Search Results - "competitive intelligence"

  • Showing 1 - 11 results of 11
Refine Results
  1. 1
  2. 2

    Competitive intelligence and the sales force : how to gain market leadership through competitive intelligence / by Le Bon, Jo�el

    Published 2014
    Table of Contents: “…Competitive intelligence and the sales organization -- 4. Competitive intelligence acquisition, management, and sales ethics -- Conclusion -- Notes -- References -- Index.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  3. 3
  4. 4
  5. 5

    Competitive intelligence and decision problems

    Published 2011
    Table of Contents: “…Models and tools -- A model for transforming decision problem to information search problems / Philippe Kislin -- Proposal of tools for competitive intelligence dedicated analysis : from information collection to information treatment / Ilheme Ghalamallah, Eloise Loubier et Bernard Dousset -- The synergy of knowledge management and competitive intelligence / Bolanle OLADEJO et Adenike Osofisan -- Collaborative information retrieval in competitive intelligence process / Victor Odumuyiwa -- The study of risk factors for decision making in competitive intelligence : cognitive approach / Olufade F.W. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  6. 6

    Competitive intelligence 2.0 organization, innovation and territory /

    Published 2011
    Table of Contents: “…Organisation -- Competitive intelligence 2.0 : a three-dimensional relationship -- Management 2.0 -- Sustainable development 2.0 : seeking for "the creation of shared values" -- Corporate education and web 2.0 -- Marketing 2.0 -- Innovation -- Parallax : a mindset 2.0 -- Competitive intelligence 2.0 tools -- Patent information 2.0, technology transfer, and resource development -- Industrial property : competitive weapon 2.0 (case study of Tenofovir) -- Innovation, serendipity 2.0, filing patents from biomedical -- Literature exploration -- Processing business news for detecting business innovation strategies -- Information property and liability in the 2.0 -- Territory and organisational reputation 2.0 -- Triple helix and territorial intelligence 2.0 -- Regional development 2.0 -- Government strategies of territorial intelligence 2.0 : support to SMEs-TPE -- University : catalyst for the implementation of competitive intelligence 2.0 in Africa (case study of Nigeria).…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  7. 7
  8. 8
  9. 9
  10. 10

    Governance, accountability and sustainable development /

    Published 2015
    Table of Contents:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  11. 11

    Defending the brand aggressive strategies for protecting your brand in the online arena / by Murray, Brian H., 1968-

    Published 2004
    Table of Contents: “…-- What to do -- The business case -- Boardroom summary -- The opportunities and threats of online commentary -- The rumor mill -- Financial earnings -- Early warning -- Information security -- Other security and liability threats -- The world's largest focus group -- Activism and "sucks" sites -- Nobody is immune -- Managing risk -- Buried treasure -- The business case -- Boardroom summary -- Customer diversion -- Customer capture -- Cybersquatting -- Typo-piracy -- Domain name administration -- Arbitration -- Search engine manipulation -- Invisible seeding -- Visible seeding -- Spoofing --Paid placement -- Managing seeding and spoofing issues -- Software utility generated advertisements -- Mislabeled links -- Unsolicited e-mail -- Keeping the customer -- Bringing the customer back -- Scope of the problem -- The future -- The business case -- Boardroom summary -- Online partners and distribution issues -- A managing partner compliance -- The customer experience -- Changing dynamics -- Online partners -- Affiliates -- Suppliers -- Distributors -- Third parties -- Monitoring partners -- Step 1: Prioritization -- Step 2: Brand management -- Step 3: Enforcement -- The business case -- Boardroom summary -- Counterfeits and gray markets -- Gray markets -- Combating gray market activity -- Counterfeiting -- Copier supplies -- Pharmaceuticals -- Online monitoring -- Criteria that may signal a suspect distributor -- Testing authenticity -- The business case -- Boardroom summary -- Defending against digital piracy -- Music -- Sales leads -- Video -- Cease and desist -- Customer convenience -- Copy protection and digital rights management -- Software -- Text and images -- E-books -- The Stephen King experiment -- News services -- Market data -- The business case -- Boardroom summary -- Trust -- The costs of compromised privacy and security -- Information collection technologies -- Cookies -- Web beacons -- Information security -- Customer information transmission -- Customer information storage -- Fraud -- Managing privacy and security -- The business case -- Boardroom summary -- Competitive intelligence -- Using online competitive intelligence to outmaneuver competitor brands -- The internet as a competitive intelligence source -- Brand presence -- Brand reach -- Competitor brand abuse -- Competitor absence -- Linking relationships -- Partnerships -- Recruiting competitor partners -- Online commentary -- Collecting the data -- Counterintelligence -- Actionable information -- The business case -- Boardroom summary.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook