Search results

1 – 10 of 26
Article
Publication date: 25 July 2008

Craig S. Fleisher

The paper seeks to show how the increasingly popular use of data and information acquired from open sources (OS) impacts competitive and marketing intelligence (C/MI). It…

6302

Abstract

Purpose

The paper seeks to show how the increasingly popular use of data and information acquired from open sources (OS) impacts competitive and marketing intelligence (C/MI). It describes the current state of the art in analysis efforts of open source intelligence (OSINT) in business/commercial enterprises, examines the planning and execution challenges organizations are experiencing associated with effectively using and fusing OSINT in C/MI decision‐making processes, and provides guidelines associated with the successful use of OSINT.

Design/methodology/approach

This is a descriptive, conceptual paper that utilizes and develops arguments based on the search of three unclassified bodies of literature in competitive and marketing intelligence, intelligence processing and marketing analysis.

Findings

Open sources are useful in marketing analyses because they can be easily accessible, inexpensive, quickly accessed and voluminous in availability. There are several conceptual and practical challenges the analyst faces in employing them. These can be addressed through awareness of these issues as well as a willingness to invest resources into studying how to improve the data gathering/analysis interface.

Practical implications

Marketing analysts increasingly rely on open sources of data in developing plans, strategy and tactics. This article provides a description of the challenges they face in utilizing this data, as well as provides a discussion of the effective practices that some organizations have demonstrated in applying and fusing open sources in their C/MI analysis process.

Originality/value

There are very few papers published focusing on applying OSINT in enterprises for competitive and marketing intelligence purposes. More uniquely, this paper is written from the perspective of the marketing analyst and how they use open source data in the competitive and marketing sense‐making process and not the perspective of individuals specialized in gathering these data.

Details

European Journal of Marketing, vol. 42 no. 7/8
Type: Research Article
ISSN: 0309-0566

Keywords

Article
Publication date: 1 August 1999

Athol Yates and Nicholas Zvegintzovi

Open Source Information (OSI) and Open Source Intelligence (OSINT) are attracting enormous interest from the business, military and political intelligence communities. OSI…

Abstract

Open Source Information (OSI) and Open Source Intelligence (OSINT) are attracting enormous interest from the business, military and political intelligence communities. OSI and OSINT offer the prospect of delivering valuable intelligence, from so‐called open sources such as newspapers, experts, and online databases. While OSI and OSINT may offer considerable potential when employed to produce information on foreign countries, they are totally dependent on the researchers’ and analysts’ understanding of the target country‘s history, politics and society. A research project on the BAM (Baikal‐Amur Mainline) Railway in eastern Siberia provides a practical example of OSI. The project involved researching a book on the BAM (Baikal‐Amur Mainline) Railway in eastern Siberia using OSI alone as it was impossible to visit the region. The 3,084km BAM traverses an almost unpopulated region which had been virtually closed to Westerners since it became a major gulag zone in the 1930s. Once the book’s research was underway, it became clear that much of the English language published material was ill‐informed and contradictory. After the collapse of the Soviet Union and the relaxation of travel restrictions, it was possible to validate the information gathered. This led to a number of surprising findings about the accuracy and comprehensiveness of the material collected outside Russia.

Details

Aslib Proceedings, vol. 51 no. 6
Type: Research Article
ISSN: 0001-253X

Keywords

Article
Publication date: 25 November 2013

Alon Leonid Goldis

– The purpose of this paper is to discuss the relative popularity of Lean Six Sigma among the internet users comparing it to other problem solving methodologies.

Abstract

Purpose

The purpose of this paper is to discuss the relative popularity of Lean Six Sigma among the internet users comparing it to other problem solving methodologies.

Design/methodology/approach

The comparisons between the Lean Six Sigma and other problem solving methodologies among the internet users were assessed by using open-source intelligence (OSINT) tools, such as Google Keyword tools provided by Google, it is possible to assess the problem solving techniques popularity used by the internet users with a confidence of 80 percent.

Findings

It is found that the popularity of Lean Six Sigma among the internet users far exceeds that of other methodologies.

Research limitations/implications

The paper is limited as it is written from the view of the author, based the conclusions on OSINT tools. Further research could be beneficial.

Originality/value

This study is based on Google Keyword tools provided by Google as an OSINT tools as effective source of information.

Details

International Journal of Lean Six Sigma, vol. 4 no. 4
Type: Research Article
ISSN: 2040-4166

Keywords

Article
Publication date: 5 July 2013

Paul A. Watters

A key problem in money laundering investigations based on open source intelligence gathering is the performance (efficiency and accuracy) of people in the team, where…

Abstract

Purpose

A key problem in money laundering investigations based on open source intelligence gathering is the performance (efficiency and accuracy) of people in the team, where suspects will typically try to conceal incriminating evidence or deliberately deceive investigators to avoid prosecution. If we are able to develop a suitable psychological model of deception for web‐based investigations, it should be possible to develop training programmes to improve investigators' ability to “see beyond” deliberate concealment. The purpose of this paper is to empirically test a model based on non‐linear system identification using a well‐known psychological phenomenon (the Stroop effect), where conflicting colour and text information is presented to subjects which they are instructed to process in a certain way.

Design/methodology/approach

The paper uses an experimental approach.

Findings

The results indicate that strategies for improving investigator information processing performance can benefit from models that incorporate both linear and non‐linear components.

Originality/value

Although the Stroop effect is well known, no other papers have investigated how it may be used to evaluate and monitor the performance of investigators. The real value of this study will emerge when tools are developed to better train investigators to identify concealment within conflicting input data.

Details

Journal of Money Laundering Control, vol. 16 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 2 October 2017

Michael Tierney

In 2014, Paul Gill et al. introduced a study of 119 lone-actor terrorism cases, and found that lone-actor extremists could be more accurately identified by their…

534

Abstract

Purpose

In 2014, Paul Gill et al. introduced a study of 119 lone-actor terrorism cases, and found that lone-actor extremists could be more accurately identified by their behavioural characteristics and activities, rather than their extremist ideologies. The study was said to have significant impact on intelligence analysis in the field of counterterrorism. The purpose of this paper is to apply Gill et al.’s findings to financial intelligence investigations, to assist investigators with the detection and prevention of lone-actor terrorist financing.

Design/methodology/approach

This article provides an overview of the key findings provided by Gill et al. It then discusses the indicators of lone-actor terrorism in the context of financial intelligence investigations, and sets out methods to improve financial intelligence investigations to better identify and stop lone-actor terrorism in the future.

Findings

By applying traditional financial intelligence techniques, which focus on assessing an individual’s activity and behaviour, with open-source intelligence gathering, financial intelligence investigators will be better equipped to identify lone-actor terrorism and its financing moving forward.

Originality/value

This article will be of value to investigators specializing in terrorism and financial crime, as it will assist them in the identification of a proliferating security threat, the lone-actor terrorist. While the article relies on the findings provided by Gill et al., it takes a new approach by applying those findings specifically to the financial intelligence sector, to improve investigations related to terrorism.

Details

Journal of Financial Crime, vol. 24 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Abstract

Details

Intelligence and State Surveillance in Modern Societies
Type: Book
ISBN: 978-1-78769-171-1

Article
Publication date: 3 July 2017

Mark Lawrence Ashwell

The purpose of this paper is to highlight the potential of digital transformation and innovation opportunities for intelligence analysis. Its focus is the development of…

2929

Abstract

Purpose

The purpose of this paper is to highlight the potential of digital transformation and innovation opportunities for intelligence analysis. Its focus is the development of individuals to exploit data and information technologies to better understand and counter organised criminal networks.

Design/methodology/approach

The methodology adopted consisted of an extensive literature review and interview with practitioners in digital technology and transformation focused on intelligence, crime and terrorism, plus practical experience and field study.

Findings

Phenomena including the World Wide Web, social media and interconnectedness are influencing all aspects of human activity. Effective digital transformation, focusing on data, information technologies and people bestows significant competitive advantage upon those who have transformed. Applications are making previously complex processes and tasks easier for individuals to understand and exploit. An activity-based intelligence (ABI) model provides a platform for intelligence transformation. ABI provides a foundation from which to better fuse and share data to understand and resolve complex human (wicked) problems. To counter increasingly fast-moving organised crime networks, law enforcement needs to quickly transform.

Originality/value

This paper serves as a guide to alert and educate law enforcement professionals of the potential of digital transformation and associated evolving intelligence processes. It offers an appreciation of the nature of organisations, and the role of innovation within those organisation, required to better appreciate and tackle complex, human network challenges such as organised crime. It reveals the emergence and importance of an increasingly applications-based culture and the potential of this culture to simplify and exploit previously complex, expert-based processes.

Details

Journal of Financial Crime, vol. 24 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Abstract

Details

European Security in a Post-Brexit World
Type: Book
ISBN: 978-1-78769-837-6

Article
Publication date: 15 September 2021

Oleksandr D. Dovhan, Oleksandr M. Yurchenko, Juliana O. Naidon, Oleg S. Peliukh, Nataliia I. Tkachuk and Kamal Gulati

The purpose of this study is to develop the Counterintelligence Strategy as a conceptual document in the field of state security of Ukraine, identifying current security…

Abstract

Purpose

The purpose of this study is to develop the Counterintelligence Strategy as a conceptual document in the field of state security of Ukraine, identifying current security threats to Ukraine, which global landscape has been significantly transformed since the adoption of the Law of Ukraine “On Counterintelligence”, is substantiated. It is proved that the provisions of such Strategy should determine the current and projected counterintelligence environment via a set of the following elements. The nature of real and potential threats in the process of implementing state foreign and domestic policy course determined by Ukraine. Sources of such threats (individual states and their intelligence agencies, terrorist organizations, transnational organized crime, etc.). Features of the identified encroachment objects of foreign intelligence agencies, terrorist and other criminal organizations, including transnational ones. Long time strategy treats like COVID-19 pandemic.

Design/methodology/approach

During the past decades of the XXI century, intelligence has become a crucial tool in the system of determining and implementing the foreign policy in international relations. Modern realities confirm that this political and legal phenomenon directly affects the formation of the foreign policy course of any state, the development of its geopolitical strategy and defense doctrine. Possessing a powerful apparatus for obtaining primary information, fulfillment of government orders for monitoring, evaluation, analysis, forecasting and modeling of possible scenarios of global- or regional-scale events and processes, special services take an active part in perspective and current foreign and domestic policy implementation.

Findings

Thus, based on the state security paradigm, which cannot be defined in the absence of threats and ensured by their complete elimination, since negative factors for state security objects will always exist, the ensuring of its development requires first of all creation of the conditions under which threats will not be able to limit its development. That is why it is necessary not only to minimize the impact of such factors on vulnerable objects, but also to create a certain “immunity” to their impact, i.e. the ability of the state security system to function effectively in spite of the negative impact. Thus, maintaining the ability to function in terms of the existing threats is the most important area of practical activity for the state security protection, as well as ensuring the legitimate interests of the state.

Originality/value

During the paper decades of the XXI century, intelligence has become a crucial tool in the system of determining and implementing the foreign policy in international relations. Modern realities confirm that this political and legal phenomenon directly affects the formation of the foreign policy course of any state, the development of its geopolitical strategy and defense doctrine. Possessing a powerful apparatus for obtaining primary information, fulfillment of government orders for monitoring, evaluation, analysis, forecasting and modeling of possible scenarios of global- or regional-scale events and processes, special services take an active part in perspective and current foreign and domestic policy implementation.

Details

World Journal of Engineering, vol. 19 no. 2
Type: Research Article
ISSN: 1708-5284

Article
Publication date: 25 July 2008

Jonathan L. Calof and Sheila Wright

The article traces the origins of the competitive intelligence fields and identifies both the practitioner, academic and inter‐disciplinary views on CI practice. An…

12540

Abstract

Purpose

The article traces the origins of the competitive intelligence fields and identifies both the practitioner, academic and inter‐disciplinary views on CI practice. An examination of the literature relating to the field is presented, including the identification of the linear relationship which CI has with marketing and strategic planning activities.

Design/methodology/approach

Bibliometric assessment of the discipline. Findings reveal the representation of cross disciplinary literature which emphasises the multi‐faceted role which competitive intelligence plays in a modern organization.

Findings

The analysis supports the view of competitive intelligence being an activity consisting dominantly of environmental scanning and strategic management literature. New fields of study and activity are rapidly becoming part of the competitive intelligence framework.

Research limitations/implications

The analysis only uses ABI Inform as the primary sources for literature alongside Society of Competitive Intelligence Professionals (SCIP) and Competitive Intelligence Foundation (CIF) publications, particularly the Journal of Competitive Intelligence and Management. A more comprehensive bibliometric analysis might reveal additional insights. Simple counts were used for analytical purposes rather than co‐citation analysis.

Practical implications

Attention is drawn to the need for the integration of additional, complementary fields of study and competitive intelligence practice. It is clear that today's competitive intelligence practitioner cannot afford to rely on what they learned 20 years ago in order to ensure the continued competitive advantage of their firm. A keen understanding of all business functions, especially marketing and planning is advocated.

Originality/value

While there have been bibliographies of competitive intelligence literature there have been few attempts to relate this to the three distinct areas of practice. This article is of use to scholars in assisting them to disentangle the various aspect of competitive intelligence and also to managers who wish to gain an appreciation of the potential which competitive intelligence can bring to marking and business success.

Details

European Journal of Marketing, vol. 42 no. 7/8
Type: Research Article
ISSN: 0309-0566

Keywords

1 – 10 of 26