The Opportunities of the Use of Competitive Intelligence in Business: Literature Review
Abstract
The article is aimed at the revelation of the opportunities of competitive intelligence application in business using different ways and tools of information collection. The scientific literature identifies the following stages of CI interpreting it as a process: establishment of the need, evaluation of the need, need fulfilment plan, need funding, long-term plan making. However, companies not always search for the information about competitors’ actions but they might want to seek to protect their information from competitors. Under the conditions of this reverse need, the following stages of CI can be defined: identification of possible threats, evaluation of the threats; assessment of threat level, selection of priorities, funding, and threat elimination. It has been established that the most popular CI information sources are as follows: company’s own knowledge obtained while searching competitors’ websites, participation in fairs and exhibitions. It shows that information is easily accessible, although it is not always reliable or verified. The model presented by the authors of the article enables to identify the main specificities of CI using in big and small - medium business sectors. The main differences between these two sectors include CI funding and access to secret competitors’ information.
Full Text: PDF
Abstract
The article is aimed at the revelation of the opportunities of competitive intelligence application in business using different ways and tools of information collection. The scientific literature identifies the following stages of CI interpreting it as a process: establishment of the need, evaluation of the need, need fulfilment plan, need funding, long-term plan making. However, companies not always search for the information about competitors’ actions but they might want to seek to protect their information from competitors. Under the conditions of this reverse need, the following stages of CI can be defined: identification of possible threats, evaluation of the threats; assessment of threat level, selection of priorities, funding, and threat elimination. It has been established that the most popular CI information sources are as follows: company’s own knowledge obtained while searching competitors’ websites, participation in fairs and exhibitions. It shows that information is easily accessible, although it is not always reliable or verified. The model presented by the authors of the article enables to identify the main specificities of CI using in big and small - medium business sectors. The main differences between these two sectors include CI funding and access to secret competitors’ information.
Full Text: PDF
Browse Journals
Journal Policies
Information
Useful Links
- Call for Papers
- Submit Your Paper
- Publish in Your Native Language
- Subscribe the Journal
- Frequently Asked Questions
- Contact the Executive Editor
- Recommend this Journal to Librarian
- View the Current Issue
- View the Previous Issues
- Recommend this Journal to Friends
- Recommend a Special Issue
- Comment on the Journal
- Publish the Conference Proceedings
Latest Activities
Resources
Visiting Status
![]() |
396 |
![]() |
173 |
![]() |
857 |
![]() |
6076 |
![]() |
1148916 |
![]() |
13 |