bi systems we limited our research scope to organizational level competencies. in general, organizational competencies are an organization’s ability for optimizing use of available resources, setting shortand longrange goals, and developing the strategies and policies to achieve such goals. the concept of competencies first found its way into is/it studies in an attempt for supporting organizational it/is goals. competencies have been found to have the potential to impact organizational success and to be relative to bi in particular. specifically, it has been related to an organization's ability to derive benefits from their investment in is (chasalow, 2009). the aim of this research is to determine the organizational level competencies that are necessary for bi to be applied successfully according to the bi success factors. since the major reason that a large number of bi projects are considered to be failures is related to ignorance of organizational characteristics, the emergent competences identified in this research can help organizations understand the competencies that they need to build in order to benefit from their bi investments (chasalow, 2009). therefore, this research is directed towards developing a theoretical model for bi success. although bi success is the positive value that an organization obtains from its bi investment, its definition differs from one organization to another. it depends on what benefits that organization expects (sabanovic & solberg søilen, 2012) from its bi initiative. benefits that are gained from improved profitability, reduced costs, and improved efficiency can be defined as bi success in an organization. for the purpose of this research, bi success is defined as the positive benefits of bi, which the organization may achieve as a result of implementing bi competencies as important elements in the success of information systems, and appear to have the potential to be of particular value in explaining achieving benefits from bi. this research will therefore seek to develop a model to help explain the organizational level competencies that would support the attainment of business value from bi. the developed model can be used as an instrument to improve the likelihood of an organization achieving benefits from their bi investments. 2. literature review there are few studies about competencies that affect bi success. in this section, we study organizational level competencies related to is/it in addition to bi related competencies. first, competencies are described and then competency related research studies are introduced. the literature review is summarized in table1 and appendix a. 2.1. competencies “competencies have been studied from two different perspectives: (i) as assets, skills, or 19 resources belonging to the company that allow an activity to be performed systematically (ii) as the activities themselves, that is, the operations that the firm is able to carry out by integrating a series of assets, emphasizing what the company does as opposed to what the company has” (en escrig-tena & bou-llusar, 2005). previous literature includes studies that have adopted different competency-derived approaches such as the strategic management field (anderson & sohal, 1999;penrose, 1959; selznick, 1957), the resource-based view (danneels, 2002; montealegre, 2002; tyler, 2001; wilcox kingl & zeitham, 2001), the dynamic capability theory (huang, 2011), the competency-based competition (en escrigtena & bou-llusar, 2005), the knowledgebased theory (harzallah & vernadat, 2001), core competencies of strategic business units (bhamra, dani, & bhamra, 2010; prahalad, 1994; wang, lo, & yang,2004), competency for developing human resource (worley, chatha, weston, aguirre, & grabot, 2005; lee, 2010), and competency management within—and at the intersection of—knowledge management (javanmard, mashayekhi nezamabadi, & larki, 2010), project management (crawford & hassner nahmias, 2010), supply chain competencies (scc) (green jr., inman, birou, & whitten, 2014), and computer science (zouine & fenies, 2015). some of these studies on competency deal with is/it. since the early 1990s, the researchers considered the sustainability of competitive advantage from it (peppard & ward, 2004). the present research addresses the competencies studied in the is/it field. these competencies can be related to organizational factors or introduced as is/it capabilities that lead to better achievement in an organization. competencies are usually divided into two groups: organizational level competencies and individual competencies. organizational competency is a term that has been used in the world of performance management for many years. it is routinely used by human resource professionals and by organizational change consultants to refer to the variety of employee skills (nienabera & sewdassb, 2016) that the company must have in order to achieve their plans (coates & associates, 2008). the current research focuses on non-individual competencies (organizational level competencies) studied in the is/it field. 2.2. bi related competencies competencies within the sphere of bi first appeared in the bi practitioner literature beginning with the business intelligence competency center (bicc). bicc encompasses a lot of issues: better use of bi across the organization, greater alignment and collaboration between business units, a bi strategy that supports the corporate strategy, standardized bi processes and initiatives, consistency of definitions, processes, and methodologies, and higher roi from bi (miller, bräutigam, & stefani, 2006). miller and et al. (2006) introduced comprehensive competencies modeled in three dimensions: business skills, analytical skills, it skills to support the development and support of bi in an enterprise. but, these competencies are primarily technical in nature and their focus is not on organizational level competencies (miller, bräutigam, & stefani, 2006). furthermore, chasalow (2009) presented five competency factors on the organizational level: learning organization, participative leadership style, clearly defined business goals, technological resource availability, and financial resource availability. he argues that these five factors have an impact on business intelligence success (chasalow, 2009). as chasalow mentioned in his dissertation, his work is one of the few studies that have been done on organizational factor effects on is systems and also these studies are still in an initial stage. also, his study did not attended to some factors like relationship management that have been introduced in this research and are one of a company’s challenges for implementing information systems in some organizations. in addition to that, ghazanfari (2011) presented an expert tool to evaluate the bi competencies of iranian enterprises and identified six factors for his evaluation model: analytical and intelligent decision-support, access to related experimentation and integration with environmental information, optimization and recommended model, reasoning, enhanced decision-making tools, and finally, stakeholder satisfaction (ghazanfari, jafari, & rouhani, 2011). their view of bi competencies is limited to bi specification. their study is not about organizational level competencies, but they mention some competencies like stockholder’s satisfaction that we recognize as organizational level competencies. 20 furthermore, isık et al. (2013) studied the effect of the decision environment on business intelligence capabilities for achieving bi success. according to their study, technological capabilities such as data quality, user access and the integration of bi with other systems are necessary for bi success (isık, jones, & sidorova, 2013). although their study focused on technical capabilities, some of the capabilities, like data quality, are grouped into organizational level competencies in other studies like chasalow’s study. 2.3. studies on organizational level competencies in the is/it field because there are few research studies in the field of bi-related competencies, organizational level competencies in the is/it field have been studied too. since bi is an is system, not only studies about competencies in the is/it field have been studied in our research, but they can make our literature review more inclusive. competencies related to an is facilitate the relationships between organizational processes and structures for beneficial use of is resources in order to accomplish organizational tasks and obtain organizational goals (tarafdar & gordon, 2007). one of the most cited articles about is related capabilities is by feeny and willcocks (1998) in which they offer a competency model (feeny & willcocks, 1998). their model, which was revised in 2006, suggested four tasks and nine capabilities that grouped into three categories: business and it vision, delivery of it services, and design of it architecture that can help a company benefit from the technology (willcocks, feeny, & olson, 2006). furthermore, there are other studies that have addressed the problem of value creation from is investments in an organization as opposed to an is functional perspective. peppard, lambert & edwards (2000) developed a framework for mapping macro competencies and identified their related micro competencies. four years later, peppard and ward (2004) offered an is model that identified six domains of is competencies which are themselves composed of micro is competencies—25 in all. these domains involve strategy, is contribution definition, it capacities definition, exploitation, solutions and supply. it projects that help operational performance of the organization go back to 30 years ago (doherty & terry, 2009). as such, wade and hulland (2004) defined three is resources and capabilities that can be used for gaining market opportunities. they also proved that is resources rarely have a direct effect on sustained competitive advantage (sca), but they can indirectly lead to sustained performance (wade & hulland, 2004). in another study, doherty & terry (2009) examined the impact of is capabilities on competitive positioning at the process level. also, ravichandran (2007) presented how is capabilities can offer digital options that lead to firm agility by investing in it. similarly, tarafdar and gordon (2007) illustrate how six is competencies could affect the conception, development and implementation of process innovations. on the other hand, some studies addressed it competencies as components of other concepts. for example, ngai, chau and chan (2010) defined it competencies (it integration and flexibility) as supply chain competencies. also, the theory of competency rallying (tcr) was presented for the first time by katzy and crowston (2000). crowston and scozzi (2002) then introduced the tcr model and tested it in the context of oss projects as a virtual organization (ghapanchi, 2013). while all the studies on is/it discussed above have adopted the resource-based view of is/it competencies, some other research studies have introduced different views. for example, caldeira and dhillon (2010) categorized organizational competencies into two groups: facilitating competencies and fundamental competencies that lead to information technology advantages within organizations (caldeira, mário; dhillon, gurpreet, 2010). additionally, chen & wu (2011) developed a model of it management capability of cios and found that information technology competencies affect it management activity. although these is related studies did not consider some competencies that are more important for bi like data quality or metadata that are mentioned in bi related competencies, they mentioned important competencies that are necessary for bi implementation as an is system. is related studies are summarized in this research, because considering is related studies beside bi related competencies can show their similarities and differences. a review of the related literature is summarized in table 1. table 1 constructs for is/it competencies source competency constructs dependent variables feeny & willcocks, (1998) and willcocks, feeny & olson (2006) is/it governance, business system thinking, business-is relationship building, designing technical architecture, making technology work, informed buying of it services, contract facilitation, contract monitoring, vendor development none peppard & ward (2004) strategy formulation (business strategy, technology innovation, investment criterion, information governance) is strategy (prioritization, is strategy alignment, business process design, business performance improvement, systems and process innovation) it strategy (infrastructure development, technology analysis, sourcing strategies) exploitation (benefits planning, benefits delivery, managing change) solutions (applications development, service management, information asset management, implementation management, business continuity and security) supply organizational performance doherty & terry (2009) outside-in (external relationship management, market responsiveness) spanning (is-business partnerships, is management/planning) inside-out (infrastructure provision, is technical skills, is development, cost-effective is operations) sustainable improvements to competitive positioning wade & hulland (2004) external relationships management, market responsiveness, is business partnerships, is planning and change management, is infrastructure, is technical skills, is development capability, operational efficiency ravichandran (2007) digital option (it infrastructure flexibility, application platform scope), is capabilities (planning sophistication, development capability, support maturity, operations capability), it investment orientation organizational agility tarafdar & gordon (2007) knowledge management, collaboration, project management, ambidexterity, it/innovation governance, business-is linkage, process modeling process innovation ngai, chau, & chan (2010) it integration, it flexibility supply chain agility caldeira & dhillon (2010) fundamental competencies in delivering it benefits which entail the following capabilities (conducting it strategic thinking and planning, aligning it with business processes and objectives, deploying cost effective applications and systems, conceptualizing the maintenance of data integrity and confidentiality, facilitating behavior enrichment for technology adoption, ability to ensure compliance with standard it methods and procedures) facilitating competencies in delivering it benefits include the following capabilities (selecting and managing it staff, providing ongoing it training, acquiring top management support in it projects, designing business processes for effective use of it expertise, maintaining systems consistency, involving users in it projects, instituting slas (service level agreements) with it suppliers, identifying and setting it standards and procedures, developing software in-house, selecting and contracting it vendors and is consultants, deciding on software sourcing strategies, maintaining or decreasing system response time, ensuring user application knowledge, identifying business is requirements, increasing the credibility of the it department, increasing service accountability, developing an is architecture) delivering it benefits chen & wu (2011) it infrastructure, business application, business technology integration it management activity effectiveness miller, brautigam, & stefani (2006) business skills (linking to business strategy, defining priorities, leading organizational and process change), it skills (data quality), analytic skills (the ability to discover and explore, developing business rules, developing user skills), business skills, it skills, and analytic skills overlap (defining bi vision, managing programs, controlling funding, establishing standards, technology blueprint, mythology leadership, adaptable infrastructure, extracting data, identifying data) business needs organization and processes tools and applications data integration chasalow (2009) individual competencies (strategic hr management) organizational competencies (learning organization, participative leadership style) decision making (clearly defined business goals, technological resources availability, financial resources availability, human resources availability) bi success rouhani, jafari, & ghazanfari, (2011) analytical and intelligent decision-support, providing related experiment and integration with environmental information, optimization and recommended model, reasoning, enhanced decision-making tools, stakeholders’ satisfaction bi success popovic, hackney, simoes coelho, & jaklic, 2012 data integration, analytical capabilities, information content quality, information access quality, use of information in business processes, analytical decision-making culture bi systems maturity isık, jones, & sidorova, 2013 data quality, integration with other systems, user access quality, flexibility, risk bi success 3. research methodology to answer the research question of “what are organizational level competencies for bi success?”, first we identified organizational level competencies from the literature review. then a questionnaire was designed to answer the question “are these identified competencies effective in bi success?” in order to test whether the designed questionnaire was valid and reliable, and 22 effective for answering the research question, we performed a validity test like efa that classified constructs. the research steps as are follows in figure 1: (1) specifying the domain of the construct, (2) identifying the competencies by literature review and making the semi-structured interviews, (3) constructing an initial framework, (4) designing the questionnaire, (5) collecting data (6) testing the hypotheses, (7) assessing construct validity and reliability of the measures. in the following sections, each step is elaborated in more details and some of the steps are explained in section 4: data analysis and results. 3.1 specifying the domain of the construct according to what is described in the literature review, there are different competency-derived approaches. moreover, competency-based studies on bi are in their infancy and limited. however, there are more research studies on is/it related competencies in the literature. therefore, additional competencies were extracted from other competency-based studies including both bi and is/it, which use a more resource-based approach to competency indices. the literature identifies two levels of competencies: individual level and organizational level. the present paper addresses the organizational level. 3.2 identification of the competencies from the literature review and interviews the first step is to identify the competencies. this can be done through adopting either a qualitative or quantitative approach. in our case, the competencies were developed through reviewing the literature on is/it and birelated competencies. initially, 35 is/itrelated competencies at the organizational level were identified. the next step was to examine the competencies identified for content validity. content validity is whether or not the elements in a given construct represent the underlying concept to be measured. in our case, we used two methods for determining content validity: 1) conducting interviews to investigate if variables are transparent enough, appropriate and relative. some variables like knowledge management, project management, and change management that are more reflective than formative were eliminated. as a result, 19 competencies were extracted from a total of 35 by eliminating or merging the elements. appendix a outlines these 19 competencies and provides their related sources. 2) developing an initial theoretical framework by grouping competencies in relevant constructs by an inductive reasoning method and via the help of experts who reviewed the elements in each group that are explained in the following sections. 3.3 constructing an initial framework for determining the importance of competencies in bi success concepts comprise categories which in turn create the basis for the formation of a theory (allan, 2003). the aim of categorizing competencies is indirectly to determine the importance of competencies in bi success, that is, how these 19 competencies lead to bi success. the competencies were grouped into three bi related categories: it infrastructure, it governance, and resources. these categories and their variables are shown in appendix a. a) it infrastructure group: miller et al. (2006) argue that “infrastructure refers to the hardware, software, networking tools, and technologies that create, manage, store, disseminate, and apply information”. figure 1 the research steps 23 a business intelligence infrastructure has to be responsive to various needs of a business on demand and in real time. also, well-defined infrastructure ensures data quality and availability. the v1 to v7 group of variables was assigned to the it infrastructure category as critical it assets. it is crucially important to build and expand the necessary data and analytic infrastructure that is agile, stable, scalable, and integrated. data quality and stewardship especially are important for developing metadata (miller, bräutigam, & stefani, 2006). b) bi governance: this is a new term that a few references mentioned it. turban et al. (2010) used bi governance for prioritizing bi projects and appropriate planning and forming an alignment with the business strategy as a factor for bi success. beth (2006) also developed a bi governance framework and application portfolio that deals with the funding process, exceptions process, bi development process, tracking and measurements, and communications plan as governance mechanisms. the v8 to v 15 group of variables were assigned to the bi governance category, emphasizing the importance of strategy thinking to both sides of is and business alignment to ensure bi success. it is evident that is strategy is critical, however, it would be a waste of resources for both sides to overlook the business needs, and the alignment of business and is strategy. c) facilitating resource: this is critical for determining the relative success or failure of it adoption. in fact, resource facilitation supports fundamental competencies (caldeira, mário; dhillon, gurpreet, 2010). chasalow (2009) refers to financial resources and strategic human resources as organizational competencies for business intelligence success. moreover, miller et al. (2006) describe human capital as an important factor for bicc. v16 and v17 as financial resources and v18 and v19 were grouped into the human capital policies category that was included in facilitating resources. the implementation of bi systems does not just occur on one day and end there; they rather take place gradually over time and through data collection, hence there is the need for more financial support and budget allocation. on the other hand, even the best systems without utilizing skilled users could not amount to much, as a study asserts that inadequate education and training and lack of employees’ morale and motivation cause the failure of erp projects (amid, moalagh, & zare ravasan, 2012). 3.4 questionnaire design in the third step, a questionnaire was designed with three main sections. the first section of the questionnaire consisted of questions about the characteristics of the interviewees. the content of the second section entailed the description of bi success as described in the literature review. and the third section of the questionnaire included questions about the effect of the 19 competencies on bi success using a five-point-likert scale ranging from (5) “highly effective” to (1) “highly ineffective”, and additionally an “uncertain” option. the third section of the questionnaire was designed to measure the effect of the 19 organizational competencies on bi success in the organization. 3.5 sample size and data collection using purposive sampling, the target population of this study was determined to include consultants and it department members of the ministry of industries mines and trade. this study was conducted in iran, because the environment in which iranian organizations operate today is becoming more and more complex. moreover, organizations and departments that are situated inside organizations face problems such as reduced budgets and amplified pressure from top managers to increase performance and profit and also from markets and consumers to lower the prices. in this kind of environment, managers must respond quickly, innovate, and be agile. both private and public organizations are cognizant of today's business environment and pressures (turban, sharda, delen, & king, 2010). in october 2011, the ministry approved a sizable budget for bi implementation that came into effect. the sample size was a major 24 limitation in our study in terms of the available time. additionally, some experts were not interested (e.g. due to lack of familiarity with the research subject) in cooperating with the research, especially, with the electronic form of the questionnaire. consequently, the data was collected from questionnaires which were distributed among the minimum sample size of 80 individuals after removing none approved samples. there are different ideas about the minimum sample size in factor analysis. according to lawley & maxwell (1971), 51 more cases than the number of variables are enough. although the subject-to-variables (stv) ratio of the sample size is 4.2 (that is under 5), expletory factor analysis was conducted because the kmo is 0.62, which is above the ‘‘average’’ threshold of 0.5 (amid, moalagh, & zare ravasan, 2012; kaiser, 1974), and the bartlett test p-value is less than 0.05, which suggests a good correlation. demographically, 5.8% of the respondents had a phd degree, 46.37% had an m.e. degree, and 47.83% had a b.e. degree. of these, 4.48% of the respondents were classified as university professors, while 41.79% were executives/managers, and 53.73% were it department employees that they had work experience in the area of bi tools. 4. data analysis and results in this stage, the collected survey data from the questionnaire was used for testing the research hypothesis. it was necessary to determine the statistical distribution of the collected data from the third part of the questionnaire. subsequently, based on the distribution of data, either a parametric or non-parametric test was performed to prove the hypothesis: h1: do v (i=1 to 19) competencies have effects on bi success? the next step in the development of this type of measurement was to test the construct validity and reliability. construct validity exists if the items accurately represent the underlying concepts that are being measured (boudreau, gefen, & straub, 2001). therefore, some tests were performed on the data collected from the third part of the questionnaire. 4.1 hypothesis test in order to evaluate the effectiveness of 19 competencies on bi success, the results should support the hypothesis. as previously mentioned, these 19 items were included in the third part of the survey questionnaire constituting the hypothesis: h1. do v (i=1 to 19) competencies have effects on bi success? one of the most accepted ways to identify the distribution of the data, statistically, is the one-sample kolmogorov–smirnov test. the kolmogorov–smirnov test compares the observed cumulative distribution function for a variable with a specified theoretical distribution, which may be normal, uniform, poisson or exponential (lilliefors, 1967). many statistical parametric tests require normally distributed variables. the one-sample kolmogorov–smirnov test can be used to test whether or not a variable is normally distributed (hollander & wolfe, 1973). according to our test results, the p-value of all 19 items was less than 0.05, which shows that their distribution was not normal; hence there was a need for a statistical non-parametric test to prove h1. therefore, a chi-square test was used to determine whether the frequencies of the upper categories of likert questionnaire, (5) “highly effective” and (4) are higher than other categories (i.e. 1, 2, and 3). that is, the residual (r2) values of categories (5) and (4) of the likert scale are to be higher than categories (3), (2), and (1). the chi-square test procedure (cochran, 1954) tabulates a variable into categories and computes a chi-square statistic. this goodnessof-fit test compares the observed and expected frequencies in each category to test whether all categories contain the same proportion of values or test that each category contains a user-specified proportion of values. a significance level below 0.05 for all the 19 items indicates that the observed frequencies differ from expected frequencies in each category and the average rate of frequencies do not significantly differ by category. on the other hand, the residual (r2) of each category of items, which is equal to the observed frequency minus the expected value, shows that differences between observed frequencies (nonparametric tests, chi-square test) in (4) and (5) are a lot more than the expected frequencies and are completely positive. thus, based on the significance level and residual test for all items, it can be concluded that all of the 19 competencies are highly effective for bi success in an organization. 4.2 exploratory factor analysis in this study, we use an exploratory factor analysis (efa) as a statistical approach to determine the correlation among the variables in a dataset. this type of analysis provides a 25 factor structure (a grouping of variables based on strong correlations). efa is good for detecting "misfit" variables. in general, an efa prepares the variables to be used for cleaner structural equation modeling. an efa should always be conducted for new datasets (statwiki, 2012). an efa was used to examine the dimensions evidenced in the data and the loading of the items on the empirically specified dimensions of effective organizational competencies for success. principal component analysis was used to extract the factors with the varimax rotation method to simplify the interpretation of the factors. the guttman-kaiser rule was applied to determine the number of capability factors. at this point, only factors with eigen values of one or more were retained. a kaiser-meyerolkin (kmo) and bartlett's test were conducted prior to the efa. in addition, the kmo (kaiser, 1958) examines whether the partial correlations among variables are small (momeni & mehrafzoon, 2013). bartlett's test determines (bartlett, 1950) whether the correlation matrix is an identity matrix, which would indicate that the factor model is inappropriate. the kmo is 0.62, which is above the ‘‘average’’ threshold of 0.5 (amid, moalagh, & zare ravasan, 2012; kaiser, 1974), and the bartlett test p-value is less than 0.05 which suggests good correlation. according to hair et al. (1998), factor loadings over 0.3 meet the minimal level, over 0.4 are considered more important, and 0.5 and greater are practically significant. it is also suggested that the loadings over 0.71 are excellent, over 0.55 good, and over 0.45 fair (amid, moalagh, & zare ravasan, 2012). the factor analyses conducted in this study are assessed according to these criteria and because the chi-square test proved the effectiveness of the factors before the efa, factor loadings over 0.45 are considered suitable for efa. the 19 variables were grouped into six categories of factors which had an eigen value greater than one and factor loading greater than 0.45, and the interpretation variable was 70.8. moreover, the extraction variances of the 19 variables were greater than 0.61. table 1 summarizes the results of factor loading. table 2 the results of efa and reliability test factor1 factor2 factor3 factor4 factor5 factor6 factor (1), data management: v7: metadata tools availability 0.8 v6: data quality improvement 0.78 v5: well-defined data environment including stewardship and metadata 0.74 v4: integration of data sources 0.48 factor (2), is/it development: v3: applications development 0.84 v2: it flexibility 0.81 v1: is architecture framework 0.64 factor (3), financial resources: v16: funding for acquiring bi tools and building related systems 0.82 v15: sourcing strategy 0.74 v17: funding for building and maintaining an analytical data environment 0.73 factor (4) relationship management: v8: external relationship management 0.8 v11: stakeholder planning and management 0.66 v10: service level definition 0.65 v9: it vendor and consultant development 0.51 factor (5) is strategy: v12: business processes and is/it alignment 0.77 v13: is strategy alignment 0.77 v14: is prioritization strategy 0.46 factor (6) human capital policies: v19: ongoing it training 0.85 v18: selection, evaluation and management of (especially it) staff 0.71 eigen value 5.08 2.51 2.04 1.44 1.24 1.14 % of variance 26.75 13.21 10.73 5.58 6.52 6.02 cronbach's alpha 0.79 0.8 0.77 0.69 0.6 0.61 4.3 factor denominations the factors were named based on the meaning and functionalities of the competencies that were related to each factor (momeni & mehrafzoon, 2013). the names and content of the six factors are shown in table 2. the following section offers an elaboration of each of the factors, which are based on explanations or model dimensions of their criteria-related resources. factor (1) data management: this refers to capturing, storing and maintaining a large volume of data to support bi analysis (chasalow 2009). qualitative data is the most important part of an analysis. capturing and storing metadata helps to create various reports from various dimensions. here, data management is defined as how data can be integrated and validated in a proper way to be more profitable. factor (2) is/it development: this refers to the competencies that allow an organization to develop or experiment with new technologies. so, infrastructure must be flexible and is architecture has to be designed in a way that allows development (wade & hulland, 2004). factor (3) financial resources: first described by chasalow (2009), financial resources deal with the availability of financial resources to support the collection and maintenance of bi tools. many is implementation projects failed because of a lack of financial resources. although availability of the resources facilitates bi success, financial resources are an important competency that determines success and failures of these projects. factor (4) relationship management: the aim of relationship management is to increase the connectivity with consumers, suppliers and other trading partners. one of the is systems’ (like scm, crm) tasks is facilitating relationships of organizations with their partners (aziza, oubrich, & solberg søilen, 2015). so well defined management systems can lead to is systems like bi. schaarschmidt, walsh, kortzfleisch (2015) mentioned interacting with external parties on a macro level of governance, which we considered a relationship management factor in it governance groups. factor (5) is strategy: this is defining organizational strategies in a way that integrates is with business (peppard & ward, 2004). for bi success in an organization, organizational strategies must be well defined in a way that information systems meet the business needs. besides, business strategy must consider is needs. factor (6) human capital policies: this is a very well defined system that can benefit an organization without well trained users. the human resources importance for is success, especially in bi, is clear as described before and is considered to be individual competencies. but, human capital policies are permanent and continuing policies and the processes of an organization for selecting, evaluating and training it and business staffs in a way that helps bi implementation and usage. table 2 illustrates which competency (vi) has been grouped into which factor (j). on the other hand, appendix a illustrates relationships of the initial theoretical framework with competencies (vi) and factors (j). as described earlier, the research theoretical framework groups competencies into three categories. the framework was then revised by efa, so competencies which were assigned to the it infrastructure category were divided into factor (1) and factor (2); the bi governance category was divided into factor (4) and factor (5); the facilitating resources category was divided into factor (3) and factor (6). v15 (sourcing strategy) which was primarily grouped as one of the it governance category, by efa has been grouped into factor (3). figure 2 also shows the factors and the initial framework relationships. 4.4 reliability reliability is another aspect of the measurement scale to be evaluated in this step. this concept refers to the extent to which repeated use of the measurement scale would give the same results (straub, 1989). the analysis of reliability is reported in table 2 as composite reliability, and was entirely consistent with the factor analysis. table 1 outlines cronbach's alpha based on standardized items where values above the minimum of 0.6 for f4, f5, and f6 are unacceptable, and above the minimum of 0.7 for f1, f2, and f3 are considered acceptable. for the reliability of the questionnaire, the cronbach’s alpha was estimated to be 0.86 (greater than 0.7), which implies good reliability of the instrument (amid, moalagh, & zare ravasan, 2012; nunnally, 1978). 27 4.5 discriminant validity discriminant validity refers to the extent to which factors are distinct and uncorrelated. the rule is that variables should relate more strongly to their own factor than to another factor. two primary methods exist for determining discriminant validity during an efa. the first method is to examine the pattern matrix. in order to have discriminant validity, variables should load significantly only on one factor. the second method is to examine the factor correlation matrix, as shown in table 2. correlations between factors should not exceed 0.7. a correlation greater than 0.7 indicates a majority of shared variance (0.7 * 0.7 =49% shared variance) (statwiki, 2012). as can be seen from the factor correlation matrix in table 3, correlations between all factors are under 0.7 which supports the discriminant validity. table 3 correlation matrix of factors f(1) f(2) f(3) f(4) f(5) f(6) f(1) 1.000 f(2) .361 1.000 f(3) .260 .512 1.000 f(4) .122 .278 .357 1.000 f(5) .338 .425 .385 .356 1.000 f(6) -.161 .170 .295 .215 .220 1.000 5. discussion this paper presented a competency model as illustrated in figure 2. interpretations of factors and practical usages of this model are discussed in the following sections. 5.1 interpretation of factors according to our findings, there is no similar research that has presented effective competencies for bi success by studying previous research in is fields. one of the differences between research studies about is and bi related competencies is the emphasis of bi related research studies on data management and its factors that also were shown in efa results. efa shows that the data management factor has the highest variance, among other factors. this is due to the fact that a bi system’s goal is analyzing data for exploring useful information for decision makers and it makes data management a critical factor for bi success. the importance of data management is highlighted in many sources and articles, such as işık (2010) who defined data sources, data types, and data reliability as bi capability; or cox (2010) who identified information availability, information quality, and information quantity as effective elements that improve decision-making speed and quality. factor (2), is/it development, is an organization’s ability to develop applications, architecture and infrastructure of is without which data cannot be gathered and managed perfectly. therefore, this factor is considered to be a base or infrastructure for data organizational competencies for successful bi implementation facilitating resources bi governance it infrastructure : data management : is/it development : relationship management : is strategy : financial resources : human capital f(1) f(2) f(4) f(5) f(6) f(3) 0.57** 0.83*** 0.64*** 0.66** 0.87*** 0.42* r2=0.33 r2=0.69 r2=0.41 r2=0.44 r2=0.76 r2=0.19 * indicate that the coefficient is significant at p ≤ 0.05 ** indicate that the coefficient is significant at p ≤ 0.01 *** indicate that the coefficient is significant at p ≤ 0.001 figure 2 the model of organizational level competencies effects on bi success 28 management. most of the articles in which factor (2) is referred to have mentioned application development capability as a competency and they have ignored the importance of architecture and system flexibility for implementing new information systems or developing new features for existing systems. in this article, is/it development refers to both soft (application) and hard (infrastructure) abilities and their flexibility of an organization for bi success. financial resource is not considered to be an is ability, however, it provides the ground for other capabilities and because of their importance in is implementation, we cannot overlook them, especially in bi implementation which is a time-bound development process. the importance of financial resources ignored in most articles related to is competencies except chasalow’s study that emphasized its importance. as an initial classification, the sourcing strategy is classified into it governance groups and funding for acquiring bi tools funding for building and maintaining an analytical data environment, classified into resource facilitation groups. sourcing strategy that is classified into financial resources refers to both sides of the funding strategies of sourcing and selection of supplies. by grouping the sourcing strategy competency into financial resources factors, the first side of the competency (funding strategies of sourcing) was highlighted. both internal and external data gathered from suppliers and stakeholders are important to determine bi success. on the other hand, continued relationships with it vendors (solberg søilen & hasslinger, 2012) and consultants are necessary for having a better understanding of an organization's it needs. therefore, relationship management is another important ability, as well. it is one of the top and long-running concerns of the senior management that the organizational strategies are in alignment with the business strategy as well as the is strategies. research studies show that businesses rely on it to execute the company strategy and the top priority is building the foundation for execution, which is the it infrastructure and digitized business processes that automate the core capabilities of the enterprise. businesses should have strategic directions about is investments that lead to alignment between it strategy and business processes (peppard, lambert, & edwards, 2000). the requirement for alignment of the organization’s is/it strategy with the business’s underlying goals and objectives was apparent. in is strategy definition, is/it governance imply an important role for integrating the it effort with business strategy and processes (willcocks, feeny, & olson, 2006). in a similar way, bi governance responsible for arranging strategies, structures, processes, and activities of bi for a business is an important factor for bi success. factor (5), is strategy, is a strategy part of bi governance that refers to is and business strategy and their alignment. this factor is the most referred to, directly and indirectly, among other factors that suggests the importance of is and business strategies and their alignment. human resources determine how bi has been used in the organization. skill, knowledge, and motivation of users (both business and it users), such as it skills, statistical and analytical knowledge, creativity and market knowledge are critical for working with bi systems, which are achieved through selecting, evaluating, and managing staff and ongoing it training. although human resource abilities refer to individual competencies, management of individual competencies and an organization’s policies for directing them refer to organizational level competencies. some articles like peppard & ward (2004) or chasalow’s study have mentioned human resource strategy and development importance. there is more need for specific studies about its importance in information systems; the gap is obvious among research studies in this subject area. 5.2 practical usages the results of the factor analysis indicate that the organizational competencies for bi success can be evaluated based on six main factors. to measure the maturity of these factors, an organization should be evaluated by nineteen criteria through questions about organizational competencies. using the extracted loads of each criterion within its factor, the maturity of the organizational competencies can be measured and depicted on a chart (for the six factors). by comparing the “as is” situation of these six factors with the “to be” situation the probability of bi success can increase as revealed through interviews with the experts of the studied organizations. since bi success criteria may differ from one organization to another, in addition, the criteria defined for bi success have influence on the importance of defined competencies; bi 29 critical success criteria must be defined in the organization first. also, defining bi success criteria helps the organizations that is going to implement bi to measure the fulfillment of these criteria. periodic evaluation of success criteria and their relative competencies can lead to continuous system performance improvement and better utilization of the information system. the present research introduced a new measurement instrument by using a competency-based approach to bi, which helps companies achieve bi success. it should be noted that the authors utilized a case study to propose a valid measurement model. nevertheless, it is believed that it can be generalized to apply to similar organizations, which plan to implement bi. the authors believe that the results of this research can help organizations make better decisions with regard to implementing bi, and shed light on effective organizational competencies according to critical success factors (csfs) of bi implementation. 6. conclusion and future research the purpose of the study was to introduce new competency measurements on the organizational level for bi success. in this way, first we reviewed related literature about competencies and bi success. after we specified our research domain to the organizational level and is/it or bi related competencies, competencies of presented models in this domain were extracted and decreased to 19 competencies by combining and interviewing. then, the questionnaire was developed that asked about the 19 competencies effect on bi success in its part 3, which contains an explanation of the bi success definition in part 2 (part 1 was assigned to the respondent profile). all 19 of the competencies effects on bi success was approved by a chi-square test. an efa, conducted to test the validity, grouped the 19 competencies into six factors that are grouped in the initial framework (it infrastructure, bi governance, and facilitating resources). the six factors are named and described completely in this article. bi systems are new to iranian companies and there are only limited numbers of companies that are familiar with bi systems. that was a limitation for this study. on the one hand, the number of experts who were qualified enough for participating in the study was limited. nonetheless, some experts declined to participate and answer the questionnaire. indeed, this study is not comprehensive in relation to organizational competencies for bi success. this is because the scope of the study is limited due to the elimination of some competency constructs: knowledge management competencies (alpar, engler, & schulz, 2015) that incude the capturing, filing and categorization of the information (oubrich, 2011), business process competencies, project management competencies, and learning organization competencies (which were among the 40 competencies explored). since these competency constructs can be in turn defined as independent study projects for future research, we found them to be beyond the boundaries of a single study. 7. references abzaltynova, z., & williams, j. (2013). developments in business intelligence software. journal of intelligence studies in business, 3(2), 40-54. adamala, s., & cidrin, l. (2011). key success factors in business intelligence. journal of intelligence studies in business, 1(1), 107127. agostino, a., solberg søilen, k., & gerritsen, b. (2013). cloud solution in business intelligence for smes – vendor and customer perspectives. journal of intelligence studies in business, 3, 5-28. allan, g. (2003). a critique of using grounded theory as a research method. electronic journal of business research methods, 2(1): 1-10. alpar, p., engler, t., & schulz, m. (2015). influence of social software features on the reuse of business intelligence reports. information processing and management, 51, 235–251. amara, y., solberg søilen, k., & vriens, d. (2012). using the ssav model to evaluate business intelligence software. journal of intelligence studies in business, 3, 29-40. amid, a., moalagh, m., & zare ravasan, a. (2012). identification and classification of erp critical failure factors in iranian industries. information systems, 37: 227–237. doi:10.1016/j.is.2011.10.010 anderson, m., & sohal, a. s. (1999). a study of the relationship between quality management practices and performance in small businesses. international journal of quality & reliability management, 16(9): 859–877. 30 aziza, a., oubrich, m., & solberg søilen, k. (2015). the impact of crm on qoe : an exploratory study from mobile phone industry in morocco. journal of intelligence studies in business, 5(2), 22-35. bartlett, m. (1950). test of significance in factor analysis. british journal of psychology, 3: 77– 85. banerjee, m., & mishra, m. (2015). retail supply chain management practices in india: a business intelligence perspective. journal of retailing and consumer services, 2-12. beth, l. (2006). ‘bi governance. http://66.132.247.206/uploads/bcg_pub_big overnance.pdf. bhamra, r., dani, s., & bhamra, t. (2010). competence understanding and use in smes: an uk manufacturing perspective. international journal of production research, 1-15.doi: 10.1080/00207541003738873 boudreau, m., gefen, d., & straub, d. (2001). validation in information systems research: a state-of-the-art assessment. mis quarterly, 25(1):1-16. caldeira, m., & dhillon, g. (2010). are we really competent? assessing organizational ability in delivering it benefits. emerald group publishing limited: 1-25. chasalow, l. (2009). a model of organizational competencies for business intelligence success. proquest, dissertation, virginia commonwealth university. chen, y.-c., & wu, j.-h. (2011). it management capability and its impact on the performance of a cio. information & management, 48: 145–156. doi:10.1016/j.im.2011.04.001 chuah, m.-h., & wong, k.-l. (eds.). (2013). the implementation of enterprise business intelligence: case study approach. journal of southeast asian research, 1-15. doi:10.5171/2013.369047 cochran, w. g. (1954). some methods of strengthening the common chi-square tests. biometrics, 10: 417451. cox, c. (2010). balancing decision speed and decision quality. proquest, dissertation, california: faculty of the college of business administration. crawford, l., & hassner nahmias, a. (2010). competencies for managing change. international journal of project management, 28: 405–412. doi:10.1016/j.ijproman.2010.01. 015 danneels, e. (2002, september 19). the dynamics of product innovation and firm competences. strategic management journal, 23: 1095– 1121. doi:10.1002/smj.275 doherty, n. f., & terry, m. (2009). the role of is capabilities in delivering sustainable improvements to competitive positioning. journal of strategic information systems, 18: 100–116. doi:10.1016/j.jsis.2009.05.002 enescrig-tena, a. b., & bou-llusar, j. c. (2005). a model for evaluating organizational competencies: an application in the context of a quality management initiative. decision sciences, 36 (2): 221-257. exploratory factor analysis statwiki. (2012). statwiki: http://statwiki.kolobkreations.com/ wiki/exploratory_factor_analysis feeny, d., & willcocks, l. (1998). core is capabilities for exploiting information technology. sloan management review, 39(3): 9-21. fourati-jamoussi, f. and niamba, c.n. (2016) an evaluation of business intelligence tools: a cluster analysis of users’ perceptions. journal of intelligence studies in business. vol 6, no 1. pages 37-47. ghazanfari, m., jafari, m., & rouhani, s. (2011). a tool to evaluate the business intelligence of enterprise systems. scientia iranica e, 18(6): 1579–1590. doi:10.1016/j.scient.2011.11.011 ghazanfari, m., jafari, m., & rouhani, s. (2011). a tool to evaluate the business intelligence of enterprise systems. scientia iranica e, 1579– 1590. green jr., k., inman, r., birou, l., & whitten, d. (2014). total jit (t-jit) and its impact on supply chain competency and. int. j. production economics, 147, 125–135. doi:10.1016/j.ijpe.2013.08.026 hair, j., black, w., babin, b., & anderson, r. (2010). multivariate data analysis (7thed.). nj, usa: prentice-hall, inc. upper saddle river. harzallah, m., & vernadat, f. (2001). it-based competency modeling and management: from theory to practice in enterprise engineering and operations. computers in industry 48: 157-179. hermosillo worley, j., chatha, k., weston, r., aguirre, o., & grabot, b. (2005). implementation and optimization of erp systems: a better integration of processes, roles. computers in industry, 56: 620–638. doi:10.1016/j.compind.2005.03.006 hollander, m., & wolfe, d. (1973). nonparametric statistical methods. wiley: 21–132. hoppe, m. (2013). the intelligence worker as a knowledge activist – an alternative view on intelligence by the use of burke’s pentad. journal of intelligence studies in business, 59-68. huang, k.-f. (2011). technology competencies in competitive environment. journal of business research, 64: 172–179. doi:10.1016/j.jbusres.2010.02.003 isik, ö. (2010). business intelligence success: an empirical evaluation of the role of bi. 31 proquest, dissertation, texas: university of north texas. isik, o., jones, m. c., & sidorova, a. (2013). business intelligence success: the roles of bi capabilities and decision environments. information & management, 50: 13–23. doi:10.1016/j.im.2012.12.001 miller, g. i., bräutigam, d., & stefani, g. (2006). business intelligence competency centers a team approach to maximizing competitive advantage. in canada: sas institute. momeni , a., & mehrafzoon, m. (2013). critical factors of competitive intelligence in the power plant industry: the case study of mapna group. journal of intelligence studies in business, 3(1), 31-43. muntean, m., gabriel cabău, l., & rînciog, v. (2014). social business intelligence: a new perspective for decision. 12th international symposium in management. 124, pp. 562 – 567. timisoara, romania: procedia social and behavioral sciences. doi:10.1016/j.sbspro.2014.02.520 javanmard, h., mashayekhi nezamabadi, e., & larki, n. (2010). surveying the organizational competencies for implementing the knowledge management in markazi province's gas company, iran. ieee 2010: 531-533. ieee. doi: 978-1-4244-55409/10 jayanthi, r. (2008). business justification with business intelligence. the journal of information and knowledge management systems, 38(4), 461-475. doi: 10.1108/03055720810917714 kaiser, h. (1958). the varimax criterion for analytic rotation in factor analysis. psychometrika, 23(3): 187–200. kaiser, h. (1974). an index of factorial simplicity. psychometrika 39: 31–36. lee, y.-t. (2010). exploring high-performers’ required competencies. expert systems with applications, 37: 434–439. doi:10.1016/j.eswa.2009.05.064 li, s., shue, l.-y., & lee, s.-f. (2008). business intelligence approach to supporting strategymaking of isp service management. expert systems with applications, 35: 739–754. lilliefors, h. w. (1967). on the kolmogorovsmirnov tests for normality with mean and variance unknown. journal of the american statistical association, 62: 399-402. lin, y.-h., tsai, k.-m., shiang, w.-j., kuo, t.-c., & tsai, c.-h. (2009). research on using anp to establish a performance assessment model for business intelligence systems. expert systems with applications 36: 4135–4146. montealegre, r. (2002). a process model of capability development: lessons from the electronic commerce strategy. organization science, 13(5), 514-531. http://www.jstor.org/stable/3086075 ngai, e. w., chau, d. c., & chan, t. (2010). information technology, operational, and management competencies for supply chain agility: findings from case studies. journal of strategic information systems: 118. doi:10.1016/j.jsis.2010.11.002 nienabera, h., & sewdassb, n. (2016). a reflection and integration of workforce conceptualisations and measurements for competitive advantag. journal of intelligence studies in business, 6(1), 5-20. nunnally, j. (1978). psychometric theory. mcgraw-hill, ny. oubrich, m. (2011). competitive intelligence and knowledge creation outward insights from an empirical survey. journal of intelligence studies in business, 1, 97-106. penrose, e. t. (1959). the theory of the growth of the firm. oxford, uk: basil blackwell, londres. peppard, j., & ward, j. (2004). beyond strategic information systems: toward an is capability. journal of strategic information systems, 13: 167–194. doi:10.1016/j.jsis.2004.02.002 (peppard & ward, 2004) peppard, j., lambert, r., & edwards, c. (2000). whose job is it anyway? : organizational information competencies for value creation. information system journal, 10: 291-322. (peppard, lambert, & edwards, 2000) popovic, a., hackney, r., simoes coelho, p., & jaklic, j. (2012). towards business intelligence systems success: effects of maturity and culture on analytical decision making. decision support systems, 54: 729– 739. doi:10.1016/j.dss.2012.08.017 prahalad, c. k., & hamel, g. (1994). strategy as a field of study: why search for a new paradigm? strategic management journal, 15(s2): 5–16. doi:10.1002/smj.4250151002 (prahalad, 1994) ravichandran, t. (2007). it competencies, innovation capacity and organizational agility: performance impact and the moderating effects of environmental characteristics. cist, informs: 1-23. sabanovic, a., & solberg søilen, k. (2012). customers’ expectations and needs in the business intelligence software market. journal of intelligence studies in business, 2, 5-20. schaarschmidt, m., walsh, g., & kortzfleisch, h. (2015). how do firms influence open source software communities? a framework and empirical analysis of different governance modes. information and organization, 25, 99– 114. 32 selznick, p. (1957). leadership in administration: a sociological perspective. new york: harper & row. solberg søilen, k., & hasslinger, a. (2012). factors shaping vendor differentiation in the business intelligence software industry. journal of intelligence studies in business, 3, 48-54. straub, d. (1989). validating instruments in mis research. mis quarterly 13(2): 147-169. tarafdar, m., & gordon, s. r. (2007). understanding the influence of information systems competencies on process innovation. journal of strategic information systems, 16: 353–392. doi:10.1016/j.jsis.2007.09.001 turban, e., sharda, r., delen, d., & king, d. (2010). business intelligence: a managerial approach, second edition. pearson, new jersey. tyler, b. b. (2001). the complementarity of cooperative and technological competencies: a resource-based perspective. journal of engineering and technology management, 18: 1-27. wade, m., & hulland, j. (2004). the resourcebased view and information systems research: review, extension, and suggestions for future research. mis quarterly 28(1): 107-142. wang, c.-h. (2015). a novel approach to conduct the importance-satisfaction analysis for acquiring typical user groups in businessintelligence systems. computers in human behavior, 1-9. wang, y., lo, h.-p., & yang, y. (2004). the constituents of core competencies and firm performance: evidence from high-technology. journal of engineering and technology management, 21: 249280.doi:10.1016/j.jengtecman.2004.09.001 wilcox kingl, a., & zeitham, c. p. (2001). competencies and firm performance: examining the causal ambiguity paradox. strategic management journal, 22(1), 75–99. doi: 10.1002/10970266(200101)22:1 willcocks, l., feeny, d., & olson, n. (2006). implementing core is capabilities: feenywillcocks it governance and management framework revisited. european management journal, 24(1): 28–37. doi:10.1016/j.emj.2005.12.005 worley, j., chatha, k., weston, r., aguirre, o., & grabot, b. (2005). implementation and optimization of erp systems: a better integration of processes, roles, knowledge and user competencies. computers in industry, 56, 620–638. doi:10.1016/j.compind.2005.03.006 zouine, a., & fenies, p. (2015). a new evaluation model of erp system success. journal of intelligence studies in business, 5(1), 18-39. 8. appendix a the organizational competency descriptions and related sources. id competency the ability related sources it i nf ra st ru ct ur e v1 is architecture framework the type of is architecture framework determines the development and maintenance ability of the system (caldeira, & dhillon, 2010)(chasalow 2009)(feeny, & willcocks, 1998)(j. miller, bräutigam, & stefani, 2006)(peppard & ward, 2004) v2 it flexibility it flexibility is a part of the it infrastructure ability that facilitates quick and easy adaption of new technology launches (some references mentioned connectivity, compatibility and modularity as it flexibility factors) (miller, bräutigam, & stefani, 2006)(ngai, chau& ,chan, 2010)(ravichandran, 2007) (agostino, solberg søilen, & gerritsen, 2013) v3 applications development to develop/acquire and implement information, systems and technology solutions that satisfy business needs (not only to develop applications in-house but also to contract out it products and services) (caldeira, & dhillon, 2010)(doherty & terry, 2009)(peppard & ward, 2004)(peppard, lambert, & edwards, 2000)(wade & hulland, 2004) v4 integration of data sources to link information systems and share information among different functions and parts of a supply chain (chasalow, 2009)(chen & wu, 2011)(miller, bräutigam, & stefani, 2006)(ngai, chau& , chan, 2010) v5 well-defined data environment including stewardship and metadata to manage and maintain metadata and to administer technical metadata and ensure its adjustment with business metadata (stewardship) (chen & wu, 2011)(miller, bräutigam, & stefani, 2006) v6 data quality improvement to have and improvement cycle for collecting, correcting, accreting, and validating data and improving data quality (caldeira, & dhillon, 2010)(chen & wu; 2011)(miller, bräutigam, & stefani, 2006) (fourati-jamoussi & niamba, 2016) 33 v7 metadata tools availability to have and use metadata tools regularly across the organization (chen & wu, 2011) b i g ov er na nc e v8 external relationship management to manage linkages between the is function and stakeholders outside the firm (doherty & terry, 2009)(peppard & ward, 2004)(peppard, lambert, & edwards, 2000)(wade & hulland, 2004) v9 it vendor and consultant development to have an outreach list and contact it/ebusiness service suppliers. the ability to have long relationships with vendors and consultant that sure supporting the implemented system (caldeira, & dhillon, 2010)(feeny, d.f; willcocks, l.p, 1998)(j. miller, bräutigam, & stefani, 2006)(willcocks, feeny, & olson, 2006) v10 service level definition the establishment of service level agreements, and their monitoring, evaluating, measuring, and managing; which is an element of informed buying (caldeira, & dhillon, 2010)(feeny, & willcocks, 1998)(j. miller, bräutigam, & stefani, 2006)(peppard & ward, 2004)(peppard, lambert, & edwards, 2000) v11 stakeholder planning and management to identify key business, human resources, and technical stakeholders to clarify the benefits of the change; and planning and managing their expectations (caldeira, & dhillon, 2010)(ghazanfari, jafari, & rouhani, 2011)(miller, bräutigam, & stefani, 2006)(peppard & ward, 2004) v12 business processes and is/it alignment to integrate it efforts with business purposes and activity and to determine how is can deliver the ‘best practice’ in operational processes and organizational activities (caldeira, & dhillon, 2010)(peppard & ward, 2004)(tarafdar & gordon, 2007)(wade & hulland, 2004)(willcocks, feeny, & olson, 2006) v13 is strategy alignment business strategies should support and be aligned with is strategies and vice-versa (i.e. strategic alignment). according to the alignment is and business are in the same direction ( caldeira, & dhillon, 2010)(miller, bräutigam, & stefani, 2006)(miller, bräutigam, & stefani, 2006)(peppard & ward, 2004)(peppard, lambert, & edwards, 2000) v14 is prioritization strategy to prioritize technology investments and to balance information technology demand and resource requirements to maximum return from investments (chen & wu, 2011)(miller, bräutigam, & stefani, 2006)(peppard & ward, 2004)(peppard, lambert, & edwards, 2000) v15 sourcing strategy to stablish criteria and processes to evaluate the cost-benefit of supply options and contracts with suppliers, to outsourcing it services, and custom designed applications ( caldeira, & dhillon, 2010)(feeny, & willcocks, 1998)(willycocks, feeny, & olson, 2006) f ac ili ta ti ng r es ou rc es v16 funding for acquiring bi tools and building related systems to provide and anticipate required funding to develop an enhanced use of the systems (chen & wu, 2011) v17 funding for building and maintaining an analytical data environment funding for maintaining or improving systems’ response time and the level of it service delivery and funding for improving data quality and availability (chen & wu, 2011) (agostino, solberg søilen, & gerritsen, 2013) v18 select , evaluate, and manage (especially it) staff to recruit an individual who was involved in bi projects and evaluate their technical skills ( caldeira, & dhillon, 2010)(miller, bräutigam, & stefani, 2006)(peppard & ward, 2004)(peppard, lambert, & edwards, 2000) (amara, solberg søilen, & vriens, 2012) v19 ongoing it training to develop staff skills to use computers and software applications and to deploy their skills to ensure technical, business and personal skills meet the needs of the organization ( caldeira, & dhillon, 2010)(chen & wu, 2011)(peppard & ward, 2004)(peppard, lambert, & edwards, 2000) vol6no1paper1 nienaber and sewdass to cite this article: nienaber, h. and sewdass, n. (2016) a reflection and integration of workforce conceptualisations and measurements for competitive advantage. journal of intelligence studies in business. vol 6, no 1. pages 5-20. article url: https://ojs.hh.se/index.php/jisib/article/view/139 this article is open access, in compliance with strategy 2 of the 2002 budapest open access initiative, which states: scholars need the means to launch a new generation of journals committed to open access, and to help existing journals that elect to make the transition to open access. because journal articles should be disseminated as widely as possible, these new journals will no longer invoke copyright to restrict access to and use of the material they publish. instead they will use copyright and other tools to ensure permanent open access to all the articles they publish. because price is a barrier to access, these new journals will not charge subscription or access fees, and will turn to other methods for covering their expenses. there are many alternative sources of funds for this purpose, including the foundations and governments that fund research, the universities and laboratories that employ researchers, endowments set up by discipline or institution, friends of the cause of open access, profits from the sale of add-ons to the basic texts, funds freed up by the demise or cancellation of journals charging traditional subscription or access fees, or even contributions from the researchers themselves. there is no need to favor one of these solutions over the others for all disciplines or nations, and no need to stop looking for other, creative alternatives. journal of intelligence studies in business publication details, including instructions for authors and subscription information: https://ojs.hh.se/index.php/jisib/index a reflection and integration of workforce conceptualisations and measurements for competitive advantage hester nienaber and nisha sewdassa adepartment of operations management, ajh van der walt building, university of south africa, pretoria, south africa, nienah@unisa.ac.za; bcollege of economics and management sciences, ajh van der walt building, university of south africa, pretoria, south africa, sewdan@unisa.ac.za journal of intelligence studies in business please scroll down for article a reflection and integration of workforce conceptualisations and measurements for competitive advantage hester nienabera and nisha sewdassb adepartment of operations management, ajh van der walt building, university of south africa, pretoria, south africa; bcollege of economics and management sciences, ajh van der walt building, university of south africa, pretoria, south africa; *corresponding author: nienah@unisa.ac.za received 15 march 2016; accepted 8 may 2016 abstract workforce management is important in organisational performance. however, executives lament that their workforce management efforts remain ineffective. this comes as no surprise, as workforce measurement poses a challenge for several reasons: the many different conceptualisations of the workforce, which developed in parallel, and flawed workforce analytics, hence inadequate workforce intelligence, are among the most significant. to have the right people available requires timely and accurate information and intelligence to make evidence-based decisions. in order to achieve this proper measurement is required, which forms part of the information system that ensures the availability of the right people, at the right place, at the right time. people measurement/metrics, is a neglected area of research, which is receiving increased attention. though little, if any, attention is devoted to the link between people as dimension of competitive advantage and metrics to ensure the availability of the right people, at the right place at the right time. our conceptual paper attends to this omission by reflecting on the different conceptualisations of ‘workforce’ by integrating the diverse and fragmented literature, which has not been done before, and linking it with workforce measurement. in so doing, we provide a more comprehensive understanding of ‘workforce’ and workforce measurement, ensuring alignment with organisational strategy to secure a competitive advantage and, thus, organisational performance. we also propose an integrated framework to measure and manage the workforce. it transpired that of the many tools available, predictive analytics emerged as the most effective means to measure and manage the workforce successfully. our paper benefits both academics and practitioners as theoretical ambiguities and tensions are clarified while ensuring the availability of the requisite workforce. keywords competitive advantage, organisational performance, predictive analytics, strategy, workforce, workforce analytics, workforce intelligence, workforce metrics 1. introduction workforce management, in whatever guise it appears, has emerged as the answer to promote competitive advantage, ensuring sustainable organisational performance (owen 1813; lepak and snell 2002; sirmon et al. 2011; campbell et al. 2012; vaiman et al. 2012; ployhart et al. 2014; teece 2014; wright et al. 2014; collings 2015). in brief, workforce management is generally seen to involve utilising people with the right sets of competence, across occupations and hierarchies, in a particular context, to ensure organisational performance (i.e. goal achievement) both now and in the future. these sets of competence comprise knowledge (tacit and/or explicit; declarative and/or journal of intelligence studies in business vol. 6, no. 1 (2016) pp. 5-20 open access: freely available at: https://ojs.hh.se/ 6 procedural), skills, abilities/capabilities, experience, attitudes/motivations and physical and emotional health. although organisations recognise the importance of workforce management in sustaining organisational performance, their efforts remain ineffective (ashton and morton 2005; lawler 2006; beechler and woodward 2009; harris et al. 2010, 2011; vaiman et al. 2012; boudreau 2013; dries 2013a,b; winkler et al. 2013; bersin et al. 2014; gelens et al. 2014; kinley and ben-hur 2014; phillips and phillips 2014; collings 2015). a range of reasons is advanced for this state of affairs. on the one hand, it is argued that 'workforce,’ especially in the talent guise, and 'organisational performance' lack conceptual clarity, influencing their measurement and consequently their management. this creates a dilemma for organisations when employing and deploying workers to ensure the organisation’s performance. it stands to reason that we can only manage what we can measure, and we can do so only as well as the intelligence derived from the measurement. in addition, workforce management is compounded by challenges such as globalisation, skills shortages and the accompanying war for ‘talent,’ the mobility of workers, changing demographics and the recessionary lay-off of workers, all of which adversely affect access to workers and, thus, organisational performance (axelrod et al. 2001; lepak and snell 2002; ashton and morton 2005; beechler and woodward 2009; farndale et al. 2010; ployhart et al. 2011, 2014; schuler et al. 2011; sirmon et al. 2011; vaiman et al. 2012; thunnissen et al. 2013; collings 2014, 2015; teece 2014; gallardo-gallardo and thunnissen 2016). on the other hand, it is argued that organisations do not use workforce analytics to derive intelligence based on proven measurement tools. this affects effective decision-making to ensure the availability of the required workforce when needed. put differently, organisations generally do not use formal, relevant, business-focused metrics and intelligence to measure the impact of their workforce on goal achievement (i.e. organisational performance). and this is the case, despite the accessibility and demonstrated success of some measurement methods and tools (bersin et al. 2014; boudreau 2010, 2013; collings 2015; harris et al. 2010; harris et al. 2011; kinley and benhur 2014; lawler 2006; phillips and phillips 2014; vaiman et al. 2012; winkler et al. 2013; zula and chermack 2007). it stands to reason that decisions regarding the workforce and their consequent impact on organisational performance are only as good as the intelligence/analytics yielded by the metrics used. we define 'analytics' as the information/intelligence that results from the systematic analysis of the data or statistics collected by the instrument(s) chosen to measure a specific workforce aspect to be managed. to capitalise on the promise of workforce management, researchers call for further research (boudreau 2013; collings 2015; dries 2013a; gelens et al. 2014; lepak and snell 2002; vaiman et al. 2012) towards a finergrained examination (ployhart et al. 2011) of unresolved issues in the literature (wright et al. 2014), while drawing on and (better) integrating various related literatures (thunnissen et al. 2013; vaiman et al. 2012) to more fully understand (collings 2015; thunnissen et al. 2013) and making a lasting contribution to workforce management and measurement (thunissen et al. 2013; vaiman et al. 2012) theory and practice. this paper aims to respond to the above calls and contributes to the debate on this important issue by integrating significant sources from the diverse and large body of management literature on the different workforce guises, specifically (strategic) human capital (resources), talent management; strategic human resource (hr) management; strategy, particularly the resource-based view; engagement; and metrics, while providing top metrics that are used to make informed workforce decisions supporting strategy implementation, competitive advantage and, thus, sustainable organisational performance. the workforce literature centres on people in the organisation and their (collective) contribution to sustainable organisational performance. although progress has been made in this regard (vaiman and collings 2013) there is still room for improvement (boudreau 2013; davenport et al. 2010, dries 2013a, vaiman et al. 2012) because of the incomplete representation, which limits organisational performance. the need to integrate these literatures stems from both theory and practice. the theory indicates ambiguities and tensions (collings 2014, 2015; dries 2013a,b; thunissen et al. 2013; vaiman et al. 2012), while practice indicates that the required workforce is not available when needed, jeopardising the strategy implementation and, 7 consequently, competitive advantage and, ultimately, the sustainable organisational performance (bersin et al. 2014; collings 2015; vaiman et al. 2012). a better integration of views across the literature in explaining phenomena is not uncommon and can, in certain cases, even be desirable (mayer and sparrowe 2013) as it will produce a more holistic understanding of workforce measurement and management, benefitting the practical application of the phenomenon and, ultimately, the competitiveness and sustainability of organisations. thus our paper contributes to the body of knowledge, as it makes a synthesis that has not been made before and thus adds to knowledge (about workforce management and measurement) to support successful strategy execution, and thus organisational performance, in a way that has not previously been done (see phillips and pugh 2015, p. 26). hence, our theoretical paper provides an overview of how to approach this topic strategically, culminating in a framework. the article begins by discussing people and their role in organisational performance. this is followed by a discussion of workforce analytics that can be used to ensure that organisations make sound decisions for unlocking the availability of the right ‘workforce’ when needed. the article concludes with a framework showing how metrics can be used to measure – and hence manage – the workforce to ensure organisational performance. 2. method the basis of this reflection was 86 texts, including peer-reviewed, full-text articles available in english, reporting on people contributing to organisational performance, whether conceptual or empirical in nature, and/or in combination with workforce metrics. these articles were gathered by merging our personal collections of texts on these topics with texts retrieved from a literature search from the web of science and ebscohost limited to the period from 2000 – the year in which the first articles on the ‘war for talent’ appeared – to 2016. search terms used were ‘(strategic) human capital (resources)’; ‘strategic hr management’; ‘talent management’; ‘engagement’; ‘strategic management’; and ‘metrics, intelligence and analytics’. only 17 of these texts specifically addressed workforce measurement in organisational performance, and only to a limited extent (see references). 3. people and their role in organisations the role of people in sustainable organisational performance has been recognised since the early management publications (see owen 1813). people are acknowledged as the most valuable resource of organisations (lewis and heckman 2006) because of their potential to (collectively) drive organisational performance (crook et al. 2011; lockwood 2007; ployhart and moliterno 2011). limited empirical evidence in this regard is available (collings 2015; guest 2011). thus, people have been studied for a number of years from a variety of viewpoints, including (strategic) human capital (resources) (becker 1962; campbell et al. 2012; ployhart et al. 2011; ployhart et al. 2014; wright et al. 2014), strategic hr management (huselid 1995; lepak and snell 2002), talent management (collings 2015; thunnissen et al. 2013; vaiman et al. 2012), engagement (cheese et al. 2008; crook et al. 2011; kahn 1990; macey and schneider 2008; saks 2006) and strategic management (barney 1991; sirmon et al. 2011; teece 2014). in short, these studies have explicitly or implicitly examined the availability of people with the required competence to execute organisational strategy successfully from an hr perspective or, to a limited extent, in combination with (business) strategy. these studies were largely developed in parallel and do not incorporate engagement and/or workforce measurement to enable management to make evidenced-based decisions on the availability of people with the required competence in support of its strategy execution. organisational performance stems from the competence people bring to the organisation, which should be aligned with the (common) purpose and goals of the organisation to support successful strategy implementation (boxall 2013; campbell et al. 2012; collings 2014; ployhart et al. 2011; ployhart et al. 2014; thunnissen et al. 2013; wright et al. 2014). it should be noted that competence is not fixed or static and may change owing to changes in the workplace and/or environment (bartlett and ghoshal 2002; campbell et al. 2012; collings 2015; lewis 2011; lockwood 2007). it can therefore affect successful strategy implementation and, consequently, goal achievement, otherwise known as organisational performance. moreover, competence by itself does not achieve organisational goals. the worker embodying 8 the competence must be ‘available’ to dispense the competence in pursuit of organisational goals (wright and mcmahan 2011). availability depends on both the worker and the employer (see blumberg and pringle 1982; boxall 2013) and needs elaboration as it entails more than the mere physical presence of the essential number of persons embodying the requisite competence. availability also means that the employee must be able and willing to expend the embodied competence in pursuit of organisational goals. this ability and willingness to act depends on a host of factors, including whether the person has the physical and mental health and the opportunity to dispense his/her competence. we interpret the drivers of engagement identified by cheese et al. (2008) as the availability of people to act in pursuit of organisational goals, which we will briefly elaborate on. opportunity may include being deployed in the correct position, which includes the physical, cognitive and emotional demands that the job makes on the worker, the sense of achievement that the job offers, the opportunity to learn or discover new things, and whether it is meaningful and leads to some form of satisfaction. opportunity is furthermore influenced by whether the worker has been given the means to handle the job and whether his/her goals are achievable. handling the job involves knowledge, skills, technology, accurate and timely available information, systems, processes, training, a favourable working environment, supportive managers and colleagues, work practices that reduce effort rather than adding to it, reasonable workloads and health. furthermore, the worker must perceive that he/she is receiving fair financial compensation and is recognised for his/her contribution to organisational performance. in the main, being fairly compensated is a feeling of being equitably rewarded for his/her contribution and understanding how this is evaluated; he/she must thus experience the process as fair. compensation that is reasonably marketrelated signals recognition. moreover, the worker must experience a sense of community, that is, there should be a feeling of positive social interactions in the workplace. the work should be perceived as fulfilling, meaningful, enjoyable, fun and done in a supportive or collaborative environment, rather than a confrontational environment. in addition, the employee must perceive congruence, which consists of agreement between the individual and organisational values and alignment of expectations and values that have been met. workers must also perceive an alignment between their career and life expectations and aspirations over both the short and the long term, including work–life balance. they must also perceive whether the organisation is investing in them and whether they can shape their own destiny. based on these drivers of engagement, workers then choose to engage themselves (more or less) in pursuit of organisational goals via strategy implementation. the level of worker engagement is, in turn, influenced by, inter alia, the conceptualisation of the workforce, which is the key to strategy implementation. 4. workforce and strategy implementation strategy is a ‘potentially powerful tool to cope with change, but a somewhat elusive concept’ (ansoff and mcdonnell 1990). simply put, strategy is the tool management uses to achieve organisational goals and, in so doing, secure organisational performance (andrews 1987; ansoff 1988; drucker 1954; grant 2016; nilsson and ellström 2012; ployhart et al. 2014; porter 1985, 1998). it is common practice to express goal achievement in financial terms (drucker 1954; nag et al. 2007; nilsson and ellström 2012), the ultimate litmus test for long-term sustainability. this, however, may deflect attention from non-financial measures, whether employee, customer or social good (andrews 1987; boxall and purcell 2011; collings 2014). this observation resonates with the purpose of an organisation, namely to deliver products/services that are valued by its customers, provide employment and contribute to wealth creation (drucker 1954; teece 2014). wealth creation is a broader concept than profit maximisation, involving more stakeholders than only shareholders. moreover, profit maximisation does not necessarily equate with efficacy and, on its own, is not sufficient for organisational sustainability (teece 2014). additionally, there is more to employment than meets the eye. because workers are not inanimate resources, they think about their work and how they contribute to goal achievement (griseri 2013; rothbard 2001; wright and mcmahan 2011). thus, workers are not merely vessels embodying competence, but actively assess (cognitively and affectively) how they contribute to organisational performance in 9 discharging their duties (fearon et al. 2013; kahn 1990; rothbard 2001). as such, workers ‘do’ strategy when discharging their duties in pursuit of organisational goals (jarzabkowski and spee 2009). hence, workers and, in particular, their competence, in concert with other resources, are key in shaping a competitive advantage (heinen and o’neill 2004; campbell et al. 2012; collings 2014; pease et al. 2014). other resources include assets, systems, processes, information, firm attributes, technology and the like. the resource configuration enables the organisation to conceive and implement strategies that improve its efficacy (see barney 1991; cheese et al. 2008; lepak and snell 2002; ployhart et al. 2014; teece 2014; sirmon et al. 2011; wright et al. 2014) in creating value for customers in the arenas where the organisation chooses to compete. according to barney (1991), resources can be classified in three categories: (i) physical capital resources; (ii) human capital resources; and (iii) organisational capital resources, though not all of these have (the same) strategic relevance for the organisation. yet all resources are required in differing degrees to compete successfully (lepak and snell 2002; ployhart et al. 2014; sirmon et al. 2011; teece 2014). the workforce must be prepared to expend their competence (available) (wright and mcmahan 2011), individually and/or especially collectively, to ensure a competitive advantage, as was discussed previously. management plays an important role by creating an environment in which people will be available, as well as combining accessible resources to shape a competitive advantage (campbell et al. 2012; lepak and snell 2002; ployhart and moliterno 2011; sirmon et al. 2011; teece 2014). 5. competitive advantage competitive advantage, the hallmark of an effective strategy (barney 1991; campbell et al. ployhart et al. 2014; porter 1985; 1998), means the organisation does something better than the competition. it attracts customers based on value offered (peteraf and barney 2003; porter 1985, 1998) by combining the resources at its disposal (huselid 1995; ployhart et al. 2014; ployhart and moliterno 2011; sirmon et al. 2011; teece 2014) to leverage their benefit for sustainable organisational performance. this description of competitive advantage shows that it is linked to the resource-based view of the firm. barney (1991, pp.106-111) describes competitive advantage in terms of the characteristics of resources, namely valuable, rare, inimitable and non-substitutable: ‘resources can be valuable only to the degree that they enable an organisation to conceive of or implement strategies that improve its efficacy. resources are rare when they are not abundantly available to competitors to implement a value-creating strategy. valuable and rare resources can only create and sustain a competitive advantage if they cannot be obtained by competitors and thus are imperfectly inimitable. non-substitutability means that there must be no strategically equivalent valuable resources that are themselves either not rare or inimitable.’ thus, competitive advantage is deemed to be embedded in the organisation, and resources play a key role. of all the resources, the workforce is the most important. 6. workforce management and challenges hence, for some authors, competitive advantage is achieved by a few key positions (huselid 1995; whelan and carcary 2011) and/or top performers (axelrod et al. 2001; gelens et al. 2013; vaiman et al. 2012) in the organisation creating an advantage over rivals. in some instances, authors refer to these performers as ‘talent.’ the debate about ‘talent’ covers the following, either as opposing positions or in some combination: whether it is subject (person) or object (competence); exclusive (a gifted few akin to top performers) or inclusive (all people but to differing degrees); unique (company-specific) or generic (applicable to a variety of contexts); and whether competence is innate (a predetermined and fixed capacity) or malleable (can be developed) (becker 1962; boudreau 2013; campbell et al. 2012; dries 2013a,b; farndale et al. 2010; lepak and snell 2002; ployhart et al. 2011; ployhart et al. 2014; schuler et al. 2011; tansley 2011; teece 2014). given the dynamic nature of relationships, the contribution of individuals to organisational performance is greater than merely aggregating individual actions (boxall and purcell 2011; campbell et al. 2012; lepak and snell 2002; pfeffer 2001; ployhart et al. 2011; ployhart and moliterno 2011; pugh and dietz 10 2008; sirmon et al. 2011; teece 2014; wright and mcmahan 2011). hence, the notion that collaboration creates synergy emphasises that competitive advantage cannot be achieved by a position or person or competence acting on its own. some combination is necessary, as shown by, inter alia, boxall and purcell (2011), campbell et al. (2012), lepak and snell (2002), pfeffer (2001), ployhart et al. (2011), ployhart and moliterno (2011), pugh and dietz (2008), sirmon et al. (2011), teece (2014) and wright and mcmahan (2011). thus the view taken on the workforce influences its management, which depends, inter alia, on its consequent measurement, including investing in the development of availability of a future workforce, in particular making decisions about the workers in pursuing organisational performance. moreover, the decisions about having the right workforce available to shape competitive advantage are influenced by a myriad of factors, notably globalisation, global skills shortages, the mobility of skilled people and changing demographics, as mentioned earlier (beechler and woodward 2009; farndale et al. 2010; holtom et al. 2008; nilsson and elstrom 2012; schuler et al. 2011; vaiman et al. 2012). of these factors influencing the availability of the right workforce, skills shortages, of which analytics, are the most important (boudreau 2013; harris et al. 2010; harris et al. 2011; kinley and ben-hur 2014; lawler 2006; phillips and phillips 2014; winkler et al. 2013). moreover, workers can voluntarily relocate (holtom et al. 2008), which is influenced by many factors and can be synthesised as ‘inducements and contributions’ (see march and simon 1958; holtom et al. 2008). the reasons most often advanced for voluntary turnover are improved career opportunities and enhanced work–life balance, suggesting that available workers are not properly utilised, thus affecting availability. to capitalise on the workforce and their contribution to competitive advantage, employers – and particularly line managers – should create an environment in which people feel motivated to expend their ability when given the opportunity to do so. workforce metrics and, in particular, the intelligence gained from analytics play an important role in making sound decisions on the utilisation of workers and their competence, as well as developing competence (boudreau 2010, 2013; davenport et al. 2010; harris et al. 2010; harris et al. 2011; kinley and ben-hur 2014; phillips and phillips 2014) to shape competitive advantage and, thus, organisational performance. hence, in considering the workforce and their contribution to organisational performance, attention should be given to the purpose of the organisation and the goals it pursues; strategy, and specifically competitive advantage on which strategy is based; and particularly people – in terms of numbers required, the competence needed, occupations and hierarchies affected, other resources needed to assist the workforce to discharge their duties in pursuing organisational goals; and the configuration of the people and other resources needed to achieve organisational goals, which are influenced by the environment in which the firm operates. these considerations are relevant in introducing or changing workforce metrics to gauge the impact of the workforce on goal achievement (performance). as such, these considerations are variables forming the basis of the framework we propose, which is illustrated in figure 1. workforce metrics can be used to assess one or more of the components in figure 1. depending on the component to be measured, an appropriate metric/metrics must be selected to collect data that will yield the information and intelligence, on analysis, to make relevant decisions. such decisions can then be assessed for their impact. 7. workforce analytics while hr metrics, human capital metrics, talent analytics, hr scorecards and the hr information system (hris) are valuable for workforce management, it is suggested that there are differences in approaches (khatri 2014, p.2). human resource metrics and human capital metrics are qualitative in nature. human resource metrics focus on the figure 1 workforce and their contribution to organisational performance. 11 efficacy of the role, purpose and accomplishments of the human resources function. human capital metrics inherently focus on employees’ expressing their skills, knowledge and ability, and attempt to explain employees’ contribution to organisational performance. hr scorecards, on the other hand, assist managers to determine what the hr department’s worth is and they attempt to aid in hr measurements. hence, hr scorecards focus more on the strategic requirements of the organisation. there are various hris software programs for managing hr activities. it has become important for organisations to examine the effects of their investment in their workforce on the returns that they gain from such investments (zula and chermack 2007) in terms of organisational performance. hence, organisations need to re-examine their workforce planning processes regularly. this will ensure that they are aligned with the objectives and initiatives of the organisation and applied appropriately so that resources are allocated to support strategy execution and thus enhance the achievement of organisational goals. regular re-examination can benefit organisations by providing evidence of their workforce configuration and can help them to measure and plan for the correct development, allocation and alignment of people so that the organisation can sustain a competitive advantage. when workforce practices and processes are strategically managed, organisations can gain a competitive advantage by utilising their greatest assets, namely their people (lawson and hepp 2005). zula and chermack (2007) caution that when managing the workforce of the organisation, it is important to take note of the metrics adopted to determine if the endeavour is a success. the use of inaccurate or inappropriate metrics may result in incorrect measurements, or even in measuring the wrong thing, thus adversely affecting competitive advantage. typically, the metrics used to measure workforce practices include numbers and costs related to the hiring, training, time to deliver services, ratios of people to budgets and benchmarks (fitz-enz 2009). since these measurements focus mainly on those activities that cost the organisation money and do not provide much relevant information on the value-adding aspects of the people’s performance in the organisation, they do not excite management. pease et al. (2013) concur with this view and indicate that most data collected in organisations mainly focus on the past, including records of sales, expenses, productivity and past performance data that cannot be managed any longer or make a difference to the current situation in the organisations. hence, it has been suggested that measurements are needed on leading-edge indicators such as leadership, engagement, readiness, culture and retention. such information can provide management with clues about the future of the organisation. for instance, engagement surveys have become prominent tools, as reflected in the bain & co survey (see rigby 2015). the latest and more advanced forms of metrics are leading indicators and intangible metrics that are able to predict what is more likely to happen to the workforce. these metrics offer a much higher level of analysis and can address issues that have an effect on the current organisational operations, instead of focusing on past events. this type of metrics is proving more beneficial to organisations and has been reported to attract the attention of management (fitz-enz 2009). with the turbulence in the 21st century economic and business environments globally, most managers want to be forewarned about what is going to happen in the future so that they can make sound investment decisions regarding workforce measurement and management. 8. predictive analytics to deal with the challenges that contemporary workforce changes present in organisations, more powerful means of planning and deploying appropriate development and training of people will be needed. predictive analytics is emerging as a game-changer in current business environments (pease et al. 2014). predictive analytics has been defined as the use of quantitative methods to extract insight from data and then using these insights to assist organisations to make informed decisions and to forecast and improve their final business performance (pease et al. 2014). khatri (2014) indicates that it is a valuable tool for employees’ career planning and the organisation’s strategic planning. predictive analytics can also be used for assessing employees’ training needs, as already discussed. with reference to the white paper on predictive analytics, dey and de (2015) state: 12 ‘several organizations have proactively adopted predictive analytics for their business functions such as finance and risk, customer relationship management, marketing and sales, and manufacturing and it enables them to make informed decisions across a range of activities such as customer retention, sales forecasting, insurance pricing, campaign management, supply chain optimization, credit scoring, and market research.’ furthermore, several new opportunities are offered by predictive analytics that are useful for all the core workforce processes, such as competence acquisition, attrition risk management, employee sentiment analysis and capacity planning. predictive analytics can be applied to workforce learning initiatives to improve the impact of the learning and development initiatives offered in the organisation, thereby shaping competence. it gives the organisation insight into the types of employees that can benefit from the learning initiatives and those that will receive very little or no benefit at all. in this way, employees can be selected that will benefit from the learning initiatives, increasing the impact of their performance in the organisation. organisations can then provide for those employees who would otherwise gain little or no benefit from training, saving costs by investing in suitable learning initiatives that will affect all employees, improving their performance and ability to execute the organisation’s strategy and achieving organisational goals, thereby sustaining organisational performance. it has also been suggested that the best workforce metric for an organisation is the long-term performance of the organisation, which is influenced by leadership and management. investing in people is not new. organisations have anecdotally been using onboarding, skills training and development programmes for a long time now (pease et al. 2014). however, these initiatives have not been able to indicate exactly where and how they are of value and benefit to workers or the organisation. by applying predictive analytics to these learning investments, both the organisation and workers can benefit. the organisation benefits by reducing its expenditure on training for workers that will not benefit, while improving their performance. furthermore, it can focus on improving other business metrics. workers benefit because they attend training and development that can actually help them to improve their performance and that is worthwhile for their specific operations. in turn, appropriate training can contribute to their increased engagement and retention in the organisation (pease et al. 2014). this is in line with the findings of becker (1962), lepak and snell (2002), sirmon et al. (2011) and teece (2014). predictive analytics uses scientific data as evidence for planning, developing and deploying learning and development programmes for workers. 9. reasons for using predictive analytics for workforce management we agree with pfeffer (2009, cited in fitz-enz 2009), who stated: ‘if competitive success is achieved through people – if the workforce is indeed an increasingly important source of competitive advantage, then it is important to build a workforce that has the ability to achieve competitive success that cannot be readily duplicated by others’. pfeffer’s statement resonates with the research of barney (1991), campbell et al. (2012), collings (2014), lepak and snell (2002), ployhart et al. (2011), ployhart et al. (2014), sirmon et al. (2011), vaiman et al. (2012) and wright et al. (2014). according to a 2013 global study by the american management association and the institute for corporate productivity (cited by reilly 2014): ‘58 percent of business leaders indicated that they believe that analytics is a vital part of their organisation today, while 82 percent of business leaders indicated that they expect analytics to be a big part of their organisation in five years’. sullivan (2014) concurs with this and indicates that the traditional metrics used in workforce measurement have a very limited impact since they are backward-looking and focus on the past. predictive analytics is regarded as offering higher value and quality for organisations, as it focuses on analysing past and current data. it looks for patterns and trends that can assist managers to predict possible future people problems, as well as emerging opportunities that they can capitalise 13 on. the global human capital trends report (bersin et al. 2014:117) also found that 78 percent of large organisations that have over 10 000 people in their employ realise that workforce, and specifically competence, analytics is ‘urgent’ and ‘important.’ hence they have placed analytics as one of the top three most urgent trends for workforce management in the 21st century. the report also purports that organisations that make use of analytics successfully to manage their workforce are in a much better position to outperform their peers and competitors as far as the implementation of workforce configuration strategies is concerned. workforce analytics, in particular, is able to provide a significant combination of workplace data and business data that can assist workforce managers to make more informed and appropriate decisions about their people for the sake of sustainability. sullivan (2014) indicates, inter alia, the following reasons why hr (and line) managers need to use predictive analytics for workforce management: § it engenders a forward-looking mindset and routinely making informed decisions based on evidence about what the future will hold for the organisation. § it alerts managers well in advance to emergent problems and challenges so that they can prepare for their effects and minimise any damage. § it allows managers to act strategically, ensuring that their hr plans are integrated into the organisation’s strategic business plans. § the root cause of problems can be easily identified with predictive analytics, allowing talent managers to devise appropriate solutions that solve the exact problems instead of alleviating the symptoms. § since predictive analytics is specifically designed to increase some form of execution to solve or enhance a situation, hr managers have a more positive attitude to accepting and reading the analysis. it also provides in-depth information, such as the estimated costs of future problems and their effects, as well as the cost to the organisation if no action is taken to improve the situation. it furthermore helps managers to prioritise problems that need immediate intervention in support of business priorities. § because predictive analytics is comprehensive, more integrated and usually available in an electronic form, it can provide answers to decision-makers’ enquiries in a timely and consistent manner that other forms of workforce metrics usually lack. § this form of analytics allows management to develop several scenarios or models for a specific problem situation, to pretest the decision that they want to make, see its effects and, where possible, make adjustments before implementing it in the organisation. § predictive analytics allows the organisation to gain a far better workforce and competitive advantage, as compared to those competitors that do not implement predictive analytics to assist them in decision-making. 10. the future of predictive analytics for workforce management to enable an organisation to leverage predictive analytics and obtain maximum benefits from the workforce data that it produces, it is essential to link these data sources to its strategic business outcomes, that is, it should be results-driven, as already pointed out. predictive analytics can be used in workforce management in the following areas, as identified by dey and de (2015): 10.1 employee profiling and segmentation predictive analytics can benefit workforce management by profiling and segmenting employees, helping managers to get a better understanding of their workforce and their contribution to organisational performance. workforce data such as demographics, skills, educational background, experience and designation can be combined with information on roles and responsibilities to create segments that can be used to effectively deploy people. this is congruent with boudreau (2010) and lepak and snell (2002), who claim that the workforce will feel a higher degree of satisfaction in their jobs and their relationship with their employer will improve drastically if they are selected to attend relevant programmes that are going to benefit them the most, contributing to their availability to pursue organisational performance. this 14 analytic forms the basis of workforce planning and engagement surveys, to mention a few. 10.2 employee attrition and loyalty analysis predictive models of attrition can be used to measure the attrition risk score of individual employees. in this way, the organisation can prevent the potential attrition of their workforce that forms part of its competitive configuration. workforce demographic data, performance, compensation and benefits data, market data, rewards and recognition data, training data, behavioural data and workforce survey scores can be used for this analysis. this metric contributes to workforce planning, employee satisfaction and commitment measurements. this analytic will ensure that organisations have the required workforce available at all times. 10.3 forecasting of workforce capacity and recruitment needs organisations are in a better position to optimise resource utilisation and sustain appropriate growth and margins when they are able to predict the requirements for workforce capacity and recruitment. accurate forecasting enables managers to determine their future staffing requirements. factors such as attrition risk scores, business growth forecast and pipelines, number of employees and competence in each department, productivity level and past performance of each employee can be incorporated to enrich the predictive models. again, this analytic equips organisations to be in a better position to do workforce planning. table 1 top five workforce management analytical tools. analytical tool purpose of the tool total cost of workforce this tool is used on a macro level to measure the alignment of the workforce (e.g. competence, ‘availability’ and configuration) with the objectives of the business in support of strategy implementation and to make better strategic decisions in terms of workforce management. this tool can be used effectively in combination with workforce planning, in particular, because it also helps managers to link investments in the workforce to the organisation’s results. management span of control management span of control is regarded as the best tool to measure cost and structure of management staff in an organisation. it is used to assist organisations to capitalise on productivity and efficiency and can evaluate the entire organisation or specific divisions or business units in relation to business results. this tool is useful because it connects well to workforce planning, as the objectives can be displayed on a real-time basis. high-performer turnover rate this tool helps the organisation to see how many employees providing a competitive edge it has lost over time; to some extent, this tool is predictive in that it also indicates the value of the loss of these employees over a period of time. it also provides clues as to how productive the workforce is, which can be linked to business results. career path ratio this tool provides two important measures that reflect the mobility of employees, namely total promotions and total transfers. this measures career path mobility and any internal movement of employees. this metric can be used in combination with employee retention and performance metrics, they are also able to provide valuable links to critical workforce issues, particularly productivity and organisational performance. talent management index this index helps an organisation to evaluate and analyse its talent management practices for recruiting, mobility, managing performance, training and development. the above metrics can all be linked to this metric in order to ensure that the organisation’s workforce is properly measured and, thus, managed. this metric can therefore be regarded as an overarching or holistic tool to manage the workforce. 15 10.4 appropriate recruitment profile selection attrition of employees in specific roles that entail high costs of hiring can lead to significant losses for the organisation. dey and de (2015) indicate that ‘by analysing the data for current employees, including performance and productivity indices, attrition details, and life-time value’, the talent manager will be in a position to create the right profile for each potential employee. moreover, a statistical relationship can be identified between employee value and profile variables such as education and experience. this will then assist managers to identify the most suitable profiles for their organisation. the organisation can then increase the quality, productivity and customer satisfaction scores, while at the same time reducing its recruitment cost and creating sustainable value for the organisation where the strategy can be achieved, thus feeding directly into workforce management. 10.5 employee sentiment analysis it has been suggested that ‘employee sentiment analysis is more effective than annual employee surveys in getting honest, useful feedback’. employee sentiment analysis involves the tracking, analysing and dissecting of key issues regarded as the most relevant to employee sentiments over time, or that can be related to a specific real-time issue. managers then obtain a better understanding of how an hr initiative, policy, organisational change or event is being received by employees at that specific time. internal data related to the respective hr initiatives or changes, together with data from external social media such as facebook, twitter and linkedin, can be used for this analysis, thereby providing the organisation with a clear understanding of the impact that various organisational factors have on productivity, business growth or other objectives. this directly promotes proper workforce management. 10.6 employee fraud risk management predictive analytics can be used by organisations to identify employees who are at high risk of non-compliance with the organisation's security policy or other rules and regulations. the organisation can strengthen its internal fraud risk management by analysing the employee activity data and incident data, using statistical modelling techniques, and then creating a fraud risk score for employees so that appropriate proactive steps can be taken to protect the organisation’s brand image and reputation and prevent possible financial losses. this metric demonstrates a link to workforce management. it may be necessary for hr managers, in particular, as they drive workforce-related issues, to collaborate with other business units in their organisations that are already using predictive analytics to get a better understanding of how to use this measurement tool. the correct application of predictive analytics can transform workforce management from a reactive to a proactive process. it will provide accurate early warnings that can support strategy more comprehensively and help the organisation to sustain itself in the long term. furthermore, the organisation will be in a better position to solve its business problems and reduce its costs, at the same time improving business performance, employee engagement and satisfaction. if this is accomplished, organisations will be able to prove that the ‘generally acceptable idea that organisations can create a competitive advantage from their workforce and their management practices, as reported by shrimali and gidwani (2012)’ is indeed a reality. in sum, predictive analytics can give effect to the ideas proposed by barney (1991), becker (1962), campbell et al. (2012), cheese et al. (2008), collings (2015), huselid (1995), becker and huselid (2006), kahn (1990), lepak and snell (2002), macey and schneider (2008), ployhart et al. (2011), ployhart et al. (2014), saks (2006), sirmon et al. (2011), teece (2014), vaiman et al., (2012) and wright et al. (2014). moreover, this observation corroborates boudreau’s (2010) observation that hr metrics needs retooling. to assist practitioners in applying predictive analytics, we present the top five workforce analytical tools next. 11. top five workforce management analytical tools for the 21st century predictive analytics, workforce analytics or even ‘people analytics’, as it is more commonly referred to by hr managers, has been used extensively by organisations such as humanyze, which assists managers to ‘find surprising and unsuspecting connections and insights in data about what its most effective employees do differently’ (kane 2015). the ceo of humanyze, ben waber, is of the 16 opinion that people analytics can assist managers to gain a better understanding of patterns that are usually hidden about why some employees are more successful at the jobs that they do than others. in this case, the analytics enable managers to read employees in the same way that they usually read statistics. the saba white paper (2014) confirms that most of the world’s advanced organisations use human capital metrics and analytical tools for managing their workforce. these tools provide managers with a more visual understanding of their workforce and enable evidence-based decision-making. the top five practical analytical tools for human capital and workforce management have been identified by saba (2014) and are indicated in table 1. these tools can assist firms to identify and prioritise key questions about their workforce, especially the individuals who give them a competitive edge. these include identifying and quantifying the (strategic) competencies of people, who constitute the most important resource of the organisation, together with other resources, particularly information and technology, which enable the organisation to implement its strategy successfully. moreover, these metrics can also show how the performance of the workforce, in concert, helps to enhance these capabilities, resulting in effective strategy implementation, as discussed in this article. in summary, we provide an integrated workforce management framework in figure 2. 12. conclusions for organisations to remain competitive, they should use workforce analytics effectively, particularly predictive analytics, derived from proven metrics suited to their context. these tools will allow the organisation to make informed decisions about workforce measurement and management and its availability in support of strategy figure 2 integrated framework to measure and manage the workforce. 17 implementation, thus securing organisational sustainability. organisations that are successful at leveraging this form of datadriven decision-making will most certainly position themselves to outsmart their competitors and sustain a competitive advantage. at the same time, they will sustain a higher return and value to all stakeholders and society at large, and they will be able to better position themselves for the challenging business world of today, as well as the business demands of the future. 13. theoretical and practical implications this theoretical article demonstrates that investments in the workforce – whether employment, deployment or training and development – contribute to organisational performance. in this regard, an integrated approach should be followed, starting with a consideration of the purpose and goals of the organisation and the strategy employed to pursue those goals. more particularly, attention should be given to the competitive advantage on which strategy is based, particularly people, in terms of numbers required, the competence needed, and occupations and hierarchies affected. in addition, other resources needed to assist the workforce to successfully discharge their duties in pursuing organisational goals, as well as the configuration of the people and other resources needed to achieve organisational goals, should be considered. moreover, the environment in which the organisation operates, which influences organisational performance, should be considered. it is imperative that managers (whether hr or line) focus on results rather than inputs to ensure the analytics are forward-looking rather than backward-looking and provide relevant workforce data per ‘segment’ (like the quadrants suggested by lepak and snell 2002) – indicating future needs, including training and development per segment. 14. contribution the suggested conceptual framework is theoretical and requires empirical testing. it serves as an outline for future research that can be used universally by researchers. 15. future research given that limited empirical evidence is available on the use of predictive analytics in the workforce, we suggest a practical investigation of how organisations (i) conceptualise their workforce; (ii) what tools they use in measuring different aspect of the workforce, including their impact on organisational performance; and (iii) predict workforce performance. 16. references andrews, k.r. 1987. the concept of corporate strategy. 3rd ed. homewood, ill: richard d irwin. ansoff, h.i. 1988. the new concept of corporate strategy. new york: john wiley & sons. ansoff, h.i. and mcdonnell, e. 1990. implanting strategic management. uk: prentice hall international. ashton, c. and morton, l. 2005. managing talent for competitive advantage: taking a systemic approach to talent management, strategic hr review, 4, 5, 28–31. axelrod, e.l., handfield-jones, h., & welsh, t. 2001. the war for talent, part two. the mckinsey quarterly, 2, 9–11. barney, j. 1991. firm resources and sustained competitive advantage. journal of management, 17, 1, 99–120. bartlett, c.a. and ghoshal, s. 2002. building competitive advantage with people. mit sloan management review, winter, 34–41. becker, g.s. 1962. investment in human capital: a theoretical analysis. the journal of political economy, 70, 5, part 2, 9–49. becker, b.e. and huselid, m.a. 2006. strategic human resources management: where do we go from here? journal of management, 32, 6, 898–925. beechler, s. and woodward, i.c. 2009. the global war for talent. journal of international management, 15, 273–285. bersin, j., houston, j. and kester, b. 2014. global human capital trends 2014: engaging the 21st century workforce. a report by deloitte consulting and bersin by deloitte, 117–123. blumberg, m. and pringle, c.d. 1982. the missing opportunity in organizational research: some implications for a theory of 18 work performance. academy of management review, 7, 560–569. boudreau, j.w. 2010. retooling hr: using proven business tools to make better decisions about talent. boston, ma.: harvard business school press. boudreau, j.w. 2013. appreciating and ‘retooling’ diversity in talent management conceptual models: a commentary on ‘the psychology of talent management: a review and research agenda'. human resource management review, 23, 286–289. boxall, p. 2013. mutuality in the management of human resources: assessing the quality of alignment in employment relationships. human resource management journal, 23, 1, 3–17. boxall, p. and purcell, j. 2011. strategy and human resource management. 3rd ed. basingstoke: palgrave macmillan. campbell, b.a., coff, r. and kryscynski, d. 2012. rethinking sustained competitive advantage from human capital. academy of management review, 37, 3, 376–395. cheese, p., thomas, r.j. and craig, e. 2008. the talent powered organisation: strategies for globalisation, talent management and high performance. london: kogan press limited. collings, d.g. 2014. toward mature talent management: beyond shareholder value. human resource development quarterly, 25, 3, 301–319. collings, d.g. 2015. the contribution of talent management to organization success. in kraiger, k., passmore, j., dos santos, n. r. and malvezzi s. (eds). the wiley blackwell handbook of the psychology of training, development, and performance improvement, [s.l.]: john wiley and sons, ltd. crook, t.r., todd, s.y., combs, j.g., woehr, d.j. and ketchen, d.j. 2011. does human capital matter? a meta-analysis of the relationship between human capital and firm performance. journal of applied psychology, 96, 443–456. davenport, t.h., harris, j. and shapiro, j. 2010. competing on talent analytics: what the best companies know about their people – and how they use that information to outperform rivals. harvard business review, 88, 10, 52–8. dey, t.h. and de, p. 2015. predictive analytics in hr: a primer. white paper. tata consultancy services: india. dries, n. 2013a. talent management, from phenomenon to theory: introduction to the special issue. human resource management review 23, 267–271. dries, n. 2013b. the psychology of talent management: a review and research agenda. human resource management review 23, 272–285. drucker, p. 1954. the practice of management. london: heinemann. farndale, e., scullion, h. and sparrow, p. 2010. the role of corporate hr function in global talent management. journal of world business, 45, 161–168. fearon, c., mclaughlin, h. and morris, l. 2013. conceptualising work engagement: an individual, collective and organisational efficacy perspective. european journal of training and development, 37, 3, 244–256. fitz-enz, j. 2009. the roi of human capital: measuring the economic value of employee performance. 2nd ed. new york: amacom. gallardo-gallardo, e and thunnissen, m. 2016. standing on the shoulders of giants? a critical review of empirical talent management research. employee relations, 38, 1, 31–56. [online]. available from: http://dx.doi.org/10.1108/er10-2015-0194. accessed 30 december 2015. gelens, j., hofmans, j., dries, n. and pepermans, r. 2014. talent management and organisational justice: employee reactions to high potential identification. human resource management journal, 24, 2, 159–175. grant, r. 2016. contemporary strategy analysis. 9th ed. chichester: wiley. griseri, p. 2013. an introduction to the philosophy of management. thousand oaks, ca: sage. guest, d.e. 2011. human resource management and performance: still searching for some answers. human resource management journal, 21, 1, 3–13. harris, j., craig, e. and egan, h. 2010. how successful organizations strategically manage their analytic talent. strategy & leadership, 38, 3, 15–22. harris, j.g., craig, e. and light, d.a. 2011. talent and analytics: new approaches, higher roi. journal of business strategy, 32, 6, 4–13. heinen, j.s. and o’neill, c. 2004. managing talent to maximize performance. employment relations today, summer 2004. 19 holtom, b.c., mitchell, t.r., lee, t.w. and eberly, m.b. 2008. turnover and retention research: a glance at the past, a closer review of the present and a venture into the future. academy of management annals, 2, 1, 231– 274. huselid, m.a. 1995. the impact of human resource management practices on turnover, productivity, and corporate financial performance. academy of management journal, 38, 3, 635–872. jarzabkowski, p. and spee, a.p. 2009. strategyas-practice: a review and future directions for the field. international journal of management reviews, 11, 1, 69–95. kahn, w.a. 1990. psychological conditions of personal engagement and disengagement at work. academy of management journal, 33, 4, 692–724. kane, g.c. 2015. people analytics’ through supercharged id badges: ben waber (humanyze), interviewed by gerald c. kane. mit sloan management review, 7 april 2015. khatri, b. 2014. talent analytics: toolkit for managing hr issues. sai om journal of commerce and management, 1, 5, 1–3. kinley, n. and ben-hur, s. 2014. four questions every leader needs to ask about talent management. strategic hr review, 13, 2, 63– 68. lawler, edward, e, iii. 2006. becoming a key player in business strategy. workspan, 49, 1, 10. lawson, t.e. and hepp, r.l. 2005. measuring the performance impact of human resource initiatives. human resource planning, 36–44. lepak, d.p. and snell, s.a. 2002. examining the human resource architecture: the relationships among human capital, employment, and human resource configurations. journal of management, 28, 4, 517–543. lewis, r. 2011. management competencies for enhancing employee engagement. research insights. london: charted institute of personnel development. lewis, r.e. and heckman, r.j. 2006. talent management: a critical review. human resource management review. 16, 139–154. lockwood, n. 2007. leveraging employee engagement for competitive advantage: hr’s strategic role. society for human resource management research quarterly, 3, 1, 1–11. macey, w.h. and schneider, b. 2008. the meaning of engagement. industrial and organizational psychology, 1, 3–30. march, j.g. and simon, h.a. 1958. organizations. new york: john wiley. mayer, k.j and sparrowe, r.t. 2013. from the editors: integrating theories in amj articles. academy of management journal, 56, 4, 917922. nag, r., hambrick, d.c. and chen, m-j. 2007. what is strategic management really? inductive derivation of a consensus definition of the field. strategic management journal, 28, 935–955. nilsson, s. and ellström, p-e. 2012. employability and talent management: challenges for hrd practices. european journal of training and development, 36, 1, 26–45. owen, r. 1813. an address to the superintendants of manufactories. in merrill, h.f. (ed.) 1970, classics in management. [s.l.]: american management association. pease, g., beresford, b. and walker, l. 2014. developing human capital: using analytics to plan and optimize your learning and development investments. new jersey: wiley and sons. pease, g., byerly, b. and fitz-enz, j. 2013. human capital analytics: how to harness the potential of your organisation’s greatest asset. new jersey: wiley and sons. peteraf, m.a. and barney, j.b. 2003. unraveling the resource-based tangle. managerial and decision economics, 24, 309–323. pfeffer, j. 2001. fighting the war for talent is hazardous to your organization’s health. organizational dynamics, 29, 248–259. phillips, e. and pugh, d.s. 2015. how to get a phd: a handbook for students and supervisors. 6th ed. new york: open university press. phillips, jack, j. and phillips, patti, p. 2014. developing a human capital strategy in today's changing environment: eight forces shaping hc strategy. strategic hr review, 13, 3, 130–134. ployhart, r.e. and moliterno, t.p. 2011. emergence of the human capital resource: a multilevel model. academy of management review, 36, 1, 127–150. 20 ployhart, r.e., nyberg, a.j., reilly, g. and maltarich, m.a. 2014. human capital is dead; long live human capital resources! journal of management, 40, 2, 371–398. ployhart, r.e., van iddekinge, c.h. and mackenzie, w.i. jr. 2011. acquiring and developing human capital in service contexts: the interconnectedness of human capital resources. academy of management journal, 54, 2, 353–368. porter, m. 1985. competitive advantage: creating and sustaining superior performance. new york: the free press. porter, m. 1998. competitive advantage: creating and sustaining superior performance. 2nd ed. new york: the free press. pugh, s.d. and dietz, j. 2008. employee engagement at the organisational level of analysis. industrial and organizational psychology, 1, 44–47. reilly, e.t. 2014. hr challenged in the era of big data. [online]. available from: http://www.talentmgt.com/articles/print/6757 -hr-challenged-in-the-era-of-big-data. accessed 13 march 2015. rigby, d.k. 2015. management tools 2015: an executive’s guide. boston, ma: bain & co. rothbard, n.p. 2001. enriching or depleting? the dynamics of engagement in work and family roles. administrative science quarterly, 46, 655–684. saba white paper. 2014. top five metrics for workforce analytics. [online]. available from: http://www.saba.com. accessed 30 april 2014. saks, a.m. 2006. antecedents and consequences of employee engagement. journal of managerial psychology, 21, 7, 600–619. schuler, r.s., jackson, s.e. and tarique, i. 2011. global talent management and global talent challenges: strategic opportunities for ihrm. journal of world business, 46, 506–516. shrimali, h. and gidwani, b. 2012. role of talent management in sustainable competitive advantage: rising to meet business challenge. pacific business review international, 4, 3, 29–33. sirmon, d.g., hitt, m.a., ireland, r.d. and gilbert, b.a. 2011. resource orchestration to create competitive advantage: breadth, depth, and life cycle effects. journal of management, 37, 5, 1390–1412. sullivan, j. 2014. hr ranks at the bottom – reasons to adopt metrics and predictive analytics. [online]. available from: http://www.ere.net/2014/09/29/hr-ranks-atthe-bottom-reasons-to-adopt-metrics-andpredictive-analytics/. accessed 13 march 2015. tansley, c. 2011. what do we mean by the term “talent” in talent management? industrial and commercial training, 43, 5, 266–274. teece, d.j. 2014. the foundations of enterprise performance: dynamic and ordinary capabilities in an (economic) theory of firms. the academy of management perspectives, 28, 4, 328–352. thunnissen, m., boselie, p. and fruytier, b. 2013. talent management and the relevance of context: towards a pluralistic approach. human resource management review, 23, 326–336. vaiman, v. and collings, d.g. 2013. talent management: advancing the field. the international journal of human resource management, 24, 9, 1737–1743. vaiman, v., scullion, h. and collings, d. 2012. talent management decision-making. management decision, 50, 5, 925–941. whelan, e. and carcary, m. 2011. integrating talent and knowledge management: where are the benefits? journal of knowledge management, 15, 4, 675–686. winkler, s., konig, c.j. and kleinmann, m. 2013. what makes human resource information successful? managers’ perceptions of attributes for successful human resource information. the international journal of human resource management, 24, 2, 227– 242. wright, p.m., coff, r. and moliterno, t.p. 2014. strategic human capital: crossing the great divide. journal of management, 37, 5, 1390– 1412. wright, p.m. and mcmahan, g.c. 2011. exploring human capital: putting human back into strategic human resource management. human resource management journal, 21, 2, 93–104. zula, k.j. and chermack, t.j. 2007. human capital planning: a review of literature and implications for human resource development. human resource development review, 6, 3, 245–262. jisib-vol-12_nr-1(2022) (3).pdf journal of intelligence studies in business vol. 12 no. 1 (2022) open access: freely available at: https://ojs.hh.se/ pp. 44–64 how to improve the vision and competitive advantage of a new product by ict and olc? abstract nowadays, organizations that learn and are based on innovation are more successful. the purpose of this study is to investigate the impact of information and communication technology (ict) on mediating role of organizational learning capability (olc) by structural equation modeling (sem). iran’s automobile industry was selected as the statistical population. the results show implementing ict. keywords: 1. introduction great improvement in information and communication technology (ict) and its widespread use is one of the characteristics of 21st century (unctad, 2010). this improvement provided people with more possibilities and opportunitechnology also facilitated access and management of information and provided our ability in accessing knowledge and business opportuinformation and communication technology is an extensive domain that includes hardware (portable computers, computing technologies, automated event record tools), software (multimedia data sources) and information system technology (intranet and internet) (brown and maccormac, 2009). information and communication technology has great potential in changing most common activities (otieno, 2012). prasad believes that information and communication technology is a tool for mass customization passed on customer demands, automation of the sales department, improving marketing decision-making systems and cooperation and communication with customers (prasad et al., 2001). many organizations are facing a competitive environment in which maintaining their competitive abilities is one of the main concerns (knudsen et al., 2021). competitive advantage means a company has attained superior performance relative to other competitors (lazzarini, 2015; schilke, 2014; kahupi et al., 2021) by for example achieving cost leadership or being differentiated in what it offers, or having developed a strategy that is value-creating and not being implemented by competitors (barney, 1991). according to nevo and wade (2010) and chatterjee (2021) value refers to the ability of exploiting market opportunities; rarity refers to competitors; inimitability relates to the costs non-substitutability refers to the nonexistence of equivalent resources. among the characteristics of a competitive environment are spread of novel technologies, quicker obsolescence or products and changes in customers’ needs 45 (knudsen et al., 2021). managers also noticed tions is their human resources. therefore, organizations must provide a continuous stream of novel and innovative products and expand their markets in order to maintain their success which necessitates organizational learning (gomes and wojahn, 2017). novel organizational approaches consider learning to be an organizational culture and seek to integrate personal, group and organizational learning. in this approach, in order to pay attention to external challenges and proper use of opportunities, an organization needs certain internal abilities and capabilities that use different styles of learning to acquire novel ideals from organization’s environment and institutionalize these ideas in the organization (ashton and thorn, 2007). the concept of organizational learning capability emphasizes the importance of factors facilitating learning or trend toward learning in the organization (kalmuk and acar, 2015). in fact, organizational learning capability shows the capacity for creating and implementation of ideas in order to deal with various organizational barriers using innovations and management methods (nwankpa and roumani, 2014). organizational learning alone is not enough, but its ultimate goal of improving performance and gaining, maintaining and enhancing competitive advantage must be achieved. organizational learning is an important and vital component for innovation through which a new product is developed (sutanto, 2017). before an organization can improve its innovation behavior, management must analyze the learning that is common in the organization (petra et al., 2002). in fact, organizational learning has become an important strategy to create competitive advantage in considered valuable resources for the organization (saro, 2007). organizational learning can also help the organization to achieve its vision and performance goals (gah, 2003). therefore, it is important to pay attention to the concept of learning and measure its capability in is possible by acquiring knowledge from various sources and applying it in the organization. organizations therefore seek to enhance the performance of innovation by improving their knowledge base, by adapting to customer needs, and by rapid learning (gilbert et al., product development processes, the ability to acquire existing knowledge and competencies, and knowledge development, i.e. the concepts that underlie organizational learning capability. based on this, it can be said that organizational learning is an important factor that can lead to the success of a new product (callanton, 2002). organizations must cope with an increasingly changing environment. such a change derives essentially from the evolution and changes in customers’ needs, technological advances to satisfy those needs and the evolution in business management (lee et al., 2013). therefore, the business ability to build and defend a competitive position in the market depends to a great extent on the capacity to invest and use information (weber and kantamneni, 2002; mithas and rust, 2016). in this regard we can consider information technology to be a key factor for the organization’s success. the literature considers information technologies to be an important source of competitive advantages for the company (gil-saura et al., 2009; amuna, 2017). ict industry plays an essential role in most countries (ministry and pitner 2014; talib ict manufacturing and ict service. in both may emerge and provide products and services with new functions and values. unlike other industries, ict-based industries show the most diverse characteristics of convergence (an et al. 2016). ict industry leads to sustainable national competitiveness because it creates greater linkage effects than any other industry and accelerates innovation in related sectors (xing et al. a pivotal role in increasing the productivity of the entire economy (asikainen and mangiarotti 2017). given that the automobile industry has a vital role in the economic development of a country and is considered as one of its economic infrastructures, iran also seeks to become strong in this industry. given that automobile industry in iran is developing, this industry seeks to increase its market share, especially in the middle east, by launching new products. in this regard, paying attention to factors such as vision and competitive advantage in new products can lead to the growth of this indusin iran has been studied. on the other hand, so far no research has been done on the role of information and communication technology and organizational learning capability in improving the new product vision and competthis gap. accordingly, the purpose of this study is to investigate the effect of information and 46 communication technology on the new product competitive advantage and new product vision by considering the partial mediating role of organizational learning capability. the results of present research can help government or managers and contribute to future relevant researches. 2. literature review 2.1 information and communication technology at the start of the millennium, information and communication technology has affected the entire world and has changed the foundations of many systems (jerez-gomez, céspedessocieties” (sar and misra, 2020). the ict also stimulates initiative and creativity (chai, koh, and tsai, 2010; ómez mediavilla, 2021), enables individualization and makes knowledge acquisition more accesicts are an important part of every country’s national infrastructure. technological readiness refers to the speed with which an economy utilizes existing technologies to improve the productivity of its industries, with speactivities and production processes to achieve (salehan, kim and lee, 2018). ict profoundly affects economic and social development (wang, communication technology in many aspects of human life had turned the world into what is known as an information society. the rapid emergence of modern ict has substantially changed the type of skills that are needed to successfully participate, communicate, and work in a modern society (gnambs, 2021). today, access to internet and other information sources is increasing exponentially and all societies try to use these new technologies by creating the necessary infrastructures. icts may have promoted and advanced an individual’s (and a community’s) radicalization process (parra, gupta, and mikalef, 2021). the application of ict across different sectors of the global economy has become a game changer (ayisi nyarko and kozári, 2021). all experts and policy-makers state that information and communication technology creates great potendevelopment. to this end, many countries have information and communication technologies many nations consider ict to be a strategic tool for improving welfare, wealth, equity and better access to information are considered to be wealthier. this means that today, the main power of countries is not based on polluting factories or destructive war machines but instead based on having access to more information in a timely manner (pelgrum, 2001). in fact, ict emphasizes the role of information and information processing, storage, transfer and retrieval facilities. it is worthy to note that other than communicative infrastructure, other forms of media such as radio and television also play important roles as information transfer channels (colecchia and schreyer, the set of tools, machines, know-how, methods and skills used in creating, trading, processing, retrieval, transfer and use of information and includes all levels of information processes from simplest to the most complex (akshay and dhirubhai, 2005). in general, ict is the use of information management tools services used for creating, processing, storage, distribution and transfer of information (rama rao, 2004). studies show that one of the factors separating organizations from each other is information technology and the extent of its use in them. many factors affect the use of ict in organizations (alexandru, 2006) some of which are investigated in this study which include the folmirghani et al., 2010); attitude factors (alam beigi et al., 2009; mooij and smeets, 2005); training factors (alam beigi et al., 2009); 2009); environmental factors (khuong, 2008); et al., 2015). 2.2 organizational learning capability organizational learning is a process through which organizations learn new information. according to experts, organizational learning is an essential process for every organization in today’s competitive environment and is the sum of all organizational and management characteristics that facilitates learning in 47 2015; sutanto, 2017). many experts state that there is no consensus about measures of organizational learning; this is mostly due to the fact that organizational learning is the result of several stages, each with its own measures of success (birchall and giambona, 2010). the concept of organizational learning emphasizes the importance of factors facilitating the natural inclination or tendency of the organization toward learning (goh, 2003; nwankpa and roumani, 2014). an organization’s learning capacity is one of its organizational and mantions in which it is possible for the organization to learn (alam beigi et al., 2009). it can be said that factors facilitating learning in an organization are the same as measures of its learning capacity. the learning capacity of an organization is the result of individual and group learning in the organization, carried out in management actions or conditions can facilitate or hinder this process. therefore, if one can determine the management actions that facilitate learning (nwankpa and roumani, 2014), then it is possible to measure the organization’s learning capacity. this information can help managers focus on efforts that facilitate organizational learning (chiva, alegre and lapiedra, 2007). organization’s learning capacity is the intrinsic ability of the organization in creating, developing and use of new knowledge in order to compete with its compet2005). in order to create the capacity to learn in an organization it is necessary to have an effective innovation process through activities such as experimentation, constant improvement, team work and group problem solving, observing the activities of other employees and participatory decision-making (goh, 2003). in his study, chiva (2004) tried to determine the factors facilitating organizational learning. in this later work, chiva et al. (2007) developed their measurement tool for organizational learning capacity and determined that organizational learning has several dimensions including 1-experimentation, 2-rrisk-taking cabrera, 2005), 3-interaction with external environment (chiva, alegre and lapiedra, 2007), 4-dialogue (chiva, alegre and lapiedra, 2007) and 5-participatory decision-making (bapuji and grossan, 2007; scatt-ladd and chan, 2004). 2.3 new product competitive advantage a pivotal determinant to its performance and survival(barnett & mckendrick, 2004; barney, and sustain competitive advantage is the funmust consider decisive factors that may enable in terms of product image, sales, market share, and new market opportunities (liao, kuo, and ding, 2017). according to the resource-based tage is attributable to the valuable and rare resources that it currently possesses (cao et al., tage provided that the resources are non-tradable or imitated barney, 1991; barney and clark, 2007; chadwick et al., 2015). globalization of markets, development of dynamic technologies, shortening of product life cycle and rapid changes in customer demands; all of this means that companies’ competitiveness strongly depends on their ability to meet customer demands and needs by creating more value in products and services. these forces companies to upgrade their ability and capacity to create and deliver value to stakeholders, especially customers. in dynamic global markets, companies face varying degrees of competition. rapid technological changes, shortening the product life cycle, and the increasing complexity of technology have forced companies to outsource their technical development (banrent and tishirki, 2004). in a product development environment with new to complexity and uncertainty. competitive advantage includes strategies that companies use to perform better than competitors in product markets. the environmental competitive advantage can be further categorized into cost and differentiation advantage (lópez-gamero et al., 2016; miotto et al., 2020). organizations can gain competitive advantage if they can create value for customers. launching new products is one of the strategic sources of value creation (miles and covin, 2000; walsh and dodds, 2017). so the competitive advantage of a new product is actually the advantage that the new product has over the competitors’ products. competitive advantage requires companies to have particular control over production costs to ensure that their products are priced competitively. dunk (2004) showed that competitive 48 advantage has a positive role on the extent to which organizations use the cost of product life cycle. organizations will have a competitive advantage when they produce and deliver their goods and services better than competitors. in this study, the competitive advantage of the new product is measured by following the research of singh and sang (2007) with seven indicators. 2.4 new product vision objectives and mission (oswald et al., 1994). proactive environmental strategy (pes) entails organizational members’ support, involvement and commitment in attaining sustainability goals of an organization (albertini, 2019; journeault 2016). thereby, shared vision is critical in fostering employees’ participation and commitment in environmental decision making and actions (aragón-correa et al., 2013; garcía-morales et al., 2011). it facilitates effective communication of sustainability-integrated goals, strategies, practices and technologies among organizational members (johnson, 2017) and develops a sense of collectivism and a sustainability-driven working culture (ketprapakorn and kantabutra, 2019). in addition, it provides goal clarity and strategic directions by mitigating ambiguities according to the above description, it can be expressed that the new product vision is in fact a goal and strategic direction that is considered for the product launched to the market. the sector and industry in which the company competes, and how to create value for future customers. all of these factors set the company apart from its competitors (abel, 2006). in new organizations, psychological differences between departments affect the performance ple, if a subsidiary feels that the parent company has a clear picture of a common goal, then it will perform better in competition. the new product vision creates a psychologically safe work environment for teams and also clearly explains development goals to members. lane collaboration and support for the group’s clear and sustainable goals. organizations and their internal departments, with a particular insight into customers and market situations, have to interact with and coordinate with external marketing trends, especially when products members of the new product development team must have the same vision for the product so that they can create a kind of synergy between different departments and organizations. in modern business environments, the success of new product development depends on collaboration between suppliers, research and development, production, sales, marketing, sales channels, and management support (chen and james lane, 2011). in this study, the new product vision is measured by following tsarola’s (2007) research with three indicators. 3. framework and hypotheses development this study which is investigated in the following hypotheses. 3.1 ict and olc information technologies have improved information and communication. in addition, the continuous development of information technologies constantly poses new challenges for people so that they improve, learn and adapt. the communication within an organization, and need to invest in organizational learning, and master the capabilities of knowledge generation, appropriation and exploitation. learning has become valuable because knowledge is an important resource (mai, do and phan, 2022; productivity and competitiveness are a function of knowledge generation and information processing and so modern information and communication technology (ict) acts as (2000), ict might support knowledge-sharing. consequently, technology is important for facilitating knowledge-sharing between organization members. knowledge-sharing can be for managers wishing to help their organizaencourage members to share and transfer their knowledge (bock et al., 2005). according to 49 dewett and jones (2001), information technoland innovative by making knowledge “visible” and accessible; encouraging sharing and applieffective to dismantle communication barriers de ridder (2004) emphasized that the use of it cess. technology can play a central part in providing the media and infrastructure for learning in and between knowledge communities. ing and knowledge transfer and integrated ict development and usage as key characteristics of a successful knowledge community. bennet and shane tomblin (2006) emphasized that organizational learning is also concerned with knowledge and the use of ict helps modern cient, be better coordinated, and create more and varied links between human and knowledge resources in modern ol and km efforts. based on the discussion above, this study offers the following hypothesis. hypothesis 1 information and communication technology affects organizational learning capability. 3.2 olc and npca the results of studies on organizational learning show that learning capabilities can lead to competitive advantage (gah and ryan, 2008) and organizational learning capabilities are in fact a set of organizational and the organizational learning process and allows the organization to learn and play a vital role in the learning process (chiva et al., 2007). in today’s global marketplace, maintaining a competitive position is a constant concern. technological innovations and economic uncertainty have changed the face of competition and made the survival of organizations dependent on the competitive advantage of their new prodnizations should seek to ensure the competitive advantage of their new products by learning and acquiring new knowledge of the envithis study offers the following hypothesis. hypothesis 2 organizational learning capability affects new product competitive advantage. 3.3 olc and npv companies are looking for ways to reduce product development time while at the same time developing quality and reducing costs a strategic and key activity for many companies through which new products will have a signif2005). in fact, new products are an important factor for the success of organizations in the market (gonzalez and palacios, 2002). more . information and communication technology experimentation attitude factor training factor human and managerial factor environmental factor economic factor organizational learning capacity new product vision new product competitive advantage personal factor risk-taking participatory decisionmaking dialogue interaction with external environment h1 h4 h5 h2 h3 50 organizational learning capability can increase the possibility of providing a clear statement of objectives along with the mechanism of providing a path for the rapid development of new products in the form of product vision (winklen, 2010). based on the discussion above, this study offers the following hypo thesis. hypothesis 3 organizational learning capability affects new product vision. 3.4 ict and npca recognized as a primary driver of competitive advantage (chadee and kumar, 2001). icts are an important part of every country’s national infrastructure (salehan, kim and lee, 2018). ict related research has suggested that information processing capability 2003). information processing capability as an essential component of company’s ict has (premkumar et al., 2005; wang et al., 2013) and asset productivity and business growth (chen et al., 2015). recently, practice-oriented research suggests that information processing capability based on business analytics is likely to help companies to gain competitive advantage (e.g. davenport et al., 2001; kiron & shockley, 2011; kiron et al., 2012; cao et al., 2019). nevertheless, a direct link between ict-related capability and competitive advantage seems highly plausible and has been supported by a number of studies underpinned bharadwaj, 2000; barua et al., 2004; mithas (2003) show that a company’s information capability affects its competitive advantage in american high technology companies; sookstrate that information processing capability is positively related to competitive advantage while lim, stratopoulos, and wirjanto, (2012), senior it executives help develop superior it capability, which in turn has a positive impact on competitive advantage. gunasekaran, subramanian and papadopoulos (2017); saeidi et al. (2019) and mao et al. (2016) also state that information technology can lead to a competitive advantage. also competitive advantage requires companies to have particular control over production costs to ensure that their products are priced competitively (liao, kuo and ding, 2017). technological readiness refers to the speed with which an economy utilizes existing technologies to improve the productivity of zation of icts in daily activities and production competitiveness (salehan, kim and lee, 2018). also, according to cao et al. (2021) competitive advantage can be achieved by introducing new technology-based products. based on the discussion above, this study offers the following hypothesis. hypothesis 4 information and communication technology affects new product competitive advantage. 3.5 ict and npv over the last decade, competition has intenrestructure and improve their business pracobtain competitive advantage in order to for a wide range of business processes and improves information and knowledge manageformance (gargallo-castel and galve-górriz, 2012). information and communication technology can promote the economic development 2017; torkayesh and torkayesh, 2021). also information and communication technology affects organization productivity (garicano, affect the communication within an organizarole in all organizations. information technologies are a key tool in the process of knowledge and stafford (2010) investigated how employees in large companies observe communication is the best accepted, but employees believe way of sharing information. information and communication technology can optimize production process and enable capital to replacing labor (acemoglu and restrepo, 2020; autor that guides strategy, policies, and tasks; it is also a key source of cultural formation and susrole in an enterprise’s development, acting as a bright light directing the business towards (2003) found that vision and strategy are 51 foster business strategy. thus, the extent to which organizational members support and understand the vision is a key factor affecting performance (balduck et al., 2010; james and lahti 2011). the adoption of information and communication technologies (icts) in organizations promises to better connect managers with people, increase public participation service delivery, decrease uncertainty, and improve information dissemination (welch can help create a clear vision for new products by improving knowledge sharing, speeding up reducing uncertainty, and improving information dissemination. based on the discussion above, this study offers the following hypothesis. hypothesis 5 information and communication technology affects new product vision. 4. research methodology the main method in examining the hypotheses in the present study is the structural equation modeling method. sem can provide a more quantitative and conceptually appropriate or satisfying understanding of the relationships ment differs from other modeling approaches in that it tests both the direct and indirect effects 2016). the advantage of sem is the ability to incorporate unobserved latent factors whose implied values can be estimated from multiple observed indicators. since these indicators are assumed to be caused by the latent factor or factors (taucher and oschlies, 2011; chin, marcolin, & newsted, 2003). 4.1 data collection and statistical population data gathering methods are divided into two ods. the statistical population of this study include managers of companies active in automobile industry in iran. 4.2 sampling method and sample-size in this study, simple random sampling method was used which was carried out from among managers. sample size was calculated to be 203 managers of companies active in automobile industry in iran. 4.3. measures and instrument development information and communication technology was the independent variable. in this study, alam beighi et al. (2009) questionnaire was used to measure the ict. it measures six aspects included personal factors, attitude factors, training factors, economic factors, environmental factors and human and managerial factors. organizational learning capability was the mediator. in this study. chiva et al. (2007) questionnaire was used to measure the olc. tation, risk-taking, interaction with external environment, dialogue and participative decision making. in this study, the new product competitive advantage and new product vision were dependent variables. new product competitive advantage was measured by following the research of singh and sang (2007) with seven indicators and new product vision was measured by following tsarola’s (2007) research with three indicators. based on prior literature, the present research utilizes a 5-point likert-type rating scale, containing both the extreme points as to accumulate responses for the multi-item constructs. all these studied measures have been adapted from prior researches which establish their validity, however, to check their validity in context to this study a series of tests relating to construct validity and reliability have been performed. 5. empirical analysis and results partial least square–structural equation model ing (pls-sem) is a non-parametric ap proach that makes no distributional as sump tions and can evaluate small samis a research instrument utilized to quantify dynamic cause-effect relationship models with latent variables in various disciplines (cepedathat pls-sem’s methodological toolbox could accommodate more complex model structures and handle data inadequacies such as heterogeneity. this emerging statistical approach 52 could substantially provide higher statistical power, making it a better alternative to covariance-based structural equation modeling, as supported by leguina (2015). pls-sem has now become a popular statistical technique (kumar and purani, 2018). the analysis of this approach can be aided by smart pls, a robust software application with an accessible graphical user interface (sarstedt and cheah, 2019). an sem model combines the attributes of two the multivariate relationship between latent variables and the measured variables and among the latent variables. the measurement model and the structural model together the observed variables into several common and then analyze the direct and indirect relationships between variables through path analysis (ignacio et al., 2019). validity and descriptive statistics variables are measured through observed variables (kang and ahn, 2021; abuzaid, moeilak, and alzaatreh, 2022). each construct contains a set of indicators (lin et al., 2005). to evaluate the measurement model, three cases of index reliability, convergent validity and divergent validity are used. the reliability of the index is measured by three criteria: 1cronbach’s alpha (cronbach, 1951; cronbach and shavelson, 2004), 2composite reliability (cr) (bagozzi & of each criterion must be checked and if this ca6=0.382, and olc11=0.084 are less than ing the indices with a factor loading less than 0.4. reliability indicates the internal consistency of the items and evaluates the extent to which these items are free from random error (rahman, 2022; kuei and madu, 2001). (2010); al-refaie (2011); kim et al. (2020); basak et al. (2021) and al-refaie et al. (2011), the unique and distinct items assigned under each construct. after the analysis, as shown in table 1, the calculated composite reliability 53 the recommended value of 0.7 and thereby, studied under each construct (cronbach and shavelson, 2004). similar test has also been conducted by lu and ramamurthy (2011) to examine the reliability of their studied variables. the instrument’s validity is determined by how well it measures the construct it was validity test, two separate tests such as the convergent and discriminant validity of items have been conducted. the estimated average variance extracted greater than the standard value of 0.5 conation explained by a construct in its criterion variables compared to the total varialso been conducted to determine the t-statistics values which are found to be significant (since, all p < .05) for all the factor loadings and thereby, establish the convergent validity criterion. similar test has latent constructs cr ave mean sd s.e. mean experimentation 1.000 1.000 1.000 4.6495 .47961 .04870 risk-taking 0.759 0.828 0.707 4.5155 .45331 .04603 interaction with external environment 0.916 0.947 0.857 4.1478 .64365 .06535 dialogue 0.817 0.881 0.655 4.1005 .47001 .04772 participative decision-making 0.814 0.914 0.841 4.1718 .66686 .06771 1.000 1.000 1.000 3.0722 1.13878 .11563 1.000 1.000 1.000 3.7938 1.07953 .10961 0.868 0.884 0.525 3.3879 .73098 .07422 0.783 0.902 0.822 3.0515 1.03954 .10555 1.000 1.000 1.000 3.3196 1.02618 .10419 0.822 0.883 0.656 3.3938 1.27654 .12961 npca 0.979 0.983 0.905 3.8823 .88759 .06690 1.000 1.000 1.000 3.9811 .31212 .02353 ict 0.938 0.9389 0.720 3.3365 .86555 .08788 olc 0.791 0.8428 0.5172 4.3170 .29751 .03021 a-f d ec-f en-f e h&m-f i npca npv p-d p-f r t-f 1.000 d 0.049 0.809 0.552 0.074 0.907 0.615 0.058 0.595 1.000 e 0.101 0.045 0.068 0.87 1.000 0.634 0.080 0.741 0741 0.048 0.810 i 0.004 0.772 0.132 0171 0.108 0.094 0.926 npca 0.018 0.584 0.013 0.081 0.423 0.098 0.511 0.951 0.050 0144 0.016 0.104 0.057 0.039 0.039 0.645 1.000 p-d 0.014 0.394 0.069 0.035 0.365 0.086 0.210 0.780 0.682 0.917 0.555 0.016 0.695 0.631 0.068 0.667 0.085 0.029 0.008 0.090 1.000 r 0.089 0.305 0.061 0.040 0.720 0.107 0.408 0.638 0.308 0.434 0.007 0.841 0.725 0.035 0.784 0.735 0.082 0.760 0.080 0.001 0.002 0.006 0.712 0.016 0.725 e = experimentation; r = risk-taking; i = interaction with external environment; d = dialogue; p-d= participative decision54 also been conducted by bi et al. (2013) and tamilmani et al. (2020). validity is estimated when the distinctive and unique values of the individual meacriminant validity of the constructs and according to gefen, straub, and boudreau be greater than the inter-construct correlation. table 2 ascertains that all the studied constructs satisfy the discriminant validity criterion. similar test has also been conducted by panda and rath (2016) to examine the discriminant validity of constructs. 5.2 and reliability of the measurement sections, it is time to examine the structural part of the model. in this section, the most common criterion for measuring the link between constructs in the model (structural part) is the sigif the t-value exceeds 1.96, it indicates the sigond criterion for measuring the structural 2 and panjakajornsak (2018) and wang et al. (2022), 2 is a criterion used to connect the measurement part and the structural part of model and shows the effect that an exogenous variable has on an endogenous variable. 0.19, 0.33 and 0.67 are introduced as the values for weak, medium and strong values of 2. the third criterion is 2. this criterion determines the predictive power of the model and if it is equal to or greater than 0.15, it indicates the appropriate predictive power of the independent variable. is at the appropriate level. 5.3 how well the researcher’s model reproduces the actual phenomenon presented in the data (kang and ahn, 2021). wetzels et al. (2009) have introduced three values of 0.01, 0.25 and 0.36 as weak, medium and strong values for 1. similar test has also been conducted by kim et al. (2005); schermelleh-engel et al. 1 2 and 2 latent constructs r2 q2 t-statistics experimentation 0.452 0.222 risk-taking 0.439 0.283 interaction with external environment 0.709 0.616 dialogue 0.761 0.50 participative decision-making 0.364 0.188 0.625 0.619 0.586 0.566 0.912 0.453 0.740 0.598 0.667 0.644 0.796 0.430 npca 0.640 0.465 0.496 0.308 ict olc 0.589 0.415 ict --> olc 3.028 olc --> npca 13.320 3.087 ict --> npca 3.110 2.010 2 and 2 55 5.4 hypothesis testing results the current study has used the sem approach to test the formulated hypotheses ( et al., 2015), where the results are derived on has also been considered by al-refaie (2015), eriksson (2017) and guzman (2022) to test their studied hypotheses. the present research has both direct and indirect effects similar to t-value for ict to olc is 3.028 which is higher than the critical t-value of 1.96. this nication technology on organizational learning nizational learning capacity due to changes in information and communication technology 3. this means that 42.1% of changes in organizational learning capacity is due to changes in information and communication technology. there is a similar analysis and interpretation for other hypotheses, which is presented in the conclusion section. 6. discussion at information and communication age, phenomenal development of communication and information technology changes the world (nazemi et al., 2005; shahzad et al., 2020; niu, jayaram, 2020). this technology by enhancing the information exchange process and cost reduction has been presented as inducement competition and growth in every human activand teo, 2013; arvanitis and loukis, 2009). the exploration on how to manage organizational resources and capabilities to sustain competitive advantages remains the intriguing unit of research of strategic management ). it is especially through for information and communication technologies industry where technologies developing with astonishing speed and where the life cycles of cutting-edge products are becoming shorter and shorter, and brand-new by others ( idly changing economic landscape, coupled with transformational advances in information and communication technologies, presents many challenges to managers of large and small enterprises alike ( in personal application to political and economic activities because it is multifunctional solution in personal and local applications to satisfy various needs (castelz, 2001). granroos (2000) indicates that ict can cause organizational interaction promotion, cost reduction of management and social interaction promotion of an organization so pay attention to ict and evaluate its level is fundamental and very important. knowledge changes makes new zations so organizations must change continuously. but do organizations know suitable resources for maximizing the innovation? researchers pay attention to factors which develop organizational innovation and introduce organizational learning as core instrument for making innovation, economic growth, organization survivability and also factor for employees’ productivity and organizational performance improvement (arango et al., 2007; hypotheses path t-value p-value test results information and communication technology affects organizational learning capability 0.421 3.028 supported organizational learning capability affects new product competitive advantage 0.800 13.320 supported organizational learning capability affects new product vision 0.309 3.087 supported information and communication technology affects new product competitive advantage 0.261 3.110 supported information and communication technology affects new product vision 0.186 2.010 supported 56 cegarra-navarro et al., 2020). in past, fundamental building of organizations was workforce and capital but nowadays organizations which learn and be innovative and service-oriented are successful. relatively, resources for controlling an organization was outside but in present new resources which are intangible are inside. intangible resources create knowledge and organizational learning is basic method for knowledge creation. organizational learning is is performance improvement and competitive advantage obtainability, retain ability and improvement. saban introduce organizational learning as important and critical component for innovation that has been developed through nization can improve innovation behavior, management must analyze common learning in organization (petrra et al., 2002). in fact, organization learning is important strategy for creating competitive advantage in organizations because competent employees are valuable resources for organizations (saru, 2007). also, organizational learning can help organizations achieve their performance goals and vision (goh, 2003). 7. conclusion information and communication technology (ict) actively promotes development of emerging industries in the global market and structural change, since it catalyzes the creation of some new markets and disappearance of others (li, lee, and kong, 2019). typically, has become a hot topic in the world economy and level investment in ict increased the perforinclude p2p, online banking, e-wallets. that is to say, ict has penetrated the traditional logical activities, transforming and upgrading internetand technology-based structure. the ict industry is an enabler and a driver of economic development and growth, it is imperative to gain knowledge on the functioning of ict in other industries at different levels (li, lee, and kong, 2019). organizational learning capability is considered as factors and managerial and organizational characteristics which facilitate organizational learning process and permit it to learn. also ict affects on olc and is higher than the critical value of 1.96 which to changes in ict and is equal to 0.421. this means that 42.1% of changes in olc is due to changes ict or in other words, ict determines 0.309, olc on npca are 13.320 and 0.800. all communication technology, in addition to having capability, can directly and indirectly affect the competitive advantage of the new product cant role in determining the level of each these variables. references abell, m. (2006). individualizing learning using intelligent technology and universally designed curriculum. journal of technology, learning, and assessment, 5(3), 5–10. (2022). customers’ perception of residential photovoltaic solar projects in the uae: a structural equation modeling approach. energy strategy reviews, 39, 1–14. acemoglu, d., and restrepo, p. (2018). the race between man and machine: implications of technology for growth, factor shares, and employment[j]. the american economic review, 108(6), 1488–1542. ahmad, s., and wan afthanorhan, w. m. a. b. (2014). the importance-performance matrix analysis in partial least square structural equation modeling (pls-sem). international journal of mathematical research, 3 (1), 1–14. akshay, m., dhirubhai, a. (2005). ict and rural societies: opportunities for growth. 57 the international information & library review. 37, 345–351. alam beigi, a., malek ahmadi, e., moghimi, m. (2009). analyzing the effects of components of ict on organizational entrepreneurship development in iran’s agricultural development organization. journal of economic and agricultural development, 2 (40), 103–113. albertini, e. (2019). the contribution of management control systems to environmental capabilities. journal of business ethics, 159(4), 1163–1180. alexandru, a. (2006). ict and its impact upon the globalization and accessibility the information society. 22, 279–290. ict implementation and school leadership: case studies of ict integration in teaching and learning. journal of educational administration. 41 (2), 158–170. al-refaie, a. (2011). a structural model to investigate factors affect patient satisfaction and revisit intention in jordanian hoslife research, 2(4), 43–56. (2011). the effects of quality management practices on customer satisfaction and innovation: a perspective from jordan. international journal of productivity and quality management, 8(4), 398–415. al-refaie, a. (2015). effects of human resource management on hotel performance using structural equation modeling. computers alt, e., díez-de-castro, e. p., and lloréns stake holders to environ mental performance: the role of proactive environmental strategies and shared vision. journal of business ethics, 128(1), 167–181. https:// doi.org/10.1007/s10551-014-2095-x. dynamic capabilities and are they a useful construct in strategic management? international journal of management review, 11(1), 29–49. design: a dynamic capability perspective. the oxford handbook of dynamic capabilities. doi:10.1093/oxfordhb/9780199678914.013.2. naser, s. s. (2017). strategic environmental scanning: an approach for crises management. international journal of information technology and electrical engineering itee, 6, 28–34. identifying converging technologies in ict industry: analysis of patents published by incumbents and entrants. journal of korean institute of industrial engineers, 42(3), 209–221. aragón-correa, j. a., martín-tapia, i., and vironmental strategies and employee inclusion: the positive effects of information sharing and promoting collaboration and tion & environment, 26(2), 139–161.https:// doi.org/10.1177/1086026613489034. arvanitis, s., and loukis, e. n. (2009). information and communication technologies, human capital, workplace organization and labour productivity: a comparative study switzerland. information economics and policy, 21(1), 43 61. doi:10.1016/j.infoecopol.2008.09 mation and communications technology in retrieving local community. oxford brundtland commission 35, 15–141. asikainen, al., and mangiarotti, g. (2017). open innovation and growth in it sector. service business,11(2), 45–68. (2003). the skill content of recent technological change: an empirical exploration[j]. quarterly journal of economics, 118(4), 1279–1333. ayisi nyarko, d., and kozári, j. (2021). information and communication technologies (icts) usage among agricultural extension ery in ghana. journal of the saudi so ciety of agricultural sciences, 20(3), 164–172. doi:10.1016/j.jssas.2021.01.002 tions to answers: reviewing organizational learning research. management learning. 35 (4), 397–417. uation of structural equation models. journal of the academy of marketing science, 16(1), 74–94. https://doi.org/10.1007/ teer board members of community sports quarterly, 39(2), 213–235 58 barnett, w., and mckendrick, d. (2004). why are some organizations more competitive than others? evidence from a changing global market. administrative science quarterly, 49, 535–571. barney, j. (2001). resource-based theories of competitive advantage: a ten-year retrospective on the resource-based view. journal of management, 27(6), 643–650 tained competitive advantage. journal of management, 17 (1), 99–120. barney, j.b. and clark, d.n. (2007). resourcebased theory: creating and sustaining competitive advantage. oxford university press, oxford, uk. barua, a., konana, p., whinston, a. b., and of net-enabled business value. mis quarterly, 28(4), 585–620. basak, d., bose, a., roy, s., chowdhury, i. r., and sarkar, b. c. (2021). understanding sustainable homestay tourism as a driving factor of tourist’s satisfaction through structural equation modelling: a case of rent research in environmental sustainability 3, 1–13. bharadwaj, a. s. (2000). a resource-based perspective on information technology capainvestigation. mis quarterly, 24(1), 169– 196. of ict on the work patterns of managers and their organizations. euromed journal of business. 3 (3), 244–262. the research & impact of ict in education in developing country contexts. journal of education for international development. 4 (2), 14–23. development of an instrument to measure preservice teachers’ technology skills, technology beliefs, and technology barriers. computers in the schools, 25(1–2), 112–25. the link between information processing capability and competitive advantage mediated through decision-making effectiveness. international journal of information management, 44, 121–131. ers’ attitudes and behavioral intentions organizational decision-making. technovation, 106, 102312. and sustained competitive advantage: a fsqca approach. long range planning, 1–14. https://doi.org/10.1016/j.lrp.2021. 102131 cegarra-navarro, j.-g., wensley, a. k. p., martínez-martínez, a., and garcía-pérez, a. (2020). linking organisational commitment with continuous learning through peripheral vision and procedural memory. european management journal, 38(6), 874–883. doi:10.1016/j.emj.2020.05.003 cepeda-carrion, g., cegarra-navarro, j.g., least squares structural equation modelling (pls-sem) in knowledge management. journal of knowledge management, 23 (1), 67–89. https://doi.org/10.1108/jkm-052018-0322. chadee, d. and kumar, r. (2001). sustaining the international competitive advantage journal of management, 18, 461–480. chadee, d.d., pang, b. (2008). technology strategy and performance: a study of information technology service providers from selected asian countries. service business, 2, 109–126. resource orchestration in practice: ceo gic management journal, 36 (3), 360–376. ment of technological, pedagogical, and content knowledge (tpack). journal of educational technology and society, 13(4), 63–73. chatterjee, s., rana, n. p., tamilmani, k., sharma, a. (2021). the effect of ai-based crm on organization performance and competitive advantage: an empirical analysis in the b2b context. industrial marketing management, 97, 205–219. chen, d. q., preston, d. s., and swink, m. affects value creation in supply chain management? journal of management information systems, 32(4), 4–39. chin, w. w., marcolin, b. l., and newsted, p. r. (2003). a partial least squares latent variable modeling approach for measuring 59 interaction effects: results from a monte carlo simulation study and an electronic-mail emotion/adoption study. information systems research, 14(2), 189–217. h t t p s : / / d o i . o r g / 1 0 . 1 2 8 7 / i s r e . 1 4 . 2 . 1 8 9 . 16018. chiva, r., alegre, j. and lapiedra, r. (2007). measuring organizational learning capability among the workforce. international journal of manpower. 28 (3/4), 224–242. “signature business model” that support durable competitive advantage. journal of open innovation: technology, market, and complexity, 2 (15), 1–21. the internal structure of tests. psychometrika, 16(3), 297–334. https://doi.org/10. cronbach, l. j., and shavelson, r. j. (2004). my successor procedures. educational and psychological measurement, 64(3), 391–418. colecchia, a., schreyer, p. (2002). the contribution of icts to economic growth in nine oecd countries. oecd economic studies. 34, 204–227. collins, c. j., and clark, k. d. (2003). strategic human resource practices, top manperformance: the role of human resource practices in creating organizational competitive advantage. academy of management journal, 46(6), 740–751. 1–15. equation modeling with pls. tehran: jahad daneshgahi organization. and jacobson, a. l. (2001). data to knowledge to results: building an analytic capability. california management review, 43(2), 117–138. eriksson, p. e., larsson, j., and pesämaa, o. (2017). managing complex projects in the infrastructure sector–a structural ect management, international journal of project management, 35, 1512–1523. entrepreneurial orientation and export intensity: examining the interplay of organizational learning and innovation. international business review, 24(1), 148–156. doi:10.1016/j.ibusrev.2014.07.004 spss, third ed. sage publications ltd, new delhi. and supply management (psm) practice– alytical structural equation model, journal of purchasing and supply management, 22 (4), 351–366. equation models with unobservable variables and measurement error: algebra and statistics. j. mark. res. 18 (3), 382. vo, m. m., and mihi-ramírez, a. (2011). ities on organizational outcomes through the organizational learning process. industry and innovation, 18(7), 685–708. https:// doi.org/10.1080/13662716.2011.604473 the complementarity between information and communication technologies and organizational resources. procedia-social and behavioral sciences, 41, 51–58. doi: 10.1016/j.sbspro.2012.04.007 garicano, l. (2010). policemen, managers, lawyers: new results on complementarities between organization and information and communication technology. international journal of industrial organization, 28(4), 355–358. doi:10.1016/j.ijindorg.2010. 03.00 lina, m-e. (2009). information and information and communication technology in retailing: a cross-industry comparison. journal of retailing and consumer services, 16, 232–238. gnambs, t. (2021). the development of gender differences in information and communication technology (ict) literacy in middle ado114, 106533. doi:10.1016/j.chb.2020.106533 goh, s. c. (2003). improving organizational learning capability: lessons from two case studies. the learning organization. 10 (4/5), 216–227. gomes, g., and wojahn, r. m. (2017). organizational learning capability, innovation and performance: study in small and medium-sized enterprises (smes). revista de exploring the relationship between information and communication technologies (ict) and academic performance: a multilevel analysis for spain. socio-economic 60 planning sciences, 77, 101009. doi:10.1016/j. seps.2021.101009 gunasekaran, a., subramanian, n., and papadopoulos, t. (2017). information technology for competitive advantage within logistics and supply chains: a review. transportation research part e, 99, 14–33. guzman, j., recoco, g. a., pandi, a. w., padrones, j. m., and ignacio, j. j. (2022). evaluating workplace safety in the oil and demic using occupational health and safety square structural equation modelling, cleaner engineering and technology, 6, 1–12. and communication technologies (ict) in the processes of distribution and use of 198, 644–649. son, r. e. (2010). multivariate data analysis (seventh). squares structural equation modeling (plssem). european business review, 26(2), 106– 121. https://doi.org/10.1108/ebr-10-2013 0128 teachers perspective on integrate ict into subject teaching: commitment, constraints, caution and change. curriculum studies, 37 (7), 155–192. (2015). a new criterion for assessing discriminant validity in variance-based structural equation modeling. journal of the academy of marketing science, 43(1), 115–135. https://doi.org/10.1007/s11747-014-0403-8. technology adoption: a model comparison with university teachers from china and spain, computers & education, 133, 69–81. the relationship among competitive advantage, catchup, and linkage effects: a comparative study on ict industry between south korea and india. service business, 13, 603–624. ignacio, j. j., malenab, r. a., pausta, c. m., beltran, a., belo, l., tanhueco, r. m., promentilla, m. a., and orbecido, a. (2019). a perception study of an integrated water system project in a water scarce community in the philippines. water, 11 (8), 1–23. https://doi.org/10.3390/w11081593. jagersma, p. k. (2003), innovate or die., the journal of business strategy. 24 (1), 25–28. james, k., and lahti, k. (2011). organizaemployee inspiration and organizational performance. creativity and innovation management,20 (2), 108–120. jerez-gomez, p. céspedes-lorente, c., and learning capability: a proposal of measurement. journal of business research, 58 (6), 715–725. . innovation, organizational learning, and performance. journal of business research, 64 (4), 408–417. johnson, m. p. (2017). knowledge acquisition and development in sustainability-oriented small and medium-sized enterprises: exploring the practices, capabilities and cooperation. journal of cleaner production, 142, 3769–3781. eco-control package on environmental and economic performance: a natural resourcebased approach. journal of management accounting research, 28(2), 149–178 lette, s. (2021). building competitive advantage with sustainable products e a case study perspective of stakeholders. journal of cleaner production ,289, 1–11. 125699 ing role of organizational learning capability on the relationship between innovaioral sciences, 210, 164–169. doi:10.1016/j. sbspro.2015.11.355 interpretation of results in research using structural equation modeling: a checklist with guiding questions for reporting. asian nursing research 15 (3), 157–162. nication technology (ict) on future foresight processes—results from a delphi surchange, 85, 81–92. ketprapakorn, n. and kantabutra, s. 2019. culture development for sustainable smes: 61 toward a behavioral theory. sustainability, 11 (9), 1–15. (2018). structural equation model to assess the impact of learning organization and commitment on the performance of research organizations. kasetsart journal of social sciences, 39 (3), 457–462. kim, w., kim, n., lyons, j. b., nam, c. s. (2020). bility human-robot interaction contexts: a structural equation modelling approach. applied ergonomics, 85, 1–12. https://doi. org/10.1016/j.apergo.2020.103056 (2012). innovating with analytics. mit sloan management review, 54(1), 47–52. kiron, d., and shockley, r. (2011). creating business value analytics. mit sloan management review, 53(1), 57–63. knudsen, e. s., lien, l.b., timmermans, b., belik, i., and pandey, s. (2021). stability in turbulent times? the effect of digitalization on the sustainability of competitive advantage. journal of business research, 128, 360–369. kudyba, s, diwan, r. (2002). research report: increasing returns to information technology. information systems research, 13(1), 104–111. kuei, c., madu, c. n. (2001). identifying critical success factors for supply chain qualreview, 6 (4), 409–423. kumar, d. s., and purani, k. (2018). model ing linear and non-linear models in hospiity and tourism technology, 9 (3), 338–353. 0105. lazzarini, s. g. (2015). strategizing by the govlevel competitive advantage? strategic management journal, 36(1), 97–112. learning capability on user acceptance of information technology among operating room nurse staff. acta anaesthesiologica taiwanica, 51(1), 22–27. resource allocation in strategic factor markets: a realistic real options approach to generating competitive advantage. journal of management, 43, 2588–2608 formance. procedia–social and behavioral sciences, 224, 20–27. doi:10.1016/j. sbspro.2016.05.395 collaboration value innovation, supply chain capability and competitive advantage in taiwan’s networking communication industry. international journal of production economics, 191, 143–153. doi: 10.1016/ j. ijpe.2017.06.001. model of supply chain quality management and organizational performance, international journal of production economics, 96, 355–365. janto, t. s. (2012). role of it executives advantage through it capability. international journal of accounting information systems, 13(1), 21–40. lópez-gamero, m. d., pertusa-ortega, e. m., pereira-moliner, j. (2016). organizational antecedents and competitive consequences of environmental proactivity in the hotel industry. journal of sustainable tourism, 24(7), 949–970. mai, r., niemand, t., and kraus, s. (2021). better decisions about structural equation change, 173, 1–17, https://doi.org/10.1016/j. techfore.2021.121142 information technology resource, knowledge management capability, and competitive advantage: the moderating role of resource commitment. international journal of information management, 36, 1062–1074. ministry. j, and pitner, t. (2014). academic-industrial cooperation in ict in a transition economy: two cases from the czech republic. information technology for development, 21(3), 480–491. co-gonzález, a. (2020). reputation and tion institutions’ sustained competitive advantage. journal of business research, 112, 342–353. 62 mirghani, m., arthur m., mohamed, m. (2010). the role of information and communication technology (ict) in mobilization of sustainable development knowledge: a quantitative evaluation. journal of knowledge management, 14 (5), 744–758. tion technology strategy and investments and empirical evidence. mis quarterly, 40, 223–245. mithas, s., tafti, a., bardhan, i., and mein goh, j. (2012). information technology and ical evidence. mis quarterly, 36(1), 205– 224. and terek, e. (2017). the impact of information technologies on communication satisfaction and organizational learning in behavior, 76, 87–101. doi:10.1016/j.chb. 2017.07.012 mooij, t. smeets, g. (2009). modelling and supporting ict implementation in secondary schools. computers & education. 36 (4), 81–265. nevo, s., & wade, m. (2010). the formation and value of it-enabled resources: antecedents and consequences of synergistic relationships. mis quarterly, 34(1), 163–183. information and communication technology drives (routine and non-routine) jobs: structural path and decomposition analysis for china. telecommunications policy, 102242. doi:10.1016/j.telpol.2021.102242 standing the link between organizational learning capability and erp system usage: an empirical examination. 234. doi:10.1016/j.chb.2014.01.030 vativeness. procedia–social and behavioral sciences, 150, 708–717. doi:10.1016/j. sbspro.2014.09.029 tegic involvement: implications for psychological attachment to organization and job. strategic management journal, 15(6), 477–489. of the primary teacher training colleges in kenya. journal of information, communication & ethics in society. 8 (1), 40–57. parra, c. m., gupta, m., and mikalef, p. (2021). information and communication technologies (ict)-enabled severe moral communities and how the (covid19) pandemic might bring new ones. international journal of information management, 57, 102271. doi:10.1016/j.ijinfomgt.2020.1022 pelgrum, w. j. (2001). obstacles to the integration of ict in education: results from a worldwide educational assessment. computers and education. 170 (6), 27–64. pollman, c. d. (2014). mercury cycling in aquatic ecosystems and trophic state-related variables-implications from structural equation modeling. sci. total environ. 499, 62–73. ing integration on marketing competencies and export performance. journal of international marketing. 9 (4), 82–110. premkumar, g., ramamurthy, k., and saunders, c. s. (2005). information processing view of organizations: an exploratory ganizational relationships. journal of management information systems, 22(1), 257– 294. service quality based on low-income women’s perception: a case study in dhaka city by structural equation model (sem). iatss research, in press, 1–12, https://doi. org/10.1016/j.iatssr.2021.11.009 rama rao, t. p. (2004). ict and e-governance for rural development, center for electronic governance, indian institute of rural management. ahmedabad, poetics. 34, 211–235. least squares structural equation modeling with r. practical assessment, research and evaluation, 21 (1), 1–16. https://doi. org/10.7275/d2fa-qv48. ruiz-molina, tal practices for hospitality and tourism, the role of information and communication technologies. management of environmental quality: an international journal. 21 (4), 464–476. nilashi, m., and mardani, a. (2019). the impact of enterprise risk management on competitive advantage by moderating 63 role of information technology. computer standards & interfaces, 63, 67–82. salehan, m., kim, d. j., and lee, j-n. (2018). are there any relationships between try-level trend study of the association between information communication techand management, 55 (6), 725–745. in linking information technology capabil27(1),125–153. sar, a., and misra, s. n. (2020). a study on policies and implementation of information and communication technology (ict) in educational systems. materials today: proceedings. doi:10.1016/j.matpr.2020.10.507 least squares structural equation modeling using smartpls: a software review. journal of marketing analytics, 7 (3), 196–202. https://doi.org/ 10.1057/s41270-019-00058-3. structural equation models: tests of signifsures. international journal of methods of psychological research, 8 (8), 23–74. schilke, o. (2014). on the contingent value of dynamic capabilities for competitive advantage: the nonlinear moderating effect of environmental dynamism. strategic management journal, 35(2), 179–203. scott-ladd, b. and chan, c.c.a. (2004). emotional intelligence and participation in decision making: strategies for promoting organizational learning and change, strategic change. 13 (2), 95–105. and wang, l. (2020). impact of using information and communication technology and renewable energy on health expenditure: a case study from pakistan. energy, 204, 117956. doi:10.1016/j.energy.2020.117956 (2013). investigation the role of information & communication technologies on student’s collaborative learning. procedia– social and behavioral sciences. 38, 932–936. (2015). information infrastructure capability and organizational competitive advantage. international journal of operations & production management, 35(7), 1032–1055. spitale, d., petraglia, a., and tomaselli, m. (2009). structural equation modelling de tects unexpected differences between bryophyte and vascular plant richness along multiple environmental gradients. journal of biogeography, 36 (4), 745–755. zational learning capability and organizational creativity on organizational innovation of universities in east java, indonesia. 128–135. instrument for measuring the key practices of total quality management in ict industry: an empirical study in india. service business, 7(2), 275–306. tamilmani, k., rana, n. p., nunkoo, r., raghatravellers’ adoption of airbnb platform. taucher, j., oschlies, a. (2011). can we predict the direction of marine primary production change under global warming? geophysical research letters, 38 (2), 1–6. teece, d. j., pisano, g., & shuen, a. (1997). dynamic capabilities and strategic management. strategic management journal, 18(7), 509–533. taneous virtual teams: improving organizational performance through information and communication technology. business bushor.2013.01.003 torkayesh, a. e., and torkayesh, s. e. (2021). evaluation of information and communication technology development in g7 countries: an integrated mcdm approach. technology in society, 66, 101670. doi:10.1016/j. techsoc.2021.101670 walsh, p. r., and dodds, r. (2017). measuring the choice of environmental sustainability strategies in creating a competitive advantage. business strategy and the environment, 26(5), 672–687. https:// doi.org/10.1002/bse.1949. work as a source of competitive advantage: the dynamic capability perspective and evidence from china. long range planning, 54 (2), 1–48. https:// doi.org/10.1016/j.lrp. 2020.102052. wang, j., jiang, q., dong, x., and dong, k. (2021). decoupling and decomposition analysis of investments and co2 emissions in information and communication technology sector. applied energy, 302, 117618. doi:10.1016/j.apenergy.2021.11761 64 exploring the relationships of the residential and workplace built environment with commuting mode choice: a hierarchical transportation letters, doi: 10.1080/ 19427867.2020.1857010 (2013). examining the relational beneprocessing capability in buyer-supplier dyads. mis quarterly, 37(1), 149–173. information and communication technology (ict), digital divide and urbanization: evidence from chinese cities. technology in society, 64, 101516. doi:10.1016/j.techsoc.2020.101516 weber, m. m., kantamneni, s. p., 2002. pos and edi in retailing: an examination of ply chain management: an international journal 7 (5), 311–317 culture mediates information and communication technology outcomes. government information quarterly, 31(4), 506– 512. doi:10.1016/j.giq.2014.07.006 internal communication, information satisfaction, and sense of community: the effect relations research, 22(1), 65–84. wong, k. k. k. (2013). partial least squares structural equation modeling (pls-sem) techniques using smart pls. marketing bulletin, 24 (1), 1–32. ing convergence of china’s ict industry: an input–output analysis. telecommunications policy, 35(4), 301–313. the impact of multiple seashore reclamalow river delta, china: implications based on structural equation modeling. journal of coastal conservation, 22, 283–292. mation communication technology adoption behavior: the moderators of information literacy and digital skills. computers a multi-theory perspective on enablers of inter-organizational information and communication technology: a comparison of china and the netherlands. international journal of information management, 54, 102191. doi:10.1016/j.ijinfomgt.2020.1021 and liu, c. (2022). identifying changes in resources using a causality-based indicator framework, convergent cross-mapping, and structural equation modeling. environmental and sustainability indicators, 14, 1–11. page 4 editors note vol 11 no 1 editor’s note vol 11, no 1 (2021) the internet is leading the world towards forms of totalitarianism: how to fix the problem it is difficult to imagine intelligence studies as separate from information technology as we enter the third decade of the 21st century. the current issue of jisib bears witness to this integration with a strong focus on big data applications. hardly anyone today would or could do without the internet, but the project that started with us government financing in the 1960s, with packet switching, and in the 1970s with arpanet and saw commercial light in the 1990s is helping countries turn into totalitarian systems where totalitarianism is defined by a high degree of control over public and private life. public life is influenced by hacking, troll factories, fake news/propaganda, and interference in elections. private life is influenced by massive surveillance. to borrow the title of the book by zuboff (2019) we now live in “the age of surveillance capitalism”. business intelligence systems lie at the heart of this transformation, but so do artificial intelligence and robotics. and the trend is global. in the west the suppressors are mostly private monopolies (e.g. google, facebook), while in the east it is primarily the government that is snooping (e.g. china’s social credit system). face recognition is likely to become as popular in the west as it is in the east. it is also easily forgotten that no city was better surveilled than london, which started to build its cctv technology in the 1960s. the system is now being updated with facial recognition, just like the one we are criticizing the chinese for having. some forms of surveillance may also lead to great advances in our societies, like access to government forms and statements electronically and a non-anonymous central bank digital currency (cbdc), which promises to reduce corruption and tax fraud, and could be used for easy distribution of universal basic income (ubi) . fintech promises to be highly disruptive. we are moving into an orwellian world of surveillance more or less voluntarily, often applauding it. “i have nothing to hide” the young man says, but then he later becomes a minister and starts to worry about the traces he has left on keyboards. the five eyes intelligence alliance, or any other major service, can pull out extensive analyses of behavior and personality on most of us now as we continue to exchange our personal data for access to searches and social media, but also subscription-based services. most chinese think that the social credit system is a good thing. this is for much of the same reason: they believe it will not be used against them and think that they will do well. we all tend to be overoptimistic about our abilities and opportunities. it’s not before we fail that the full implications of the system are felt: lack of access, credit, housing, and no more preferential treatments. the result threatens to worsen the lack of social mobility and increase the growing conflict between the super-rich and those hundreds of millions who risk slipping from the middle class to being counted among the poor, many of whom live in the western world. the truth is another essential part of our civilization that we are now tampering with. on the internet, few users can tell facts from lies, but we think we can. most of those who grew up only with the internet never really learned how to think critically. the old library of physical books was the best guarantee that lessons learned from history would be transferred to future generations without anyone mingling. for that same reason, books were also seen as real threats to tyrants and have been censured and burned. the last time that happened in the west on a large scale was in nazi germany, but it is happening again now in subtler forms as amazon and other giants act as arbiter and refuse books with certain content based on value judgements. a world which relies all too much on the internet should recall that the information there can be switched off in a second. old books are often not even accessible, having been exchanged for online solutions. the situation in the brave new social sciences is much the same, everyone is running after the latest articles without ever questioning if the same ideas have been published before (difficult to know now). thus, much academic literature suffers, becoming a tedious process of repetitions under new brands. in a society where everyone is a writer, no one really reads or has much of importance to say at the end. journal of intelligence studies in business vol. 11, no 1 (2021) p. 4-5 open access: freely available at: https://ojs.hh.se/ 5 how do we solve these problems? step one on the internet is serious encryption as to make data private. step two is to give all personal data back to the users, that is, to take it away from the private companies and then indirectly away from the security services. that will eliminate the “free” business model and lead to more subscription-based products instead. step three is to break up the monopolies, and before that to tax them properly. step four is to return to books that have stood the test of time (real peer-reviewed) whether online or offline. (the learning process is probably only half as good on the screen). we need to go from a culture of skimming data back to reading and discussing it. technology and management practices should be a part of that solution. otherwise it looks like we will continue down the road that leads to totalitarianism. the internet right now is making shopping easier, but most people are becoming less aware of realities, less smart, less critical. only a small part of the population is able to use it to their advantage for understanding the world around them. it would be great to see more articles develop ideas and products for how we as societies can go in this direction. when looking at the articles in this issue we are reminded that intelligence studies is no longer an anglo-saxon body of literature but has become truly international. the first article entitled “interpreting, analyzing and distributing information: a big data framework for competitive intelligence” is by erlaine binotto et al. it presents a big data intelligence framework. the second article entitled “competitive intelligence and absorptive capacity for enhancing innovation performance of smes” by abdeslam hassani and elaine mosconi suggests a way in which competitive intelligence enhances innovation performance for smes. the third article entitled “a framework for big data integration within the strategic management process based on a balanced scorecards methodology” by mouhib alnoukari shows how to integrate big data into the strategic management process using a balanced scorecards methodology. the fourth article entitled “competitive intelligence approach for developing an e-tourism strategy post covid-19” by franky tulungen et al. shows a strategy for how to boost tourism after the covid19 pandemic by developing e-tourism based on a competitive intelligence approach. the fifth article entitled “la veille stratégique entre l'efficacité décisionnelle et l’optimisation de la gouvernance: etude restreinte dans les organismes publics tunisiens” by mostapha tayeb ben amor and fatma chichti (in french, abstract in english) suggests an intelligence framework for the public sector. the study is based on interviews with public sector organizations in tunisia. the last article entitled “integrating science and technology metrics into a competitive technology intelligence methodology” by marisela rodriguez-salvador and pedro f. castillo-valdez presents a new framework for competitive technology intelligence (cti) providing a broader scope to science and technology metrics where quantitative tools such as patentometrics and scientometrics are used. as always, we would above all like to thank the authors for their contributions to this issue of jisib. thanks to dr. allison perrigo for reviewing english grammar and helping with layout design for all articles. i wish i could say that the covid-19 pandemic is soon over, but unfortunately it still has a grip on our societies. on behalf of the editorial board, sincerely yours, prof. dr. klaus solberg søilen halmstad university, sweden editor-in-chief zuboff, s. (2019). the age of surveillance capitalism: the fight for a human future at the new frontier of power: barack obama's books of 2019. profile books. copyright © 2021 jisib, halmstad university. all rights reserved. journal of intelligence studies in business vol. 13 no. 1 (2023) pp. 53–64 open access: freely available at: http://jisib.com/ the role of competitive intelligence in improving performance through organizational learning, a case study start-ups in algeria zighed rahma laboratory ecofima, university 20 août 1955, skikda, algeria, e-mail: r.zighed@univ-skikda.dz, https://orcid.org/0009-0007-5957-5713. mekimah sabri1 laboratory ecofima, university 20 août 1955, skikda, algeria, e-mail: s.mekimah@univ-skikda.dz, https://orcid.org/0000-0002-7701-7500. received 8 march 2023 accepted 23 march 2023 abstract the study aims at identifying the role of competitive intelligence in improving company performance through organizational learning in start-ups, relied on a descriptiveanalytical approach with the use of a questionnaire to collect data, which was distributed to a random sample of 255 start-ups in algeria. the structural equation modelling was also used through the smart pls 4 program to test the study's hypotheses. the study concluded that there is a weak indirect role between competitive intelligence and the performance through organizational learning expressed in a correlation coefficient estimated at 23.1%, while the direct role was greater with a correlation coefficient of 61.6%.this is due to the fact that the mediator variable does not play its active role in strengthening the relationship between competitive intelligence and the start-ups performance despite this impact, start-ups in algeria does not effectively carry out research to obtain available opportunities in the market. keywords: competitor intelligence, market intelligence, organizational learning, start-ups, the performance 1. introduction: business companies today face a range of difficulties regardless of their size or nature of work, as the resulting risks from unexpected changes in the environment are due to its successive changes, which in turn have an impact on the performance which requires experiment and practice methods and approaches that enable them to survive and compete in the market, including competitive intelligence. among these methods is competitive intelligence, which in turn is a process that includes gathering analysing and communicating information about the environment to help in strategic decision-making (dish man & calf, 2008, p. 767).as it refers to the behaviour used by corresponding author both companies and nations to enhance competitiveness through better use of information for a company to effectively benefit from competitive intelligence efforts and operations (moloi & iyamu, 2015, p. 3), there must be a proper organizational awareness and a competitive culture(saayman & al, 2008, p. 383). despite the fact that competitive intelligence serves as a highly important tool for the company’s strategy, represented in the planning, management, and official exploration of the marketing strategy model for the company (safarnia, 2011, p. 2) . its purpose was to analyse information about competitors’ activities, trends in a specific sector, and the market in general, in order to guide the 54 company in achieving its goals and objectives (artur, 2020, p. 2) . in order to ensure sustainability and continuity, companies work on improving their performance to reach high levels and have a competitive advantage. this trend has led to the emergence of human resources as a strategic supplier and a key element for creativity, learning, and technology creation. this is reflected through competitive intelligence and its role in improving organizational performance, as it has the ability to effectively produce goods and services that meet market demand (quality, term, and growth) and contributes to the economic system's movement (lorino, 1991, p. 56) . performance is a positive attribute that companies can achieve for a certain period of time, resulting in positive outcomes compared to others. performance in companies is subject to the measurement and evaluation process which helps the company ensure that all departments perform their various tasks with the highest possible efficiency. it also determines the outcomes that need to be achieved and the evaluation that is carried out independently by the relevant authority (fermon & grandjean, 2015, p. 1). performance management should be properly administered as it is a system that sets goals and connects individual goals with organizational ones by defining the objectives and expectations towards each individual, followed by providing incentives that align with their performance (lorraine dori ponu & zubair, 2015, p. 2) . this study aims at achieving objectives related to clarifying the different concepts that pertain to competitive intelligence and organizational learning, the performance of the company, and to identify if the start-ups in algeria have orientations and procedures aimed at developing the role of competitive intelligence in improving the institution’s performance through organizational learning. the study derives its importance from the role that competitive intelligence plays in improving the performance of start-ups in algeria through organizational learning. the significance of the study also lies in the fact that it deals with a recent topic in the field of scientific research in algeria and the scarcity of studies and research related to it, as it is one of the first studies that applies competitive intelligence in start-ups in algeria. therefore, we look forward that it will be a reference for specialized scientific studies and a practical guide for start-ups . the descriptive and analytical approach was adopted, by defining the variables of the study both theoretically represented by the variables of competitive intelligence and organizational learning, and performance of the company. in terms of the practical aspect, data was collected through a questionnaire designed and distributed to a sample of start-ups in algeria. to process and test the study's hypotheses, structural equation modelling was used through the smart pls 4 program. 2. literatures review: in this element, we will delve into the concepts related to competitive intelligence, organizational learning, and performance. 2.1. competitive intelligence: competitive intelligence is providing companies with the tools to make informed decisions. it is enabling companies to keep ahead of the competition and industry trends (maune, mobile applications adoption and use in strategic competitive intelligence: a structural equation modelling approach, 2022, p. 65), competitive intelligence is defined are considered a crucial tool for the company’s strategy represented in the formal planning, management and exploration process of its marketing strategy model (safarnia, 2011, p. 2), where the latter includes the optimal use of public sources for developing data related to the competitive and market environment (maune, 2014, p. 61) . competitive intelligence is also considered as behaviour used by companies and countries alike as a means to improve competitiveness through the best use of information (moloi & iyamu, 2015, p. 3). besides, the importance of competitive intelligence lies in shaping strategic marketing decisions and building for companies aimed towards the market, given its fundamental role in central marketing decisions and the company, with the latter focusing on monitoring the competitive environment to provide actionable 55 intelligence to enhance the company’s competitiveness (macinnis & al, 2002, p. 179) . competitor’s intelligence aims to assess the risks and opportunities in a competitive environment before they become apparent, this process is called early signal analysis, being a highly specialized activity where it has become necessary to design tools and means that can assist analysts in competitor intelligence in the process of collecting analyzing benefiting from knowledge and coming up with strategies effective work (lipika & al, 2011, p. 2). additionally, competitive intelligence also aims to analyze information about competitor activities and trends in a specific sector and the market in general, in order to guide the institution in achieving its goals and objectives (artur, 2020, p. 2) . market intelligence is the set of means that enable managers to be constantly aware of developments in the market environment (kotler & autres, 2006, p. 84). it is a strategy that links a company’s activities, resources and capabilities to its external environment with the goal of maximizing current and future performance and converting current goals into more meaningful and achievable ones from both functional and operational perspectives (johnson & scholes, 1993, p. 20) . the latter affects the planning process both in the long and short run, and adds value to the company’s strategic decisionmaking as well (lackman & al, 2000, p. 6). additionally, market intelligence studies the relationship between intelligence acquired through the internet, value creation, and variables such as customer relationships, innovation, productivity, and the efficiency of these connections (rahchamani & all, 2019, p. 58) . market intelligence performs a set of core functions that support strategic marketing information. it aims to fulfil the marketing goals of a company by determining the information needs of the intended strategic marketing objectives and conducting research to gather and deliver that information, processed appropriately for management, as well as executive managers who require intelligent data to develop and implement related marketing strategies. furthermore, market intelligence has the role of identifying business operations and techniques represented in the on-going information search, which contributes to improving the quality of strategic marketing programs. finally, the role of predicting the future is for intelligence to be more effective when it can act proactively, in other words, anticipating future events (лена, 2019, p. 3). 2.2. organizational learning: organizational learning is considered as a collective phenomenon for acquiring and forming competencies that can be more or less profound or sustainable. it leads to a change in the way situations are managed or in the situations themselves (bounfo, 1998, p. 182) .organizational learning is also a means through which individuals in companies continuously discover how they shape the reality they work in and how they can change it (peter & al, 1994, p. 59) . companies are considered large repository of knowledge, as their success depends on converting implicit knowledge into an explicit one, which is shared among the company’s members (marshall & al, 2004, p. 16). organizational learning is a multi-level process in which individuals acquire knowledge through work and thinking together, and it is also a process of improving practices through better understanding, developing vision, knowledge, and connecting past and future practices and activities (hillary, 2018, p. 3) . organizational learning is composed of a set of elements that may come about through partnerships and alliances, as it generates a large accumulation of knowledge. through this, the value and importance of the company increases, paralleling its assets, innovations, employee loyalty and customer satisfaction (stephen, 2000, p. 8). additionally, learning companies are distinctive in that they are leadershiporiented, either transformational or transactional. as transactional leadership is encountered in such a way which helps leaders understand the appropriate way to achieve desired goals. as for transformational leadership, it is a new type in which it motivates employees to work together for the long term (jeery & ann, 56 1999, p. 19). the more the scope of learning companies expands, the stronger the culture it creates, which leads to increased learning and is reflected in the results and development of the companies (raanan & al, 2007, p. 66) . 2.3. the performance: the subject of performance is considered to be of great importance in managing companies, considering its ability to ensure the sustainability and achievement of balance between the satisfaction of stakeholders and employees (drucker, 1999, p. 73). the performance represents the values and principles prevailing in the organizations internal work environment, which regulate work strategies, ideas and visions that help develop the organization and ensure its continuity (mbaindin, 2022), it is also considered as the ability to produce goods and services effectively in response to market demand (quality, deadline, growth), allowing for a surplus to move the economic system (lorino, 1991, p. 56). performance consists of three main elements, represented by efficiency, effectiveness, and potency. efficiency refers to the relationship between the resources allocated and the results achieved, while effectiveness refers to the level of goal attainment. as for potency, it is the degree to which a companies able to reach its goals and achieve them. therefore, performance is considered as a concept that reflects both the goals and the necessary means to achieve them (brosquet, 1989, p. 1). furthermore, all companies should measure the effectiveness of their activities and the results of their work, because the information obtained will lead them towards achieving their goals and thus improving their performance. therefore, a company that cannot measure its performance cannot monitor it, if it is so, it cannot manage it, and as a result, it will not be able to make sound decisions performance measurement is important because it helps the company to ensure that all departments are performing their various tasks with the highest possible efficiency (lingle & schiermann, 1996, p. 56). it also provides a benchmark for evaluating the performance outcomes, as well as an independent evaluation by the relevant authority. it measures the level of achievement (fermon & grandjean, 2015, p. 1) . performance management is a system that involves setting performance goals, defining measures, evaluating performance and providing feedback. this allows for the identification of training needs and the development of performance, as well as determining the reward system (solkova andrea & gabriela, 2013, p. 20). as it links individual goals with organizational ones by clarifying expectations for each individual and then offering rewards that are aligned with their performance (lorraine dori ponu & zubair, 2015, p. 2). the performance process in the company is subjected to the evaluation process, as the latter plays an important role by looking at the reasons and also concerned with the goals and ways to achieve them. it is a broader process as it considers the causes, also concerned with the goals and ways to achieve them (lauras, 2004, p. 112). 2.4. research questions: through this study, we will address the role of competitive intelligence in improving the performance of start-ups in algeria through organizational learning. however, this study differs from previous ones in that it takes into account a mediator variable represented by organizational learning, unlike other studies, it dealt with each variable separately, and it also focuses on start-ups in algeria. on this basis, the following problematic was raised: what is the role of competitive intelligence in improving the performance of start-ups in algeria through organizational learning? as a preliminary answer to the problematic, the following main hypothesis was adopted: there is a strong positive correlation with statistical significance at a 0.05 level of competitive intelligence in improving the performance of start-ups in algeria through organizational learning. 3. data and method: in order to test the hypotheses of the study and to reach results about the role of competitive intelligence in improving the 57 performance of the company through organizational learning, start-ups in algeria were studied as a case study . 3.1. study population and sample: the study population was made up of all 756 start-ups in algeria. a simple random sample was selected using the equation of steven thompson, with a size of 255 startups. 231 start-ups that were suitable for analysis were retrieved, resulting in a response rate of90.58% (thompson, 2012, p. 51) . 3.2. analysis and presentation of the study tool: in order to test the relationships between the variables of the study and to build a standard model while ensuring its validity, a questionnaire was designed which included (20) questions divided into three axes. the first one is concerned with competitive intelligence with questions ranging from 01 to 08. the second deals with organizational learning from 09 to 12, while the third is about organizational performance from 12 to 20. the variable representation statements of the study model that combines the latent and measured variables should be represented in order to test the biases .e. the extent to which the questions are able to express and measure the real variable, it was found that there are statements that do not achieve the required minimum of 70%, and this can be clarified through the following table: table 1. examine the question ramifications of the modified default form saturation coefficient paragraphes latent variables 0,857 m1 competitor intelligence competitive intelligence 0,861 m2 0,598 m3 0,762 m4 0,872 ma1 market intelligence 0,812 ma2 0,705 ma3 0,849 ma4 0,579 o1 organizational learning 0,558 o2 0,841 o3 0,879 o4 0,795 k1 efficiency company performance 0,744 k2 0,794 k3 0,751 k4 0,117 f1 effectiveness 0,881 f2 0,937 f3 0,686 f4 source: prepared by researchers using smart pls 4 from table 1, it can be seen that there are indicators less than 70% in the dependent variable "performance of the company f1", and this variable has been previously removed. however, despite the fact that there are indicators that do not comply with the 58 condition, they are not less than 40%, but they were kept in the model because they increase the composite reliability values or the average variance, as the following figure shows the adjusted study model after the mentioned indicators are removed. figure 1. the modified model 3.3. reliability evaluation: by measuring the reliability of the study tool, the alpha cronbach index was relied on and reinforced with the composite reliability index cr, and the results were as shown in the table below : table 2. the value of the alpha cronbach and the rho indicator vehicle reliability indicator rho alpha cronbach variants 0,857 0,798 0,774 competitor intelligence competitive intelligence 0,895 0,838 0,826 market intelligence 0,814 0,869 0,725 organizational learning 0,854 0,777 0,774 efficiency company performance 0,878 0,845 0,792 effectiveness source: prepared by researchers using smart pls 4 as seen from the previous table 2, all of the alpha cronbach’s coefficients are greater than 0.7, and the rho values are also high and exceed 0.70. this makes it possible to rely on the proposed questionnaire, and the cr index is greater than 0.7 in all dimensions. therefore, it can be said that the study tool is characterized by reliability. 3.4. measure of convergent validity: it is determined that the model has convergent validity if the accepted ave value is greater than or equal to 0.50, meaning that the model explains more than half of the variance in its indicators. the following table shows average variance extracted ave: table 3. the asymptotic validity measure of the model extracted average variance variants 0,604 competitor intelligence competitive intelligence 0,659 market intelligence 59 0,532 organizational learning 0,595 efficiency company performance 0,709 effectiveness source: prepared by researchers using smart pls 4 from the table 3, we note that all ave values are accepted from a statistical standpoint because they are greater than 0.50. thus, it can be determined that the model has convergent validity. 3.5. the r2 determination coefficient test: in this stage, the values of the determination coefficient that relates to the overall impact of the factors, (the independent variables dependent on the dependent variables through the mediator ones), are calculated. the following table shows the results of the determination coefficient: table 4. the coefficient of determination r2 adjusted2r 2r variants 0,774 0,776 company performance 0,457 0,460 organizational learning 0,434 0,437 effectiveness 0,813 0,814 efficiency 0,919 0,920 market intelligence 0,915 0,916 competitor intelligence source: prepared by researchers using smart pls 4 according to the table 4, it is noted that all coefficients are positive and statistically acceptable, where competitive intelligence explains 0.46 of the organizational learning, which is a mediator interpretation. however, competitive intelligence and organizational learning together explain 0.72 of the company performance, which is a large interpretation. it is similar to the modified coefficient of determination, where its results are close to the results of the coefficient of determination, to indicate the predictive quality of the model. 3.6. evaluating model validity: after confirming the validity of the measurement model, we move on to evaluating the validity of the previously determined building model. this is by calculating the conformity quality index using the gof. the calculation is done using the following formula: gof= √𝐴𝑉𝐸̅̅ ̅̅ ̅̅ × 𝑅2̅̅̅̅ 𝐺𝑂𝐹 = √0.619 × 0.720 𝐺𝑂𝐹 = 0.667 therefore, with a gof of 0.66, which is greater than 0.36, the model is characterized by high quality . 3.7. results analysis: the significance of the paths is confirmed by relying on the bootstrapping technique by generating 500 partial samples. the results were as shown in the following figure: 60 figure 2.statistical significance of thpaths of the structural model. 3.8. paths analysis: the following table illustrates the results obtained from the analysis of the relationship paths between the model variables. table 5. the results of the structural model trajectories analysis p-value std. dev t-value paths value paths 0,000 0,064 10,272 0,648 company performance ; effectiveness 0,000 0,018 51,520 0,908 company performance ; efficiency 0,000 0,043 7,496 0,340 organizational learning ; company performance 0,000 0,041 15,006 0,616 competitive intelligence ; company performance 0,000 0,034 19,796 0,679 competitive intelligence ; organizational learning 0,000 0,006 154,049 0,959 competitive intelligence ; market intelligence source: prepared by researchers using smart pls 4 the previous table 5; indicates that all the model coefficient paths have statistical significance at a level less than 0.05, which indicates the presence of a relationship between the model structural variables, meaning : there is a statistically significant positive relationship between competitive intelligence and organizational learning. there is a statistically significant positive relationship between organizational learning and the company’s performance. there is a statistically significant relationship between competitive intelligence and company’s performance. 3.9. hypothesis testing: the sub-hypotheses and the main hypothesis will be tested in order to determine the impact of competitive intelligence on the performance of start-ups in algeria through organizational learning. -first hypothesis test: there is a statistically significant relationship at a level of 0.05 between 61 competitive intelligence and organizational learning in start-ups in algeria. table 6. the results of the first hypothesis. p value value t std. dev beta paths 0,000 19,796 0,034 0,679 competitive intelligence ; organizational learning source: prepared by researchers using smart pls 4 according to the table 6, the correlation coefficient between the variables is 0.679, which indicates a positive correlation that aggregates the variables and is characterized by being a mediator relationship. furthermore, we notice that this correlation is statistically significant at the level of 0.000 which is less than 0.05. thus, we reject the null hypothesis and accept the alternative hypothesis which states that: there is a statistically significant relationship at a level of 0.05 between competitive intelligence and organizational learning in start-ups in algeria. -second hypothesis test: there is a statistically significant relationship at a level of 0.05 between organizational learning and performance of start-ups in algeria. table 7.the results of the second hypothesis p value value t std. dev beta paths 0,000 7,946 0,043 0,340 organizational learning ; company performance source: prepared by researchers using smart pls 4 from the table 7, we note that the correlation coefficient between the variables is 0.340, indicating a positive weak relationship that is characterized by a weak relationship between the variables. additionally, this correlation is statistically significant at a significance level of 0.000 which is less than 0.05. thus, we reject the null hypothesis and accept the alternative hypothesis which states that there is a statistically significant relationship at a level of 0.05 between organizational learning and performance of start-ups in algeria. -third hypothesis test: there is a statistically significant relationship at the 0.05 level of significance between competitive intelligence and the performance of start-ups in algeria. table 8. the results of the third hypothesis p value value t std. dev beta paths 0,000 15,006 0,041 0,616 competitive intelligence ; company performance source: prepared by researchers using smart pls 4 62 from the table 8, we note that the correlation coefficient between the variables is 0.616, indicating a positive and strong relationship between the variables. this correlation is statistically significant at a level of 0.000 which is less than 0.05. therefore, we reject the null hypothesis and accept the alternative hypothesis which states: there is a statistically significant relationship at the 0.05 level of significance between competitive intelligence and the performance of start-ups in algeria. -the main hypothesis test: there is a strong positive correlation with statistical significance at a level of 0.05 between competitive intelligence and performance of start-up in algeria through organizational learning. table 9. the results of the main hypothesis test. value t p value beta std. dev paths 7,218 0,000 0,231 0.032 competitive intelligence; organizational learning; company performance. source: prepared by researchers using smart pls 4 from the table 9, we notice that the correlation coefficient between the variables is 0.231, indicating a positive correlation that combines the variables together, and which is characterized by a weak relationship. we also note that this correlation is statistically significant at a level of 0.000, which is less than 0.05. therefore, we reject the null hypothesis and accept the alternative hypothesis which states that: there is a statistically significant role at a level of 0.05 for competitive intelligence in improving the performance of start-up in algeria through organizational learning. 4. results: the study reached a set of results related to competitive intelligence and its role in improving the performance of start-ups in algeria through organizational learning. it was concluded that competitive intelligence is part of the strategic information management process, which is necessary for the company’s strategies, as it assists to understand the methods and strategies used by competitors to gain and sustain a competitive advantage, and that organizational learning is the main driving force for improving organizational performance. it was also concluded that there is a relationship between competitive intelligence and the company’s performance with an average degree estimated at 61.6%, despite this impact, start-ups in algeria do not effectively carry out research to obtain available opportunities in the market. this direct relationship between competitive intelligence and the performance of start-ups was better than the indirect relationship through organizational learning as a mediator variable, which was weak, estimated at 23.1%. this is due to the fact that the mediator variable does not play its active role in strengthening the relationship between competitive intelligence and the start-ups performance. through a review of the results and the correlational relationships, it was concluded that the reason for the weakness of the impact is due to the fact that start-ups in algeria do not work on updating their programs for developing their employees' skills and providing training and education programs on the one hand, and on the other hand, they do not do a good job in analyzing their competitors and early detection of risks and opportunities available to them. 5. conclusion: competitive intelligence is considered one of the most significant systematic operations that work to improve the performance of a company through organizational learning. it is a solid foundation in the field of making strategic decisions and determining the priorities of the company intelligence requirements to lead the path of competitive intelligence in terms of collecting, analyzing and distributing information. it aims to 63 determine the purpose and new sources of competitive advantage identify strengths and weaknesses of competitors and their reactions, as well as to identify the priorities of agreement on research and development activities. based on previous results, we recommend that start-ups in algeria prioritize competitive intelligence as a necessary means of making strategic decisions in the company, which helps improve its performance. they should also give more consideration to organizational learning, as it is the process through which the company aims to improve its overall capabilities, develop itself, activate its relationships with its environment, adapt to its internal and external variables, and mobilize its employees to be more attentive in following and acquiring knowledge for the purpose of development and excellence. besides, it is also essential to conduct on-going and continuous improvement processes for competitive intelligence, which assists achieve a competitive advantage. additionally, startups in algeria should also pay more attention to organizational learning in order to achieve its expected role in improving the relationship between competitive intelligence and organizational performance and to provide training and education programs for individuals. furthermore, they should conduct research to identify available opportunities and use modern systems and methods for analyzing their competitors . references artur, v. (2020). competitive intelligence concepts and definitions, doi:10.13140/rg.2.2.14667.34087. management and leadership . bounfo, a. (1998). le management des ressources immatériélles: maitriser les nouveaux leviers de l'avantage compétitif. paris: dunod. dish man, pl. calf, jl. (2008). competitive intelligence: multiphasic + precedent to marketing strategy, european journal of marketing, vol 42(no 7/8). drucker, p. (1999). l'avenir du management selon drucker. paris: ed d'organisation. fermon, b., & grandjean, p. (2015). performance et innovation dans les établissements de santé. paris, france: dunod. jeery, w.g & ann, m. (1999). beyond the learning organization,usa,persus books group. johnson, g & scholes, k. (1993). exploring corporate strategy,new yorknu: prenticehall. hillary, o. (2018). a literature review on organizational learning and learning organizations, doi:10.4172/21626359.1000494. international journal of economics & management, vol 7 (no 1). kotler, p & al. (2006).marketing management,france,edition pearson education. lauras, m. m. (2004). méthodes de diagnostic et d'evaluation de performance pour la gestion de chaines ligistique. l'nistitut national polytechnique de toulouse. lackman, c. & al. (2000). the contribution of market intelligence to tactical and strategic business decisions, marketing intelligence & planningvol 18(no 1). lingle, j. h., & schiermann, w. a. (1996). from balanced scorecard to strategic gauges: is measurement worth it? management review, vol 85 (no 3). lipika, d., & al, e. (2011). acquiring competitive intelligence from social media, doi: 10.1145/2034617.2034621. lorino, p. (1991). l'économiste et le manageur.alger: enag. lorraine dori ponu, a., & zubair, h. (2015). the influence of organizational culture on performance, management in assurance industry: zurich insurance malaysia. international journal of accountng, business and management, vol 1 (no 1). marshall, g & al. (2004). leading organizational learning harnessing the power of knowledges.an franciscopublished by jossey-bas macinnis, d. j., & al, e. (2002). generating competitive intelligence in organizations. journal of market focused management, doi: 10.1023/b:jmfm.0000008071.19917.36, vol 5 (no 4). 64 maune, a. (2014). competitive intelligence: an exploratory literature review of its positioning, doi:10.22495/jgr_v3_i4_p6. journal of governance and regulation, vol 3 (issue 4). maune, a. (2022). mobile applications adoption and use in strategic competitive intelligence: a structural equation modelling approach. journal of intelligence studies in business , vol 12 (no 1). mbaindin, h. (2022). the mediating effect of entrepreneurial orientation on the impact of knowledge management processes on successful organizational performance at industrial sector in jordan. journal of intelligence studies in business , vol 12 (no 1). moloi, r., & iyamu, t. (2015). competitive intelligence in the entreprise, doi: 10.4018/jantti.2013040104. international journal of actor-network theory and technological innovation, vol 5 (no 2). peter, m. s., & al, a. (1994). the fifth discipline field book stratégies and tools for building a learning organization. new york: doubleday dell publishing group inc. pecinova, z. lostakova, h. (2012).the company performance from the point of view of the customers in the context of the overall company performance,carpathian logistics congress. rahchamani, a., & all, e. (2019). the impact of marketing intelligence and business intelligence on acquiring competitive advantage, doi:10.20397/21776652/2019.v19i5.1794. revista gestão & tecnologia, vol 19 (no 5). raanan, l. (2007). idemystifying organizational learning, usa, sage publication. saayman, a & al. (2008). competitive intelligence: construct exploration, validation and equivalence, aslib proceedings, doi: 10.1108/00012530810888006vol 60(no 4). safarnia, h. (2011). review of competitive intelligence & competitive advantage in the industrial estates companies in appraisal and testing of model by amos graphics, doi: 10.3968/j.ibm.1923842820110202.006. international business and management, vol 2 (no 2). solkova andrea, v. k., & gabriela, k. (2013). identification of employees performance appraisal methodes in agricultural organization. journal of competitiveness, vol 5. stephen, j. (2000). the manager's pocket guide to organizational learning,massachusettshrd press. thompson, s. (2012). williey séries in probability and statistics. inc. publication , 50-60. лена, м. (2019). marketing intelligence as a tool for strategic enterprise management, doi:10.37200/ijpr/v24i8/pr281089. international journal of psychosocial rehabilitation, vol 24 (n 8) o p i n i o n s e c t i o n 30 integration of business intelligence and knowledge management – a literature review najibeh abbasi rostami 1 1 isfahan university, iran email: najibeh.abbasi@yahoo.com received september 27, accepted october 26 2014 abstract: in today’s world data are so numerous that technology is needed to cope with this knowledge. business intelligence (bi) is a process that involves sorting all the collected information and select those that are relevant. bi provides critical insights that help organizations make right decisions. knowledge management (km) is a key approach to solving current problems. km can be defined as a systematic process of finding, selecting, organizing, distilling and presenting information in a way that improves an employee's comprehension in a specific area of interest. bi and km play an important role in improving the qualitative and quantitative value of information available for decision making. km and bi can also benefit from each other. it seems that integration of bi and km can help organizations achieve wider benefits. integration of bi and km will not only help to promote and enhance knowledge for better decision making, but also improve an organization’s performance. therefore it is imperative for organizations to have both bi and km as an integrated system to get full value from both. this paper is a literature review which shows the importance of bi and km integration through a series of models. keywords: business intelligence, knowledge management, integration, literature review available for free online at https://ojs.hh.se/ journal of intelligence studies in business vol 4, no 2 (2014) 30-40 https://ojs.hh.se/ o p i n i o n s e c t i o n 31 1.0 introduction the environment in which firms operate is growing in complexity. since the 1900’s nearly three billion people have become players in the global stage, overcoming cultural, religious, ethnic, and political barriers to market entry. in addition to globalization, other environmental factors that are pressuring businesses to perform at high levels include: customer demand, government regulations, market conditions, and competition. to meet the performance challenge, companies require considerable volumes of timely, relevant, high quality data, information, and knowledge (kimpel and morris, 2013). in most larger firms, there is a vast aggregation of documents and data, including business documents, forms, data bases, spreadsheets, e-mail, news and press articles, technical journals and reports, contracts, and web documents. knowledge and content management applications and technologies are used to search, organize and extract value from these information sources and are the focus of significant research and development activities (herschel and jones, 2005). for example, the international data corporation (idc) reported that digital data growth was up by 48 percent in 2012, with 90 percent of information being unstructured. as a result of this type of data complexity, many businesses are now challenged to understand and analyse the wide range of information involved. however, as many business users lack access to the information they need, many tend to make decisions based on instinctive knowledge that can result in loss of productivity, reduced agility in the marketplace, and flawed decision-making (boonsiritomachai et al., 2014). therefore business intelligence systems allow organizations to access, analyze, and share information and knowledge, which in turn helps to track, understand, target and manage their business in order to improve enterprise performance (panian,2008). in today’s highly competitive and increasingly uncertain world, the quality and timeliness of an organization’s “business intelligence” (bi) can mean not only the difference between profit and loss, but also even the difference between survival and bankruptcy (ranjan, 2008). bi is a broad category of applications and technologies of gathering, accessing, and analyzing a large amount of data for the organization to make effective business decisions. bi is primarily used to improve the timeliness and quality of information, and enable managers better understand the position of their firm as in comparison to competitors. bi applications and technologies help companies to analyze changing trends in market share; changes in customer behavior and spending patterns; customers' preferences; company capabilities; and market conditions. it is used to help analysts and managers determine which adjustments are most likely to respond to changing trends. it has emerged as a concept for analyzing collected data with the purpose to help decision making units get a better comprehensive knowledge of an organization’s operations, and thereby make better business decisions (khan & quadri, 2012). in parallel with the development of paradigmatic knowledge economy, which emphasizes the role of knowledge in creating economic goods, grows the importance of knowledge management. managing business information allows the use of remaining data, its collecting and converting into usable information. managing the knowledge, through implementing various concepts, and using modern business intelligence tools, are necessary to gain a competitive advantage and survival in the markets. integrating business intelligence and knowledge management in new software applications designated not only to store highly structured data and exploit it in real time but also to interpret the results and communicate them to decision factors provides real technological support for strategic management. integrating business intelligence and knowledge management in order to respond to the challenges the modern enterprise has to deal with represents not only a “new trend” in it, but a necessity in the emerging knowledge based economy (albescu et al., 2008). with respect to the increasing importance of the use of bi and km, and the importance integrating business intelligence and knowledge management in knowledge based economy, it seems that integration bi and km can be determined as one of the key success factors in modern business. therefore, this article will address the importance of integration of bi and km as key for successful organizations. the article is structured as follows: section 2 provides definitions of bi and km. in section 3, similarities and distinction between bi and km are presented. section 4 discusses bi and km benefits for the organization. section 5 presents integration of km and bi with benefits, and the last section gives a brief summary of the article. 2.0 literature review 2.1 defining business intelligence understanding of business intelligence often differs by its content’s focus as well as on several related terms used for referring to business intelligence (including competitive intelligence, competitor intelligence, strategic intelligence etc.) (jaklic et al., 2009). o p i n i o n s e c t i o n 32 business intelligence is a natural outgrowth of a series of previous systems designed to support decision making. the emergence of the data warehouse as a repository, the advances in data cleansing that lead to a single truth, the greater capabilities of hardware and software, and the boom of internet technologies that provided the prevalent user interface all combine to create a richer business intelligence environment than was available previously. bi pulls information from many other systems. figure 1 depicts some of the information systems that are used by bi (negash, 2004). figure 1: bi relation to other information systems. where: olap = on-line data processing, crm=customer relationship management, dss= decision support systems, gis = geographic information systems bi is a set of business information and business analyses within the context of key business processes that lead to decisions and actions. in particular, bi means leveraging information assets within key business processes to achieve improved business performance (williams & williams, 2007). bi systems combine data gathering, data storage, and knowledge management with analytical tools to present complex internal and competitive information to planners and decision makers (al-shubiri, 2012). business intelligence has been defined as solutions applying information technologies to retrieve heterogeneous and distributed resources in order to interpret, categorize, and integrate them, and then to formulate any potentially usable knowledge by employing analysis mechanisms (vine, 2000). bi is the way and method of improving business performance by providing powerful assistance to executive decision maker which enables them to have actionable information at hand. bi tools are viewed as technology that enhances the efficiency of business operation by providing an increased value to the enterprise information and hence the way this information is utilized (cui et al., 2007). business intelligence is not a single entity; it is decomposed into business information. crosspollination of the value drivers identifies three major components to business intelligence within a business enterprise: (1) relationship intelligence. understanding of how the interactions between knowledge workers influence the organizational performance. (2) competence intelligence. understanding of how the abilities/proficiency of knowledge workers influences organizational performance. (3) structure intelligence. understanding of how an organization’s infrastructure environment influences organizational performance (green, 2007). wixom and watson (2010) define bi as: “a broad category of technologies, applications, and processes for gathering, storing, accessing, and analyzing data to help its users to make better decisions.” (p. 14). turban, et al. (2002: 460) define bi as a computer-based decision analysis usually done online by managers and staff. it includes forecasting, analysing alternatives and evaluating risk and performance. bi is a systematic process, by which knowledge needed for an organisation to compete effectively, is created, captured, shared and leveraged (foo et al., 2007). davenport (2006) defines bi as a term which: “encompasses a wide array of processes and software to collect, analyze, and disseminate data, all in the interest of better decision-making.” (pp. 106-107). the key to bi is to capture and share such knowledge. bi is often confused with it systems and processes. unlike information, knowledge resides in the experiences of people in different contexts. the aim of bi in an organisation is to work within business processes that create, and transfer knowledge throughout the organisation. if knowledge is created and transferred via human experiences then these business processes must encompass an understanding of how people learn business intelligence olap data mining dss/ eis knowledge management data warehouse gis crm marketing visualization o p i n i o n s e c t i o n 33 and transfer their knowledge (sharma and djiaw, 2011). 2.2 knowledge management definition knowledge management refers to a systematic and organizational specific framework to capture, acquire, organize, and communicate both tacit and explicit knowledge of employees so that other employees may utilize them to be more effective and productive in their work and maximize the organization’s knowledge (davenport et al., 1998). knowledge management (km) is not always about technology, but also about understanding how the people work, brainstorming, identify groups of people who work together and how they can share and learn from each other and in the end the organization learning about their workers experience and about the leadership the organization. (muhammad et al., 2014). based on actual experiences of the leading global km case studies, the components for km can be broadly categorized into three classes people, processes, and technology (figure 2). while all three are critical to build a learning organisation and get business results from km, a majority of organisations worldwide implementing km have found it relatively easier to put technology and processes in place, whereas the "people" component has posed greater challenges (bhojaraju, 2005). figure 2: components of knowledge management when analysing these dimensions, it appears clear that knowledge management in an organization is facilitated by the coordination among the three important elements: • people – who create individual and collective knowledge by learning, knowledge sharing, problem solving, integrating knowledge with corporate culture, in order to finally launch better and better products and services. • processes – which should be regularly updated with currently available information and knowledge, and improved adequately. • technologies, and in particular information technologies – which should be developed in line with market demands, in reply to competitors’ activities and based on a company’s resources. (olszak and ziemba,2010). km is a process of knowledge creation, validation, presentation, distribution, and application (bhatt,2001). km is achieving organizational goals through the strategy-driven motivation and facilitation of knowledge workers to develop, enhance and use their capability to interpret data and information (by using available sources of information, experience, skills, culture, character, personality, feelings, etc.) through a process of giving meaning to these data and information (beijerse, 1999). 3.0 the similarities and differences between bi and km enterprises have been investing in technology in an effort to manage the information glut and glean knowledge that can be leveraged for a competitive edge. two technologies in particular have shown good return on investment in some application of research and development. the technologies are business intelligence and knowledge management (cody et al, 2002). knowledge management and business intelligence systems have been around for a long time. km systems are people centric. people create, share, disseminate, use and apply knowledge. although bi includes various tools and technologies, the most decisions and actions are taken and implemented by people. although people play crucial role in both the systems, the distinguishing fact is: in km systems people use knowledge from various knowledge sources and apply them to address the problems knowledge management people process technology o p i n i o n s e c t i o n 34 while in bi systems the insights and decisions are mostly data driven (see figure 3) (sonar, 2011). figure 3 : people centric bi and km business intelligence (bi) and knowledge management (km) are the main tools to achieve the organizational tool by providing the environment which users receive, desire and find reliable as timely information or knowledge. the organizations need both bi and knowledge management (km) as an integrated system to get value from explicit and implicit knowledge (khan & quadri, 2012). bi exploits the advantage of huge repositories of data present with and outside the organization. it extracts valuable information/knowledge from various sources of data (khan & quadri, 2012). similar to bi, km improves the use of information and knowledge available to the organization (sun and chen, 2008). however, km is distinct from bi in many aspects. according to a survey by otr consultancy, 60 percent of consultants did not understand the difference between the two. (herschel and jones, 2005). main differences between bi and km have been well described in the table 1. table 1. difference between bi and km (rao and kumar, 2011). bi km sources internal and external structured data sources. data about suppliers, employees and customers etc. expert employees, communities of interests / practices, organization, market & competitors structured/ unstructured data sources. it source systems, etl ,dw,olap, meta data, data mining ,statistical analysis reporting and user interface document management, web content management, enterprise knowledge portal , work flow, collaboration and e-learning business process converts data into information & then into knowledge that finally meets needs of enduser. knowledge sharing, knowledge extraction, knowledge communication, knowledge application, and knowledge innovation. deals with explicit knowledge, which is extracted from operational data. kpi, process optimization, predict from internal and external data. it deals with explicit as well as tacit knowledge. informal, formal, synergic and operational knowledge. objective identifies trends and patterns in structured data for developing new business strategies. utilizes the massive data to discover the knowledge to provide competitive advantage. captures, stores, organizes, and distributes organizational knowledge and resources. it deals with the unstructured knowledge and tacit knowledge of the employees. depends it depends on km to receive feedback/experience from end-users and then to modify the solution, if required. depends on bi techniques to implement in an efficient way and explicit knowledge generated by bi. structured data sources unstructured knowledge sources bi tools km tools data driven insights knowledge driven insights people o p i n i o n s e c t i o n 35 4. bi and km benefits for the organization 4.1 benefits of bi in the last decade, bi has evolved as one of the critical applications in organizations to provide useful insight, support decision-making, and drive organizational performance (on, 2006). there are, of course, many other definitions of the benefits of business intelligence. carver and ritacco (2006, p. 6), for instance, divide them into four groups: (1) lowering costs; (2) increasing revenue; (3) improving customer satisfaction; and (4) improving communication within the company. similarly, atre & moss (2003, p. 39) categorize the benefits of business intelligence as: (1) an increase in revenue; (2) an increase in profit; (3) improved customer satisfaction; (4) a reduction of costs; and (5) an increase in market share. in the survey, kpmg identify several expected bi outcomes. they are: better decision making; better customer handling; faster response to key business issues; improved employee skills; improved productivity; increased profits; sharing best practices; reduced costs; increased market share; creation of new business opportunities; and improved new product development. 4.2 benefits of km km can help organizations to provide better service, enhance quality product, reduce cost and respond faster to their customers (mcadam and mccreedy, 2000). efficient knowledge management has a positive effect on organisational performance (drucker, 1994). the knowledge management process aims to support innovation and encourage the free flow of ideas through the company. it helps increasing revenues and reducing costs. the knowledge management process increases the value of the company and its competitiveness as a whole, because it increases the efficiency and effectiveness, the relationship of all resources and innovation (tisen et al., 2006, p. 47). the importance of knowledge management and its link with business performance have been recognised: companies need to spend relevant management efforts towards this direction (canzano and grimaldi, 2012). the benefits of using km in the organizations are: helps drive strategy solves problems quickly diffuses best practices improves knowledge embedded in products and services cross-fertilizes ideas and increases opportunities for innovation. enables organizations to stay ahead of the competition better. builds organizational memory (dalkir, 2005, p. 20). 5.0 integration bi and km 5.1 relationship between bi and km business intelligence plays a central role in knowledge management (white, 2005). business intelligence is a form of knowledge. the techniques used in knowledge management for generating and transferring knowledge (alshubiri, 2012). bi is seen as an integral part of a larger km effort. the effectiveness of bi integrated with km effort will help not only to promote and enhance knowledge for better decision making, but also improve an organisation’s performance. according to wang and wang (2008), there should be interactions between knowledge workers through bi techniques and business decision makers for knowledge sharing and improvement to happen in an organisation. the provision of quality information is the key to gaining competitive advantages. better information leads to better strategies, tactics, and a more efficient decisionmaking process ( schwartz and teeni, 2011, p.73). herschel (2008) argued that bi activities should lead to knowledge improvement. in other words, “the effectiveness of bi should measure based on how well it promotes and enhances knowledge, how well it improves the mental model(s) and understanding of the decision maker(s), and how well it improves decision making and, hence, firm performance. business intelligence should therefore be viewed as an integral part of km”. some researchers see the relationship differently. they argue that km and its processes are helping hand of bi and make it more pervasive in organizations (zarghamifard and behboudi, 2012). haimila (2001) also sees km as the ‘‘helping hand of bi’’. he cites the use of bi by law enforcement agencies as being a way to maximize their use of collected data, enabling them to make faster and better-informed decisions because they can drill down into data to see trends, o p i n i o n s e c t i o n 36 statistics and match characteristics of related crimes (herschel and jones, 2005). harold m. campbell created a business intelligence model through knowledge management in his paper “the role of organizational knowledge management strategies in the quest for business intelligence.” there are three strategic value propositions which are included in the above model which the organization may use. these are: 1) the need to manage their staff member as assets, who add meaning to information; 2) the need to set up structures that allow staff members to gather and distribute information, but most importantly to convert that information into bottom-line income; 3) the need to be in touch with, and responsive to, the needs of the customers of the organizations; they are the best, and final, arbiters of an organizations' actions. these value propositions are encapsulated in a model for creating bi through km (shrivastava and lanjewar, 2012). it can be argued that there exists an interaction effect between km activities and bi efforts. for example, as malhotra notes, artificial intelligence and expert systems are intended to help deliver the “right information to the right people at the right time.” but, this can only happen if the right information and the right person to use or apply it, and the right circumstance and appropriate time are known in advance. detection of non-routine and unstructured change depends on the sense-making capabilities of knowledge workers for correcting and validating the computational logic of the business and the data it processes. further complicating this issue is the realization that the same assemblage of data may evoke different responses from different people at different times or in different contexts ( herschel and jones, 2005). 5.2 bi/km or km/bi? integrated bi and km provide a robust system with the capability of process-driven decision making. the processes are stored in process model base and their flexibility and reuse help enterprises improve the speed and effectiveness of business operations (lee, 2000). bi and km must be integrated in order to promote organisational learning and effective decision making (cook & cook, 2000). campbell discussed km, components of km, bi and integration of bi and km. there have been several models of integration of bi and km reported in the literature. at the conceptual level, malhotra (2004) has proposed general models of integration of km and bi for routine structured information processing and nonroutine unstructured sense making. white (2005) provides a flowchart model that articulates the use of bi in the km context for decision making. the flowchart model illustrates the involvement of collaboration and interaction between the knowledge workers for socialization. (wang and wang, 2008). adirekpullap (2008) evaluated a framework of business intelligence systems and then explore the development integration framework of the bi and km process, so called bikm framework. you (2010) discusses how km and data mining can become more valuable for real time bi. also, km tools can provide a repository for organizing these reports among other relevant information and for collaborative business intelligence (cbi) (stavrianos and henderson, 2006). km practices make bi more pervasive throughout the organization (vesset and mcdonough, 2009). cheng and peng analyze bi and km, and explain their pros and cons followed by proposing a framework named the kmbi framework that integrates km and bi. the kmbi is built on three layers: data integration, function integration and presentation integration. km and bi have different features and the integration of both can maximize organizational efficiency and provide the best services to the customers (shehzad and ahmed khan, 2013). 5.3 stages in integrating km and bi integration is an ambiguous term that has many interpretations in different domains. for example, in strategy, it means “coordination of activities and management of dependencies between them”. in production and logistics, it is “coordinated management of information, material flows, plant operations and logistics through a common sets of principles, strategies, policies and performance metrics”. the dictionary also provides multiple definitions for integration, for example “the act of combining or adding parts to make a unified whole”. in the domain of information technology, integration is often associated with different perspectives (kahkonen and smolander, 2013). there are three levels of integration between bi and km: (1) presentation level integration provides a horizontal integration with a joint user interface. (2) data level integration provides the content of km systems for bi processes by storing the related metadata into data warehouse. (3) system level integration provides distribution and re-utilization of bi analysis models by a knowledge management system (rao and kumar,2011). km and bi a distinct but interrelated terms of common foundation, mutual effects, complementarities, and synergy ( zarghamifard and behboudi, 2012). stages of integrating km and bi have been described in 4 steps (figur 4). o p i n i o n s e c t i o n 37 according to the american heritage dictionary of the english language, synergy is defined as the interaction of two or more agents or forces so that their combined effect is greater than the sum of their individual effects or cooperative interaction among groups, especially among the acquired subsidiaries or merged parts of a corporation, that creates an enhanced combined effect (taib et al., 2008). as shown in the figur 4, integrating bi and km process generate synergy. therefore, it is expected that the effects produced by combining the km and bi functions will be greater than the sum of their individual effects. this synergy can be important to create and sustain competitive advantages that will lead the organizations to compete strategically in the k-economy. 5.4 integration bi and km benefits for the organization integrating business intelligence and knowledge management in order to respond to the challenges the modern enterprise has to deal with represents not only a “new trend” in it, but a necessity (albescu et al., 2008). km and bi have different features and the integration of both can maximize organizational efficiency and provide the best services to the customers (cheng and cheng, 2011). the benefits of integrating of bi with km are to 1) ensure a real support in deploying successful business across the organization by smoothly managing multicultural teams of employees in providing highest quality products and global services to multicultural customers, 2) end-user preference and experience can be included in bi implementation, and 3) provide better understanding on business context, interpretation results and training to the end-user (rao and kumar, 2011). integrating bi and km provides real technological support for strategic management (albescu et al., 2008). this integration will not only facilitate the capturing and coding of knowledge but also enhances the retrieval and sharing of knowledge across the organization to gain strategic advantage and also to sustain it in competitive market (khan and quadri, 2012). see also the topic of integrating knowledge management with business intelligence processes for enhanced organizational learning (shehzad and ahmed khan, 2013). bikm is the new term that represents the integration and can be determined as one of the key success factors in modern business. integration of bi and km will provide an harmonious tool for enterprise to exploit valuable information and knowledge and gain sustainable competitive advantage (adirekpullap, 2008). o p i n i o n s e c t i o n 38 conclusion rapid developments of techniques and technologies have driven the needs for the application of new knowledge in workplaces. in modern businesses, increasing standards, automation, and technologies have led to vast amounts of data becoming available. this explosive growth has generated an even more urgent need for techniques and tools that can assist us convert this data into useful information and knowledge which can meet customer requirements. in today's world of complex and dynamic, more knowledge-based companies than ever are in need of having knowledge management and business intelligence. in this article we discussed bi and km benefits. business intelligence can bring critical capabilities to an organization. business intelligence systems to allow organizations to access, analyze, and share information and knowledge. also, km improves the use of information and knowledge available to the organization. therefore, it can conveniently be assumed that bi and km play an important role in improving the qualitative and quantitative value of information available for decision making. as we discussed, km and bi can benefit from each other. business intelligence has an important role to play in knowledge management projects. business intelligence techniques are used in knowledge management for generating and transferring knowledge. there exists an interaction effect between km activities and bi efforts, which is discussed in greater detail in other articles. we can conclude that proper integration of bi & km can help organization to get wide benefits. it includes maximize organizational efficiency, enhanced organizational learning and improvement organization performance. we have also discussed the stages in integrating km and bi. both km and bi are deeply influenced by the culture of the organization, especially leadership, groups and opinion leaders, as well as organizational. with successful integration between knowledge management and business intelligence, every company can ensure its viability and outpace its competitors. if an organization aims to develop competitive advantage from information that it has collected then it is best to implement an integrated bi and km strategy. however, the success of each firm depends largely on its human factor. since culture is a km critical success factor and is largely expressed through tacit behavior, we can examine issues that culture can have on bi and km integration efforts. although using integration of bi and km has many benefits and advantages for organizations, studies show that business intelligence projects without due attention to necessary conditions presented here is inefficient. if factors affecting integration of bi and km of business are identified and understood, better integration strategies can be designed. references adirekpullap. t. (2008). “integration of business intelligence and knowledge management as a strategic intelligence tool”, university of nottingham, a management project presented in part consideration for the degree of general mba. ahmad khan, r. and quadri, s.m. k. (2012). “business intelligence: an integrated approach”, business intelligence journal january, 2012 vol.5 no.1, p.64-70. al-shubiri f. (2012). “measuring the impact of business intelligence on performance: an empirical study “,polish journal of management studies, vol.6, p.162-173. albescu, f., pugna, i. and paraschiv, d. (2008). “business intelligence & knowledge management – technological support for strategic management in the knowledge based economy”, revista informatica economică, nr. 4(48). atre, s. and moss, l. t. (2003). “business intelligence roadmap”. the complete project lifecycle for decision-support applications. boston: addison-wesley. bhatt, g.d. (2001). “knowledge management in organizations: examining the interaction between technologies, techniques and people”. journal of knowledge management 5(1),68–75. beijerse, r.p.u. (1999). “questions in knowledge management: defining and conceptualizing a phenomenon”. journal of knowledge management, 3(2), 94-109. boonsiritomachai, w., mcgrath, m. and burgess, s. (2014). “a research framework for the adoption of business intelligence by small and medium-sized enterprises”, small enterprise association of australia and new zealand 27th annual seaanz conference. bhojaraju, g. (2005). “knowledge management: why do we need it for corporates”, malaysian journal of library & information science, vol. 10, no.2: 37-50. campbell, h. m. (2010), “the liberation of intellectual capital through the natural evolution of knowledge management systems”, ieee. canzano, d. and grimaldi, m. (2012). “an integrated framework to implement a knowledge management programme: the role of technological tools and techniques”, int. j. intelligent enterprise, vol. 1, nos. 3/4, p. 233347. o p i n i o n s e c t i o n 39 carver, a. & ritacco, m. (2006). the business value of business intelligence. a framework for measuring the benefits of business intelligence. business objects. cheng, l. and cheng, p. (2011). “integration knowledge management and business intelligence”, ieee. cook, c., & cook, m. (2000). the convergence of knowledge management and business intelligence. new york: auerbach publications. cody, w.f., kreulen, j.t., krishna, v. & spangler w.s. (2002). “the integration of business intelligence and knowledge management”, ibm system journal, vol. 41, no. 4, p. 697-713. dalkir, k. (2005). “knowledge management in theory and practice”, burlington: elsevier butterworth-heinemann. davenport, t. h., & prusak, l. (1998). working knowledge: how organisations manage what they know. boston: harvard business press. davenport, t.h. (2006). competing on analytics. harvard business review, 84(1): 98-107. drucker, p.f. (1994). “the age of social transformation”, the atlantic monthly, 274(5), 53-80. cui, z., damiani, e. and leida, m. (2007). "benefits of ontologies in real time data access", digital ecosystems and technologies conference, dest '07. inaugural ieee-ies, , pp. 392-397, 21-23. green, a. (2007). “business information – a natural path to business intelligence: knowing what to capture”, the journal of information and knowledge management systems vol. 37 no. 1, pp. 18-23. herschel, r., (2008). knowledge management and business intelligence, available. at: http://www.b-eye-network.com/view/7621. herschel, r.t. and jones n.e. (2005). “knowledge management and business intelligence: the importance of integration”, journal of knowledge management, vo l. 9 n o. 4 2005, pp. 45-55, jaklic, j., coelho. p.s and popovic, a. (2009). “information quality improvement as a measure of business intelligence system benefits”, wseas transactions on business and economics, issue 9, volume 6, kahkonen t., smolander k. (2013). “erp integration – a systematic mapping study”, in international conference on enterprise information systems, angers, france. khan, r. a., & quadri, s. k. (2012). dovetailing of business intelligence and knowledge management: an integrative framework. information and knowledge management. vol 2, no.4. kimpel, j.f and morris, r. (2013). “critical success factors for data warehousing: a classic answer to a modern question”, issues in information systems, volume 14, issue 1, pp.376-384. kpmg international (2000). knowledge management research report 2000 , kpmg consulting,london, available at: www.providersedge.com. lee, j. s. (2000). knowledge management: the intellectual revolution. iie solutions, 32, 3437. mcadam, r. and mccreedy, s. (2000). a critique of knowledge management using a social constructionist model, new technology, work and employment, vol. 15, no. 2, pp. 155-168. muhammad, g., ibrahim, j., bhatti, b., and waqas, a. (2014). “business intelligence as a knowledge management tool in providing financial consultancy services”, american journal of information systems, vol. 2, no. 2, 26-32. negash, s. (2004). “business intelligence”, communications of the association for information systems, volume13, 177-195 . olszak, c.m. and ziemba, e. (2010). “knowledge management curriculum development: linking with real business needs”, issues in informing science and information technology, volume 7, p.235-248. on, p. (2006). “the importance of enterprise information management for business intelligence,” business intelligence journal 11:1, pp. 49-54. panian, z. (2008). “how to make business intelligence actionable through serviceoriented architectures”, wseas transactions on business and economics, vol.5, no.5, pp. 210-221. rao, g.k. and kumar, r. (2011). “framework to integrate business intelligence and knowledge management in banking industry”, review of business and technology research vol. 4, no. 1. ranjan, j. (2008). “business justification with business intelligence”, the journal of information and knowledge management systems vol. 38 no. 4, pp. 461-475. sabherwal, r. (2009). “knowledge management and business intelligence: resource competitors or synergistic forces?”, https://business.queensu.ca/centres/monieson/f ulbrightpresentation-oct5-2009.pdf schwartz, d.g. and te'eni, d. (2011). “encyclopedia of knowledge management”, second edition ,united states of america, information science reference. sharma, r.s. and djiaw, v. (2011). “realising the strategic impact of business intelligence tools”, the journal of information and knowledge management systems, vol. 41 no. 2, pp. 113131. http://www.b-eye-network.com/view/7621 http://www.providersedge.com/ https://business.queensu.ca/centres/monieson/fulbrightpresentation-oct5-2009.pdf https://business.queensu.ca/centres/monieson/fulbrightpresentation-oct5-2009.pdf o p i n i o n s e c t i o n 40 shehzad, r. and ahmed khan, m.n. (2013). “integrating knowledge management with business intelligence processes for enhanced organizational learning”, international journal of software engineering and its applications , vol. 7, no. 2, p.83-92. shrivastava, a. and lanjewar,u. (2012). “research agenda: behavioural business intelligence framework for decision support in online retailing in indian context”, international journal of scientific and research publications, volume 2, issue 5. sonar, r.m. (2011). “people centric bi and km: relationship and integration”, www.csi-india.org. taib, k.m., yatin, s.f.m., ahmad, a.r. and mansor, a.n. (2008). “knowledge management and competitive intelligence: a synergy for organizational competitiveness in the k-economy”, communications of the ibima , volume 6, p.25-34. tisen, r., andriessen, d. & lekan deprez, f. (2006). the knowledge dividend: creating high-performance companies through valuebased knowledge management. financial times prentice hall. turban, e., mclean, e., wetherbe, j., bolloju, n. and davison, r. (2002). management technology for management: transforming businesses in the digital economy. new york: john wiley. vesset, d. and mcdonough, b. (2009). taking lessons from km to influence business intelligence pervasiveness. km world, vol. 18 (4), pg. 20-23. vine, d. (2000). internet business intelligence: how to build a big company system on a small company budget , cyberage books, medford, nj. white, c., (2005). the role of business intelligence in knowledge management, available at : http://www.b-eyenetwork.com/view/720 accessed 15/11/2010. williams, s., & williams, n. (2007). the profit impact of business intelligence: morgan kaufmann. wixom, b. and watson, h. (2010). the bi-based organization. international journal of business intelligence research, 1(1): 12-24 you, h. (2010). “a knowledge management approach for real-time business intelligence”, ieee. zarghamifard, m. and behboudi, m. r. (2012). “exploring the underlying relations between the business intelligence and knowledge management”, international journal of science and engineering investigations, vol. 1, issue 2, p.31-35. http://www.csi-india.org/ http://www.b-eye-network.com/view/720%20accessed%2015/11/2010 http://www.b-eye-network.com/view/720%20accessed%2015/11/2010 jisib-vol-12_nr-3(2022).pdf journal of intelligence studies in business vol. 12 no. 3 (2022) open access: freely available at: https://ojs.hh.se/ pp. 54–65 does more intelligent trading strategy win? interacting trading strategies: an agent-based approach burc ulengin abstract: the market is populated with agents having different trading strategies and they are let to interact with each other. agents differ in the trading method they use to trade, and they are grouped as noise, technical, statistical analysis, and machine learning traders. the model is validated shape of probability density function, volatility clustering and absence of autocorrelation in asset returns. the wealth dynamics for each agent group is analysed throughout trading period. agents with a higher time complexity trading strategy outperform those with strategy keywords: 1. introduction the world bank statistics reveal that the market capitalisation of all listed companies on stock exchanges in the world reaches a total of 94 trillion us dollars in 2020.1 there have broad range of studies aiming to explain dynamics of asset prices and model this comthe capital market theory for asset pricing assumption were the most common approaches used. these approaches assume that prices are tions have been challenged by both empirical therefore, alternative approaches have been introduced, kahneman and tversky (1979) proposed the prospect theory as a part of irrationally assess gain and losses asymmetrically. cont (2001) also present a set of stylbe explained by these traditional approaches. in this sense, agent-based models (abms) are introduced as a “paradigm shift” with more realistic assumptions as boundedly rational agents with heterogenous expectations. abms offer as emergent behaviour of system as result of interaction among system entities. therefore, 55 abms draw a wide attention and jean-claude trichet, the former ecb president, writes that “we need to deal better with heterogeneity across agents and the interaction among those heterogeneous agents”.4 an abm is a simulation to model a system consisting of interacting agents. agents can have static or adaptive rules to initiate their interactions with other agents and environment. it has great importance in terms of providing bottom-up understanding of systems. model the interactions among market entities and agents can also apply range of sophisticated learning capabilities especially when continuous adaptation exists.5 spective, traditional models fall short to explain the behaviour of market through extreme situ6,7 since there is no such classical approach to capture behaviour of crashing markets. in this sense, abms can capture such extreme moves when built with necessary components and optimal parameter calibrations. simulating stock markets has been growing market mechanism, wealth dynamics and price dynamics.9,10,11,12 the seminal paper of the santa 13 14,15,16 these models are differing in the way they set the market microstructure, agents trading strategies, network among agents and intelligence level in agents. a review of abms and found in the literature.9,17,18,19 the main studrequires a proper design and four main design elements are needed: market mechanism, trading strategies, traded assets and trader types. the built model is subject to be validated by measures of modelled market. the validation is the key part of abms since it ensures the appropriateness of the simulation cial market model is measured by the ability of reproducing stylized facts observed in the real market.3 another approach for validation is to use modelled market parameters.20,21,22 llacay and peffer (2018) use face validation differing from the mainstream. the stylized facts in erature and they are relation23 24,25 3 there is no simulation model can reproduce all known facts due to increasing complexity of model, hence models are kept simple in compliance to ockham’s razor principle which asserts to use minimal entity for explanations. the trading strategies agents employ play simulation model.17 these strategies can range from zero-intelligent agents26 to very intelligent agents compared to earlier studies.27 in a recent study, llacay and peffer (2018) used agents with realistic trading strategies that takes historical price into account. the method used to take trade action mainly relies on future price forecast which can be any method, for example, evolutionary techniques such as works. agents can also employ social learning method where agents observe other traders and change their strategy accordingly.9,28 this may lead a herding behaviour in the marthe herding behaviour as a reason for bubbles considering main components of agentmethods are main agent diversifying component in the model. in this sense, considering existing studies, there are a few studies that takes realistic agent trading strategies since the earlier studies mainly employ agents with zero-intelligent and agents using fundamental value and genetic algorithms. in this study, we more realistic technical and fundamental trading strategies as well as machine learning approaches. the methods our agents use have been studied in the literature for price preautoregressive integrated moving average (arima) and nelson et al. (2017) used long short-term memory (lstm) as predicting method. on the other hand, llacay and peffer (2018) applied some realistic technical tradthe most of prediction methods use historical data and do back testing to measure the sucmethod interaction with market environment, and this assumes no price impact in the market. considering this fact, we equipped our agents with realistic trading strategies and let them to interact with all market entities. with this, the agent’s market effect is considered, and the model provides an insight into wealth dynamics of interacting agents. the model pro56 market hyper-parameters such as price tick size. we extend the gasm model by adding interacting intelligent agents and analyse market dynamics and wealth dynamics. we aim to make four main contributions to the agent(1) reproduction and validation of the gasm strategies which are commonly used by practitioners (3) we analyse wealth dynamics of agent types hence, the effect of intelligence level on noise traders in the market. the rest of the paper is structured as follow: section 2 presents our simulation model. in section 4, simulation results are given. concludes the study. 2. proposed model lar microstructure with gasm model, for a detailed description of the model structure.40 the herding behaviour phenomena is modelled different from gasm model. agents form cluster is activated with a given probability that all agents belong to the cluster are either seller or buyer. 2.1 trader types on behalf of another parties. traders vary in perceiving the market, they therefore employ different strategies for trading. at this point, the market theories come into account and help traders to see different beliefs about these complex systems. there are several studies prices cannot predict the future prices while brock et al. (1992) and kwon and kish (2002) evidence that technical trading rules can beat to this, statistical methods such as arima30 and lstm31 are used to predict future stock price for trading. in this sense, an environment erogeneity of traders in real market. the literature in testing trading methods usually take a strategy as a baseline and do back testing to compare performances. therefore, agent-based not possible to mimic the entire complex real market dynamics. market is populated with six types of agents who are named as the method they are equipped with: noise, moving average convergence divergence (macd), relative strength index (rsi), bollinger bands, arima and lstm. agents will be named with the method they the amount of assets (cash) to be traded is random fraction of assets(cash) and the limit price is a draw from a interval that is attached to historical volatility. agents rely on their signal function when taking trading decision. have a great importance in keeping the market working since they act as a catalyser in the market and supply volume for intelligent traders.8,35 is considered as a momentum indicator that gives signal of overbought or oversold. the method is developed by wilder (1978) and the rsi value range from 0 to 100 and the rsi value is regarded as overbought if it is above 70 while it is oversold when it is below 30. is a technical trader tool developed by gerald appel in late 1970s. it is mainly based on exponential moving average (ema) which is a type of moving average that takes the more recent data points the greater weight. is a technical trader tool developed by john bollinger in 1980s. it is volatility measure indicator that relies on the past price of asset and its volatility. the agents using arma(p, q) forecast with arma model is computed recursively. the arima model use integrated data by differencing the raw data to meet the time series stationary. the arima traders checks stationarity of stock price and do differencing till obtain a stationary series. the traders estimate arima models with different lags to p and q the model with minimum akaike information criterion (aic). the forecast price values are predicted and that is fed into a decision-making process. is recurrent neural netschmidhuber (1997). it is a machine learning method with deep networks and differs from feedforward neural networks with feedback connections since it can process sequences of data. the lstm is widely used in predicting stock price movement and outperform baseline approaches.31,39 the lstm traders use simulation initialisation period stock price return 57 to predict following 5-periods return so post orders accordingly. 3. market initialisation at the beginning of simulation, the stock price p0 is set to be $100. the wealth is equally distributed among agents, each get 1000 stock (inventory) and $100000 cash. the hyperparameters for market is set before simulation run as in table 1. there are total of 550 agent population of which 500 noise traders and 10 for each of rsi, macd, bollinger, arima and lstm traders. the tick size for asset price is one cent. marchesi et al. (2003) extended the gasm model by populating the market with four different agents. like this study, the most of agents are noise traders that enables the order matching mechanism working. the simulation time steps refer a trading day and simulation is consist of 5040 days which is approximately 20-year trading period since a year has average agents are in a partially observable environment since they only can access asset price. agent types use technical trading indicators, statistical model for time series, and a machine learning, deep learning. all intelligent agents they rely on signals for the forecast period. the stock market is closed form since there is the total wealth of agent agent at time step can be calculated as = + , where and are the cash amount and assets of agent at time step and pt asset price. wise. the wealth of a trader changes throughout simulation as a result of their interactions. the actions within market environment are based on the strategy trader employ to take buy or sell action. building these strategies rely on the parameters that emulate realistic trading strategies, which is given in table 2. market initial parameters. market parameters value description n 550 total number of agents t 5240 simulation time steps pac 0.001 probability that agents create a cluster pca 0.002 probability that cluster is activated bp 0.5 buy probability of noise traders smu 1.01 mean of sell limit orders ssk 4.5 sell sigma k bmu 1.01 mean of buy limit orders bsk 4.5 buy sigma k agent population [500, 10, 10, 10, 10, 10] [noise, rsi, macd, bollinger, arima, lstm] 58 agent initial parameters. agent type parameters values description noise [p ] [0,5] buy probability rsi r1 ] [14, 30, 70] periods of rsi, buy signal threshold, sell signal threshold macd m1 m2 m3 [12, 26, 9, 2/(n+1) ema(p), ema(p), ema(macd) periods and smoothing constant bollinger [ b] [20, 2] periods and constant k arima [p, d, q] [ [1], [0,1], [1] ] p, d, q are lag order of ar, degree of differencing and ma window size, respectively. p, q take an integer value 1 and 2, depending on model selection aic criteria. d is mainly 0 or 1. lstm optimiser, epochs, learningrate] [20, “adam”, 50, 1, 0.005] input and output layers. “adam” is an optimiser for training deep neural networks. epochs is the number of learning algorithm works through the training set. learningrate is the step size function. 2. simulation model and results in this section, the extended gasm model is simulated, and the result of the experiments to trade in the market for a given initialisation period hence, initial stock price is generated. different traders who are called “intelligent” agents since those agents predict future price move. the market behaviour emerges under agent interactions. the simulation is run with 500 noise traders and 10 intelligent traders for each method. since the amount of asset to trade is a random friction of agent’s wealth, having 10 agents for each method will decrease the effect of randomness on average. several simulations with same parameters were run and all give similar outputs. therefore, results here are a representative simulation model for those series the model keeps the gasm main structure, however, some parameters are tuned after several experiments and intelligent agents are added to the market. the population share of traders in the market are determined with experiments. a market with more than 10% of intelligent agent population leads stock stock market simulation loop structure. 59 price jumps and halt in price formation process. the decision-making process is two part which are trading decision and the amount to trade. the amount to trade is random fraction sion depends on the method agents use, trading signal functions is summarised in table 3. it shows the tuning options on parameters for agent trading methods hence, mostly used realistic trading parameters are used to condition realistic trading strategies. 2.1 price, return and volume analysis approaches have assumption that stock returns than normal distribution.3 in addition to this acteristics that are well documented in warner and brown (1985). therefore, the price and other emergent features of simulated market agent decision estimation window and decision making. traders estimation period (day(s)) forecast period (day(s)) buy rule (if …) sell rule (if …) noise rsi 14 1 rsi rsi macd 9, 12, 26 1 bollinger bands 20 1 sma sma arima t lstm t market outputs over simulation time. upper left panel: asset price. upper right panel: asset price log return. lower left panel: asset price log return density distribution. lower right panel : traded volume. 60 are supposed to exhibit these characteristics alongside stylized facts. the price, return and volume outputs are of price is expressed as returns in the rest of this paper. asset price and return related descriptive statistics. statistics price returns mean 81.98 0.000 standard deviation 6.58 0.0091 minimum 65.12 -0.0702 maximum 101.80 0.0754 skewness -0.33 -0.5172 kurtosis 2.09 9.5849 augmented dickey-0.6579 -87.2366 descriptives of price returns are in line with real world stock return features which has zero mean and have heavy-tailed distribution. the distribution is leptokurtic and left skewed with 11.65 kurtosis and -0.769 skewness measure. the price is not-stationary at lation parameters are tuned for different combinations of market and agent parameters. the most striking result is that increasing population of intelligent agents halts price formation so the market. 2.2 validation market model is measured with the number of stylized facts the simulation model is capable to reproduce. the validity of our built model cial market features. as a seminal work, cont (2001) documented a list of stylized facts for markets have reproduce some these stylized facts but not all of them, so do ours. in addition to all market microstructure parameters, there are also six different types of agents interacting which increase the complexity of the stock market. the validation process is conducted for each fact given in cont (2001). return autocorrelations it is empirically showed that autocorrelation time scales could be exception.3 there would be a price to be exploited otherwise, and this function (acf) values for simulation generated asset price returns indicates that there is a staafterwards. this is more like intraday small the slow decay behaviour in absolute return autocorrelation function is another real marfeature that is measured by squared returns return related autocorrelations. left panel: return autocorrelation function. right panel: return partial autocorrelation function. 61 with ljung-box q-test. the test results show that there is an autocorrelation in squared return with test values [critical values] of 1960.22 [11.07], 2155.86 [18.31] and 2176.27 [24.99] for lag 5,10 and 15, respectively. this is a sign of long dependence of volatile market conditions so the conditional volatility behaviour. volume/return corelations it is expected to asset return has negative correlation with volume, however the simulation output short fall to meet this feature since the calculated correlation is = 0,03. another as negative correlation between return and change in volatility. the simulation output was able to reproduce a weak with . the validity of our model with stylized facts is summarised on table 5. testing all stylized facts given in cont (2001) for asset price and volume outputs from simulation show that the model can replicate real market features and they are summarized in table 5. 2.3 wealth analysis the literature in testing trading strategy methods relies on back testing mostly where the agent is assumed to have no market impact on market dynamics since they interact with market participants. this study aims to create a stock market testbed where agent interaction is considered, hence variety of sensitivity analysis can be applied. satisfying some real market stylized facts, the agent-based model is capable of generate real market features. therefore, the market is populated with different types of partial autocorrelation function. list of stylized facts for asset returns that is used for simulation model validations. stylized fact testing does our model meet? absence of return autocorrelations autocorrelation plot partially slow decay of autocorrelation in absolute returns autocorrelation plot squared return autocorrelation plot aggregational gaussianity skewness and kurtosis no corelation no leverage effect corelation partially 62 agents who compete to increase their wealth at the end of trading period. one of the question this study aims to answer is if computationally intelligent agents can beat the overall market. in the light of this with the signal they receive. the rules agent use to trade were summarised in table 3. based on these rules, agents entered market and start to trade. the average wealth of agent the agent named lstm, which is a deep learning method, outperforms other agents by far. lstm method is the most complicated and computationally costly method among others. computation power can be considered as intelligence level in an interacting agent market. therefore, it can be concluded that the more computational power the higher return. the number of days agents take long, and short positions is summarised in table 5. average number long and short positions over trading period. traders long positions short positions noise 2269 2266 rsi 120 131 macd 368 369 bollinger 125 126 arima 127 4400 lstm 2531 1811 two agent group rsi and bollinger are reluctant to take position since there is no up-down pattern in price long run. arima and lstm trade most of time since they take position based on their future price move predicagent types, agent wealth differs statistically of agent type pairs was tested at 1%, except noise-macd agent pairs, the rest of 14 pairs has different wealth over the trading period. a boxplot for each agent group is created that although all agents belong to the same group use the same trading method, they differ in the amount to trade at each trading decision. therefore, randomness in amount to trade decision give advantage to some traders. in this sense, each group has at least ten members and distribution checked at initial and homogenous. to measure this, the gini coefinequality in wealth that ranges from 0 to 100. increase in it is a sign of inequality in wealth distribution. at the beginning of simulation all agents were endowed with same amount of small inequalities occur during trading period average wealth of agent types in cash throughout trading period. 63 type agents were kept, and it remains stable at is a measure of wealth inequality, the outliers 3. discussion and conclusion the study aims to gain a better understanding of trader interaction in stock markets and reproduce real market price features. approach is employed to serve the purpose of this study since it takes agents’ market impact into account. the model was able to reproduce real market “stylized facts”, thus it is eligible to were able to equip agents with realistic trading into rivalry of different intelligence level in agents and supporting evidence to dominance of computationally powerful agents. it is evident that agent using deep learning approach get the highest return among others with the highest time complexity method. with agent groups using no trading strategy, rsi, macd, bollinger, arima and lstm methods. catalyser effect of noise traders is tested as the increase in population of 64 intelligent agents halts market and that is ligence in agents helps market to move and provide liquidity to the market. are also in line with back testing on real data, siami-namini et al. (2018) compares performance of arima and lstm methods where the lstm trader outperforms. this is also can be taken as validity measure whereas llacay and peffer (2018) use also face validation and sensitivity analysis to validate their market model extended with realistic trading strategies. our results are consistent with the previous work of raberto et al. (2001) and marchesi et al. (2003) since it reproduces its results. although it is challenging to represent commodel can still reproduce most of price dynamics.43 components is built and validity of empirical tic trading strategies compete alongside agent interactions in our bottom-up market model. the emergent behaviour of the market is a result of agent interactions which is hardly let agents to interact at micro level and analyse the behaviour of market dynamics under different parameter combinations. this can also be considered in a game theorical view since competence of different strategies resulted in price equilibria. considering these aspects, help us to better understand market dynamics even in a competing strategies environment. there are potential limitations of study that heterogeneity in agents is more diverse in real markets such as informed and uninformed although our model mimic real market price features, fundamental value of an asset is the key for major investors and could be added as one trader type. a more powerful computation can ease time complexity of simulation when agents with complex trading strategy is considered such as deep learning method. market parameters, different combination of parameters can be applied when modelling interest in high-frequency trading and limit order book modelling44, therefore there are variety of direction to apply machine learning tools for future research. references 1. market capitalization of listed domestic companies. (2020). retrieved 10 jan 2022, from https://data.worldbank.org/indicator/ cm.mkt.lcap.cd. 2. kahneman, d., tversky, a. prospect theory: an analysis of decision under risk. 3. cont, r. empirical properties of asset returns: stylized facts and statistical issues. quantitaal economics. 4th ed. san diego: elsevier 5. macal, c., north, m. tutorial on agentbased modelling and simulation. journal of 6. bouchaud j. economics needs a scientifpp. 1181–1181. markets. –2259. 10. chakraborti, a., toke, i. m., patriarca, m., 11. ponta, l., scalas, e., raberto, m., cincotti, s. statistical analysis and agent-based microcial trading. ieee journal of selected topics 12. llacay, b., peffer, g. using realistic trading strategies in an agent-based stock market model. computational and mathematical marchesi, m. agent-based simulation of tor behavior to market phenomena. elsevier. 2000. 16. martinez-jaramillo, s., tsang, e. p. an heterogeneous, endogenous and coevolutionary 65 17. lebaron, b. a builder’s guide to agentnancial markets. reports on progress in critical overview of agent-based models for economics. arxiv preprint arxiv:1101.1847. 2011. 20. lux, t., marchesi, m. scaling and criticali498–500. and the business school with genetic programming: a new architecture of the agentnancial market. working paper, graduate nance, brandeis university. 2003. dence in daily foreign exchange rates. joural hetero scedasticity with estimates of econo metrica: journal of the econometric 25. bollerslev t. generalized autoregressive conditional heteroskedasticity. journal of 26. gode, d.k., sunder, s. ‘double auction dynamics: structural effects of non-binding price controls’, journal of economic dynam27. lux, t., schornstein, s. genetic learning as an explanation of stylized facts of foreign exchange markets. journal of mathematiof agent-based models: the case of an asymmetric herding model. computational eco35–56. 30. ariyo, a. a., adewumim a. o., ayo, c. k. ‘stock price prediction using the arima model’. simulation 31. nelson, d. m., pereira, a. c., de oliveira, r. a. ‘stock market’s price movement prediction with lstm neural networks’. 33. brock, w., lakonishok, j., lebaron, b. simple technical trading rules and the stochastic properties of stock returns. the journal 639–653. 35. palit, i., phelps, s., ng, w. l. can a zero-intelligence plus model explain the stylized international multiagent systems. (pp. 653–660). 36. wilder jw. new concepts in technical trading systems. 1978. term memory. dicting stock prices using lstm. ket: microstructure and simulations. lecture notes in economics and mathematical 41. brown, s. j., warner, j. b. using daily stock returns: the case of event studies. journal 42. siami-namini, s., tavakoli, n., namin, a. s. a com parison of arima and lstm in forecasting time series. 17th ieee international conference on machine learning and applicanancial complexity. . get real: realism metrics for robust limit order book market simulations. in methodology of integration for competitive technical intelligence with blue ocean strategy: application to an exotic fruit marisela rodríguez salvador* and manuel alejandro bautista reyes** *instituto tecnológico y de estudios superiores de monterrey (itesm) campus monterrey, eugenio garza sada 2501, monterrey, mexico marisrod@itesm.mx **exa-tec campus monterrey reyestec@gmail.com received 10 march 2011; received in revised form 22 november 2011; accepted 28 december 2011 abstract: this article presents a new methodology that integrates competitive technical intelligence with blue ocean strategy. we explore new business niches taking advantage of the synergy that both areas offer, developing a model based on cyclic interactions through a process developed in two stages: understanding opportunity that arise from idea formulation to decision making and strategic development. the validity of our approach (first stage) was observed in the evaluation of an exotic fruit, anacardium occidentale, in the south of the state of veracruz, mexico with the support of the university itesm, campus monterrey. we identified critical factors for success, opportunities and threats. results confirm the attractiveness of this crop. keywords: competitive technical intelligence, blue ocean strategy, anacardium occidentale 1. introduction with an area of 1,964,375 km², mexico is a country located in the southern part of north america, with a varied territorial geography: arid, mountainous, coastal and desert. its population is approximately 112,336,538 inhabitants (inegi 2010) and its economy is based substantially on the traditional industry, high-tech industry, and agriculture (cia 2011). in mexico, one of the main industrial areas is located in the northern part of the country, in monterrey, nuevo leon. in this city the main campus of the instituto tecnológico y de estudios superiores de monterrey (itesm) is located, which is one of the most important private academic institutions in latin america. the institute has since its beginning developed strong relations with the industry resulting available for free online at https://ojs.hh.se/ journal of intelligence studies in business 1 (2011) 29-39 mailto:reyestec@gmail.com https://ojs.hh.se/ 30 in broad training and consulting services (noriega and rodríguez 2010, itesm 2011). since 2001 a unit of competitive technical intelligence is established on the monterrey campus headquarters (center of quality and manufacturing). its purpose is to promote academic and research activities within this field and assist companies in the identification of opportunities and drawbacks for improvement in innovation processes (noriega and rodríguez 2010, 30-39). in 2010, a master degree student in the quality and manufacturing program asked for support in developing his master's thesis with a project to evaluate the potential niche of an agricultural product from the southern part of mexico. the purpose was to develop a model to evaluate the feasibility of production of an exotic fruit, applying both methodologies: competitive technical intelligence and blue ocean strategy. the final aim was to help improve the competitiveness of a group of farmers of the olmeca region in veracruz. 2. competitive technical intelligence and blue ocean strategy the competitive intelligence field in the anglo saxon world has its origins around the 1600’s in england when sir francis bacon recognized that scientific knowledge is the engine that generates technological change and environmental evolution. the importance of collection and assimilation of sources of technological information was established in the 1800’s, as industries of textile, steel and others evolved. however, it wasn’t until the 1900’s that the field of competitive intelligence was recognized as a profession (ashton and klavans 1997). in 1986 the society of competitive intelligence professionals (scip) was established in the usa. scip is a nonprofit global organization whose purpose it is to promote the field and develop professional knowledge in order for organizations to be more competitive. competitive intelligence refers to a systematic and ethical process for collecting, analyzing and managing external information that could have an impact on the plans, decisions and operations of a company. it is an analytical process that transforms disperses data from competitors, industry and market to apply knowledge in strategic areas related to capabilities, intentions, performance, and position of competitors (scip 2011). whereas the term ‘competitive intelligence’ refers to the process that involves the handling of general information about the external competitive atmosphere of the business, competitive technical intelligence (cti) is also concerned with the associated scientific and technological events of research, development and innovation processes; technological acquisition policies, joint venture, portfolios of r&d, etc. (escorsa and rodriguez 1997, 835). competitive technical intelligence pursues three main objectives: 1. timely awareness of technological events that could improve or harm the organization’s performance. 2. identification of new products/processes, and collaboration prospects to create or improve business. 3. comprehension of scientific and technological events or trends related to the competitive environment, which identifies innovative opportunities (porter 1991). the primary role of cti is anticipation (early warning), a key factor in the business world today. companies that apply this methodology successfully can hope to make decisions with more certainty and can stay ahead of future changes in the environment (comai and tena 2006, 113-136). competitive technical intelligence systems have been a decisive factor of success for companies like: l’oreal, master lock, nestlé, american airlines, oracle, hasbro, 3m, hacer, kellog co. north america, nutra sweet, procter & gamble, johnson & johnson, hewlet packard, southern bell, texas instruments, ford motor credit and rockwell automative design. increased sales are one of the most important benefits that an organization can achieve. a study realized by price waterhouse coopers in 2002 concluded that companies considering awareness of environmental changes had a sales growth of 14.2%, against 11.8% from those who didn’t (scip 2009). from the mid-1990s there has been a substantial increase in research, literature, symposia, training and consulting in cti and related areas. in first world countries the value of cti activities are well recognized for growth and competitiveness (grisaleña and unai 2008, 26-31). in developing countries, like in latin america, there is still much to be done in this area (price 2000). cti provides a methodology interesting to latin american organizations, in particular when they can obtain support from academic institutions that can guide them in this process, taking advantage of resources available in the institution. as chan and mauborgne (2004a, 8) established, there has been an accelerated commoditization of products and 31 services, increased price wars, and shrinking profit margins around the world the last years. this is the result of increased global competition. for major product and service categories, brands are becoming more similar, and as they become more similar people increasingly make selections based on price. in overcrowded industries, differentiating brands becomes a harder strategy to implement in both economic upturns and downturns. this is why strategies that focus on the prospect of entering into an untargeted market and attracting a wider array of customers, who are not currently the target of heavy competition from other competing brands, are needed. one answer to this problem can be a blue ocean strategy deployment, creating and capturing new demand with the aim of adding value in businesses not seen or thought of before. the idea of blue ocean strategy was the result of a decade-long study of 150 strategic moves spanning over more than 30 industries and 100 years (1880-2000) (bos 2011). the name blue ocean derives comes from the idea of imagining the market universe formed by two types of oceans: a red ocean and a blue ocean. a red ocean refers to a market that is already known (competition is heavy, companies are already established). a red ocean means staying in a competitive environment where demand of products and services has defined boundaries and the competence are known by the companies involved. a blue ocean refers to a market space that hasn´t yet been explored and that could constitute a business opportunity. the blue ocean shape is set to overcome competitors and gain greater market shares (chan and mauborgne, 2005). the purpose of a blue ocean strategy is restructuring current market boundaries or creating an entirely new market, where competition rules are not yet set and high profits could be obtained. in this kind of scenario, competence is more or less irrelevant at the moment due to the fact that competition does not exist. products and service standardization is low and business growth is promising (chan and mauborgne 2005). a blue ocean strategy enables the opening of new markets, discovering new demands and consequently achieving economic benefits that allow a clear differentiation from competitors. as chan and mauborgne (2004b, 101-116) note, the strategy comes up from the result of limit expansion of the existent industries, applying a different logic strategy called ¨value innovation ¨. value innovation is the cornerstone of blue ocean strategy due to the fact that it requires simultaneous pursuit of differentiation and low cost. it is a new way of thinking, an execution of a strategy to set aside the competition and break the tradeoff between value and cost. value could be achieved by eliminating or reducing the variables on which a company competes. the value for clients increases by searching for and creating elements that companies have not offered before. chan and mauborgne, (2005) note that the real challenge is not only to be compared with competitors offering more for less; this kind of strategy could increase sales for a period, but will hardly lead to the opening of a new market. conversely, they suggest a redirection of the strategy, where alternative products are considered focusing directly on the customer, not only on the competitors. the final objective is to build strong barriers against imitation through innovation. some of the companies that have successfully implemented the blue ocean strategy include cirque du soleil, casella wines (australian wines), netjets (airlines), curves (a texan company specialized in women exercise programs), novo nordisk (a danish company that produces insulin among other products), nabi (hungarian bus company), cemex, starbucks, dell, and the home depot. these companies have obtained interesting competitive advantages generating a value differentiation by offering differentiated products/services, establishing high barriers against imitation (druehl and schmidt 2008, 44-60). in this context, we suggest that a systematic monitoring of the environment through competitive technical intelligence can lead to knowledge of key competence factors needed in a blue ocean strategy in terms of product, service and/or delivery. 32 we applied this strategy to the fruit anacardium occidentale. while the combination of six sigma and blue ocean strategy has been studied before (meyer 2010), no studies to our knowledge are published where competitive technical intelligence and blue ocean is integrated to evaluate agricultural products. chan and mauborgne (2005) propose several analytical tools to help in this effort: a six-way scheme, a strategic profile and a four action scheme. the combination of these tools could balance the risk factors in the formulation and execution of the strategy for the final concept implementation. for the purpose of this article, the last two tools are applied. 3. the case study mexican agriculture represents 4% of the country´s gdp; only 11% of mexican territory is arable and the agriculture is concentrated in products, such as corn and beans (u.s. department of state 2010). unfortunately, the agricultural development has suffered important constraints in the last years; this is the case for veracruz; a state located in the southern part of the country with an area of 71.820 km². veracruz borders with the gulf of mexico and has an extended coastline of 745 km. mexico, particularly in the southern area, has appropriate conditions for the production and marketing of many different agricultural products with high level standards. some barriers, however, exist. while veracruz shares are 4.8% of all domestic agricultural market, ranking sixth at national level in the category (inegi2011). the state has hardly increased its area harvested (inegi 2009), but have very attractive conditions for farmers, including large land area, excellent location, agro-climatic diversity and wide availability of natural resources, especially water. for many years, food production based on short crops periods have been of particular significance for companies in the area (sedarp 2010). veracruz has a large territory which is divided into 212 cities, grouped in 10 administrative areas, as can be seen in figure 1. figure 1: administrative areas that integrate veracruz state (source: inegi 2010) we will focus our attention on the district with the highest food production potential: the olmeca region, which is located in southern veracruz. this zone has an area of 17,863 km² and is composed of more than 20 municipalities, as shown in figure 2. 33 figure 2: olmeca zone (source: inegi 2010) even though it is one of the most attractive regions, this advantage has not been sufficiently capitalized upon. in most cases, farmers compete with traditional products (where markets are nearly saturated and the return on investment is poor) and they do not normally look for other options. the recommendation is that farmers should focus their efforts on searching for high value alternatives, for example by exploring non-traditional crops or exotic species that would give them a unique differentiation (conagua 2005). in this respect, we apply competitive technical intelligence as a method to explore new opportunities combined with blue ocean strategy. 34 4. integration approach based on the competitive technical intelligence methodology proposed by escorsa y rodríguez (1997, 835) and the blue ocean strategy of chan and mauborgne (2004), a synergic model was designed, as shown in figure 3. figure 3: model of competitive technical intelligence with blue ocean strategy the objective was to identify and analyze business opportunities in markets that have not been previously explored, such as the case of exotic fruit in our example. this model is based on cyclic interactions through a process divided in two stages: 1) understanding opportunities and 2) strategic development. in the subsequent paragraphs, we present a brief explanation of the development of each stage, including insights obtained from the implementation of the methodology proposed in the model above. 5. the methodology even though the model includes both understanding the opportunity and strategic development, for the purpose of this study, we decided of practical reasons to develop only the first part. with this perspective, we hope to show those interested (individuals, companies, associations) new ways to discover business opportunities applying innovative methodologies. the second phase was not developed due to time and space restrictions; it would have been necessary to select a company, establishing utility, 35 price, implementation cost and strategy. it will instead be suggested for future research. 5.1 understanding the opportunity in this phase, the bases of the innovation project is established by employing four activities, starting with idea formulation and establishment of objectives. according to otto and wood (2001, 83-110) the idea of how to drive the project forward should be clearly defined; this includes development of vision and market analysis, including detection of hidden client needs. in our case the project involved the exploration of a non-traditional crop: the anacardium occidentale fruit, shown in figure 4. figure 4: anacardium occidentale next, competitive and technical intelligence was applied to perform the environment analysis. concerning the project, a thorough review of primary and secondary information was completed over a period of six months. information sources were selected based on content, actuality, legality, and cost efficiency. access to the digital library resources of itesm campus monterrey was crucial. a primary research was conducted in veracruz. for this purpose, one municipality of the olmeca region was selected (name is confidential). this municipality had more opportunities to grow and develop new business. 10 of the most important farmers of the region were interviewed in terms of their possible interest in the project as well as availability of resources (economic, facilities and basic capabilities needed). once the information was gathered, the processing and analysis could start. it is important to emphasize that these activities should focus on getting an actionable final result, which signifies an added value for the decision-making process. in this respect, analysis of the factors that could determine the exit potential of the product (in our case, efficiency in yields and market attractiveness) was the main focus of attention. the analysis indicated that anacardium occidentale is appropriate for exploitation. its crop yields are attractive; for example, in favorable conditions it is possible to harvest approximately 1.4 ton/ha starting from the second year sown. the analysis determined that up to 28 ton/ha of production could be obtained after the 5th year sown. concerning the other key factor, the product has a high market value; its commercial value could reach $221,760 mxp or 16,234 usd (bank of mexico, 36 2011) per hectare with a cost to the producer of $7,920 mxp or 580 usd per ton. continuing with the methodology proposed, an initial analysis of commercial feasibility was performed; possible success or failure of the project determined considering potential attributes for market commercialization. the results of this task helped to create a better strategy for the subsequent correct conceptualization of the product in the market. we also found that the product has a high attractive potential in terms of yield production, price per ton, and commercial value, in relation to other existing crops in veracruz (figure 5). it is also possible to commercialize different products from it. cashew nut is the main product of anacardium, which is widely consumed as a snack and for the elaboration of pastries. fresh and dried nuts total an annual worldwide demand of about 750,000 ton. unfortunately, there are no regional statistics on demand in mexico. there are no statistics concerning exploitation of the other parts of the plant either. this is one of the barriers that the project had to face: the scarcity of detailed information about the fruit. however, after a primary investigation with food engineers, biochemical engineers, farmers, companies and potential clients, we found interesting insights concerning the potential diversity of the plant. leaves and flowers can be used for the elaboration of teas and essential oils; seeds for the elaboration of stabilizers, margarines, condiments and ingredients for health treatments (mainly ulcers and scars). the fruit peel can be an ingredient in salads, juices, candies, cosmetic products and treatments for respiratory and gastrointestinal diseases. figure 5: comparative economic evaluation according to bank of mexico september 2011 the subsequent stage of the proposed approach concerns the strategic profile. this task creates a frame of reference where the key attributes of the project can be identified as the basis that the company will use to define the next competitive strategies. for this, critical factors for success need to be determined considering competitors, performance and events in the environment. regarding the project, this stage was conducted to identify the variables relative to the crops conditions and performance in terms of production, capacity of industrial diversification, total estimated market value and comparative economic evaluation crop yield (ton/ ha) price per ton (usd) commercial value ($usd/ha) papaya 39.28 204.00 8,009.00 orange 12.82 140.00 1,791.00 sugarcane 65.27 21.00 1,392.00 corn 2.15 176.00 379.00 anacardium occidentale 28 580.00 16,234.00 maracuyá 8.16 588.00 4,779.00 pitahaya 5.28 398.00 2,094.00 dominical banana 15.3 132.00 2,016.00 guanábana 7.46 212.00 1,573.00 vanilla 2.5 1,533.00 3,816.00 robusta coffee 1.68 2,647.00 4,427.50 pepper 3.08 391.00 1,200.00 macadamia 3.88 682.00 2,646.00 ginger 13 147.00 1903.00 anthurium 6.67 159.00 1,055.00 palm oil 20 53.00 1,054.00 37 potential net benefit. this information provided a clearer visualization of the critical success factors that would distinguish anacardium occidental from the rest of the crops in veracruz. due to the strategic value of this information, it is not possible to reveal all insights obtained here, but we can show some details in the next step, the four actions scheme (figure 6). this activity defines the factors that should be created, increased, reduced or eliminated in order to gain competitiveness. figure 6: four actions scheme as shown in figure 6, the following actions were determined for the project: 1) reducing time of crops, 2) creating different products (food, cosmetics and health treatment), 3) increasing net benefit to consumer as well as increasing crop production, and 4) eliminating pests and scraps. as we have mentioned before, the most important attribute of the plant is its diversification capacity to develop into different natural products. in order to follow the four actions scheme, several elements are necessary, for example: farmers should have specialized technical assistance, access to economic resources and equipment needed to manufacture different kinds of products. the analysis showed that production could start with small quantities, with a small investment and a better distribution of the resources that are already accessible to farmers. we saw that sometimes resources are focused on traditional crops, where utilities are minimal. while as information was validated and checked for accuracy in previous stages, it is important to make an extra revision before the diffusion of the results, including verification of data interpretation with key people involved in the project. once final results are determined, they should be disseminated in terms of appropriate content, format and time according to the needs of the client. with reference to this project, results were analyzed by potential investors. as a result, some farmers with a strong interest in the production and commercialization of anacardium and its products were identified. decision making is the last stage of the first phase: understanding opportunities from the methodology. it consists of the final decision by the company of whether to proceed with the next phase of the project or not: strategic development. the methodology is developed in form of a cycle, implying that interactions are important between all 38 and for all of the steps. moreover, the results obtained at the end of the phase understanding opportunity can be used for other projects in the identification of other possible opportunities to investigate. 6. conclusions the model proposed based on the integration of competitive and technical intelligence with blue ocean strategy (figure 3) provides a new perspective for the identification of new businesses to explore. in our case, support from a major academic institution is essential for exploiting new market niches in regions which lack the resources. this is the case of agriculture in the southern region of veracruz, mexico. the proposed approach represents an interesting opportunity, since many mexican companies are preoccupied with their day-to-day competitive problems in already established markets. awareness concerning the importance of future prevision and management of innovation are areas which are lacking. a common cause of this is insufficient resources (economic, human, methodological, etc.). while companies interested in investing in new approaches, such as the one proposed here, are easier to find in more developed industries, the agricultural sector has traditionally been far behind. however, given the excellent natural resources present in the regions studied, this was an excellent opportunity to consider. from a general point of view, with the application of the proposed methodology, the following benefits were identified: • identification of critical factors for success: high diversification capacity, adequate regional weather, extensive crop surface, high yield production and possibility of scraps exploitation • identification of opportunities and threats, as well as favorable or unfavorable factors that can significantly affect the business • estimation of the feasibility of a business idea taking into account the market potential and the availability of resources. for future research, the application of the second stage in our plan is recommended: strategic development, to develop a desirable concept for a particular product, considering aspects such as: uses (in this project, this includes food, cosmetics and medicinal products), performance, presentation, design and production. in order to accomplish this task the following stages should be developed: determination of the utility generated to the client (for example from the sales process, product delivery, complements offered, etc.), definition of a price strategy policy, fixation of a minimum cost (analysis of alternatives to reduce costs involved in the principal operations of the business), establishment of a product adoption strategy and analysis of the organizational structure. further stages will define the concept implementation activity, which represents the final characteristics definition before launching a new product. finally, this project opened for other opportunities to expand activities in the competitive technical intelligence (cti) domain. when the methodology becomes more available new advantages may emerge in other areas. companies in development can have access to highly trained personnel from academic institutions. these institutions provide broad information resources and new approaches for uncovering business opportunities. proof of this was revealed through the anacardium occidental project. references ashton, b., and klavans, a. 1997. in keeping abreast of science and technology, technical intelligence for business. columbus, ohio: battelle press. bank of mexico 2011. dollar exchange. retrieved september 2011. available online url: http://www.banxico.org.mx/portal-mercadocambiario/index.html bos 2011. about blue ocean strategy. available online url: http://www.blueoceanstrategy.com/abo/what_i s_bos.html http://www.scip.org/index.cfm chan, w. and mauborgne, r. 2004a. blue ocean strategy. part one: blue ocean strategy: 8. chan, w. and mauborgne, r. 2004b. blue ocean strategy. part two: formulating blue ocean strategy, pp. 101-116. chan, w. and mauborgne, r. 2004. blue ocean strategy. harvard business review: pp. 76 84. chan, w. and mauborgne, r. 2005. blue ocean strategy: how to create uncontested market space and make the competition irrelevant. massachusetts: harvard business review press. cia 2011. august 24. cia. retrieved september 2011. available online on url: https://www.cia.gov/library/publications/theworld-factbook/geos/mx.html comai, a. and tena, j. 2006. mapping & anticipating the competitive landscape. barcelona: emecom ediciones, pp. 113-136. conagua 2005. veracruz field and agrobusiness. use of surface and ground water in 39 agriculture. golf center general management: veracruz mexico. direct translation from title: el campo y la agroindustria veracruzana. aprovechamiento de aguas superficiales y subterráneas en la agricultura. gerencia regional golfo centro: veracruz, méxico, pp. 61-63. druehl, c. and schmidt, g. m. 2008. a strategy for opening a new market and encroaching on the lower end of the existing market. production and operations management , 17 (1), pp. 44 60. escorsa, p., and rodríguez, m. 1997. from information to technical intelligence. direct translation from: de la información a la inteligencia tecnológica. vii latin american biannual seminar of technology management: 835. grisaleña, d. and unai, c. 2008 . competitors studies: benefits from analysing competence. transl. from estudios de competidores: los beneficios de analizar a la competencia. puzzle: spanish cti magazine, 6 (29), pp. 26 31. inegi 2009. inegi mexico in numbers. retrieved september 2011. available online on url: http://www.inegi.org.mx/sistemas/mexicocifra s/mexicocifras.aspx?ent=30andmun=0andsec =g inegi 2010. inegi poblation report. retrieved september 2011. available online on url: http://www.inegi.org.mx/sistemas/temasv2/d efault.aspx?s=est&c=17484 inegi 2011 inegi report 2010. retrieved september 2011. available online on url: http://www.veracruz.gob.mx/wpcontent/uploads/2011/04/perspectiva-ver.pdf meyer, j. 2010. in search of blue oceans: the starwood experience. available online on url: http://knowledge.insead.edu/contents/starwoo d.cfm noriega and rodríguez. 2011. evaluation of a honduran residential project with a competitive intelligence proposal integrating scenario analysis and quality function deployment. competitive intelligence magazine, volume no. 14 issue no. 2, pp. 3039. otto, k. and wood, k. 2001. product design. techniques in reverse engineering and new product development. new jersey: prentice hall, pp. 83-110. porter a., roper a., mason t. and rossini f. 1991. forecasting and management of technology. new york: j wiley & sons, p. 57. price, j. 2000. competitive intelligence in latin america: new science meets old practice. competitive intelligence magazine, 4(3) october–december. sedarp 2010. veracruz agriculture, livestock, forestry, fishery and food programs 2005 – 2010. retrieved september 2010. available online on url: http://portal.veracruz.gob.mx/pls/portal/docs/p age/gobversfp/csfpptransparenc ia/sfpfraccionviipvd/sfpprogram assectoriales/sedarp.pdf scip 2009. does ci really make a difference to the bottom line? . retrevied may 2010. available on url: http://www.scip.org/resources/content.cfm?ite mnumber=601&navitemnumber=533 scip 2011. about strategic and competitive intelligence professionals. available online on url: http://www.scip.org/index.cfm us department of state 2010. us department of state december report. retrieved september 2011. available online on url: http://www.state.gov/r/pa/ei/bgn/35749.htm#e con jisib-vol-12_nr-3(2022).pdf journal of intelligence studies in business vol. 12 no. 3 (2022) open access: freely available at: https://ojs.hh.se/ pp. 38–53 the effect of marketing intelligence adoption of banks listed in the egyptian stock exchange shereen aly abstract. the purpose of this study is to examine the effect of marketing intelligence (mi) stock exchange. a statistical analysis was carried based on data collected, using a questionnaire 12 central banks adopting mi and listed in the egyptian stock exchange were measured during the period (2012–2021). then, statistical analysis was conducted based on data collected using the egyptian stock exchange. keywords. return on assets (roa) 1. introduction the egyptian banking sector is one of the huge service sectors that contribute to egypt’s economic growth, creating around a third of sector operates in a fast changing environment characterized with highly competitive market. moreover, the competitive pressure intensively increased due to the penetration of foreign and private banks to the egyptian market. and thangaraja, 2016, p. 756). intensifying competition forced banks operating in egypt to offer more technologically – based services in order to better serve their customers including automated teller machines (atms), plastic cards, mobile banking, internet banking, and electronic fund bagga, 2020, p. 5, ismaeel and alzubi, 2020, et al., 2014, p. 84). therefore, the banks operating in egypt are required to adapt to that highly competitive market and respond to these rapid changes in the marketplace. in the light of severe competition between banks operating in the egyptian market, the adoption of mi within banks was absolutely necessary, in order to be able to respond to the market pressures and compete with larger majority of banks operating in egypt have adopted mi. this study focuses on 12 central banks adopting mi and listed in the egyptian stock exchange. mi adoption was the key to success for those 12 banks listed in the egyptian stock exchange, in terms of managing their marketing activities, as well as analyzing large amount of marketing information gathered about their customers, competitors, and 39 banks to predict their customers’ needs and interests, know their competitors, and analyze the internal and external marketing environment to determine their strengths, weaknesses, 2020, p. 1236). essential tool used by banks’ management to of those 12 banks listed in the egyptian stock exchange and make decisions related to their analysis allows banks’ management to anaprovides them with a deep understanding on to evaluate their banks’ performance. (san and often called ratio analysis. (lipunga, 2014, of those 12 banks adopting mi and listed in on equity (roe) and return on assets (roa). 2. theoretical framework (mi) of them include: “marketing intelligence is the process of collecting daily information about important developments in the marketing environment that help managers to set, adjust, and update marketing plans”. and thangaraja (2016) added that “marketing intelligence is the continuous and systematic collection and analysis of everyday information about any changes occurring in the company’s marketing environment including competitors, attitudes, or buying behavior for the purpose of helping managers to better understand what is happening in the market and the available market opportunities. this in turn will help managers to make effective and accurate decican be viewed as a continuing and interacting structure of people, equipment, and procedures that are responsible for gathering, sorting, analyzing, and distributing pertinent, timely, and accurate information that help decision makers to improve their marketing planning, intelligence refers to the information, primarily quantitative in nature, that organizations gather through direct interaction and dialogue with market participants including customers, competitors, suppliers, sales force, social media, blogs, internet, or any combination of these in order to produce actionable insights for decision makers”. to scan, monitor, analyze, and evaluate marketing information gathered from all accessible points (internal and external marketing environment, marketing research, and market developments) in order to counteract on competitors’ actions and prevailing market conditions for improving the company’s competitive advantage and overall performance through enhanced and intelligent decision making”. 2.2 main dimensions of mi adoption sions or variables that constitute the adoption of mi. competitor intelligence customer intelligence product intelligence technology intelligence marketing environment intelligence marketing intelligence (mi) main dimensions of mi. 2.2.1 competitor intelligence: is the process of collecting and analyzing information about competitors, their trends, strategies, and future plans. this helps an organization to form a clear picture of the competitive environment where it works in, as well as helps it competitor intelligence is based on the ethical gathering of different types of information 40 including government records that are openly 2.2.2. customer intelligence: is the process of gathering and analyzing information about customers’ buying behavior, intentions, preferences, motivations, concerns, beliefs, and perceptions. this helps an organization to create will be able to produce the products that satisfy customers’ needs, as well as meet their expeclymperopoulos and chaniotakis, 2005, p. 485). 2.2.3 product intelligence: is the process of collecting and analyzing information about an organization’s products as well as about those of competitors. this provides an organization’s management team with deep insights about product development and innovation activities. product intelligence enables an organization to make individual product decisions including decisions about product attributes such as product quality, price, design, features, labeling, packaging, as well as after – sale services. ozturk et al., 2012, p. 231). 2.2.4 technology intelligence: is the process of identifying and analyzing the technological opportunities and threats that may affect an organization’s development. this helps an organization to understand what is going on in the surrounding world of technology, and adopt the technologies that help an organization to gain the most competitive advantage. the good technology intelligence provides an organization with a solid knowledge and support for planning and creating its own innovation path. 2013, p. 35, ozturk et al., 2012, p. 331). 2.2.5 marketing environment intelligence: mi goes beyond gathering information related to competitors and customers. it extends to gather information about the external marketing environment of an organization. the marketing environment intelligence aims at identifying the opportunities as well as the threats an organization faces in the external marketing environment. mi works to take advantage of the available opportunities and overcome the threats as well as try to turn them into investment opportunities. due to global competition and the complexity of surpredict the events surrounding the organization. mi reduces the environmental uncertainty through continuous monitoring of events that help to receive signals about any changes in the environment. this in turn leads to excellence and competitive advantage. (ismaeel p. 231). 2.3 importance of mi adoption ing intelligence within any organization stems from its crucial role in performing the following functions: mi gathers daily information on all developments in the marketing environment which help managers to design and modmi is an important tool for gathering relevant information that help marketing managers to improve decision making under different conditions including certainty, uncertainty, and p. 25). mi is a future – oriented activity that helps managers in predicting and planning for the future reactions of competitors. this enables managers to overcome threats and avoid risks of competitors early, as well as exploit available opportunities in the marketreduce the astonishments and the employees’ inability against environmental changes, as well as minimizes the company’s exposure to environmental risks and danger. (al-weshah, marketing managers to identify the organization’s target market, and provides insights 41 about both current and potential customers who are predisposed to buy the organization’s products/services. this will guide organizations in directing their marketing activities to the right target market. moreover, mi helps to analyze consumer buying behavior. thus, an organization can produce the products that only satisfy and meet consumers’ needs and wants. p. 1005). mi helps marketing managers to create long-term relationships with customers, manage customer relationships, which results in increasing customers’ satisfaction, loyalty, retention, and positive word of mouth. (carson of mi is vital in shaping an organization’s competitive advantage. mi helps an organization to compete with other organizations, by providing it with relevant information about its competitors. this helps an organization to expect it competitors’ reactions and be able to plan for the next strategic moves. (carson et al., 2014, p. 27). mi contributes to improving an organizations performance due to its effect on enhanced market share. (ismaeel and alzubi, p. 2). mi plays an important role in encouraging innovation and creativity. the emergence of creative ideas from using mi helps an organization to produce new products and enter new markets. this results in improving an organization’s competitive position. thereby, it can survive and grow in competitive markets helps an organization to analyze the marketing environment. this in turn enables marketing managers to identify the organization’s strengths, weaknesses, opportunities, and threats (swot analysis). also, mi helps in formulating the market penetration strategy, as well as market segmentation and market development strategies. (maria et al., 2020, et al., 2012, p. 228). the banking sector is the most important segp. 649). moreover, banks play a crucial role in the economic resource allocation of countries by chanelling funds from depositors to investors continuously. they offer all important services including providing deposits and loan facilities for personal and corporate customers, making credit and liquidity available under different market conditions, and providing access to the nations payment systems. added that the health of the nation’s economy is closely and positively related to the soundness of its banking system. a highly developed banking sector plays an important role in promoting the whole country’s economic growth. cial performance of banks reward the shareholders for their investment and stimulates additional investment which will bring further economic growth. on the other hand, poor performance of banks may lead to their which will have negative consequences on ecothe soundness of the banks depends greatly cates into either the strength or the weakness is one of the essential conditions for maintaining the stability of banking system, this study the different performance measures of the banks which can be analyzed. (akbas, 2012, p. 104). a bank in generating earnings. (lipunga, 2014, of banks contributes to the economic development of the entire nation by providing additional employment and tax revenues to the gov42 to the income of investors by having a higher dividend, and thereby improve the standard of a number of previous studies argued that there found to be the most generally used methods. and accounting information, which in turn provides managers a deep understanding of mance. this study as well as previous studies indicators: return on equity (roe) and return on assets (roa). roe and roa are the most 3. methodology and data 3.1 hypotheses development this study examines the effect of mi adoption banks adopting mi and listed in the egyptian stock exchange. the following section presents the development of the main hypothesis based on the relationship between mi adoption and mi and listed in the egyptian stock exchange. help the bank’s management in the decision making process of the bank’s operations, as well as maintaining providing the management with concrete and jolevski, 2017, p. 7). in particular, the value of for any changes that may occur in the bank’s p. 231). based on the above discussion, the following main hypothesis is proposed: (a) return on equity (roe): there are varindicators. this study focuses on using two them includes return on equity (roe). the following section presents the development of roe = net income average total equity return on equity is considered as an importroe is calculated as dividing net income (or this indicator is most often shown in percentper dollar of book equity capital. roe shows erable, as it implies that the management is and generating revenues to shareholders. thus, is the bank. this indicates into a more powerper unit of the invested capital. (asqar, 2022, 2015, p. 51). based on the above discussion, (b) return on assets (roa): a second alterbanks is return on assets (roa). the following section presents the development of the second sub-hypothesis: roa = net income average total assets 43 banks. it is used as a main indicator of the bank assets. this indicator is most often shown in percentage. it indicates into the returns genagement in converting bank’s assets into net able is the bank, and vice versa. roa is the best roa is not distorted by high equity multipliers. roa is also a proxy measure used to determine the bank’s ability to generate income a bank utilizes its total assets to achieve high ity from the perspective of shareholders, i.e. lipunga, 2014, p. 41). based on the above discussion, the second sub-hypothesis is proposed as follows: 3.2 measures on one hand, a questionnaire tool was used to measure the research independent variable which includes the mi adoption in 12 central banks adopting mi and listed in the egyptian stock exchange. the questionnaire was directed to people working within the information operationalization of the independent variables of mi. variable operational measure references mi adoption dichotomous variable indicating • customers evaluate the extent to which mi adoption helped the banks in predicting customers’ behaviors & directions, analyzing customers’ buying behavior, as well as determining customers’ needs, interests and preferences. maria et al., (2020), rao (2020), (2020), noviyanti et al. (2020), allymperopoulos and chaniotakis (2005). • product or service assess the extent to which mi adoption contributed to providing the banks with information about the current as well as the new banking services that can be provided to customers. shailza et al. (2020), kumar (2020), kant (2020), azeez (2020), inha dnd bohlin (2018), ade et al. (2017), igbaekemen (2014), ozturk et al. (2012). • analyzing the marketing environment the extent to which mi adoption helped the banks in analyzing the marketing environment in order to identify its strengths, determine its weaknesses, exploit the available opportunities, and overcome competitors’ threats. (2019), inha and bohlin (2018), ozturk et al. (2012). • competitive risks the extent to which mi adoption helped the banks in avoiding the risks of competitors, as well as analyzing any potential risks in the market. • information technology the extent to which mi adoption helped the banks in adopting the most advanced information technologies in the marketplace, which in turn contributed to gaining a competitive advantage in technology. shailza (2020), kamau and njugungo et al. (2012). 44 technology (it) department in those 12 banks. the questionnaire consists of questions with scale. in this study, all variables of mi adoption were developed based on an extensive literabeen concluded that mi adoption consists of service, analyzing the marketing environment, competitive risks, and information technology. consequently, the independent variables included in the present study have been adopted from measurements used in previous mi studies. operationalization of the study variables is summarized in table 1. the questionnaire was originally prepared in english and then translated into arabic. on the other hand, the research dependent variable which central banks was also measured. this study indicators: return on equity (roe) and return on assets (roa). the roe and roa were calthe adoption of mi (2012–2016) were compared after the adoption of mi (2017–2021) in each banks can be observed. this study extracts which include annual reports on the income statements and the balance sheets of those 12 cial statements of those 12 banks were drawn from egypt for information dissemination (egid), found in cairo, egypt. 3.3 the sample and response rate tiality of banks, the 12 central banks listed in the egyptian stock exchange are numbered from 1 to 12 instead of mentioning their names. the main concern of the present study is targeting the it people working within the information technology (it) department due to their great knowledge of mi adoption. there are nearly 40 people working within the it department in each of those 12 banks. based on the research population which consists of 480 people, the research sample size consists of 224 people which represent the minimum sample size. the simple random sampling technique was the most suitable one for this research. the questionnaire was distributed to 320 people working within the information technology (it) department in the 12 central banks adopting mi and listed in the egyptian stock exchange. 80 questionnaires were excluded and removed from the sample for being largely incomplete, and only 240 out of 320 were collected. the remaining 240 usable question75%, which was considered highly reasonable with regard to mi adoption studies. 4. data analysis and results 4.1 validity and reliability to measure the validity and reliability of the constructs of the questionnaire instrument, exhaustive literature review was carried out to identify the constructs and items that were used in the previous studies related to mi adoption. secondly, a wide range of items were selected included in the present study. thirdly, an initial version of the questionnaire was prepared in english, and then translated into arabic. directing the questionnaire to 25 it staff working in different banks operating in egypt. relaying on their comments and recommendations, some questions and items was deleted improve the clarity and relevance of the quesability of the questionnaire, cronbach’s was computed to evaluate the internal consistency pendent variable used in the present study. the results presented in table 2 indicate that ability of questions, as it ranges between 0.526 and 0.657, with p-value < 0.001. therefore, cronbach’s alpha p-value customers 0.526 <0.001 product/service 0.608 <0.001 analyzing the marketing environment 0.612 <0.001 competitive risks 0.645 <0.001 information technology 0.657 <0.001 45 4.2 descriptive statistics of the independent variables the independent variable of the study is repproduct, analyzing the marketing environment, competitive risks, and information technology. as shown in table 3, the mean values of all variables are ranged between 3.67 and 4.89, indicating that the respondents tend to agree or strongly agree to most of the statements that measure these variables. table 3 reveals that the variable with the highest agreement and minimum variation (s.d. = 0.12) is the information technology. while the variable with the least agreement and maximum variation (s.d. = 0.35) is the competitive risks. besides, a comparison was conducted between the 12 central banks listed in the egyptian stock exchange, in order to determine the differences among the 12 banks in each bank. the comparison is based on the 5 uct/service, analyzing the marketing environment, competitive risks, and information technology. the results of comparison are sumthe results indicate that all the 12 central cates that those banks have adopted the mi in 9, 2 and 10 respectively come later, which indicates that those banks have adopted the mi cient way. table 4 also reveals the differences between the 5 main variables of mi adoption for each bank. in general, the information technology variable (97.85%) the most important variable in the mi adoption, followed by product/service (90.60%), followed by customers (87.70%), followed by analyzing the marketing descriptive statistics of the independent variables. variable n minimum maximum mean std. deviation customers 214 3.70 4.80 4.3766 0.24034 product/service 214 4.20 5.00 4.5234 0.14410 analyzing the marketing environment 214 3.73 4.73 4.2260 0.19415 competitive risks 214 3.00 4.83 3.6721 0.35434 information technology 214 4.60 5.00 4.8925 0.12349 comparison among 12 banks based on the 5 variables of mi. mi variables bank number customers product or service analyzing the marketing environment competitive risks information technology total 1 83.47% 88.84% 85.26% 79.65% 96.84% 86.81% 2 85.64% 90.18% 85.45% 75.15% 95.45% 86.38% 3 84.90% 90.60% 87.64% 78.67% 97.80% 87.92% 4 87.22% 89.56% 85.56% 75.37% 98.00% 87.14% 5 86.90% 91.80% 84.64% 72.50% 97.60% 86.69% 6 89.05% 91.24% 79.65% 70.79% 97.14% 85.58% 7 88.82% 90.82% 84.17% 68.63% 99.76% 86.44% 8 89.44% 90.22% 82.93% 79.44% 97.33% 87.87% 9 88.96% 90.56% 85.82% 67.47% 99.20% 86.40% 10 88.91% 90.18% 83.80% 68.33% 100.00% 86.25% 11 90.20% 90.60% 87.00% 71.33% 97.20% 87.27% 12 88.78% 92.67% 86.36% 69.26% 97.78% 86.97% total 87.70% 90.60% 84.86% 72.89% 97.85% 86.78% 46 tive risks (72.89%). the results in table 4 have concluded that: based on the information techhas the ability to use information technology (95.45%). while, based on product/service variproduct/service is provided by bank 1 (88.84%). is the best bank in avoiding the competitive bank. a comparison between the 12 central banks adopting mi and listed in the egyptian stock exchange is illustrated in a bar chart, as the differences among those 12 banks in terms 4.3 descriptive statistics of the dependent variable the dependent variable of the study represents adopting mi and listed in the egyptian stock exchange. this study focuses on using 2 mea(roe) and return on assets (roa). as shown in before after roe roa roe roa mean 0.015983 0.1538 0.030067 0.2889 median 0.0155 0.156 0.03 0.2835 maximum 0.028 0.221 0.047 0.399 minimum 0.007 0.049 0.016 0.185 std. dev 0.006108 0.034597 0.006257 0.058848 38.2156 22.4948 20.81019 20.36968 skewness 0.216123 -0.498 0.073132 0.001873 kurtosis 1.770913 3.370287 3.032453 2.040236 jarque-bera 4.243727 2.822827 0.056116 2.302901 probability 0.119808 0.243798 0.972332 0.316178 mi% bank the percentage of mi adoption 47 table 5, the results indicate that all dependent variables whether before or after the adoption of mi, reveal small data distraction due to their whereby the standard deviation of this variation is less than the mean. table 5 also shows tor (roe) that was 0.015983 before mi adoption. while, after mi adoption, the mean values of roe raised to 0.030067, with a percentage of increase equals to 88%. similarly, the mean valwas 0.1538 before mi adoption, and raised to 0.2889 after mi adoption, with a percentage of increase equals to 88% as well. moreover, the mean values of roe and roa are very close to median values, which indicate that the distribution of these variables is symmetrical. in addition to skewness values which the minimum and maximum values of roe and roa are positive values, which indicate that all ratios, whether before or after mi adopthe results in table 5 indicate that all jarquebera statistical values are less than the tabumeans that all dependent variables follow normal distribution. this result is in compliance with the sig values (p-value > 5%). plots were conducted, and reveal that all data points are near or on the straight reference line, indicating that both roe and roa are normally distributed. moreover, the effect of mi adoption on roe and roa of 12 central banks adopting mi and listed in the egyptian show the effect of mi on roa. the roe and before the adoption of mi (2012–2016) were period after the adoption of mi (2017–2021). ing mi, and its effect was clearly observed on enhancing the roe and roa of the 12 banks after adopting the mi. the effect of mi adoption on roe. the effect of mi adoption on roa. 48 4.4 correlation analysis the correlation analysis of the variables of the study was conducted using pearson correlaand roa). the results of the correlation analysis are summarized in table 6. the results in between roe and mi adoption, since the value p-value < 0.001, and the strong positive correlation ranges between (0.7 and 1). table 6 a strong positive correlation between roa and mi adoption, since the value of pearson correlavariable mi pearson correlation p-value roe 0.816 < 0.001 roa 0.754 < 0.001 4.5 regression analysis this study aims to examine the effect of mi cators (roe and roa) of 12 central banks adopting mi and listed in the egyptian stock exchange. therefore, the simple linear regression model was used to test the two research sub-hypotheses. the independent variable (mi) will be expressed as dummy variable that takes the value 0 before the adoption, and takes the value 1 after the adoption. the following simple linear models were estimated as follows: 120. j = 1, 2, …, 10 120. j = 1, 2, …, 10 where roeij: denotes the ith observed value of roe within bank j. roaij: denotes the ith observed value of roa within bank j. miij: denotes the ith observed value of mi within bank j. reg.1 and reg.2 respectively. reg.1 and reg.2 respectively 4.5.1 the analysis of reg. 1 the main aim of the present study is to examine the effect of mi adoption on enhancing the return on equity (roe) of 12 central banks adopting mi and listed in the egyptian summarized in table 7. as shown in table 7, the roe of 12 banks adopting mi and listed in is 234.998 with p-value < 0.001. also, based on the value of adjusted r2 (0.663), this indicates model sum of squares df mean square f p-value regression 0.548 1 0.548 234.998 < 0.001 residual 0.275 118 0.002 total 0.823 119 r2 = 0.666 adjusted r2 = 0.663 std. error t p-value durbin watson dwlower limit upper limit constant 0.154 0.006 24.680 < 0.001 0.141 0.166 1.817 mi 0.135 0.009 15.330 < 0.001 0.118 0.153 49 that mi could infer 66.3% from the total variation of roe. in order to estimate the parameters of reg. 1, the ordinary least square estimation method (ols) was used, which is a parametric estimation method. table 8 summarizes table 8 indicate that there is a positive relation between mi and roe, and any change in the independent variable (mi) from 0 to 1 will lead to an increase of 0.135 in the predicted value of the roe. moreover, there is banks adopting mi and listed in the egyptian stock exchange, since (t-statistic = 15.33) with watson (1.817) indicates that there is no serial autocorrelation problem, as the value is near to 2. 4.5.2 the analysis of reg. 2 similarly, the same analysis of the previous sub-section was conducted in order to examine the effect of mi adoption on enhancing the return on assets (roa) of the 12 central banks adopting mi and listed in the egyptian marized in table 9. as illustrated in table 9, the roa of 12 central banks adopting mi and listed in the egyptian stock exchange, since, also, based on the value of adjusted r2 (0.565), this indicates that mi could infer 56.6% from the total variation of roa. table 10 summarizes the regression coefthere is a positive relation between mi and roa, and any change in the independent variable (mi) from 0 to 1 will lead to an increase of 0.014 in the predicted value of the roa. roa of 12 central banks adopting mi and listed in the egyptian stock exchange, since (t-statistic = 12.476) with p-value < 0.001 and conthe value of durbin watson (1.901) indicates that there is no serial autocorrelation problem, as the value is near to 2. according to all previous statistical analysis results, it can be concluded that the main hypothesis is rejected. 5. discussion the present study contributes to the existing literature of mi adoption and its effect 12 central banks adopting mi and listed in explores a new domain (egypt), and thereby of mi has emerged as a modern marketing system in most of banks operating in egypt. in this context, the present study aims to examine the effect of mi adoption on enhancing the profitability indicators of 12 central banks adopting mi and listed in the egyptian stock exchange. the results of the study indicated a strong positive relationship between mi adoption and model sum of squares df mean square f p-value regression 0.006 1 0.006 155.657 <0.001 residual 0.005 118 0.000 total 0.010 119 r2 = 0.569 adjusted r2 = 0.565 std.error t p-value durbin watson dwlower limit upper limit constant 0.061 0.001 20.024 <0.001 0.014 0.018 1.901 mi 0.014 0.001 12.476 <0.001 0.012 0.016 based on the above discussion, the second sub-hypothesis is rejected. 50 banks. moreover, the study provided empirical of those 12 banks. according to these results, central banks. as a result, the second sub-hyet al., 2013). despite the 12 central banks had adopted the mi, there were some differences of adopting the mi. a detailed analysis of the results revealed that the information technology variable was found to be the most variof those 12 central banks. this result supports et al., 2012. the following variable to enhancing banks was product/service. this was asserted by a great body of literature review (e.g.: shailza indicators of those 12 central banks was the customers variable. this result is in line with sevability indicators of the 12 central banks was analyzing the marketing environment. this supports the research results of other previous the 12 central banks was the competitive risks. this results was consistent with previous studit can be concluded that there are some banks others. as a result, the 12 central banks were the results indicated that bank 3, 8, 11, and bank 12, 1, 5, 7, 9, 2 and 10 respectively come cient way. 6. conclusion currently, the egyptian banking sector witnesses severe competitive pressure within the vast majority of banks are urged to adopt mi due its effect on improving operational itive advantage, increasing sales revenues, ing growth and survival in the marketplace. study through examining the effect of mi adopof 12 central banks adopting mi and listed in the egyptian stock exchange. the results roa) of those banks. this result is largely in ies related to mi adoption in different countries and contexts. this study contributes to both regarding knowledge, little research work has been carried out regarding mi adoption in the service sector and particularly within cerning mi adoption within the banks listed in the egyptian stock exchange. as for practice, marketing managers need to move theory into practice and gain better understanding of mi adoption process. in this context, the study provides guidelines for marketing managers to 51 that constitute and support the adoption of mi within any sector. these include: customers, product or service, analyzing the marketing environment, competitive risks, and information technology. 7. limitations and implications for future research the research on which this study is based, like much social science research, is affected by sevself – reports, which may produce bias. second, this study has been conducted in one country (egypt). moreover, the study focuses on one service sector (banking sector: only 12 central banks listed in the egyptian stock exchange). third, the present study aims to examine the effect of mi adoption on enhancing only 2 ings, future researches need to be carried out on many other dimensions such as bank performance including sales revenues, market share, and competitive advantage. successful mi adoption, marketing managers need to understand the main requirements of adopting mi. the following managerial implicommitment, support, and belief in the importance of adopting mi within banks. second, using the latest up-to-date information technology which is considered to be the backbone of mi adoption. third, mi adoption requires conducting effective training programs for all bank members especially it staff, on a regular in order to encourage and motivate the talent members for their devoted efforts. sixth, building cross-functional team-works that are highly skilled, experienced, competent, and references ade, l. p., akanbi, a. m. and ismail, a. (2017), business competitive advantage (a study of diamond bank plc)”, journal of competitiveness, vol. 9, no. 1, pp. 51–71. banking sector”, ocak, pp. 103–110. and underdeveloped oic countries”, jourtrative science, vol. 24, no. 47, pp. 4–28. of market intelligence in the relationship between technology based knowledge sharing and product innovation”, tem journal, vol. 9, no. 2, pp. 688–693. al-taei, a. m. t. and al-shakarchi, b. th. m. impact on market value – a study of a sample of commercial banks listed in the irag stock exchange for the period 2004–2019”, ra), vol. 41, no. 133, pp. 288–308. al-weshah, g. (2017), “marketing intelligence and customer relationships: empirical evidence from jordanian banks”, journal of marketing analytics, pp. 1–12. ing intelligence on innovation and technological enterpreneurship in jordan telecommunication company (empirical study), “journal of marketing and consumer research, vol. 21, pp. 22–40. of commercial banks in the republic of uzbekistan and their modern state”, world vol. 8, pp. 141–148. system and its impact in determining stratpraxis latino americana, vol. 25, no. 1, pp. 530–543. camilleri, s. j. (2005), “an analysis of the profitability, risk and growth indicators of review, vol. 31, pp. 32–48. carson, g., o’connor, c. and simmons, g. (2020), “the crucial role of market intelligence in the development of small business market capabilities”, journal of small business and enterprise development, vol. 27, no. 5, pp. 797–816. erina, j. and lace, n. (2013), “commercial evidence from lativa”, ibima business review, vol. 2013, pp. 1–9. 52 and moghadam, s. s. (2013), “the effect of marketing intelligence on customers’ loyciplinary research journal, vol. 2, no. 2, pp. 34–45. commercial banks”, tribhuvan university journal, vol. 36, no. 1, pp. 122–133. code and iot technology in successful implementation of marketing intelligence system”, international journal of cur(ijcesr), vol. 7, no. 11, pp. 68–81. the banking sector of bangladesh”, jourand 2, pp. 43–57. igbaekemen, g. o. (2014), “marketing intelligence as a strategic tool for competitive edge”, british journal of marketing studies, vol. 2, no. 5, pp. 17–34. inha, e. and bohlin, s. (2018), “marketing intelligence: a literature review”, school of versity, sweden, pp. 1–18. ismaeel, b. and alzubi, m. m. (2020), “the impact of marketing intelligence on the market share of the jordanian commercial banks”, suntext review of economics and business, vol. 1, no. 3, pp. 1–8. ni, r. (2017), an introduction to statistical learning with applications in r, springer doi 10.1007/978-1-4614-7138-7. jeyarani, r. and thangaraja, a. (2016), “the role of marketing intelligence n green banking – practices – a conceptual approach”, imperial journal of interdisciplinary research (ijri), vol. 2, no. 9, pp. 756–758. jolevski, l. (2015), “non-performing loans and public of macednia”, preliminary communication, vol. 4, no. 2, pp. 5–20. kamau, e. w. and njuguna, p. m. (2020), “effect of marketing intelligence on sales performance of commercial banks in kenya”, the international journal of business management and technology, vol. 4, no. 5, pp. 20–32. kant, r. t. (2020), “a new dimension of marketing intelligence for retailing process optimization: a conceptual approach”, international journal of current engineerpp. 114–123. kohlscheen, e., murcia, a. and contreras, j. national settlements: bis working papers no. 686, pp. 1–13. kumar, r. k. (2020), “marketing intelligence practices on consumer preferences by a conceptual approach”, international journal of current engineering and scipp. 83–93. lekhanya, l. m. (2014), “perceived marketing intelligence and marketing communications tools used by rural small, medium, and micro enterprise in south africa”, journal of economics and behavioral studies, vol. 6, no. 12, pp. 1004–1010. lipunga, a. m. (2014), “determinants of profitability of listed commercial banks in developing countries: evidence from malawi”, ing, vol. 5, no. 6, pp. 41–51. lymperopoulos, c. and chaniotakis, i. e. the internet as a marketing – intelligence tool among employees of greek bank branches”, international journal of bank maria, s., pusriadi, t. and darma, d. c. (2020), plementation of its business”, problems of no. 2, pp. 1–8. indicators for islamic banks in jordan”, innance studies, vol. 13, no. 1, pp. 67–89. (2014), “survey of relation between organizational factors and marketing intelligence on iran’s saderat bank (case study saderat vironmental biosciences, vol. 6, pp. 83–88. plication of business intelligence in banks (pakistan), pp. 1–6. noviyanti, l., suryani, n. l., arianto, n. and asmalah, l. (2020), “marketing intelligence implementation for supply chain management of mix products that affect the purchasing decision on citra karisma, 53 supply chain management, vol. 9, no. 3, pp. 1235–1242. “determinants of commercial banks profperformance indicators: evidence from ka/business: theory and practice, vol. 18, pp. 160–170. “segmentation based on sources of marketing intelligence, marketing intelligence quotient and business characteristics in software industry”, istanbul university journal of the school of business adminperisa, a. kurnoga, n. and sopta, m. (2017), cators for selected companies of croatian market”, utms journal of economics, vol. 8, no. 3, pp. 231–242. rao, s. k. (2020), “the role of sales force engagement and level of competence on implementation of marketing intelligence system”, international journal of search (ijcesr), vol. 7, no. 9, pp. 126–136. mercial banks” african journal of business management, vol. 7, no. 8, pp. 649–660. of market intelligence in agricultural marketing”, journal of pharmacognosy and phytochemistry, pp. 131–134. ubiparipovic, b. and durkovic, e. (2011), “application of business intelligence in the banking industry”, management information systems, vol. 6, no. 4, pp. 23–30. ing intelligence: antecedents and consequences”, 3rd internationl conference on innovative computing and communication, (icicc), pp. 1–9. performance: reviewing the mediating impact of customer relationships, customer satisfaction and customer loyalty”, indian journal of economics and business, vol. 18, no. 2, pp. 555–570. 59 o p i n i o n s e c t i o n the intelligence worker as a knowledge activist – an alternative view on intelligence by the use of burke’s pentad magnus hoppe mälardalen university school of business, society and engineering (est) p.o. box 883, 721 23 västerås, sweden magnus.hoppe@mdh.se received march 3 2013, accepted march 26 2013 abstract: as society and business is becoming more complex, the creation and management of knowledge attracts more attention. for intelligence research it offers an alternative perspective on the art and science of intelligence that challenges a previous dominance of strategy and decision-making theories. the article is based on semi-structured interviews with intelligence personnel in four different multinational companies. through the use of burke’s pentad this article gives an account of important challenges encountered by intelligence personnel in modern business organizations due to an increasing dependence on different knowledge processes. these challenges are summarized in four central tasks for knowledge activists; that is to initiate and focus knowledge creation, to reduce the time and cost needed for knowledge creation, to leverage knowledge creation initiatives throughout the corporation and to guide knowledge creation by the instigation of complementary reference points. by engaging in these types of activities intelligence workers are able to stage and influence different sorts of analytical conversations, where the insights from these conversations as reformed knowledge govern an evolving strategy in dispersed circumstances. thus, intelligence workers fulfil their purpose, which in this perspective can be viewed as creating better business in whatever process they engage in. keywords: knowledge activism, knowledge creation, knowledge management, organizational learning, organizational change, analytical conversation, complexity, burke’s pentad, competitive intelligence, organized intelligence work. available for free online at https://ojs.hh.se/ journal of intelligence studies in business 1 (2013) 59-68 mailto:magnus.hoppe@mdh.se https://ojs.hh.se/ 60 1. introduction technological and social changes make business environments less stable by the year, blurring our preconceived ideas of what constitutes an industry (bettis and hitt 1995). as early as 1965 emery and trist stated, ”a main problem in the study of organizational change is that the environmental contexts in which organizations exist are themselves changing at an increasing rate, and towards increasing complexity” (ibid, 24). since then the complexity of industries and their environments has come to interest an increasing number of academics (andersson 1999), who address questions of how to manoeuvre fragmented companies in a complex society. as well as these visible signs of industrial renewal, there are also more subtle changes in organizational processes and the way organizations function. many companies have turned to more knowledge intensive production, which has affected both core competencies and business design. thus management of different knowledge processes has become particularly important. this development challenges the idea of a central core controlling the organization like a machine. instead ideas have been launched where control can be executed through influencing the mind-set of organizational members (miller 1999). as røvik (2000) puts it: "leadership is increasingly a matter of coordination through mental manipulation as opposed to control of physical movements” (ibid, 279, author’s translation). strategic coordination through formal decisions is thus not enough, challenging traditional ideas of the mission and purpose of competitive intelligence, even though these ideas are still central in contemporary descriptions of intelligence (e.g. mcgonagle and vella 2012). knowledge, and a not unproblematic relationship to knowledge management, has interested intelligence theorists since the 1990’s at least (tuomi 1999). more recently intelligence theory has also come to acknowledge complexity as an issue for intelligence professionals and theory. gay (2012) points out that the new business circumstances that follow complexity ought to have effect on how to organize and implement intelligence. lópez et al. (2012) suggests that contextualisation of best practices in supply chain knowledge might counteract the strain that complexity puts on organizations. whereas el haddadi et al. (2011) argues that what used to be strategically planned now (due to increased complexity), to a greater extent, is limited to a strategic response, thus challenging ideas of proactivity. instead, the strategic response must connect to widespread knowledge renewal activities that enable the company to innovate. in line with this reasoning knowledge creation processes (oubrich 2011) has come to interest intelligence researchers along with organizational learning (steiner and ploder 2011) as well as a still vital interest in knowledge management (lópez et al. 2012, rothberg and erickson 2012). tuomi (1999) as well as ghannay and mamlouk (2012) argue that ci could be viewed as a subset of knowledge management, thus definitely changing the locus of intelligence from decision support to knowledge support. on the other hand there are arguments that even though the world changes, the need for good decision support is still a vital task for intelligence professionals (mcgonagle and vella 2012). nan bulger (2013), executive director of scip, emphasizes this view: “whether you are a practitioner, an academic, or a consultant focused on a myriad of business operational disciplines, the need for applied methods to garner and use intelligence in decision support remains.” taking a decisional view, we can conclude that the increasing complexity is a real challenge for companies’ decision makers, not only at the top level, but throughout entire organizations. an increasing number of strategic decisions are now made outside the control of top management, a phenomenon that was also noted by emery and trist in 1965 (cf. eisenhardt 1989). for companies, the current situation makes new demands on internal services and functions that can help various decision makers and others to not only make informed decisions but also coordinate the decisions and actions taken with the rest of the organization; organizational entities that help leadership to coordinate organizational action. in knowledge based companies this demand expands the managerial dimension of a firm to other people and processes, so that the knowledge developed and applied is informed and coordinated. these types of assignments are now given to intelligence services and intelligence personnel inside business organizations; with their tradition of monitoring and analysing the environment they display the necessary competence. but it doesn’t end there. as intelligence is getting more dispersed, intelligence personnel encounter new intelligence needs and dilemmas, thus creating new opportunities for novel research. so far, the knowledge perspective has not been the pinnacle of intelligence research. instead the field is dominated by research objectives aiming at delivering practical advice for the practitioner, cf. rothberg and erickson 2012, solberg søilen 2005). this is partly due to the strong influence from consultants in the formative phases of the intelligence field in the 1980’s and onwards. the market for research favoured easily digested concept literature (jackson 2001) with authors like benjamin gilad (1988, 1996, 2003, 2006) and leonard fuld (1995, 2006). 61 the traditional writing was usually done in a managerial tradition (cf. furusten 1999), where analytical methods for strategic decision making are given emphasis, carrying with them a traditional hierarchical view of how organizations function (cf. mcgonagle and vella 2012). this tradition has favoured a view on strategy as design where managers are in control of the organization (mintzberg et al. 1998), overshadowing other views on strategy and organization. the dominance of this perspective is also due to a strong influence from military intelligence traditions (e.g. meyer 1987, wilensky 1967). what’s also noticeable is that the emergence of the intelligence field coincided with theoretical ideas of strategy planning, especially made popular by michael porter in the 1980s. porters (1980, 1985) value chain analysis respectively five forces model still attract attention today as it indirectly calls for internal and external intelligence. in this theoretical tradition analysis of the business environment is judged to be the core competence of management as it enables managers to create strategy and design the organization by informed decisions about a specific market position to aim for and defend. accordingly managers also need analysis support, upholding a perspective that emphasises the intelligence practitioners’ analytical skills and downplaying other aspects of the work. the increasing complexity in both business design and society has thus far not led to a major reformation of this dominant view of intelligence. as stated, there are emergent research initiatives that could introduced alternative descriptions of intelligence, uncovering important dimensions and aspects that will help form an intelligence science. especially knowledge management and knowledge creation are deemed promising for this advancement (cf. rothberg and erickson 2012). in line with this reasoning we provide here an exploration of questions and problems that could be fruitful areas for new research on intelligence, especially considering knowledge aspects. this leads me to phrase the purpose of this article as follows: to give an account of important challenges encountered by intelligence personnel in modern business organizations due to an increasing dependence on different knowledge processes. 2. method and materials the empirical material consists of a total of 18 semi-structured and transcribed interviews, mainly with intelligence professionals (but also in one case [case 1] people in the surrounding organization) spanning four different large multinational companies (all referred to by pseudonyms c1-c4 in this article). all companies studied were very well experienced in the organization and use of intelligence, and had a back log of organized intelligence work since the 1990s or even longer. c1 (case 1) is a global pharmaceutical company, and interviews were conducted at their country headquarters. c2 (case 2) is a global electronic company, and interviews were also conducted at their country headquarters. c3 (case 3) is a global packaging company, and interviews were conducted at the country headquarters. c4 (case 4) is a subsidiary of a european chemical company with a global market, interviews were conducted at the headquarters of the country subsidiary. complimentary research material was gathered e.g. through emails and company websites, as well as through discussions with various intelligence professionals at conferences and other gatherings. the analytical constructs presented in this article are developed inductively, and made visible through the transcription and coding process of the material as well as the intellectual process of making sense of the material at hand. burke’s pentad (burke and gusfield 1989) was used as an organizing tool for the sense-making part, where the pentad was adapted to suit the specific circumstances of this paper. the drama-metaphor emanating from burke is used to make some of the points under discussion stand out. the empirical material is presented in aggregated form. the paper begins with an explorative section, presenting the initial findings. these findings are used in the later section to build a discussion around the challenges now facing intelligence personnel, thus addressing the stated purpose of this article. 3. results from the data at hand, several aspects of intelligence emerge as interesting candidates to meet the stated purpose. in the sections below i will elaborate on five themes based on burke’s pentad, where purpose, scene, agent, and agency are presented under results but the actual act is the theme for the discussion. the paper ends by raising questions about the type of play we are witnessing and the challenges this creates for the actors, which in this case equals intelligence personnel. the themes presented are of course intertwined, and aspects of each theme can be found under different headings. 3.1 purpose: intelligence in order to create better business the interviewees described their work as mainly consisting of gathering, analyzing and disseminating information in order to support decision-making in general. the interviewees still used the term decision support while describing their work, even though the decisions to be made were not that well defined or were not clear-cut decisions. if we limited ourselves to the self-descriptions of the interviewees we would most likely come pretty close to 62 traditional ideas of strategy making and ideals of informed decisions. even though this self-description of intelligence and decision support was more or less generic, there were other aspects of their work that transcended this quite limited sphere of activity. the missions guiding the work were not focused on decisions. instead they were about supporting a special part of the company or a specific process. an analyst at c2 pointed out that their mission functioned as a good guideline for what to do and what to strive for; phrasing the mission as follows "our mission is to support the sales force with competitive knowledge and arguments in order to win the deal, and do profitable business." with missions like the one cited intelligence practitioners were encouraged to try different methods and techniques to expand their scope of work, e.g. to create and stage war stories that forced those involved to reflect and act in simulated business situations (cf. oubrich 2011). except for financial and moral considerations, the interviewees did not mention any real limitations to the scope of their work. in this respect the decision-making selfreference did not constitute an obstacle to expanding their field of practice. decision support therefore appears to be an important idea for defining the intelligence identity, but the missions given guide the practice, and these missions are, to put it simply, about creating better business. 3.2 scene: dispersed intelligence intelligence had more than one place (scene) in each of the researched organizations. it was dispersed around the organizations and could be found e.g. in the central core, subsidiaries and connected to designated project teams. intelligence units mostly worked independently of one another, serving their specific part of the organization. the c1 unit concentrated on promoting marketing issues and filling information and analytical gaps in different project teams. the c2 unit concentrated on supporting key account managers who would give c2 the upper hand in future deals. the c3 unit concentrated on identifying and making use of new ideas and technology in support of the r&d part of the organization. the c4 unit, located in a subsidiary, concentrated on handling strategic issues arising from all over the organization in an effort to help almost anyone who was in need. the context and the mission descriptions differed, but regardless of the particular context (scene) all interviewees classified themselves as intelligence practitioners. there was collaboration between intelligence units at each investigated company, e.g. for buying information or skill training, but the collaboration was a result of common interests more than a coordination effort designed by a central intelligence manager. whereas most collaboration was within the boundaries of each organization, the unit at c4 collaborated with units at other subsidiaries and at headquarters (cf. steiner and ploder 2011). even though the intelligence workers interviewed worked in dispersed circumstances, their stories contained passages that made it clear that the top levels of the investigated organizations had their own designated intelligence services. however, these intelligence units assigned to top management worked independently from the others, answering to the local needs expressed and experienced in the interfaces developed between supporters and those supported. one exception to this was occasional strategic overviews and projects where crossfunctional teams of intelligence personnel were formed, working together towards common goals for a limited time. in these specific situations hierarchical order emerged as important in defining the work to be done. this however was the exception to the rule. thus, intelligence in this study appears to be locally organized, and close to those designated to benefit from the service. intelligence also plays out more as a loosely coupled network of distinct units and less as a hierarchically organized and coherent support structure for a central core. rothberg and erickson (2012) state that this type of independent and distributed intelligence is a sign of a more mature intelligence organization that over the years has been able to develop more effective processes. it is also a type of intelligence more common in high-value knowledge industries, which in the citation under the previous heading also is visible in the informant’s choice of words. he does not simply use “competitive intelligence” but instead “competitive knowledge and arguments”, referring to something else than just decision support. together with complementary descriptions of how intelligence is used to enhance a specific knowledge need, one is inclined to say that when the intelligence organization matures, it is moving away from the tight leash of decision support defined by the hierarchical system, towards a position where intelligence functions as knowledge support is defined by the parties involved. 3.3 agent: serving the willing traditionally, intelligence is described as a function that works on the demands from the decisionmakers they are to serve. there is a clear distinction between those who experience and express an informational need and those who act to satisfy this need. in the common visualization of the intelligence process below (figure 1) the planning task is the prerogative of decision makers and the three other tasks are the responsibility of the intelligence unit (cf. mcgonagle and vella 2012). 63 figure 1: the intelligence cycle (traditional) conceptually the model is quite correct. unfortunately it describes the intelligence process on a simplified organizational level and not on a complex individual level. with the model the organization appears to be a coherent whole with a common mind, where the brain controls the limbs. this description has its roots in ideas emanating from taylorism and fayolism, with clear functional divisions between employees, which in a complex knowledge economy stand out as quite obsolete. today it’s more common to view organization as a network of loose connections between individuals, where the individuals are limited to a most personal quest of making sense of the world no matter what official function they uphold (hamrefors 1999). turning to the data at hand, and as mentioned earlier, there was no clear distinction between those who did the planning and those who did the fieldwork. instead the division appeared to be nonexistent as both intelligence personnel and intelligence users cooperated to complete the tasks they identified. thus, we have the combining of efforts of understanding and refining the question and making sense of the world. occasionally there were clear-cut assignments, but most of the time the experienced and expressed need was something that evolved through discussion between the parties involved (cf. treverton 2004). i would like to stress here that the active party was usually not the information user/decision maker, but rather the intelligence worker. interviewees frequently revisited the fact that they had to market their services internally to their intended users. it was also common that intelligence personnel went on road trips to different countries, invited themselves to meetings, and laid out plans how to reach certain people internally who they felt had something to gain through their work (but also in some cases were believed to be in possession of valuable information/knowledge that could be put to use elsewhere in the organization). in conclusion, we find that intelligence work is not so much passively awaiting requests from designated end-users than actively influencing parties in the organization that will help the intelligence workers reach important goals targeted by them in their quest of fulfilling their mission of creating better business. therefore intelligence workers are limited to serve those who are willing. the role of the agent can also be said to shift depending on purpose, scene and how the agency has developed, but nonthe less the interviewees classified themselves as intelligence practitioners. 3.4 agency: analytical conversations describing their work, the interviewees favoured stories involving actions like scouting, informing, providing a second opinion, and working as internal consultants. however none of these descriptions stands out as well as analyzing, a verb used frequently throughout the interviews. scrutinizing the data, one can also conclude that most of the time the interviewees’ work (and thus analysis) was focused on issues other than those directly connected to decision-making. instead, much of their work and the artefacts produced were for wider purposes. routine tasks included organizing and participating in discussions, updating standard analysis of particular market sectors, checking and making sense of rumours, and keeping files and profiles on competitors. so, if decision support is not enough to define intelligence and many other activities are being performed in order to fulfil the overarching goal of creating better business, are there other and possibly better ways to understand intelligence? i believe there are. here i suggest that instead of paying too much attention to the intelligence workers’ selfplanning / direction dissemination information retrieval / collection analysis 64 descriptions and the specific artefacts being produced, we should consider both what happens around these artefacts and around the practitioners themselves. taking this leap of mind brings us to a another perspective that focuses on the interaction among organizational members, where different intelligence artefacts and intelligence initiatives can be viewed as created reference points for continuous reflection and action in order to build better business (cf. argyris and schön 1995). by continuous interaction as well as the creation and maintenance of intelligence artefacts intelligence personnel influence what’s being discussed inside the organization. henceforth they are turning organizational attention towards certain aspects and away from others, and when organizational members’ ideas and experiences are affected we can also say that their knowledge has been manipulated. as noted above intelligence literature favours a description of intelligence as a service working on the command of decision makers, preferably defined through the use of models like the one shown in figure 1. in this model analysis is the third step in the process of developing raw information into intelligence (principally as intelligence artefacts). when the analytical step is completed the constructed intelligence is ready to be disseminated to the decision maker, hopefully fulfilling the information need that triggered the intelligence process in the first place. turning to the cases, this description is to some extent true, where e.g. at c1 different people and projects turned to their designated intelligence service with requests for intelligence (especially frequent in areas where they lacked necessary expertise or when they experienced time restraints). in these cases the intelligence personnel were also adding value by giving voice to facts and perspectives not present in the requesters frame of reference. nevertheless, even in these specific cases most of the intelligence workers were active in both defining the request as such and in building a common idea of how to perform the quest, depending on the insights that were gained in the process. those who expressed this intelligence need were mostly also involved in fulfilling it throughout the process. there was not just initiation and delivery; there was continuous dialogue throughout a sensemaking process where both parties (and others) performed tasks that helped solve the identified intelligence / knowledge need (cf. treverton 2004). a technical scout at c3 expressed that an important part of his job was to stage interesting discussions and processes so that a rough idea could develop into something useful for the company. different people from both inside and outside the company took part in these analytical discussions as the idea evolved, formalizing itself into an action plan with the objective of making the company more viable, e.g. through a better process, product or service. the responsibility and organizational home of the idea (and thus the discussion) also changed during the process through mutual adaptation. the technical scout’s actions were congruent with his overall organizational mission of creating better business, and were not limited to a clearly defined place in an organizational chart or a sequence in a model for intelligence creation. another example of how analytical discussions emerged as the core process for intelligence workers was given by an analyst at c2. he expressed that different analytical models of course came in handy in order to create all sorts of templates and texts, but as he pointed out, this was not the end goal. instead he emphasized that the most important outcome of using a model was the discussion that it triggered. in these examples we see that an organization is in fact a place for organizing, and that organizing is an on-going matter between organizational members, especially synchronized through speech and other communicative tools. formalities like organizational charts, work descriptions and even standard intelligence artefacts are just tools that help us keep some sort of order in the organization (or at least give the impression that order exists, cf. brunsson 2002, 2006, røvik 2000). however all these things, though useful for understanding an organization, do not reveal the true organization. instead, the organization is always an act of becoming, where those with the position and ability to influence play an important role. the intelligence services, as described in my study, can in this perspective be regarded as specific organizational entities with a mission to influence those knowledge structures that guide behavior in designated business processes. this is quite the opposite to a more traditional view on intelligence services as passive producers of intelligence artifacts. the problem with the latter position is that it limits the role of the intelligence worker to that of a bystander, with no interest of his or her own, not participating in the organizational power games, and working on the whims of others. as my study show, this description unnecessarily limits our understanding of how intelligence affects organizational behavior. the knowledge perspective is in this case better as it opens up for complementary views and ideas of how intelligence can support different business processes. this is to a large extent done by facilitating and even staging analytical discussions that intelligence personnel think will be fruitful for themselves (fulfilling their mission) and other participants. the use of analysis thus resembles the use of scenarios, which kees van der heijden (2005) describes as the art of strategic conversation. the scenarios and the analytical artifact fulfill the same purpose as they force us to 65 communicate and build common ideas of what’s important inside and outside the company. intelligence thus complements long-term strategic conversation fueled by scenarios with a more shortterm analytical conversation fueled by the supply of complementary reference points. by doing this, intelligence also helps the organization to create new knowledge in order to fulfill the mission of the company. 4. discussion: act! so what is the act? what do we see in the scene where the intelligence workers operate? i see a different kind of play to that most authors in the field traditionally chose to present. to begin the discussion i will present four different aspects (table 1) of how intelligence work appears in my study in relation to how it has traditionally been described. building on the ideas of burke, i have also constructed a drama metaphor to make each aspect clearer. change in appearance as descriptive text change in appearance as drama-metaphor the intelligence mission has changed from being a passive information service working on the command of high-ranking decision makers to an active internal agent for better business. intelligence workers are not reading from a script, they are improvising around a specific topic. hierarchical position does not determine where intelligence is to be found. instead the deployment of intelligence comes from dispersed needs displayed in each unique subpart of an organization. intelligence workers have now left the dramatic institute in favour of being a travelling theatrical company. intelligence work moves away from the creation of intelligence artefacts to the creation of analytical conversations and the advocacy of distinct reference points in these conversations. the distinction between actors and audience dissolves to the extent that together they define the play as they speak. intelligence is personalized in two dimensions, firstly the analyst comes forth as an individual agent with a personal network, and secondly the intelligence produced is adapted to the individuals and the specific situation at hand. at least compared to older plays involving the whole ensemble, intelligence is becoming more personal. table 1: summary of how intelligence appears in my study in relation to the traditional view, presented both as a descriptive text and as a drama-metaphor. with reference to the results presented above and these four points one can conclude that intelligence of today deals less with formal decisions and more with both formal and informal analytical conversations. this change of focus also moves the subject of intelligence away from decision making towards the field of knowledge creation (cf. oubrich 2011). it is hard to distinguish whether this has to do with real changes in the practice of intelligence or if these changes can be traced back to a more paradigmatic change in society. perhaps we have just learned to both see and speak about aspects of intelligence that were already present earlier when we didn't have the perspective and words needed to describe them. one could also object that the data used is skewed and/or that the intelligence presented above is culturally dependent where scandinavian intelligence practice always has been more democratically organized and less formal. nevertheless, we can at least say that the practice of intelligence described above fits well into the knowledge discourse that has developed alongside changes in industrial logics and increasing complexity in recent decades. it also seems that intelligence has a role to play in today's knowledge based industries, supporting more balanced and profitable knowledge constructs, thereby contributing to developing more viable businesses. even if it is just a scandinavian model for intelligence, it is still something to reflect on when considering how we should organize intelligence in a more knowledge intense world with blurred industrial borders. working so closely with information and analysis one might have suspected that intelligence practitioners would also use the term knowledge in defining the purpose of their work. the word knowledge was employed on and off (cf. the citation above), 66 but in an everyday fashion where knowledge appears synonymous with aggregated or analysed information. the intelligence workers did not call their work knowledge management (cf. pirttimäki 2007), market analysis or anything along those lines. instead they used the english term intelligence most of the time (even though the interviews where held in another tongue), but that should not hinder us from seeing them as highly active in influencing the knowledge used inside the organization, or even the knowledge defining the organization as such. changing the locus of the intelligence subject from decision support to knowledge support and knowledge creation will also open the field for other intelligence descriptions, where in the examples given we can interpret the intelligence worker as a knowledge activist, here described by von krogh et al. (1997, 475): ”the knowledge activist is someone, some group or department that takes on particular responsibility for energizing and coordinating knowledge creation efforts throughout the corporation. we believe that such activism will have three purposes, the first of which is to initiate and focus knowledge creation, the second to reduce the time and cost needed for knowledge creation, and the third to leverage knowledge creation initiatives throughout the corporation. knowledge activism can reside in a particular department or with a particular person, but it can also be situated in already existing departments and functions, or it can be taken up as a special assignment by individuals or departments.” important in this quote is the central concept of knowledge creation, which indirectly implies a development of, or change in knowledge as a result of knowledge activism. what von krogh et al. misses out on in the citation above is that knowledge creation also need to be guided in a certain direction and enhanced through the instigation of complementary reference points. intelligence services can do just that, which also makes intelligence personnel most suitable for taking on a role of knowledge activists. building on this it is even more obvious that intelligence workers do participate in the on-going power struggle inside the organization that define the ideas that guide organizational actions. another way of phrasing this, with reference to røvik (2000, 279), is to emphasise that intelligence is about mental manipulation and thus constitutes a vital leadership tool for those in a position to influence the missions given. perhaps, as nonaka points out (e.g. nonaka and takeuchi 1995, nonaka et al. 2000, nonaka et al. 2006), western thinking has paid too much emphasis on knowledge as a physical product, an intelligence artifact (as apparent in traditional intelligence literature), and has neglected the immaterial aspects of knowledge as personal and collective insights. this could at least explain the dominant view on intelligence as decision support still present in today’s discussions and literature. 5. conclusion this article shows that there are complementary ways of understanding the role of intelligence in organizations. intelligence workers are already engaged in the creation and management of strategic knowledge, which is done in parallel to supporting informed and outspoken decisions. this is mainly done by initiating and upholding analytical conversations in dispersed circumstances, answering to local needs for better knowledge. by doing this they fulfill their purpose of creating better business, where the end result appears more prominent than the analytical artifacts produced in pursuit of this goal. with this description, intelligence workers stand out as designated knowledge activists, or if you like knowledge intelligence activist, with four main responsibilities. * to initiate and focus on knowledge creation, * to reduce the time and cost needed for knowledge creation, * to leverage knowledge creation initiatives throughout the corporation, and * to guide knowledge creation by the instigation of complementary reference points. if we chose to take this leap of mind, i think that these four responsibilities are the most important challenges for today’s intelligence personnel who seek a central role in those knowledge intense firms among those who aim to prevail in an increasingly complex world. references andersson, philip. 1999. complexity theory and organization science. organization science, vol. 10, no. 3, pp. 216-232. argyris, chris, and schön, donald a. 1995. organizational learning ii: theory, method and practice. reading, mass.: addison-wesley. bettis, richard a., and hitt, michael a. 1995. the new competitive landscape. strategic management journal, vol. 16, iss. s1, pp. 7–19. brunsson, nils. 2002. the organization of hypocrisy : talk, decisions and actions in organizations. malmö: liber ekonomi. brunsson, nils. 2006. mechanisms of hope: maintaining the dream of the rational organization. malmö: liber. 67 bulger, nan. 2013. the world has changed and so must we. scip.insight. vol. 5, iss. 3. (accessible february 26, 2013) burke, kenneth, and gusfield, joseph r. 1989. on symbols and society. chicago: university of chicago press. eisenhardt, kathleen m. 1989. making fast strategic decisions in high-velocity environments. the academy of management journal, vol. 32, no. 3, pp. 543-576. el haddadi, anass, dousset, bernard and berrada, ilham. 2011. establishment and application of competitive intelligence system in mobile devices. journal of intelligence studies in business, vol. 1, no. 1, pp. 87-96. fuld, leonard m. 1995. the new competitor intelligence : the complete resource for finding, analyzing, and using information about your competitors. new york: john wiley and sons. fuld, leonard m. 2006. the secret language of competitive intelligence : how to see through and stay ahead of business disruptions, distortions, rumors, and smoke screens. new york: crown business. furusten, staffan. 1999. popular management books : how they are made and what they mean for organisations. london: routledge. gay, brigitte. 2012. competitive intelligence and complex systems. journal of intelligence studies in business, vol. 2, no. 2, pp. 5-14. ghannay, jihane chebbi, and mamlouk, zeineb ben ammar. 2012. synergy between competitive intelligence and knowledge management a key for competitive advantage. journal of intelligence studies in business, vol. 2, no. 2, pp. 23-34. gilad, benjamin. 1988. the business intelligence system : a new tool for competitive advantage. new york. n.y.: american management assoc. gilad, benjamin. 1996. business blindspots : replacing myths, beliefs and assumptions with market realities. calne: infonortics. gilad, benjamin. 2003. early warning : using competitive intelligence to anticipate market shifts, control risk, and create powerful strategies. saranac lake. n.y.: amacom. gilad, benjamin. 2006. neither a war nor a game. competitive intelligence magazine, vol. 9, no. 6, pp. 6-11. hamrefors, sven. 1999. spontaneous environmental scanning : putting "putting into perspective" into perspective. stockholm: economic research institute. jackson, brad. 2001. management gurus and management fashions. london: routledge. lópez, gabriela, eldridge, steve, montejano, salomón, and silva, patricia. 2012. competiveness from contextualisation of supply chain knowledge. journal of intelligence studies in business, vol. 2, no. 2, pp. 42-50. mcgonagle, john j. and vella, carolyn m. 2012. proactive intelligence : the successful executive's guide to intelligence [electronic resource]. london: springer london meyer, herbert e. 1987. real world intelligence : organized information for executives. new york: grove weidenfeld. miller, katherine. 1999. organizational communication : approaches and processes, 2 nd edition. belmont, ca.: wadsworth. mintzberg, henry, ahlstrand, bruce, and lampel, joseph. 1998. strategy safari. london: financial times / prentice hall. nonaka, ikujiro, von krogh, georg, and völpel, sven. 2006. organizational knowledge creation theory : evolutionary paths and future advances. organization studies, vol. 27, no. 8, pp. 1179-1208. nonaka, ikujiro, and takeuchi, hirotaka. 1995. the knowledge-creating company : how japanese companies create the dynamics of innovation. new york, n.y.: oxford university press. nonaka, ikujiro, toyama, ryoko, and konno, noboru. 2000. seci, ba and leadership : a unified model of dynamic knowledge creation. long range planning, vol. 33, no. 1, pp. 5-34. [edited version in: little, stephen, and ray, tim. (eds.). 2005. managing knowledge : an essential reader, 2 nd edition (pp. 23-50). the open university: sage.] oubrich, mourad. 2011. competitive intelligence and knowledge creation outward insights from an empirical survey. journal of intelligence studies in business, vol. 1, no. 1, pp. 97106. pirttimäki, virpi. 2007. comparative study and analysis of the intelligence activities of large finnish companies. journal of competitive intelligence and management, vol. 4, no. 1, pp. 147-170. porter, michael e. 1980. competitive strategy : techniques for analyzing industries and competitors. new york: the free press. http://scip.cms-plus.com/files/publications/scipinsight/scip13_v5february_fr2.htm http://scip.cms-plus.com/files/publications/scipinsight/scip13_v5february_fr2.htm http://scip.cms-plus.com/files/publications/scipinsight/scip13_v5february_fr2.htm 68 porter, michael e. 1985. competitive advantage : creating and sustaining superior performance. new york: the free press. rothberg g. scott, and erickson, helen n. 2012. benchmarking competitive intelligence activity. journal of intelligence studies in business, vol 2, no 3, pp 5-11. røvik, kjell arne. 2000. moderna organisationer : trender inom organisationstänkandet vid millennieskiftet. malmö: liber. solberg søilen, klaus. 2005. introduction to private and public intelligence: the swedish school of competitive intelligence. lund: studentlitteratur. steiner michael, and ploder michael. 2011. knowledge and social networks : new dimensions of economic interaction between firms. journal of intelligence studies in business, vol. 1, no. 1, pp. 49-60. treverton, gregory f. 2004. reshaping national intelligence for an age of information. cambridge: cambridge university press. tzu, zi. 1995. om krigets konst. 383 maximer om att segra och besegra. stockholm: nerenius and santérus förlag. wilensky, harold l. 1967. organizational intelligence. knowledge and policy in government and industry. new york/london: basic books. von krogh, georg, nonaka, ikujiro, and ichijo, kazuo. 1997. develop knowledge activists! european management journal, vol. 15, no. 5, pp. 475-483. journal of intelligence studies in business vol. 13 no. 1 (2023) pp. 76–89 open access: freely available at: http://jisib.com/ narrowing the marketing capabilities gap alamir louro brazil federal university of espirito santo alamirlouro@gmail.com received 2 may 2023 accepted 16 may 2023 abstract purpose: in marketing discipline, there is considerable interest in understanding the relationship between diverse approaches of market knowledge learning and organizational performance, and recently, how analytics and emerging revolutionary technologies are changing this relationship. to fully apprehend this relationship it is first necessary to uncover the role of marketing capabilities, the management mechanism that boosts organizational performance using market knowledge. design/methodology/approach: a new construct that embraces analytics and adaptive capabilities approach (aac) was developed to increase our comprehension of marketing capabilities mechanism using structural equation modeling and regressions. findings: the model has shown an indirect-only effect of aac using static marketing capabilities as a mediator narrowing the marketing capabilities gap and avoiding any tautological capabilities pitfalls. research limitations: a deeper endogeneity test could be executed related to adaptive market approach as well it was an original preoccupation concerned to dynamics capabilities. practical implications: it enabled managers to understand what aac are. additionally the results suggest precaution for headhunter because aac needs pre-existing marketing capabilities. social implications: it provides to managers a useful tool to assess their organizations regarding analytics in marketing realm, what makes it possible to compare with rivals and to predict the investments. originality/value: it lies in to appraise the marketing capabilities management mechanism and a step by step scale developed for aac in different industries in brazil. keywords: analytics adaptive capabilities. scale development. marketing capabilities gap 1. introduction according to the literature review of barrales-molina, martínez-lópez, and gázquez-abad (2014) and pereira & bamel (2021), marketing discipline increases attention in emerging revolutionary technologies of the recent data-driven decision-making scenario, in particular using the capabilities literature. to fully understand the learning and the outputs of market knowledge, it is first necessary to uncover the role of marketing capabilities and its management mechanism that allows the relationship between the new opportunities of market learning and organizational performance to exist. the utilization of big data, mobile connectivity, e(m)-commerce, and the internet of things (iot) has led to the emergence of revolutionary technologies that provide interactive and voluminous market 77 information. this information is used as input to advanced analytical methods, transforming both structured and unstructured internal and external data into valuable market knowledge (wedel & kannan, 2016). these new opportunities for learning are at the forefront of recent and complex performance-driven debates surrounding emerging technologies and analytics (chuang & lin, 2017; wamba et al., 2017; donthu et al., 2021; ahmed et al., 2022). revolutionary technologies have significantly improved the power of analytics, which has paved the way for the emergence of adaptive business models such as experimental spin-offs, startups for industry foresight (kiron, prentice, & ferguson, 2014), joint ventures, external networks, and collaborative strategies (barrales-molina, martínez-lópez, & gázquez-abad, 2014). however, there is a significant literature gap in measuring the construct that represents learning capabilities related to analytics, which are used in conjunction with the adaptive approach explained in day (2011). to address this gap, a scale for analytics adaptive capabilities (aac) has been proposed and tested as an antecedent variable to organizational performance (op). however, the relationship between aac and op only exists with the mediation mechanism of marketing capabilities. also according to barrales-molina, martínez-lópez, and gázquez-abad (2014) and pereira & bamel (2021), the integration of various marketing resources, capabilities, and processes into a common framework is hindered by the wide range of options available. this plethora of capabilities, often without clear construct content delimitation and scale validation, has led to conflicting and misleading findings regarding the nature and contributions of analytics for marketing. while tautological research may sometimes yield positive results, it can also lead to pitfalls, such as testing correlations between similar dynamic capability scales. the present work has aimed to avoid such pitfalls by testing a new scale derived from adaptive capabilities (day, 2011), which is an advancement related to dynamic capability. day (2011) differentiates between static marketing capabilities, which are stable capabilities, and dynamic marketing capabilities, which are capabilities that can be reconfigured and augmented, or as capabilities to pursue new opportunities. in addition to the challenges related to capabilities, a multitude of recent empirical studies in marketing and information systems have utilized various constructs related to analytics. these constructs include terms such as business analytics, business intelligence & analytics (bi&a), customer relationship management (crm) analytics, social media analytics, and big data analytics (chuang & lin, 2017; côrte-real, oliveira, & ruivo, 2017; trainor, andzulis, rapp, & agnihotri, 2014; wamba et al., 2017). it is important to recognize the potential pitfalls that may arise from an overemphasis on capabilities and analytics without adequate theory development. such tautological pitfalls can occur when concepts are overused and applied without proper consideration for their underlying theoretical foundations. the most prominent contribution of the present work is to uncover static marketing capabilities mechanism between aac and organizational performance. the step by step scale development of aac and the association between this new construct to organizational performance was tested using structured equation modeling (sem) with partial least square (pls) and ordinary least square (ols) with spss process macro. in the next sections, we discuss some concepts and assumptions and after we propose the model and the new scale, and tested them. synthetically, the paper showed an indirect only-mediation of marketing capabilities and discuss how to narrow the marketing capabilities gap. literature review and theoretical development the concept of absorptive capability (acap) is commonly used in traditional marketing and strategy literature to describe the overall learning process. this approach employs exploitative and explorative market orientation or responsive and proactive market orientation (barrales 78 molina, martínez-lópez, and gázquez-abad, 2014; ozdemir, kandemir, & eng, 2017). while this literature is prominent, it falls short in addressing the role of analytics and relies heavily on traditional marketing methods and approaches (wedel & kannan, 2016), thus failing to close the marketing capabilities gap (day, 2011). to solve the lack of an aac scale and test the mediation role of marketing capabilities we developed a new scale using the mackenzie, podsakoff, and podsakoff (2011) validity framework have ten steps that were followed here and are outlined using the notation: (validity framework step x). we followed this framework and used other scale quality tests. day (2011, 2014) criticize the current resource-based view literature, and even the current dynamic capabilities literature, as less dynamic theories than the market demands, suggesting the existence of the adaptive capabilities. directed by the point of view of day (2011, 2014) the present work advocate that aac explore market opportunities. aac reflect the (aiq) analytical information quality, and a (te) team exploits it with specific expertise (analytical, technology, and business) improved by (mkl) market knowledge learning. in summary, to develop a conceptual definition of the construct (validity framework step 1), aac can be classified as an adaptive capability that uses analytics. of course, this definition is based on two others, adaptive capability, and analytics, defined in the present theoretical review. using mackenzie, podsakoff, and podsakoff (2011) suggestions (validity framework step 1), organizations are the aac entity and the aac general property are the capabilities of these organizations to use sophisticated data technology approach to boost a market openness in a continuously experimental behavior, forging partnerships, vigilantly for deep market insights. aac is multidimensional, and its stability is across cases, where cases are, for example, projects of marketing, data science, r&d, or product/brand innovations. in terms of dimensionality, aac consists of three reflective first-order constructs. while information quality is a well-known and measured construct (gorla, somers, & wong, 2010; wieder & ossimitz, 2015), it is important to note that emerging technologies handle data in novel ways, leading to an increase in analytical information quality. market data is no longer limited to information systems within databases but includes web and social media data, different types of data that are merged into data lakes or warehouses, and independent datasets such as texts, videos, and denormalized spreadsheets that are prepared for data science applications. the process of data engineering and cleansing gives rise to another type of data, which in turn leads to another type of information quality, which we refer to as analytical information quality (provost & fawcett, 2013). teams with special expertise perform analytics. updated quantitative studies provide empirical evidence that confirms the positive role developed by innovation teams (barrales-molina, martínez-lópez, & gázquez-abad, 2014, sincorá, oliveira, zanquetto-filho, & ladeira, 2018). another example is a quantitative work executed with chinese senior executives that identified exchange and integration of team knowledge, and by its turn, this improves the organizational financial performance because of new product development (tseng & lee, 2014). analytics can help in the market knowledge learning (barrales-molina, martínez-lópez, & gázquez-abad, 2014; pereira & bamel, 2021). weaven et al. (2021) and davenport (2006) exemplifies the market knowledge learning by saying that the organizations may spend many years accumulating data from different approaches before having enough information to analyze a marketing campaign in a trusting and efficient way. this market knowledge is all information that the organization has about the customer and his needs in different situations and various moments, past, present and future (cooke & zubcsek, 2017). aac has a construct that responds to market accelerating velocity and complexity with a more outside-in and exploratory learning capability. this first-order construct is based on absorptive capability (acap) with the improvement of vigilant, experimental and, market openness of day (2011). 79 the first-order constructs do not have a causal relationship with aac; instead, they represent the dimensions of the second-order construct. another crucial point for defining the construct is the reflective/formative issue. it is essential to understand that whether a construct is reflective or formative is not inherent but a matter of definition (mackenzie, podsakoff, & podsakoff, 2011). the three dimensions of aac represent its manifestations. for instance, learning a new statistical method like clustering can enhance the team's expertise, which in turn can improve market knowledge learning and analytical information quality. as part of the first step in the validity framework, which involves defining the construct, it is important to differentiate aac from other constructs in the field of marketing capabilities (mackenzie, podsakoff, & podsakoff, 2011). figure 01 summarizes the position of aac in relation to team expertise, which is utilized during the reconfiguration process of acap, and then passes through static marketing capabilities such as resource/capabilities related to customer lifecycle assessment, loyalty or churn programs, pricing, segmentation, and personalization. theoretical model and hypotheses development market knowledge is a crucial point of connection between the constructs discussed in this paper. the source of this knowledge can be diverse, ranging from crm systems and social media to new technologies like iot and big data. however, the way of learning remains the same, that is, by using quantitative evidence (davenport, 2006). this evidence is then used to launch adaptive business models, such as experimental spin-offs, industry foresight, and collaborative network strategies. the theoretical model is presented in figure 01, and hypotheses are introduced in the following section. figure 01 – theoretical model source: prepared by the authors the information system literature has extensively used the concept of capabilities to explain the learning process (popovič, hackney, coelho, & jaklič, 2012; teo, nishant, & koh, 2016; wang & byrd, 2017), but these approaches have not explicitly focused on the market knowledge learning process, which is crucial for changing/reconfiguring organizational strategies (barrales-molina, martínezlópez, & gázquez-abad, 2014). therefore, the unique contribution of the present work lies in the utilization of market knowledge through aac. some digital marketing technologies facilitate large-scale field experiments that produce market knowledge and become powerful tools for eliciting the causal effects of marketing actions (wedel & kannan, 2016). examples are a/b tests and recommendation systems. the former started with changes in site colors for best sales, and nowadays they apply machine learning to test small details for full automated super individualized market-mix. by it turn, recommendation systems can interact directly with stock management or other marketing capabilities like loyalty programs and customer relationship management (crm) building super segmentation approaches. complementary capabilities, idiosyncratic business needs, and organizational procedures\routines should be integrated by teams of technologists and scientists that leads with complex and 80 sophisticated technological knowledge (cohen & levinthal, 1990). this seminal work about market information learning, before the discussions about analytics and big data boom (ciampi et al., 2021), gives us a clue that technologies uphold the market knowledge impacting other marketing capabilities like pricing, segmentation, and personalization. from this discussion and the assumption about the capabilities tautological pitfall, the first hypothesis raises. h1. aac has a direct positive effect on static marketing capabilities. marketing literature is concerned about the relationship between marketing and performance constructs using capabilities (morgan, 2012; kozlenkova, samaha, & palmatier, 2014) but few works measure day’s named "static marketing capabilities" improvement in organizational performance (op). op is measured subjectively. we assume the marketing capabilities importance for performance, and the following hypothesis is declared to uncover the literature term avoidance: h2. static marketing capabilities have a direct positive effect on organizational performance. analytics can improve marketing capabilities/resources like customer lifecycle assessment, loyalty or churn programs, pricing, segmentation, and personalization (germann, lilien, fiedler, & kraus, 2014; wedel & kannan, 2016). however, these capabilities/resources need to have its preexisting procedures/routines to aac make possible disruptions or become adaptive business models like experimental spin-offs, industry foresight or collaborative network strategies. extant literature argument that crm systems are enablers for marketing capabilities (wang, hu, & hu, 2013; barrales-molina, martínez-lópez, & gázquez-abad, 2014; chatterjee, chaudhuri, & vrontis, 2022) which indicates the dependence of some technological capabilities to other sorts of capabilities. additionally, the technology effectiveness, its output, is enabled by preexisting capabilities (boulding, staelin, ehret, & johnston, 2005; ferreira & coelho, 2020). finally, some technology capabilities constructs about analytics are assumed to have a direct effect on performance (wamba et al., 2017; ferreira & coelho, 2020). on the other hand, adaptive capabilities constructs have no direct effect (morgan, zou, vorhies, & katsikeas, 2003). the results show a mixed behavior, and there is hardly clear evidence for a positive impact. in brief, aac as a kind of technological adaptive capability depends on preexisting marketing capabilities to improve performance, and this is the reason to test the mediation and expect a not significant direct relationship to performance. thus, we assume that aac translates organizational performance just thru marketing capabilities. from this discussion, and using the zhao, lynch, and chen (2010) terminology about mediation, we formulate our third and central hypothesis: h3. static marketing capabilities have an indirect-only mediating role between the aac and organizational performance the last hypothesis assumed the terminology of zhao, lynch, and chen (2010) that detail three possibilities regard to mediation, (i) complementary mediation, there are direct and indirect effects and both point at the same direction. (ii) competitive mediation, there are direct and indirect effects, and they point in opposite directions. (iii) indirect-only mediation, there is only the indirect effects. methodology a survey was executed to test the hypotheses (validity framework step 5) with brazilian users of linkedin using a google docs form. it was sent after mining professionals employed (at least one year) and from the following profiles: marketing manager/ analyst, product/ brand manager/ analyst, marketing research manager/ analyst, r&d manager/ analyst, top management, it manager/ analyst, innovation manager/ analyst, data analyst/ scientist, other management positions. the survey was conducted from december 2017 to march 2018, and garnered a total of 250 records for the purposes of scale validation and item purification, without any additional treatments (mackenzie, podsakoff, & podsakoff, 2011). from this larger sample, a heuristic holdout sample of 200 was selected 81 for use in step 6 of the analysis. finally, a subsample of 195 respondents was used to validate the final model, after excluding those with it profiles. the aac construct described earlier is new, and can´t be confused with the existing constructs related to analytics which usually deal with greater technological detail (rapp, trainor, & agnihotri, 2010; wamba et al., 2017). table 01 defines the dimensions of the three first-order aac constructs and how to operationalize the multi-industry questionnaire. in the validity framework, step 2 involves generating items for the aac construct. these items are all new but were adapted from the literature review. the formal specification of the measurement model, without any formative indicators, is presented in table 01 as part of the validity framework in step 4. the table 01 adaptation (i) was a change in the items that deal with data improvements due to a crm implementation, so the new items address any data improvements. by it turn, the adaptation (ii) was necessary because the original scale did not encompass the davenport (2006) concept of quantitative evidence in decision-making. this author explains this characteristic as a background for competing on analytics. additionally, in the three questions of the original work of chuang and lin (2013) emphasis was given to the use of quantitative sources of information. regarding the team expertise, no other questionnaire tested concepts of quantitative evidence, market immersion, and experimentation, key parts of analytics and day(2011) concepts. this idiosyncrasy came from the aac contextualization as an adaptive capability discussed in the theoretical section. the adaptation (iii) was necessary because projects can be done by teams especially formed for this purpose, at a strategic level of top management or even as a specific management initiative like marketing research, or innovation, it, r&d, or product/brand management. the original scale assumes it team only (kim, shin, & kwon, 2012). table 01 aac defining the first-order constructs defining the constructs source of the indicators analytical information quality – refers to the quality of analytical information outputs (i) adaptation from chuang and lin(2013) scale team expertise– represents the professional abilities of the project team that are fundamental to perform tasks. (ex: skills or knowledge) of three different dimensions. dimension analytical expertisefor holsapple, lee-post, and pakath (2014) is about to give high priority to the resolution and recognition of problems based on quantitative evidence. this expertise has others characteristics like data-driven learning, and experimentation (day, 2011). dimension technological expertise represents the professional abilities of the project team (ex: skills or knowledge) that are considered fundamental to perform tasks related to programming languages, data engineering, and cleansing, etc. to improve analytical information quality and learn market knowledge business expertise represents the professional abilities of the project team (ex: skills or knowledge) to perform tasks related to internal and external business understanding, and related to the capacity to collaborate inter and intra-organizations, all task driven by market immersion and openness looking for industry foresight, customer insights or collaborative networks (day, 2011). (ii) dimension analytical expertise–new scale inspired in popovič and others (2012) and day (2011) (iii.a) dimension technological expertise– new scale inspired by kim, shin, and kwon (2012) (iii.b) dimension expertise in business–new scale inspired by kim, shin, and kwon (2012) and day (2011) market knowledge learning the ability of the team to recognize the value of new external knowledge, assimilate and apply that knowledge (cohen & levinthal, 1990). these authors argue that the ability for assessing and using external information is, in most part, adaptation from pavlou and sawy, (2013) and pavlou and sawy, (2010) scales and influenced by day (2011) 82 directed by the level of previous knowledge, what is related to analytical information quality. source: prepared by the authors the references for the other constructs are all based on established works in marketing. the concept of static marketing capabilities focuses on marketing competencies (conant, mokwa, & varadarajan, 1990) and employs a multiindustry scale adapted from song, di benedetto, and nason (2007). in addition, organizational performance uses a scale reproduced from jaworski and kohli (1993) as it is challenging to obtain objective performance data in a cross-industry survey. thus, this study measures performance subjectively. categorical data for multi-group analyses was based on organizational size and respondents' profile. the nonparametric equivalence analysis technique, partial least square multi-group analysis (plsmga), was used. this technique is considered an original extension of henseler's (2009) mga method. despite hypothesis delimitation, control variables such as organizational size and respondents' profile were tested. the mga results differentiated it and non-it respondents. aside organizational size and respondents profile, the work used only seven-point likert scales, ranging from "totally disagree" (1) to "totally agree" (7). to test differences between early and late responders a pls-mga was used too, with no significant differences found. another precaution was to assess common method bias using harman’s single-factor test (podsakoff, mackenzie, lee, & podsakoff, 2003). there is no missing data. according to checked non-normality, the empirical test of theoretical hypotheses was made using structural equation modeling (sem) on smartpls software (version 3.2.4). results analysis the univariate skewness and kurtosis, with values of 14 from 31 likert variables are out of interval from -1 to 1, indicate nonnormality for the original sample, what was confirmed after executing the shapiro-wilks and kolmogorov-smirnov tests rejecting the hypothesis of normality for all 31 variables (hair, black, babin, anderson, & tatham, 2009). the scale purification and refinement (validity framework step 6) resulted in the exclusion of two questions, as seen in appendix i, due to cross-loadings tests. to gather data from new sample (validity framework step 7) a holdout with only 200 first registers of the original sample, we called as heuristic subsample, was used with no big difference (mackenzie, podsakoff, & podsakoff, 2011). the holdout was used only to confirm refinement of step 6. some multi-group analyses was performed using organizational size and profile information. using a data-driven approach, the smartpls suggested the following groups for size: (a) less than 10 employees, with 48 registers, (b) more than 1000 employees, with 52 registers, and (c) the middle, with 150 registers. the plsmga and the permutation algorithm were performed using the combination of these three size groups and two groups of profile resulting in p-values bigger than 0.05, i.e., rejecting the hypothesis of group differences about organizational size. however, for profiles assessment, the pls-mga shows differences from it, 55 registers, and non-it respondents, 195 registers (final sample), then just non-it respondents were used as the final subsample (mackenzie, podsakoff, & podsakoff, 2011) for model tests. using the validation/final subsample with micom process (henseler, ringle, & sarstedt, 2016), we confirmed the possibility of pooling the data of the other profiles. step 1, configural invariance assessment ensure that both setup and algorithm parameters of the measurement and the structural model are identical; we did no additional data treatment for each group, and algorithm settings are the same. for step 2 (compositional invariance) and 3 (composites’ equality of mean values and variances across groups) we used the permutation algorithm with 5000 permutations confirming no significance and then measure invariance. the aac construct has the biggest number of variables, 19 after the deletion of 2 items. therefore, preliminary would be 190 83 respondents using the rule of thumb of 10 times (hair, hult, ringle, & sarstedt, 2017). another conservative way, making a statistical power test in 95%, and assuming an f square of 15%, the software gpower determines, for a significance of 1%, the size of the sample as 170 respondents. the gpower statistical test chosen is one that tries to maximize the multiple regressions r square adding new predictors to the solution, f² (faul et al., 2007). we used 4 predictors, including 2 control variables. model tests the pls algorithm was executed with the default values following the guidelines of hair et al. (2017). all constructs have at least three variables and are reflective according to the content definition, or a priori specification. the hierarchical components are treated using repeated indicators approach (hair et al., 2017), and the results of the measurement model regarding the validity and reliability show cronbach's alpha and composite reliability greater than 0.7 and ave, greater than 0.5. measured for the first-order and second-order aac construct (mackenzie, podsakoff, & podsakoff, 2011). the external loads of convergent validity are greater than 0.7 (validity framework step 6). still on the measurement model was analyzed discriminant validity using the fornell-larcker criterion, according to which the square root of the ave must be greater than the other constructs loads. after exclusion of two items, the cross-loading test showed no problem, confirming the validity at construct level (validity framework step 6). both tests were executed for multidimensional constructs of aac (validity framework step 8). the structural model collinearity was evaluated using the vif indicator, using less than 5 as a parameter, with the highest result being 4,097 (hair et al., 2017). after, the coefficients are evaluated using the bootstrapping procedure with 5000 subsamples with the option "no sigh changes" (validity framework step 6). the coefficients are not significant (p-value <0.05) only for the statistical test of the relationship between aac and organizational performance indicating an indirect-only mediation of static marketing capabilities (h3). for a more in-depth analysis (see table 02 and figure 02), the macro process of spss confirmed the h3, indirect-only effect for mediation, (a) and (b) <0.001 and (c´) not significant, and gave more information using ordinary least squares (ols) regression analysis with the latent scores outputted from smartpls. we used the procedures and parameters of hayes (2013), and the results of the bootstrap with 10000 resample are summarized in table 02 with results for r2, f statistics (degree of freedom 1 and 2) and p-values. it also includes unstandardized regression coefficients of direct paths (a, b, and c’), and the indirect path ab with significance level for bias-corrected 95% confidence intervals, and standard error(se). table 02 process ols mediation results consequent antecedent m(static marketing capabilities) y(performance) coeff. se p coeff. se p x(aac) a .7325 .0640 <.001 c' .0532 .0859 ns m(static marketing capabilities) - - -b .7084 .0865 <.001 constant i1 .0 .0494 1 i2 .0 .0484 1 r2 = 0.536 p<.001 f(1,193) = 130,8382 r2 = 0. 3273 p<.001 f(2,192) = 90,5057 source: prepared by the authors the first two hypothesis was confirmed (see figure 02, left side), and they gave responses to extant literature and introduced aac as an antecedent of the realm of marketing capabilities. about the main test, mediation (see figure 02, right side), the indirect effect (ab) resulted in a value of .5189 using both the normal theory test and the bootstrap confidence interval (hayes, 2013). as h3 is the main test, to improve the robustness of 84 the indirect effect value, another test procedure was executed using a simulationbased method, monte carlo using the mcmed macro (hayes, 2013). mcmed showed the same value with confidence intervals ranging from .3734 and .6811 (preacher & selig, 2012), i.e., not passing thru zero. figure 02: smartpls algorithm and process spss outcomes source: prepared by the authors thus h3 was confirmed, no direct significant effect, using sem and ols indicating an indirect-only mediation between aac and organizational performance, what agree with part of literature that we assumed as correct, what has a definite impact for practice and academics. the mediation effect is most important as higher is the indirect-effect value, not the inexistence of direct-effect (zhao, lynch, & chen 2010), and have to be analyzed together with the size of the effect f², which evaluates if any omitted constructs generate substantive impact on the endogenous constructs. this caveat is necessary to avoid the epiphenomenal association, that means a mediator correlated with another omitted construct (hayes, 2013), but f2 results deny this association as we will see. the indirect-effect has a value of .5189, but it is a scale bound then it is dependent on the constructs metrics, and the measurement metrics in our model are not inherently meaningful because they are responses to rating scales aggregated over multiple questions (hayes, 2013) and standardized by smartpls. thus we used the r-squared mediation effect size (rsq_med from process) that resulted in .3260, confidence intervals ranging from .1969 and .4546, meaning that aac explains 32.6% of organizational performance valiance in our final sample, that has total effect larger than the indirect effect and they have the same sign, following the restriction of hayes (2013) for r-sq_med effect size index. back to the smartpls, the f² effect shown that aac on static marketing capabilities and static marketing capabilities on organizational performance are large, bigger than 0.35 (hair et al., 2017), meaning the contribution of the exogenous construct for the r2 of the endogenous construct. we also evaluated the coefficient of determination that measures the model predictive power. the result was 0.523 for static marketing capabilities and 0.547 for organizational performance, with adjusted values of 0.521 and 0.543 respectively, which is considered both moderate (hair et al., 2017). the predictive relevance is evaluated using the blindfolding algorithm with default configuration, omission distance equal to seven, resulting in a q² that represents great relevance 0.377 (organizational performance) and near to great 0.318 (static marketing capabilities), with 0.35 as parameters (hair et al., 2017) using crossvalidated redundancy (validity framework step 9). to finish the validity framework steps 6 and 9, with standardized root mean square residual (srmr) fit parameter as less than 0.08 (hair et al., 2017), was found a good fit of 0.064. in summary, the analysis of sem carried out in smartpls, and ols in 85 process resulted in the confirmation of all three hypothesis. discussions the hypothesis h1 confirmed the importance of teams of technologists and scientists that leads with complex and sophisticated knowledge impacting in marketing capabilities (cohen & levinthal, 1990; ciampi et al., 2021) with a moderated r square. by it turn, the hypothesis h2 confirmed the marketing capabilities literature (morgan, 2012; kozlenkova, samaha, & palmatier, 2014) and gives the possibility of using the term "static marketing capabilities". additionally, h2 also resulted in a moderated r square for organizational performance. the parsimonious model empowers the moderated r2. the hypothesis h3 showed that aac is dependent on static marketing capabilities. this result gives to aac the same enabler behavior of technological capabilities regarding preexisting marketing capabilities to improve performance (barrales-molina, martínez-lópez, & gázquez-abad, 2014; pereira & bamel, 2021). these tests expand the knowledge of managers and academics. in particular to both profiles that take for granted the importance of analytics and think about it naively. conclusions the present paper helps to explain organizations that continually feel and act upon the emerging technological trends using a market knowledge with the adaptive approach. the paper shows that to improve organizational performance using aac it is needed static marketing capabilities. thus, analytics can boost traditional methods of customer lifecycle assessment, loyalty or churn programs, pricing, segmentation, personalization, which by its turns, can launch adaptive business models like experimental spin-offs, startups for industry foresight, they can promote joint ventures or external networks and collaborative strategies. the results show findings both from academic and practice point of views. the academic relevance is to show how aac acts through static marketing capabilities to become a critical and predictive element for organizational performance. thus, the results of the research contributed to clarify the way in which the construct operates, additionally the paper escape from traps linked to tautological dynamic capabilities research. regarding the managerial context, this research effort enabled managers to understand what the analytics adaptive capabilities are, as well as the static marketing capabilities that need to be developed and articulated by work teams involved in marketing activities. the expertise of these teams are used to recognize the value of new market knowledge through the use of technologies, assimilating them and applying them to new adaptive business models. thus, aac is a rare, valuable and adaptable capability to the market demands. the paper provides to managers a useful tool to assess their organizations regarding aac, what makes it possible to compare with rivals and to predict the investments to improve aac dimensions. in particular, we highlight the new analytical information quality that is different from the widespread information quality construct. a limitation is that the idea of researching the adaptive market approach is not entirely new, another limitation it that deeper endogeneity test could be executed related to adaptive market approach as well it was an original preoccupation concerned to dynamics capabilities. however, as an academic contribution, the results and discussions on marketing capabilities seem to expand the field toward the emerging revolutionary technologies. for management, these results suggest precaution for headhunter because aac needs pre-existing marketing capabilities and sometimes a step back is necessary. references ahmed, s., alshater, m. m., el ammari, a., & hammami, h. (2022). artificial intelligence and machine learning in finance: a bibliometric review. research in 86 international business and finance, 61, 101646. barrales-molina, v., martínez-lópez, f. j., & gázquez-abad, j. c. (2014). dynamic marketing capabilities: toward an integrative framework. international journal of management reviews, 16(4), 397–416. https://doi.org/10.1111/ijmr.12026 boulding, w., staelin, r., ehret, m., & johnston, w. j. (2005). a customer relationship management roadmap: what is known, potential pitfalls, and where to go. journal of marketing, 69(4), 155–166. https://doi.org/10.1509/jmkg.2005.69.4. 155 chang, w., park, j. e., & chaiy, s. (2010). how does crm technology transform into organizational performance? a mediating role of marketing capability. journal of business research, 63(8), 849–855. https://doi.org/10.1016/j.jbusres.2009.07 .003 chatterjee, s., chaudhuri, r. and vrontis, d. (2022), "big data analytics in strategic sales performance: mediating role of crm capability and moderating role of leadership support", euromed journal of business, vol. 17 no. 3, pp. 295-311. https://doi.org/10.1108/emjb-07-20210105 cho, y., fu, p., & wu, c. (2017). popular research topics in marketing journals, 1995-2014. journal of interactive marketing, 40, 52–72. https://doi.org/10.1016/j.intmar.2017.06 .003 chuang, s.-h., & lin, h.-n. (2013). the roles of infrastructure capability and customer orientation in enhancing customer-information quality in crm systems: empirical evidence from taiwan. international journal of information management, 33(2), 271– 281. https://doi.org/10.1016/j.ijinfomgt.2012. 12.003 chuang, s. h., & lin, h. n. (2017). performance implications of information-value offering in e-service systems: examining the resource-based perspective and innovation strategy. journal of strategic information systems, 26(1), 22–38. https://doi.org/10.1016/j.jsis.2016.09.00 1 ciampi, f., demi, s., magrini, a., marzi, g., & papa, a. (2021). exploring the impact of big data analytics capabilities on business model innovation: the mediating role of entrepreneurial orientation. journal of business research, 123, 1-13. cohen, w. m., & levinthal, d. a. (1990). absorptive capacity : a new perspective on learning and innovation. administrative science quarterly, 35(1), 128–152. https://doi.org/10.2307/2393553 conant, j. s., mokwa, m. p., & varadarajan, p. r. (1990). strategic types, distinctive marketing competencies and organizational performance: a multiple measures based study. strategic management journal, 11(5), 365–383. https://doi.org/10.1002/smj.4250110504 cooke, a. d. j., & zubcsek, p. p. (2017). the connected consumer: connected devices and the evolution of customer intelligence. journal of the association for consumer research, 2(2). côrte-real, n., oliveira, t., & ruivo, p. (2017). assessing business value of big data analytics in european firms. journal of business research, 70, 379– 390. https://doi.org/10.1016/j.jbusres.2016.08 .011 davenport, t. h. (2006). competing on analytics. harvard business review, (january), 1–11. day, g. s. (1994). the capabilities of market-driven organizations. journal of marketing, 58(4), 37. https://doi.org/10.2307/1251915 day, g. s. (2011). closing the marketing capabilities gap. journal of marketing, 75(4), 183–195. https://doi.org/10.1509/jmkg.75.4.183. day, g. s. (2014). an outside-in approach to resource-based theories. journal of the academy of marketing science, 42(1), 27–28. https://doi.org/10.1007/s11747013-0348-3 donthu, n., reinartz, w., kumar, s., & pattnaik, d. (2021). a retrospective review of the first 35 years of the international journal of research in 87 marketing. international journal of research in marketing, 38(1), 232–269. https://doi.org/10.1016/j.ijresmar.2020.1 0.006 drnevich, p. l., & kriauciunas, a. p. (2011). clarifying the conditions and limits of the contributions of ordinary and dynamic capabilities to relative firm performance. strategic management journal, 1(32), 254–279. faul, f.; erdfelder, e.; lang, a. g.; buchner, a. (2007). g* power 3: a flexible statistical power analysis program for the social, behavioral, and biomedical sciences. behavior research methods,39(2), 175–191. https://doi.org/10.3758/bf03193146 ferreira, j. and coelho, a. (2020), "dynamic capabilities, innovation and branding capabilities and their impact on competitive advantage and sme's performance in portugal: the moderating effects of entrepreneurial orientation", international journal of innovation science, vol. 12 no. 3, pp. 255-286. https://doi.org/10.1108/ijis10-2018-0108 germann, f., lilien, g. l., fiedler, l., & kraus, m. (2014). do retailers benefit from deploying customer analytics ? journal of retailing, 90(4), 587–593. https://doi.org/10.1016/j.jretai.2014.08.0 02 gorla, n., somers, t. m., & wong, b. (2010). organizational impact of system quality, information quality, and service quality. journal of strategic information systems, 19(3), 207–228. https://doi.org/10.1016/j.jsis.2010.05.00 1 hair, j. f., hult, g. t. m., ringle, c. m., & sarstedt, m. (2017). a primer on partial least squares structural equation modeling (pls-sem). thousand oaks: sage. hayes, a. (2013). introduction to mediation, moderation, and conditional process analysis. new york, ny: the guilford press. https://doi.org/978-1-60918-230-4 jarvis, c. b., mackenzie, s. b., & podsakoff, p. m. (2004). a critical review of construct indicators and measurement model misspecification in marketing and consumer research. journal of consumer research, 30(september 2003), 199–218. https://doi.org/10.1086/376806 jaworski, b. j., & kohli, a. k. (1993). market orientation: antecedents and consequences. journal of marketing, 57(3), 53–70. jayachandran, s., sharma, s., kaufman, p., & raman, p. (2005). the role of relational information processes and technology use in customer relationship management. journal of marketing, 69(4), 177–192. https://doi.org/10.1509/jmkg.2005.69.4. 177 kim, g., shin, b., & kwon, o. (2012). investigating the value of sociomaterialism in conceptualizing it capability of a firm. journal of management information systems, 29(3), 327–362. https://doi.org/10.2753/mis07421222290310 kiron, d., prentice, p. k., & ferguson, r. b. (2014). the analytics mandate. mit sloan management review, 55(4), 1. kozlenkova, i. v., samaha, s. a., & palmatier, r. w. (2014). resource-based theory in marketing. journal of the academy of marketing science, 42(1), 1– 21. https://doi.org/10.1007/s11747-0130336-7 mackenzie, podsakoff, & podsakoff. (2011). construct measurement and validation procedures in mis and behavioral research: integrating new and existing techniques. mis quarterly, 35(2), 293. https://doi.org/10.2307/23044045 morgan, n. a. (2012). marketing and business performance. journal of the academy of marketing science, 40(1), 102– 119. https://doi.org/10.1007/s11747-0110279-9 morgan, n. a., zou, s., vorhies, d. w., & katsikeas, c. s. (2003). experiential and informational knowledge, architectural marketing capabilities, and the adaptive performance of export ventures: a cross-national study. decision sciences, 34(2), 287–321. https://doi.org/10.1111/15405915.02375 ozdemir, s., kandemir, d., & eng, t. (2017). the role of horizontal and vertical new 88 product alliances in responsive and proactive market orientations and performance of industrial manufacturing firms. industrial marketing management, 64(july), 25– 35. https://doi.org/10.1016/j.indmarman.20 17.03.006 pavlou, p. a., & sawy, o. a. e. (2010). the “third hand”: it-enabled competitive advantage in turbulence through improvisational capabilities. information systems research, 21(3), 443–471. https://doi.org/10.1287/isre.1100.0280 pereira, v., & bamel, u. (2021). extending the resource and knowledge based view: a critical analysis into its theoretical evolution and future research directions. journal of business research, 132 (december 2020), 557– 570. https://doi.org/10.1016/j.jbusres.2021.04 .021 pavlou, p. a., & sawy, o. a. el. (2013). searching for a simple model of dynamic capabilities. ssrn electronic journal. https://doi.org/http://dx.doi.org/10.2139/ ssrn.2369378 podsakoff, p. m., mackenzie, s. b., lee, j.y., & podsakoff, n. p. (2003). common method biases in behavioral research: a critical review of the literature and recommended remedies. journal of applied psychology, 88(5), 879–903. https://doi.org/10.1037/00219010.88.5.879 popovič, a., hackney, r., coelho, p. s., & jaklič, j. (2012). towards business intelligence systems success: effects of maturity and culture on analytical decision making. decision support systems, 54(1), 729–739. https://doi.org/10.1016/j.dss.2012.08.01 7 provost, f., & fawcett, t. (2013). data science for business (1st ed.). sebastopol, ca: o’reilly media, inc. https://doi.org/10.1007/s13398-0140173-7.2 rapp, a., trainor, k. j., & agnihotri, r. (2010). performance implications of customer-linking capabilities: examining the complementary role of customer orientation and crm technology. journal of business research, 63(11), 1229–1236. https://doi.org/10.1016/j.jbusres.2009.11 .002 sincorá, l. a., oliveira, m. p. v. de, zanquetto-filho, h., & ladeira, m. b. (2018). business analytics leveraging resilience in organizational processes. rausp management journal, 53(3), 385–403. https://doi.org/10.1108/rausp-042018-002 song, m., di benedetto, c. a., & nason, r. w. (2007). capabilities and financial performance: the moderating effect of strategic type. journal of the academy of marketing science, 35(1), 18–34. https://doi.org/10.1007/s11747-0060005-1 teo, t. s. h., nishant, r., & koh, p. b. l. (2016). do shareholders favor business analytics announcements? journal of strategic information systems, 25(4), 259–276. https://doi.org/10.1016/j.jsis.2016.05.00 1 trainor, k. j., andzulis, j., rapp, a., & agnihotri, r. (2014). social media technology usage and customer relationship performance: a capabilities-based examination of social crm. journal of business research, 67(6), 1201–1208. https://doi.org/10.1016/j.jbusres.2013.05 .002 tseng, s.-m., & lee, p.-s. (2014). the effect of knowledge management capability and dynamic capability on organizational performance. journal of enterprise information management, 27(2), 158–179. https://doi.org/10.1108/jeim-05-20120025 wamba, s. f., gunasekaran, a., akter, s., ren, s. j., dubey, r., & childe, s. j. (2017). big data analytics and firm performance: effects of dynamic capabilities. journal of business research, 70, 356–365. https://doi.org/10.1016/j.jbusres.2016.08 .009 wang, e. t. g., hu, h., & hu, p. j. (2013). examining the role of information technology in cultivating firms’ dynamic 89 marketing capabilities. information & management, 50(6), 336–343. https://doi.org/10.1016/j.im.2013.04.007 wedel, m., & kannan, p. k. (2016). marketing analytics for data-rich environments. journal of marketing, 80(6), 97–121. https://doi.org/10.1509/jm.15.0413 weaven, s., quach, s., thaichon, p., frazer, l., billot, k., & grace, d. (2021). surviving an economic downturn: dynamic capabilities of smes. journal of business research, 128, 109-123. xu, z., frankwick, g. l., & ramirez, e. (2016). effects of big data analytics and traditional marketing analytics on new product success: a knowledge fusion perspective. journal of business research, 69(5), 1562–1566. https://doi.org/10.1016/j.jbusres.2015.10 .017 zhao, x., lynch, j. g., & chen, q. (2010). reconsidering baron and kenny: myths and truths about mediation analysis. journal of consumer research, 37(august), 197–206. https://doi.org/10.1086/651257 journal of intelligence studies in business vol. 13 no. 1 (2023) pp. 4–5 open access: freely available at: http://jisib.com/ editor’s note vol 13. no. 1 (2023) unveiling the value of competitive intelligence: coordinated communication and added value recently, a lot of attention has been paid to several aspects of ci, which influence the decision-making of organizations and the acquisition of competitive advantages. organizations must leverage data, artificial intelligence (ai), and social capital to enhance their competitive intelligence processes. social media data, ai and machine learning, big data analytics, dynamic capabilities, and intraorganizational social capital all play significant roles in driving strategic decisionmaking and improving customer experiences. by integrating these elements effectively, organizations can gain valuable insights, mitigate risks, and stay ahead of the competition. organizations can enhance their dynamic capabilities by integrating social media analytics into their competitive intelligence practices, particularly in the stages of information collection and analysis. this integration positively influences the various stages of competitive intelligence (wu, q. et all., 2023). organizations also expect higher added value and looking for sources of this value in relation to competitive intelligence. this value could be shared between different departments and coordinated by corporate communication. (ding, j.-l. & shi, b., 2021). in this issue, the authors explore internal aspects of organizations and propose models that integrate existing knowledge. these models aim to assist organizations in establishing, assessing, and enhancing their ci practices and theories, ultimately resulting in improved organizational performance. there are practical implications for various organizations, including academic entities. existing solutions are designed to help businesses deal with unforeseen events by gathering and transforming data into understandable information. while major companies have adopted big data analytics systems, the adoption and effects of business intelligence tools in universities and organizations are not well understood. therefore, researchers are investigating how business intelligence tools specifically impact decision-making and performance in public universities. furthermore, there has been a growing recognition of the importance of startups in driving economic growth and innovation. governments, private organizations, and academic institutions around the world have initiated various programs and initiatives to support startups, facilitate their establishment, and harness their potential for generating a significant impact on national economies. these initiatives aim to provide startups with the necessary resources, knowledge, and networks to thrive in competitive markets. the overarching goal is to create an environment conducive to entrepreneurial success and encourage the growth of startup ecosystems. within this context, competitive intelligence has emerged as a valuable tool for startups to improve their company performance and gain a competitive edge. researchers have conducted studies highlighting the role of competitive intelligence in improving company performance through organizational learning. 5 finally, there are numerous possibilities for enhancing the applicability of existing tools to address current problems. the use of analytical and adaptive technologies can provide organizations with comprehensive tools and techniques. i would like to express my gratitude to all contributors to this issue. references ding, j.-l., shi, b. (2021) analysis and modeling of enterprise competitive intelligence based on social media user comments. entrepreneurship research journal, 11(2), pp. 47-69. wu, q., yan, d., umair, m. (2023). assessing the role of competitive intelligence and practices of dynamic capabilities in business accommodation of smes. economic analysis and policy, 77, pp. 1103-1114. on behalf of the editorial board, sincerely yours, prof. dr. andrejs cekuls university of latvia, latvia article_sidhom_lambert__siie2011_v5f_en__ss information design for “weak signal” detection and processing in economic intelligence: a case study on health resources sahbi sidhom * and philippe lambert * * * loria/kiwi & nancy université, 4 rue ravinelle, 54000 nancy, france sahbi.sidhom@loria.fr ** vinalor, nancy université, 4 rue ravinelle, 54000 nancy, france philippe.lambert@vinalor.fr received 20 february 2011; received in revised form 22 november 2011; accepted 25 december 2011 abstract: the topics of this research cover all phases of “information design” applied to detect and profit from weak signals in economic intelligence (ei) or business intelligence (bi). the field of the information design (id) applies to the process of translating complex, unorganized or unstructured data into valuable and meaningful information. id practice requires an interdisciplinary approach, which combines skills in graphic design (writing, analysis processing and editing) , human performances technology and human factors. applied in the context of information system, it allows end-users to easily detect implicit topics known as “weak signals” (ws). in our approach to implement the id, the processes cover the development of a knowledge management (km) process in the context of ei. a case study concerning information monitoring health resources is presented using id processes to outline weak signals. both french and american bibliographic d a t ab a s e s were applied to make the connection to multilingual concepts in the health watch process. keyword: economic intelligence, business intelligence, information design, weak signals available for free online at https://ojs.hh.se/ journal of intelligence studies in business 1 (2011) 40-48 mailto:sidhom@loria.fr mailto:lambert@vinalor.fr https://ojs.hh.se/ 41 1. introduction on november 2 6 t h . (2010), the uni ver si t y o f califo r nia officially launched its laboratory project on “information design” (id). the project aims to develop knowledge exchange between different actors through applications for new media platforms such as ipads in networks or iphone technology. beyond the innovative aspect of this project, we note that the id is the projection of an important “prospective approach” in the anglo-saxon research world. this point is reinforced by the comparison of the scientific literature on the issue. since the 70s, research teams have specialized on the connections’ between the graphical representation of information and its interpretation. one of the representation techniques that have been developed is “spatial” information across neuron networks. especially in france, this approach has been somewhat vulgarized at first as in the example of mind-maps a nd mind mapping in education research. in recent years, this research focus has been applied to data mining u si n g d ata from the web (web mining). it helps to develop new knowledge from large text themes. this technique is increasingly interested in leaders who have the responsibility to detect topics that can have been missed in a linear reading. in the field of ei studies, the implicit properties on analysis take on the name “weak signals” (ws) (the explicit properties are “strong signals”).the detection of ws allows the user to take better account of the environment in a dynamic sense and t o b u i l d foresight (“to prepare today for tomorrow”). however, the connection between id and ws detection requires the development of a complex methodological process. this is the topic of this paper. the first part of the paper defines the meaning of weak signals and processes through a strategic approach. the second part presents the logic in id processes that tends to present varied graph data sets while facilitating the appropriation of “semantic” properties. the last part is matched to a case study on “strategic” health watch for which we use mapping and the visualizing of information. the study was able to detect a n u m b e r o f weak signals on scientific and technical information with the assistance of id. 2. mapping information for detecting weak signals (ws) anticipating strategic failures is one of the most common issues in ei studies. market volatility, uncertainties about property p r i c e s and economic change are signals that announce future crisis and breaks from crisis. these breaks may be opportunities or threats in a changing world of economics where the faculty of anticipation becomes a powerful strategic advantage for companies. in 1970, ansoff discussed the concept of ws in his first paper on the subject, entitled “managing strategic surprise by response t o w e a k s i g n a l s ” (ansoff, 1975). he considers the w s as corollary of organizational factors in the company, especially due to environmental turbulence a s compared to the formulation of corporate strategy. in a following paper he specified the nature of ws, by defining it as “a warning (external or internal), events and developments that are still too incomplete to allow for an accurate estimate of their impact and/or to determine a full adapted response” (ansoff, 1985). in what follows, we s e t o u t t o determine the theoretical framework and application of ws. 2.1 theoretical framework: weak signals (ws) any company can engage in a strategic process. the specificity of the ws lies also in its potentiality. if one considers the famous s-curve, w h i c h describes the four phases of the product’s life (birth, growth, maturity and decline), we can imagine that ws is a precursor of a new trend upstream of the cycle. hence, the importance of ws detection in a logic of competitiveness. the term “signal” is ambiguous. if one refers to the definition in the treasury of the french language (atilf) for the word “signal” we f ind: [in french] ”signe convenu par lequel quelq’un donne une information un avertissement á quelqu’un le moment de faire quelque chose”. ansoff's: [in english]: a sign by “proactive” value: to capture ws by the decision-maker via the channel of intuition (i.e. spontaneous knowledge of the environment) to cause a request for additional information (i.e. explicit formulations) from these signals. another contribution to the question of weak s i g n a l s was made by coffman who has worked on various aspects of the problem. for him, a ws is defined as (coffman, 1997): an idea that affects the way we trade and the environment in which we work; a novelty and a surprise in terms of receiving signals, a noise and other signals, sometimes difficult to detect among noise and other signals, an opportunity or a threat to the organization, often mad e f u n of b y the "knowledge h o l d e r s ” or experts, w e a k signal with a substantial period of time before it matures and becomes a strong signal, therefore, this signal represents an opportunity to learn, grow and evolve. coffman ( 1 9 97 ) also said that the ws could be of three types: supra-perceptual signal, perceptible s ig n a l but not recognized by our mental models, and recognized signal by our mental models and by which our change in behavior. in f r a n c e , h. lesca (2001) propose s a list of characteristics that define a ws, w h i c h 42 is close to that of ansoff. a signal can be classified as ws if it is fragmentary, embedded in a mass of useless information (or noise), an apparent weak and ambiguous meanings, could not be seen, an apparent low usability, and low "palpability". in synthesis of these definitions and presentations, we can consider that a weak signal is characterized by: a temporal discontinuity of its discovery, but also by the fact that it causes a shift (or breaking) in the facts found by the receiver to arouse/create measurable interest in the future. the researchers found, in the notion of breaking or the “discontinuity”, the reason for the information flow and design that someone provides information, a warning to someone; someone tells i t ’ s the time to do something. precisely the opposite that constitutes the “weak signal” in a strategic watch process. the transmitter of the information detected as ws do not expect the risk that competitors become aware of the potentially innovative nature of the information given. the adjective term “weak” is also a sematic problem. the “weakness” of the signal is opposite to the potential of information designated b y this t e r m . t h e ter m “weak signal” is defined by “a high potential for new innovations”. due to this we propose to transform the term “sign” above as in “weak signal” to “latent warning sign” (lws) for designated information in a strategic context. 2.2 application framework: knowledge discovery for nearly a decade, several teams of researchers across the atlantic have focused on the subject of information design (id). the concept, however, remained forgotten in france until recently. visualizing information has g r e a t p o t e n t i a l advantages. eppler and burkhard (2007) gives six main reasons for why it is important to give priority to this area: it motivates the receiver, presents new perspectives, develops memory, encourages the learning process, captures the attention of the receiver, and allows structuring and coordinating of communication. many definitions present id as an art, the art to direct information to create meaning. graphic productions goes together with significant creativity, with formatted, colorful, animated and multiform information. in addition to the purely aesthetic s i d e o f this approach, id contains intrinsically a new way of thinking about information and could be summarized as karabeg (2002) did in “a new approach to information”: he explains what id is by p r o p o s i n g t h e i m a g e o f a b u s equipped with “candle flags” (atilf, 2010). the bus represents a “modern culture” while the candles symbolize “traditional” information. we observe what the author means by this incongruence (dysfunction). however it can be surpassed by the use of id. moreover, “modern culture” is producing and consuming information on a lar ge -scale. i d through the development o f information technologies can act as a remedy to the problem of chronic “infobesity”. on this epistemological id, more technique is being added, p r o p o s e d b y men like j o t h a m fry (2004) in h i s t h e s i s e n t i t l e d “computational information design”. the issue of work is to propose a methodology for data visualization and offer a comprehensive set of graphical representations to give sense to implicit relations between connective data. j o t h a m fry (2004) presents a classic seven step process for id to ensure the transition from data to knowledge, acquire: acquisition of data from any medium, parse or split; cutting to provide a structure of the data and order, filter: filtering to select only relevant data, m i n e : the sear c h w h e r e y o u p l a c e the d a t a into a mathematical context, show: representation where it is determined, t h a t a simple representation of data can take, refine: refining to change the simple representation to more and advanced visual renderings, and interact: interaction by adding methods for manipulating data through visualization. besides the purely aesthetic s i d e o f information (or infographic), id is at the crossroads of several fields of scientific applications. this includes the fields of visualization techniques to computer graphics for greater knowledge. w e also s e e the impact i d h a s in psychology and semiotics. this d e v e l o p m e n t is to perfect the cognitive and physiological theories of visual perception and cultural factors that come into account in the process of information visualization. ultimately, id enables the end-user, usually an expert whose skills enable him to interpret the data represented as graphs, to generate links between data and knowledge. this knowledge discovery is not the ultimate goal of the logic of id. on the contrary, the new application aims to refocus the attention of the user to historical data previously unnoticed. as a result, a new watch cycle will begin on data previously “unnoticed”. in this case study, the aim is to illustrate the relation of id and knowledge data discovery (kdd). the “latent warning sign” (lws) is here a key component of this new application by t h e emergence of thematic relations that may improve the strategic watch process. 3. t h e case study: the health heterogeneous resources – project « cronisanté » during the conference siie’2010, there was a study about reflections on “chronic diseases 43 management (project 2007)”, by the high council of public health (hcsp) with inistcnrs i n fr ance , t o estab lish a n “information s y s t e m for decision support” powered by a strategic watch process on the health resources (lambert & sidhom, 2010). the hcsp was trying to identify how european health systems manage the problem of “chronic diseases”. the approach to the problem is based on the wisp model (i.e. watcher information and search problem) developed by p. kislin (2007). this model is the extension of a watch approach to describe the information needs and help the user (decision-maker and user) to formulate needs. in the context of this work, the formulation of needs has been directed towards the bibliographic references obtained after consulting a business database (cf. iii.d). the strategic issue of this work, for the user, is to formalize the declarative rules, by: <>: = if we do not act on the