Protecting your company against competitive intelligence:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | Undetermined |
Veröffentlicht: |
Westport, Conn. <<[u.a.]>>
Quorum Books
1998
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | IX, 164 S. |
ISBN: | 1567201172 |
Internformat
MARC
LEADER | 00000nam a22000001c 4500 | ||
---|---|---|---|
001 | BV026187408 | ||
003 | DE-604 | ||
005 | 20110228 | ||
007 | t | ||
008 | 110326s1998 |||| 00||| und d | ||
020 | |a 1567201172 |9 1-56720-117-2 | ||
035 | |a (OCoLC)605344308 | ||
035 | |a (DE-599)BVBBV026187408 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | |a und | ||
049 | |a DE-188 | ||
100 | 1 | |a MacGonagle, John J. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Protecting your company against competitive intelligence |c John J. McGonagle and Carolyn M. Vella |
264 | 1 | |a Westport, Conn. <<[u.a.]>> |b Quorum Books |c 1998 | |
300 | |a IX, 164 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Business Intelligence |0 (DE-588)4588307-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsmaßnahme |0 (DE-588)4181167-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Wirtschaftsspionage |0 (DE-588)4139137-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Business Intelligence |0 (DE-588)4588307-5 |D s |
689 | 0 | 1 | |a Wirtschaftsspionage |0 (DE-588)4139137-8 |D s |
689 | 0 | 2 | |a Sicherheitsmaßnahme |0 (DE-588)4181167-7 |D s |
689 | 0 | |5 DE-188 | |
700 | 1 | |a Vella, Carolyn M. |e Sonstige |4 oth | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021771353&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-021771353 |
Datensatz im Suchindex
_version_ | 1804144644121952256 |
---|---|
adam_text | Contents
Preface vii
The Concept for This Book vii
The EEA and UTSA viii
Military Analogies and Terminology viii
Structure ix
Note ix
Part I
THE BIG PICTURE
1 Cloaking and Competitive Intelligence 3
What Is Competitive Intelligence? 3
CI s Growth 4
Public Information and CI 5
CI and Your Business 6
Notes 7
2 Introduction to Cloaking: A Case Study 9
Notes 12
3 Cloaking 15
What Is a Cloaked Competitor? 15
k
iv Contents
Why Become Involved with Cloaking? 16
What Is the Core of a Cloaking Program? 18
Philosophy 19
Benefits of a Cloaking Program 20 !
Costs of a Cloaking Program 21
Too Much Cloaking Can Be a Problem 23
What About Disinformation? 23
Notes 23
4 What Do Others Know about You and Where Did They Find It? 25
Starting with Data as a Commodity 26
Starting with Sources of Raw Data 30
Notes 36
5 How Do They Figure Out What We Are Doing? 37
Evaluating and Screening Data 38
Application of Analytical Tools and Models 43
Specific Analytical Tools and Techniques 44
Drawing Conclusions 47
Notes 49
Part II
CREATING A CLOAKING PROGRAM
6 What Should You Protect and How Should You Protect It? 53
What Should You Protect? 53
How Should You Protect It? 54
Notes 56
7 Cloaking Precepts: What to Do 59
Precept 1: Seek to Control Only
^Critical Information, Not All Information 59
^M recept 2: Do Not Tell Everyone Everything 61
Precept 3: Continually Watch for Sources of CI on Your Firm 69
Notes 71
8 Cloaking Precepts: How to Proceed 73
Precept 4: Preventing Disclosure Is Preferable to Impeding It 73
Precept 5: Do Not Ignore Simple Solutions 76
Precept 6: Pay Attention to Details 80
Notes 83
9 Cloaking Precepts: Where to Act 85
Precept 7: If You Cannot Prevent Disclosure,
Conceal Some of It 85
Precept 8: If You Cannot Conceal It,
Make It Harder or More Costly to Acquire 89
Precept 9: The Top May Be Harder to Control Than the Bottom 94
Notes 95
1.
Contents v
10 Your Cloaking Program: Organizational Issues 97
Cloaking Programs and Classic
Corporate Information Defense Activities 98
Competitive Intelligence Units in Cloaking Competitors 104
Notes 108
11 Using Your New Low Visibility 109
Case Studies 109
Notes 111
APPENDIXES
A Disinformation 115
Purposeful Business Disinformation 116
Accidental Business Disinformation 117
Costs and Consequences of Disinformation 117
Notes 119
B Critical Legislation 121
Overview 121
Uniform Trade Secrets Act with Official Comments 121
Economic Espionage Act of 1996 135
Selected Congressional Remarks on the
Economic Espionage Act of 1996 139
Notes 146
C Organizations Involved with Aspects of Cloaking 147
Glossary 149
Bibliography 155
Competitive Intelligence 155
Corporate Security 155
Intellectual Property Protection 156
Legal and Ethical Issues 156
Trade-Secret Protection 156
Analysis 157
Index 161
|
any_adam_object | 1 |
author | MacGonagle, John J. |
author_facet | MacGonagle, John J. |
author_role | aut |
author_sort | MacGonagle, John J. |
author_variant | j j m jj jjm |
building | Verbundindex |
bvnumber | BV026187408 |
ctrlnum | (OCoLC)605344308 (DE-599)BVBBV026187408 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01463nam a22003611c 4500</leader><controlfield tag="001">BV026187408</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110228 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">110326s1998 |||| 00||| und d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1567201172</subfield><subfield code="9">1-56720-117-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)605344308</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV026187408</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">und</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-188</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">MacGonagle, John J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Protecting your company against competitive intelligence</subfield><subfield code="c">John J. McGonagle and Carolyn M. Vella</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Westport, Conn. <<[u.a.]>></subfield><subfield code="b">Quorum Books</subfield><subfield code="c">1998</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">IX, 164 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Business Intelligence</subfield><subfield code="0">(DE-588)4588307-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsmaßnahme</subfield><subfield code="0">(DE-588)4181167-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Wirtschaftsspionage</subfield><subfield code="0">(DE-588)4139137-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Business Intelligence</subfield><subfield code="0">(DE-588)4588307-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Wirtschaftsspionage</subfield><subfield code="0">(DE-588)4139137-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitsmaßnahme</subfield><subfield code="0">(DE-588)4181167-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-188</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vella, Carolyn M.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021771353&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-021771353</subfield></datafield></record></collection> |
id | DE-604.BV026187408 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T23:06:50Z |
institution | BVB |
isbn | 1567201172 |
language | Undetermined |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-021771353 |
oclc_num | 605344308 |
open_access_boolean | |
owner | DE-188 |
owner_facet | DE-188 |
physical | IX, 164 S. |
publishDate | 1998 |
publishDateSearch | 1998 |
publishDateSort | 1998 |
publisher | Quorum Books |
record_format | marc |
spelling | MacGonagle, John J. Verfasser aut Protecting your company against competitive intelligence John J. McGonagle and Carolyn M. Vella Westport, Conn. <<[u.a.]>> Quorum Books 1998 IX, 164 S. txt rdacontent n rdamedia nc rdacarrier Business Intelligence (DE-588)4588307-5 gnd rswk-swf Sicherheitsmaßnahme (DE-588)4181167-7 gnd rswk-swf Wirtschaftsspionage (DE-588)4139137-8 gnd rswk-swf Business Intelligence (DE-588)4588307-5 s Wirtschaftsspionage (DE-588)4139137-8 s Sicherheitsmaßnahme (DE-588)4181167-7 s DE-188 Vella, Carolyn M. Sonstige oth HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021771353&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | MacGonagle, John J. Protecting your company against competitive intelligence Business Intelligence (DE-588)4588307-5 gnd Sicherheitsmaßnahme (DE-588)4181167-7 gnd Wirtschaftsspionage (DE-588)4139137-8 gnd |
subject_GND | (DE-588)4588307-5 (DE-588)4181167-7 (DE-588)4139137-8 |
title | Protecting your company against competitive intelligence |
title_auth | Protecting your company against competitive intelligence |
title_exact_search | Protecting your company against competitive intelligence |
title_full | Protecting your company against competitive intelligence John J. McGonagle and Carolyn M. Vella |
title_fullStr | Protecting your company against competitive intelligence John J. McGonagle and Carolyn M. Vella |
title_full_unstemmed | Protecting your company against competitive intelligence John J. McGonagle and Carolyn M. Vella |
title_short | Protecting your company against competitive intelligence |
title_sort | protecting your company against competitive intelligence |
topic | Business Intelligence (DE-588)4588307-5 gnd Sicherheitsmaßnahme (DE-588)4181167-7 gnd Wirtschaftsspionage (DE-588)4139137-8 gnd |
topic_facet | Business Intelligence Sicherheitsmaßnahme Wirtschaftsspionage |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021771353&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT macgonaglejohnj protectingyourcompanyagainstcompetitiveintelligence AT vellacarolynm protectingyourcompanyagainstcompetitiveintelligence |