SlideShare a Scribd company logo
1 of 32
Intelligence Analysis
&
Deliverables
Dr. Elijah Ezendu
FIMC, FCCM, FIIAN, FBDI, FAAFM, FSSM, MIMIS, MIAP, MITD, ACIArb, ACIPM,
PhD, DocM, MBA, CWM, CBDA, CMA, MPM, PME, CSOL, CCIP, CMC, CMgr
“More than ever, effectively seeing through or ahead of the
competition is an art form (as opposed to a totally rational and
structured technique), but one that is very accessible to those
willing to learn its tools, techniques, and concepts. There’s a
creative aspect to taking gobs of loose data and making
sense out of them. Data on the competition does not come in
nice, bow-wrapped, hexa-decimal packages that you can
digest by spreadsheet, regression analysis, or even a well-
written memo. It may appear in the form of a picture, an
observation of the active crowd huddled around a trade show
booth, the pregnant pause of a speaker on the podium in
reaction to a tough question. The observer is the artist here.
He or she needs to catch the important clues, piece this
image together, and create the precious intelligence.”
- Leonard Fuld, The Secret Language of Competitive Intelligence
“Now the reason the enlightened Prince and
the wise General conquer the enemy
whenever they move, and their
achievements surpass those of ordinary
men, is foreknowledge”
- Sun Tzu
Intelligence Analysis is a context-specific
scheme for assessing data thereby
interpreting processes, synthesizing
factuality, generating insights and
actionable intelligence.
“Success for every business, whether it’s a one-
person operation or a Fortune 500 corporation,
increasingly depends on a timely awareness by
key executives of the rapidly changing events
impacting their organizations. Yet in most
corporate settings, executives consistently work
with massive amounts of raw data, small
amounts of value-added information derived from
analysis, and very little intelligence. Competitive
intelligence reverses this traditional trend toward
data and information and redirects it toward
actionable intelligence.”
- Shaker & Gembicki, The War Room Guide to Competitive Intelligence
Analysis as a Function of the Larger Intelligent Project Cycle
Source: Craig Fleisher & Babette Bensoussan, Business and Competitive Analysis
The Intelligence Path
Data Collection in Intelligence Analysis
This is normally a two-phase process well-
structured with the aid of Pareto Principle as
follows.
Secondary Sources of Data
1) Directories
2) Trade Publications
3) Newspapers
4) Federal Office of Statistics
5) Magazines
6) Journals
7) Newsletters
8) Transcripts of Speeches
9) Industry Periodicals
10)Regulatory Filings
11)Government Statements and Reports
12)Annual Reports
13)Analyst Reports
14)Online Databases
15)Vendor’s Promotional Material
16)Press Releases
17)Websites
18)Subscription News Feeds
Primary Sources of Data
I. Observations
II. Marketplace Surveys
III. Interview with Internal Experts, Industry Professionals,
Customers, Stockbrokers, Journalists, Suppliers to the
Industry, and Sources of Published Reports.
IV.Discussion Forums
V. Internet Blog
VI.Electronic Chat
Exploring Web Portals
A web portal offers a broad range of services
and resources while highlighting information
from various locations on the world wide web.
Types of portals include the following:
 Educational Portals
 Social Portals
 Management Portals
 Finance Portals
 Technology Portals
 Marketing Portals
 General Business Portals
 Scientific Research Portals
Examples of Finance Portals
 http://www.finweb.com
 http://www.ameritrade.com
 http://www.qualisteam.com
 http://library.advanced.org
 http://www.nyse.com
 http://www.moneyfactory.com
 http://www.financecenter.com
 http://www.financehub.com
 http://www.investopedia.com
 http://www.financial-portal.com
Intelligence Weblog
Intelligence weblog provides access to information,
wherefore users can update, add remark and
recommendation based on analysis. It
assembles, synthesizes and disseminates the
information, while providing opportunity for
interaction.
Market Blog Process
Source: Arik Johnson, Competitive Intelligence Weblogs
Frequency: Daily, Semi-Weekly, Monthly
2nd
Sources: XML Newsfeed
Subjects: Companies, Markets, Geographies, Behaviours
Customers: Ranges from Salesforce to Executive Staff
Alert Thresholds: Out-of-Schedule Notifications
Search Engines
i. http://www.altavista.com
ii. http://www.google.com
iii. http://www.looksmart.com
iv. http://www.infoseek.com
v. http://www.lycos.com
vi. http://www.northernlight.com
vii.http://www.iwon.com
viii.http://www.askjeeves.com
ix. http://www.dmoz.org
x. http://www.msn.com
xi. http://www.directhit.com
xii.http://www.excite.com
xiii.http://www.go.com
xiv.http://www.hotbot.com
xv.http://www.yahoo.com
xvi.http://www.snap.com
xvii.http://www.webcrawler.com
Tasks to be Performed by CI Professionals
• •Go beyond internet searches: collect from human
resources.
• • Go beyond public databases: collect hard-to-get
information (e.g. private firms) from less obvious sources.
• • Go beyond competitors: analyze whole markets and
industries.
• • Go beyond static analysis and current market statistics:
predict change.
• • Go beyond marketing intelligence: understand finance
and cost accounting.
• • Go beyond marketing, finance, and cost: understand
strategy.
• • Go beyond strategy: understand risk.
Source: Ben Gilad, CI Education Harvard Style?
Identifying the Problem
The Key Intelligence Topics (KIT) proposed by
Jan P. Herring
Key Intelligence Questions (KIQ)
Identifying the Right Metrics
Analysts must ensure every intelligence analysis is
driven by the right metrics.
Without the right metrics, the analysis would be
derailed.
Metrics are key indicators of diagnostic or
predictive value.
Data Source Evaluation
Availability
Reliability
Accuracy
Accessibility
Identifying Scope of Analysis
Levels of Intelligence Analysis
i. Strategic Intelligence Analysis
ii. Tactical Intelligence Analysis
iii.Operational Intelligence Analysis
Strategic Intelligence Analysis
 Trend Analysis
 Opportunity and Threat Analysis
 Impact Analysis
 Variance Analysis
 Competitor Analysis
Tactical Intelligence Analysis
 Response Analysis
 Pattern Analysis
 Network-Structure Analysis
Elements in Analysis
i. Assumptions
ii. Perceptions
iii.Facts
iv.Beliefs
v. Projections
vi.Synthesis
Causes of Failure in Intelligence Analysis
I. Problem of Technique
II. Bad application of technology tool
III.Error in data collection
IV.Synthesis Error
V.Error in identification of Problem
VI.Project Mismanagement
VII.Miscommunication
What are the Information Hazards of
Competitive Intelligence Information?
The objective of the Competitive Intelligence Program is to gather relevant information
that is valid and accurate. Incomplete or inaccurate information may jeopardize the
organization's CI efforts.
False Confirmation: There might be instances of false confirmation in which one source
of data appears to confirm the data obtained from another source. In reality, there is no
confirmation because one source may have obtained its data from the second source, or
both sources may have received their data from a third common source.
Disinformation: The data generated may be flawed because of disinformation, which is
incomplete or inaccurate information designed to mislead the organization's CI efforts.
Blowback: Blowback may occur when the company's disinformation or misinformation
that is directed at the competitor contaminates its own intelligence channels or
information. In all such cases, the information gathered may be inaccurate or incomplete.
Source: Yogesh Malhotra, Competitive Intelligence Programs
Four-Level Hierarchical Model of Analysis Failures
Level Nature of Problem
Individual Analyst-Level Failures
Analysis Task-Level Failures
Internal Organizational-Level Failures
External Environmental-Level Failures
Different natural analytical abilities
Naturally limited mental capacities
Natural motivation
Cognitive biases and perceptual distortion
Insufficient understanding and application of analysis tools and
techniques
Part of larger task
Task discontinuity
Unsatisfactory data inputs
Disconnects from decision making
Imbalance among key task facets
Some decision makers don’t understand and appreciate analysis
Clients cannot specify their critical intelligence needs or questions
Under-resourcing the analysis function
Lack of analysis-specific IT support
Lack of thinking time
Organizational culture and politics
Time and trust
Invisibility and mystery
Misconception that everyone can do analysis
Growing range of competitive factors
Complexity and turbulence
Data overload
Globalization
Educational deficiencies
Source: Craig Fleisher & Babette Bensoussan, Business and Competitive Analysis
“The best intelligence in the world is of little
use if it is not presented in a manner that
makes it credible, compelling and relevant
for senior executives.”
- Outward Insights
Key Deliverables of Intelligence Analysis
 Competitor Profiles
 Customer Profiles
 Technology Profiles
 Supplier Profiles
 Early Warning Alerts
 Strategic Impact Reports
 Situation Analysis Reports
 Intelligence Newsletter
 Annual Intelligence Reports
 Generic Intelligence Reports
 Due Diligence
Ten Commandments of Competitive Intelligence
1. Do not lie when representing yourself.
2. Observe your company’s legal guidelines.
3. Do not secretly record an interview if it is against the law.
4. Do not issue a bribe.
5. Do not use eavesdropping devices.
6. Do not mislead anyone in an interview.
7. Do not swap price information or capacity with a
competing company.
8. Do not distribute or exchange misinformation.
9. Do not steal a trade secret.
10. Do not knowingly pump someone for information that
could sacrifice that person’s job or reputation.
Source: Fuld and Company
Dr Elijah Ezendu is Award-Winning Business Expert & Certified Management Consultant with
expertise in Interim Management, Strategy, Competitive Intelligence, Transformation,
Restructuring, Turnaround Management, Business Development, Marketing, Project & Cost
Management, Leadership, HR, CSR, e-Business & Software Architecture. He had functioned
as Founder, Initiative for Sustainable Business Equity; Chairman of Board, Charisma Broadcast
Film Academy; Group Chief Operating Officer, Idova Group; CEO, Rubiini (UAE); Special
Advisor, RTEAN; Director, MMNA Investments; Chair, Int’l Board of GCC Business Council
(UAE); Senior Partner, Shevach Consulting; Chairman (Certification & Training), Coordinator
(Board of Fellows), Lead Assessor & Governing Council Member, Institute of Management
Consultants, Nigeria; Lead Resource, Centre for Competitive Intelligence Development; Lead
Consultant/ Partner, JK Michaels; Turnaround Project Director, Consolidated Business
Holdings Limited; Technical Director, Gestalt; Chief Operating Officer, Rohan Group; Executive
Director (Various Roles), Fortuna, Gambia & Malta; Chief Advisor/ Partner, D & E; Vice
Chairman of Board, Refined Shipping; Director of Programmes & Governing Council Member,
Institute of Business Development, Nigeria; Member of TDD Committee, International
Association of Software Architects, USA; Member of Strategic Planning and Implementation
Committee, Chartered Institute of Personnel Management of Nigeria; Country Manager
(Nigeria) & Adjunct Faculty (MBA Programme), Regent Business School, South Africa; Adjunct
Faculty (MBA Programme), Ladoke Akintola University of Technology; Editor-in-Chief, Cost
Management Journal; Council Member, Institute of Internal Auditors of Nigeria; Member, Board
of Directors (Several Organizations). He holds Doctoral Degree in Management, Master of
Business Administration and Fellow of Professional Institutes in North America, UK & Nigeria.
He is Innovator of Corporate Investment Structure Based on Financials and Intangibles, for
valuation highlighting intangible contributions of host communities and ecological environment:
A model celebrated globally as remedy for unmitigated depreciation of ecological capital and
developmental deprivation of host communities. He had served as Examiner to Professional
Thank You

More Related Content

What's hot

402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligenceDoing What I Do
 
KGB, Active Measures, Disinformation and Subversion
KGB, Active Measures, Disinformation and SubversionKGB, Active Measures, Disinformation and Subversion
KGB, Active Measures, Disinformation and SubversionPeter Hammond
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect usLuis Borges Gouveia
 
Week 1: What is terrorism?
Week 1: What is terrorism?Week 1: What is terrorism?
Week 1: What is terrorism?kamila_fraser
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligencePrachi Mishra
 
POLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptxPOLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptxRoland994165
 
Concepts of Intelligence Led Policing
Concepts of Intelligence Led PolicingConcepts of Intelligence Led Policing
Concepts of Intelligence Led Policinggroundskeeper20
 
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...IntelCollab.com
 
Community Policing Presentation
Community Policing PresentationCommunity Policing Presentation
Community Policing PresentationKrueger Joseph
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceDeep Shankar Yadav
 
Chapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whomChapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whomDoing What I Do
 
Psychology of terrorism
Psychology of terrorismPsychology of terrorism
Psychology of terrorismBruce Sorkin
 
Non kinetic warfare share
Non kinetic warfare shareNon kinetic warfare share
Non kinetic warfare share104016032
 
Diplomacy today and tomorrow. The role of public diplomacy
Diplomacy today and tomorrow. The role of public diplomacyDiplomacy today and tomorrow. The role of public diplomacy
Diplomacy today and tomorrow. The role of public diplomacyKatarzyna Rybka-Iwańska
 
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Sunil Jagani
 

What's hot (20)

402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
 
Terrorism
TerrorismTerrorism
Terrorism
 
KGB, Active Measures, Disinformation and Subversion
KGB, Active Measures, Disinformation and SubversionKGB, Active Measures, Disinformation and Subversion
KGB, Active Measures, Disinformation and Subversion
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect us
 
Week 1: What is terrorism?
Week 1: What is terrorism?Week 1: What is terrorism?
Week 1: What is terrorism?
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
POLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptxPOLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptx
 
Concepts of Intelligence Led Policing
Concepts of Intelligence Led PolicingConcepts of Intelligence Led Policing
Concepts of Intelligence Led Policing
 
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
 
Agent handling
Agent handlingAgent handling
Agent handling
 
Community Policing Presentation
Community Policing PresentationCommunity Policing Presentation
Community Policing Presentation
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
Crime scene investigation
Crime scene investigationCrime scene investigation
Crime scene investigation
 
Chapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whomChapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whom
 
Role of media in criminal justice system.pptx
Role of media in criminal justice system.pptxRole of media in criminal justice system.pptx
Role of media in criminal justice system.pptx
 
Psychology of terrorism
Psychology of terrorismPsychology of terrorism
Psychology of terrorism
 
Non kinetic warfare share
Non kinetic warfare shareNon kinetic warfare share
Non kinetic warfare share
 
Diplomacy today and tomorrow. The role of public diplomacy
Diplomacy today and tomorrow. The role of public diplomacyDiplomacy today and tomorrow. The role of public diplomacy
Diplomacy today and tomorrow. The role of public diplomacy
 
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 

Viewers also liked

Competitive Intelligence Sample Powerpoint
Competitive Intelligence Sample PowerpointCompetitive Intelligence Sample Powerpoint
Competitive Intelligence Sample PowerpointToriZ93
 
Afghanistan.
Afghanistan.Afghanistan.
Afghanistan.mgalla22
 
Gallagher.M Exam1
Gallagher.M Exam1Gallagher.M Exam1
Gallagher.M Exam1mgalla22
 
Exam3 M.Gallagher
Exam3 M.GallagherExam3 M.Gallagher
Exam3 M.Gallaghermgalla22
 
Location Intelligence for Italian and UK Justice and Public Safety - BIWASumm...
Location Intelligence for Italian and UK Justice and Public Safety - BIWASumm...Location Intelligence for Italian and UK Justice and Public Safety - BIWASumm...
Location Intelligence for Italian and UK Justice and Public Safety - BIWASumm...Iconsulting
 
Parallel Session Enforcement: Emile Lindemulder, Intelligence Management and ...
Parallel Session Enforcement: Emile Lindemulder, Intelligence Management and ...Parallel Session Enforcement: Emile Lindemulder, Intelligence Management and ...
Parallel Session Enforcement: Emile Lindemulder, Intelligence Management and ...TopProductions
 
Gallaghers' i2 guidebook
Gallaghers' i2 guidebookGallaghers' i2 guidebook
Gallaghers' i2 guidebookJames Gallagher
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philAPhil Agcaoili
 
Cyber Threat Intelligence: Who is Targeting your Information?
Cyber Threat Intelligence: Who is Targeting your Information? Cyber Threat Intelligence: Who is Targeting your Information?
Cyber Threat Intelligence: Who is Targeting your Information? Control Risks
 
4 Rules for Successful Threat Intelligence Teams
4 Rules for Successful Threat Intelligence Teams4 Rules for Successful Threat Intelligence Teams
4 Rules for Successful Threat Intelligence TeamsRecorded Future
 
Cash Flow Planning Solution
Cash Flow Planning SolutionCash Flow Planning Solution
Cash Flow Planning SolutionIconsulting
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Government
 
The Business value of agile development
The Business value of agile developmentThe Business value of agile development
The Business value of agile developmentPhavadol Srisarnsakul
 
Glassfish JEE Server Administration - The Enterprise Server
Glassfish JEE Server Administration - The Enterprise ServerGlassfish JEE Server Administration - The Enterprise Server
Glassfish JEE Server Administration - The Enterprise ServerDanairat Thanabodithammachari
 
Perl for System Automation - 01 Advanced File Processing
Perl for System Automation - 01 Advanced File ProcessingPerl for System Automation - 01 Advanced File Processing
Perl for System Automation - 01 Advanced File ProcessingDanairat Thanabodithammachari
 
Glassfish JEE Server Administration - JEE Introduction
Glassfish JEE Server Administration - JEE IntroductionGlassfish JEE Server Administration - JEE Introduction
Glassfish JEE Server Administration - JEE IntroductionDanairat Thanabodithammachari
 
JEE Programming - 08 Enterprise Application Deployment
JEE Programming - 08 Enterprise Application DeploymentJEE Programming - 08 Enterprise Application Deployment
JEE Programming - 08 Enterprise Application DeploymentDanairat Thanabodithammachari
 

Viewers also liked (20)

Competitive Intelligence Sample Powerpoint
Competitive Intelligence Sample PowerpointCompetitive Intelligence Sample Powerpoint
Competitive Intelligence Sample Powerpoint
 
Afghanistan.
Afghanistan.Afghanistan.
Afghanistan.
 
Gallagher.M Exam1
Gallagher.M Exam1Gallagher.M Exam1
Gallagher.M Exam1
 
Exam3 M.Gallagher
Exam3 M.GallagherExam3 M.Gallagher
Exam3 M.Gallagher
 
Location Intelligence for Italian and UK Justice and Public Safety - BIWASumm...
Location Intelligence for Italian and UK Justice and Public Safety - BIWASumm...Location Intelligence for Italian and UK Justice and Public Safety - BIWASumm...
Location Intelligence for Italian and UK Justice and Public Safety - BIWASumm...
 
Parallel Session Enforcement: Emile Lindemulder, Intelligence Management and ...
Parallel Session Enforcement: Emile Lindemulder, Intelligence Management and ...Parallel Session Enforcement: Emile Lindemulder, Intelligence Management and ...
Parallel Session Enforcement: Emile Lindemulder, Intelligence Management and ...
 
Gallaghers' i2 guidebook
Gallaghers' i2 guidebookGallaghers' i2 guidebook
Gallaghers' i2 guidebook
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA
 
Cyber Threat Intelligence: Who is Targeting your Information?
Cyber Threat Intelligence: Who is Targeting your Information? Cyber Threat Intelligence: Who is Targeting your Information?
Cyber Threat Intelligence: Who is Targeting your Information?
 
4 Rules for Successful Threat Intelligence Teams
4 Rules for Successful Threat Intelligence Teams4 Rules for Successful Threat Intelligence Teams
4 Rules for Successful Threat Intelligence Teams
 
Cash Flow Planning Solution
Cash Flow Planning SolutionCash Flow Planning Solution
Cash Flow Planning Solution
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat Analysis
 
The Business value of agile development
The Business value of agile developmentThe Business value of agile development
The Business value of agile development
 
Glassfish JEE Server Administration - The Enterprise Server
Glassfish JEE Server Administration - The Enterprise ServerGlassfish JEE Server Administration - The Enterprise Server
Glassfish JEE Server Administration - The Enterprise Server
 
Perl for System Automation - 01 Advanced File Processing
Perl for System Automation - 01 Advanced File ProcessingPerl for System Automation - 01 Advanced File Processing
Perl for System Automation - 01 Advanced File Processing
 
JEE Programming - 02 The Containers
JEE Programming - 02 The ContainersJEE Programming - 02 The Containers
JEE Programming - 02 The Containers
 
JEE Programming - 01 Introduction
JEE Programming - 01 IntroductionJEE Programming - 01 Introduction
JEE Programming - 01 Introduction
 
Glassfish JEE Server Administration - JEE Introduction
Glassfish JEE Server Administration - JEE IntroductionGlassfish JEE Server Administration - JEE Introduction
Glassfish JEE Server Administration - JEE Introduction
 
JEE Programming - 08 Enterprise Application Deployment
JEE Programming - 08 Enterprise Application DeploymentJEE Programming - 08 Enterprise Application Deployment
JEE Programming - 08 Enterprise Application Deployment
 
JEE Programming - 05 JSP
JEE Programming - 05 JSPJEE Programming - 05 JSP
JEE Programming - 05 JSP
 

Similar to Intelligence Analysis & Deliverables

Competitive Intelligence Management
Competitive Intelligence ManagementCompetitive Intelligence Management
Competitive Intelligence ManagementHendry Hartono
 
Lecture 1 Competitive Intelligence.pptx
Lecture 1 Competitive Intelligence.pptxLecture 1 Competitive Intelligence.pptx
Lecture 1 Competitive Intelligence.pptxRavneet Singh Bhandari
 
Competitive Intelligence
Competitive IntelligenceCompetitive Intelligence
Competitive IntelligenceElijah Ezendu
 
Analytics trends deloitte
Analytics trends deloitteAnalytics trends deloitte
Analytics trends deloitteMani Kansal
 
The Future of Applied Marketing Research
The Future of Applied Marketing ResearchThe Future of Applied Marketing Research
The Future of Applied Marketing ResearchKelly Page
 
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdfIbm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdfdawnrk
 
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdfIbm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdfdawnrk
 
Aslapr market research for entrepreneurs mg irc presentation 09 22-14
Aslapr market research for entrepreneurs mg irc presentation 09 22-14Aslapr market research for entrepreneurs mg irc presentation 09 22-14
Aslapr market research for entrepreneurs mg irc presentation 09 22-14Mark Goldstein
 
Business Analytics Lesson Of The Day August 2012
Business Analytics Lesson Of The Day August 2012Business Analytics Lesson Of The Day August 2012
Business Analytics Lesson Of The Day August 2012Pozzolini
 
Big Risks Requires Big Data Thinking
Big Risks Requires Big Data ThinkingBig Risks Requires Big Data Thinking
Big Risks Requires Big Data ThinkingTableau Software
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxstilliegeorgiana
 
The state-of-dark-data-report
The state-of-dark-data-reportThe state-of-dark-data-report
The state-of-dark-data-reportVaibhav Agarwal
 
How do I embrace it to deliver unique intelligence
How do I embrace it to deliver unique intelligenceHow do I embrace it to deliver unique intelligence
How do I embrace it to deliver unique intelligenceDigimind
 
Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionSeamus Tuohy
 
Optimizing Competitive Intelligence Through Integrated Primary and Secondary ...
Optimizing Competitive Intelligence Through Integrated Primary and Secondary ...Optimizing Competitive Intelligence Through Integrated Primary and Secondary ...
Optimizing Competitive Intelligence Through Integrated Primary and Secondary ...Contify
 
Market intelligence
Market intelligenceMarket intelligence
Market intelligenceKavi Priya J
 

Similar to Intelligence Analysis & Deliverables (20)

Competitive Intelligence Management
Competitive Intelligence ManagementCompetitive Intelligence Management
Competitive Intelligence Management
 
Lecture 1 Competitive Intelligence.pptx
Lecture 1 Competitive Intelligence.pptxLecture 1 Competitive Intelligence.pptx
Lecture 1 Competitive Intelligence.pptx
 
Competitive Intelligence
Competitive IntelligenceCompetitive Intelligence
Competitive Intelligence
 
SLA Best Practices Ci
SLA Best Practices   CiSLA Best Practices   Ci
SLA Best Practices Ci
 
Marketing Analytics: 5 Things Every CMO Should Know
Marketing Analytics: 5 Things Every CMO Should KnowMarketing Analytics: 5 Things Every CMO Should Know
Marketing Analytics: 5 Things Every CMO Should Know
 
Analytics trends deloitte
Analytics trends deloitteAnalytics trends deloitte
Analytics trends deloitte
 
The Future of Applied Marketing Research
The Future of Applied Marketing ResearchThe Future of Applied Marketing Research
The Future of Applied Marketing Research
 
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdfIbm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
 
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdfIbm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
 
Aslapr market research for entrepreneurs mg irc presentation 09 22-14
Aslapr market research for entrepreneurs mg irc presentation 09 22-14Aslapr market research for entrepreneurs mg irc presentation 09 22-14
Aslapr market research for entrepreneurs mg irc presentation 09 22-14
 
Business Analytics Lesson Of The Day August 2012
Business Analytics Lesson Of The Day August 2012Business Analytics Lesson Of The Day August 2012
Business Analytics Lesson Of The Day August 2012
 
Big Risks Requires Big Data Thinking
Big Risks Requires Big Data ThinkingBig Risks Requires Big Data Thinking
Big Risks Requires Big Data Thinking
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
 
The state-of-dark-data-report
The state-of-dark-data-reportThe state-of-dark-data-report
The state-of-dark-data-report
 
How do I embrace it to deliver unique intelligence
How do I embrace it to deliver unique intelligenceHow do I embrace it to deliver unique intelligence
How do I embrace it to deliver unique intelligence
 
Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence Collection
 
Data mining
Data miningData mining
Data mining
 
Optimizing Competitive Intelligence Through Integrated Primary and Secondary ...
Optimizing Competitive Intelligence Through Integrated Primary and Secondary ...Optimizing Competitive Intelligence Through Integrated Primary and Secondary ...
Optimizing Competitive Intelligence Through Integrated Primary and Secondary ...
 
Market intelligence
Market intelligenceMarket intelligence
Market intelligence
 
Threat intelligence minority report
Threat intelligence minority reportThreat intelligence minority report
Threat intelligence minority report
 

More from Elijah Ezendu

Execution intelligence
Execution intelligenceExecution intelligence
Execution intelligenceElijah Ezendu
 
Achieving Competitive Advantage Through Strategic Corporate Social Responsibi...
Achieving Competitive Advantage Through Strategic Corporate Social Responsibi...Achieving Competitive Advantage Through Strategic Corporate Social Responsibi...
Achieving Competitive Advantage Through Strategic Corporate Social Responsibi...Elijah Ezendu
 
Future of Work by Dr Elijah Ezendu, FRSA.
Future of Work by Dr Elijah Ezendu, FRSA.Future of Work by Dr Elijah Ezendu, FRSA.
Future of Work by Dr Elijah Ezendu, FRSA.Elijah Ezendu
 
Employer and Employee Relationship Versus Future of Work
Employer and Employee Relationship Versus Future of Work Employer and Employee Relationship Versus Future of Work
Employer and Employee Relationship Versus Future of Work Elijah Ezendu
 
Speaking to Influence Executives
Speaking to Influence ExecutivesSpeaking to Influence Executives
Speaking to Influence ExecutivesElijah Ezendu
 
Performance Wingspan Optimization Approach by Elijah Ezendu
Performance Wingspan Optimization Approach by Elijah EzenduPerformance Wingspan Optimization Approach by Elijah Ezendu
Performance Wingspan Optimization Approach by Elijah EzenduElijah Ezendu
 
Creative Selling Model for Boosting Sales Performance During Recession and Tu...
Creative Selling Model for Boosting Sales Performance During Recession and Tu...Creative Selling Model for Boosting Sales Performance During Recession and Tu...
Creative Selling Model for Boosting Sales Performance During Recession and Tu...Elijah Ezendu
 
Four Categorical Action Streams of Strategy as Yield Determinant
Four Categorical Action Streams of Strategy as Yield DeterminantFour Categorical Action Streams of Strategy as Yield Determinant
Four Categorical Action Streams of Strategy as Yield DeterminantElijah Ezendu
 
Strategic Framework for Implementation of ‘Living Our Brand’ by Elijah Ezendu
Strategic Framework for Implementation of ‘Living Our Brand’ by Elijah EzenduStrategic Framework for Implementation of ‘Living Our Brand’ by Elijah Ezendu
Strategic Framework for Implementation of ‘Living Our Brand’ by Elijah EzenduElijah Ezendu
 
10 Elements of Open-Mindedness in Workplace Operating as Drivers for Strategi...
10 Elements of Open-Mindedness in Workplace Operating as Drivers for Strategi...10 Elements of Open-Mindedness in Workplace Operating as Drivers for Strategi...
10 Elements of Open-Mindedness in Workplace Operating as Drivers for Strategi...Elijah Ezendu
 
Spectrum of Collective Leadership by Elijah Ezendu
Spectrum of Collective Leadership by Elijah EzenduSpectrum of Collective Leadership by Elijah Ezendu
Spectrum of Collective Leadership by Elijah EzenduElijah Ezendu
 
Leadership Development Strategy and Strategic Planning: The Chicken and Egg ...
Leadership Development Strategy and Strategic Planning:  The Chicken and Egg ...Leadership Development Strategy and Strategic Planning:  The Chicken and Egg ...
Leadership Development Strategy and Strategic Planning: The Chicken and Egg ...Elijah Ezendu
 
Performance of Knowledge Management
Performance of Knowledge ManagementPerformance of Knowledge Management
Performance of Knowledge ManagementElijah Ezendu
 
6 P's of Knowledge Management Performance
6 P's of Knowledge Management Performance6 P's of Knowledge Management Performance
6 P's of Knowledge Management PerformanceElijah Ezendu
 
Knowledge Management System & Technology
Knowledge Management System & TechnologyKnowledge Management System & Technology
Knowledge Management System & TechnologyElijah Ezendu
 
7 Stimulators of Customer Indulgence that Yield Expansive Business Performanc...
7 Stimulators of Customer Indulgence that Yield Expansive Business Performanc...7 Stimulators of Customer Indulgence that Yield Expansive Business Performanc...
7 Stimulators of Customer Indulgence that Yield Expansive Business Performanc...Elijah Ezendu
 
Managing Conflicts in Departments, Cross-Functional Teams, Committees and B...
Managing Conflicts in Departments, Cross-Functional Teams, Committees and B...Managing Conflicts in Departments, Cross-Functional Teams, Committees and B...
Managing Conflicts in Departments, Cross-Functional Teams, Committees and B...Elijah Ezendu
 
13 Pillars of Corporate Harmony by Elijah Ezendu
13 Pillars of Corporate Harmony by Elijah Ezendu13 Pillars of Corporate Harmony by Elijah Ezendu
13 Pillars of Corporate Harmony by Elijah EzenduElijah Ezendu
 
Ratiocinative Analysis of Budd's Model for Effective Partnership
Ratiocinative Analysis of Budd's Model for Effective PartnershipRatiocinative Analysis of Budd's Model for Effective Partnership
Ratiocinative Analysis of Budd's Model for Effective PartnershipElijah Ezendu
 
Three Models of Corporate Investment Structure Based on Financials and Intang...
Three Models of Corporate Investment Structure Based on Financials and Intang...Three Models of Corporate Investment Structure Based on Financials and Intang...
Three Models of Corporate Investment Structure Based on Financials and Intang...Elijah Ezendu
 

More from Elijah Ezendu (20)

Execution intelligence
Execution intelligenceExecution intelligence
Execution intelligence
 
Achieving Competitive Advantage Through Strategic Corporate Social Responsibi...
Achieving Competitive Advantage Through Strategic Corporate Social Responsibi...Achieving Competitive Advantage Through Strategic Corporate Social Responsibi...
Achieving Competitive Advantage Through Strategic Corporate Social Responsibi...
 
Future of Work by Dr Elijah Ezendu, FRSA.
Future of Work by Dr Elijah Ezendu, FRSA.Future of Work by Dr Elijah Ezendu, FRSA.
Future of Work by Dr Elijah Ezendu, FRSA.
 
Employer and Employee Relationship Versus Future of Work
Employer and Employee Relationship Versus Future of Work Employer and Employee Relationship Versus Future of Work
Employer and Employee Relationship Versus Future of Work
 
Speaking to Influence Executives
Speaking to Influence ExecutivesSpeaking to Influence Executives
Speaking to Influence Executives
 
Performance Wingspan Optimization Approach by Elijah Ezendu
Performance Wingspan Optimization Approach by Elijah EzenduPerformance Wingspan Optimization Approach by Elijah Ezendu
Performance Wingspan Optimization Approach by Elijah Ezendu
 
Creative Selling Model for Boosting Sales Performance During Recession and Tu...
Creative Selling Model for Boosting Sales Performance During Recession and Tu...Creative Selling Model for Boosting Sales Performance During Recession and Tu...
Creative Selling Model for Boosting Sales Performance During Recession and Tu...
 
Four Categorical Action Streams of Strategy as Yield Determinant
Four Categorical Action Streams of Strategy as Yield DeterminantFour Categorical Action Streams of Strategy as Yield Determinant
Four Categorical Action Streams of Strategy as Yield Determinant
 
Strategic Framework for Implementation of ‘Living Our Brand’ by Elijah Ezendu
Strategic Framework for Implementation of ‘Living Our Brand’ by Elijah EzenduStrategic Framework for Implementation of ‘Living Our Brand’ by Elijah Ezendu
Strategic Framework for Implementation of ‘Living Our Brand’ by Elijah Ezendu
 
10 Elements of Open-Mindedness in Workplace Operating as Drivers for Strategi...
10 Elements of Open-Mindedness in Workplace Operating as Drivers for Strategi...10 Elements of Open-Mindedness in Workplace Operating as Drivers for Strategi...
10 Elements of Open-Mindedness in Workplace Operating as Drivers for Strategi...
 
Spectrum of Collective Leadership by Elijah Ezendu
Spectrum of Collective Leadership by Elijah EzenduSpectrum of Collective Leadership by Elijah Ezendu
Spectrum of Collective Leadership by Elijah Ezendu
 
Leadership Development Strategy and Strategic Planning: The Chicken and Egg ...
Leadership Development Strategy and Strategic Planning:  The Chicken and Egg ...Leadership Development Strategy and Strategic Planning:  The Chicken and Egg ...
Leadership Development Strategy and Strategic Planning: The Chicken and Egg ...
 
Performance of Knowledge Management
Performance of Knowledge ManagementPerformance of Knowledge Management
Performance of Knowledge Management
 
6 P's of Knowledge Management Performance
6 P's of Knowledge Management Performance6 P's of Knowledge Management Performance
6 P's of Knowledge Management Performance
 
Knowledge Management System & Technology
Knowledge Management System & TechnologyKnowledge Management System & Technology
Knowledge Management System & Technology
 
7 Stimulators of Customer Indulgence that Yield Expansive Business Performanc...
7 Stimulators of Customer Indulgence that Yield Expansive Business Performanc...7 Stimulators of Customer Indulgence that Yield Expansive Business Performanc...
7 Stimulators of Customer Indulgence that Yield Expansive Business Performanc...
 
Managing Conflicts in Departments, Cross-Functional Teams, Committees and B...
Managing Conflicts in Departments, Cross-Functional Teams, Committees and B...Managing Conflicts in Departments, Cross-Functional Teams, Committees and B...
Managing Conflicts in Departments, Cross-Functional Teams, Committees and B...
 
13 Pillars of Corporate Harmony by Elijah Ezendu
13 Pillars of Corporate Harmony by Elijah Ezendu13 Pillars of Corporate Harmony by Elijah Ezendu
13 Pillars of Corporate Harmony by Elijah Ezendu
 
Ratiocinative Analysis of Budd's Model for Effective Partnership
Ratiocinative Analysis of Budd's Model for Effective PartnershipRatiocinative Analysis of Budd's Model for Effective Partnership
Ratiocinative Analysis of Budd's Model for Effective Partnership
 
Three Models of Corporate Investment Structure Based on Financials and Intang...
Three Models of Corporate Investment Structure Based on Financials and Intang...Three Models of Corporate Investment Structure Based on Financials and Intang...
Three Models of Corporate Investment Structure Based on Financials and Intang...
 

Recently uploaded

1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandSharisaBethune
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524najka9823
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 

Recently uploaded (20)

1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal Brand
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 

Intelligence Analysis & Deliverables

  • 1. Intelligence Analysis & Deliverables Dr. Elijah Ezendu FIMC, FCCM, FIIAN, FBDI, FAAFM, FSSM, MIMIS, MIAP, MITD, ACIArb, ACIPM, PhD, DocM, MBA, CWM, CBDA, CMA, MPM, PME, CSOL, CCIP, CMC, CMgr
  • 2. “More than ever, effectively seeing through or ahead of the competition is an art form (as opposed to a totally rational and structured technique), but one that is very accessible to those willing to learn its tools, techniques, and concepts. There’s a creative aspect to taking gobs of loose data and making sense out of them. Data on the competition does not come in nice, bow-wrapped, hexa-decimal packages that you can digest by spreadsheet, regression analysis, or even a well- written memo. It may appear in the form of a picture, an observation of the active crowd huddled around a trade show booth, the pregnant pause of a speaker on the podium in reaction to a tough question. The observer is the artist here. He or she needs to catch the important clues, piece this image together, and create the precious intelligence.” - Leonard Fuld, The Secret Language of Competitive Intelligence
  • 3. “Now the reason the enlightened Prince and the wise General conquer the enemy whenever they move, and their achievements surpass those of ordinary men, is foreknowledge” - Sun Tzu
  • 4. Intelligence Analysis is a context-specific scheme for assessing data thereby interpreting processes, synthesizing factuality, generating insights and actionable intelligence.
  • 5. “Success for every business, whether it’s a one- person operation or a Fortune 500 corporation, increasingly depends on a timely awareness by key executives of the rapidly changing events impacting their organizations. Yet in most corporate settings, executives consistently work with massive amounts of raw data, small amounts of value-added information derived from analysis, and very little intelligence. Competitive intelligence reverses this traditional trend toward data and information and redirects it toward actionable intelligence.” - Shaker & Gembicki, The War Room Guide to Competitive Intelligence
  • 6. Analysis as a Function of the Larger Intelligent Project Cycle Source: Craig Fleisher & Babette Bensoussan, Business and Competitive Analysis
  • 8. Data Collection in Intelligence Analysis This is normally a two-phase process well- structured with the aid of Pareto Principle as follows.
  • 9. Secondary Sources of Data 1) Directories 2) Trade Publications 3) Newspapers 4) Federal Office of Statistics 5) Magazines 6) Journals 7) Newsletters 8) Transcripts of Speeches 9) Industry Periodicals 10)Regulatory Filings 11)Government Statements and Reports 12)Annual Reports 13)Analyst Reports 14)Online Databases 15)Vendor’s Promotional Material 16)Press Releases 17)Websites 18)Subscription News Feeds
  • 10. Primary Sources of Data I. Observations II. Marketplace Surveys III. Interview with Internal Experts, Industry Professionals, Customers, Stockbrokers, Journalists, Suppliers to the Industry, and Sources of Published Reports. IV.Discussion Forums V. Internet Blog VI.Electronic Chat
  • 11. Exploring Web Portals A web portal offers a broad range of services and resources while highlighting information from various locations on the world wide web. Types of portals include the following:  Educational Portals  Social Portals  Management Portals  Finance Portals  Technology Portals  Marketing Portals  General Business Portals  Scientific Research Portals
  • 12. Examples of Finance Portals  http://www.finweb.com  http://www.ameritrade.com  http://www.qualisteam.com  http://library.advanced.org  http://www.nyse.com  http://www.moneyfactory.com  http://www.financecenter.com  http://www.financehub.com  http://www.investopedia.com  http://www.financial-portal.com
  • 13. Intelligence Weblog Intelligence weblog provides access to information, wherefore users can update, add remark and recommendation based on analysis. It assembles, synthesizes and disseminates the information, while providing opportunity for interaction.
  • 14. Market Blog Process Source: Arik Johnson, Competitive Intelligence Weblogs Frequency: Daily, Semi-Weekly, Monthly 2nd Sources: XML Newsfeed Subjects: Companies, Markets, Geographies, Behaviours Customers: Ranges from Salesforce to Executive Staff Alert Thresholds: Out-of-Schedule Notifications
  • 15. Search Engines i. http://www.altavista.com ii. http://www.google.com iii. http://www.looksmart.com iv. http://www.infoseek.com v. http://www.lycos.com vi. http://www.northernlight.com vii.http://www.iwon.com viii.http://www.askjeeves.com ix. http://www.dmoz.org x. http://www.msn.com xi. http://www.directhit.com xii.http://www.excite.com xiii.http://www.go.com xiv.http://www.hotbot.com xv.http://www.yahoo.com xvi.http://www.snap.com xvii.http://www.webcrawler.com
  • 16. Tasks to be Performed by CI Professionals • •Go beyond internet searches: collect from human resources. • • Go beyond public databases: collect hard-to-get information (e.g. private firms) from less obvious sources. • • Go beyond competitors: analyze whole markets and industries. • • Go beyond static analysis and current market statistics: predict change. • • Go beyond marketing intelligence: understand finance and cost accounting. • • Go beyond marketing, finance, and cost: understand strategy. • • Go beyond strategy: understand risk. Source: Ben Gilad, CI Education Harvard Style?
  • 17. Identifying the Problem The Key Intelligence Topics (KIT) proposed by Jan P. Herring Key Intelligence Questions (KIQ)
  • 18. Identifying the Right Metrics Analysts must ensure every intelligence analysis is driven by the right metrics. Without the right metrics, the analysis would be derailed. Metrics are key indicators of diagnostic or predictive value.
  • 21. Levels of Intelligence Analysis i. Strategic Intelligence Analysis ii. Tactical Intelligence Analysis iii.Operational Intelligence Analysis
  • 22. Strategic Intelligence Analysis  Trend Analysis  Opportunity and Threat Analysis  Impact Analysis  Variance Analysis  Competitor Analysis
  • 23. Tactical Intelligence Analysis  Response Analysis  Pattern Analysis  Network-Structure Analysis
  • 24. Elements in Analysis i. Assumptions ii. Perceptions iii.Facts iv.Beliefs v. Projections vi.Synthesis
  • 25. Causes of Failure in Intelligence Analysis I. Problem of Technique II. Bad application of technology tool III.Error in data collection IV.Synthesis Error V.Error in identification of Problem VI.Project Mismanagement VII.Miscommunication
  • 26. What are the Information Hazards of Competitive Intelligence Information? The objective of the Competitive Intelligence Program is to gather relevant information that is valid and accurate. Incomplete or inaccurate information may jeopardize the organization's CI efforts. False Confirmation: There might be instances of false confirmation in which one source of data appears to confirm the data obtained from another source. In reality, there is no confirmation because one source may have obtained its data from the second source, or both sources may have received their data from a third common source. Disinformation: The data generated may be flawed because of disinformation, which is incomplete or inaccurate information designed to mislead the organization's CI efforts. Blowback: Blowback may occur when the company's disinformation or misinformation that is directed at the competitor contaminates its own intelligence channels or information. In all such cases, the information gathered may be inaccurate or incomplete. Source: Yogesh Malhotra, Competitive Intelligence Programs
  • 27. Four-Level Hierarchical Model of Analysis Failures Level Nature of Problem Individual Analyst-Level Failures Analysis Task-Level Failures Internal Organizational-Level Failures External Environmental-Level Failures Different natural analytical abilities Naturally limited mental capacities Natural motivation Cognitive biases and perceptual distortion Insufficient understanding and application of analysis tools and techniques Part of larger task Task discontinuity Unsatisfactory data inputs Disconnects from decision making Imbalance among key task facets Some decision makers don’t understand and appreciate analysis Clients cannot specify their critical intelligence needs or questions Under-resourcing the analysis function Lack of analysis-specific IT support Lack of thinking time Organizational culture and politics Time and trust Invisibility and mystery Misconception that everyone can do analysis Growing range of competitive factors Complexity and turbulence Data overload Globalization Educational deficiencies Source: Craig Fleisher & Babette Bensoussan, Business and Competitive Analysis
  • 28. “The best intelligence in the world is of little use if it is not presented in a manner that makes it credible, compelling and relevant for senior executives.” - Outward Insights
  • 29. Key Deliverables of Intelligence Analysis  Competitor Profiles  Customer Profiles  Technology Profiles  Supplier Profiles  Early Warning Alerts  Strategic Impact Reports  Situation Analysis Reports  Intelligence Newsletter  Annual Intelligence Reports  Generic Intelligence Reports  Due Diligence
  • 30. Ten Commandments of Competitive Intelligence 1. Do not lie when representing yourself. 2. Observe your company’s legal guidelines. 3. Do not secretly record an interview if it is against the law. 4. Do not issue a bribe. 5. Do not use eavesdropping devices. 6. Do not mislead anyone in an interview. 7. Do not swap price information or capacity with a competing company. 8. Do not distribute or exchange misinformation. 9. Do not steal a trade secret. 10. Do not knowingly pump someone for information that could sacrifice that person’s job or reputation. Source: Fuld and Company
  • 31. Dr Elijah Ezendu is Award-Winning Business Expert & Certified Management Consultant with expertise in Interim Management, Strategy, Competitive Intelligence, Transformation, Restructuring, Turnaround Management, Business Development, Marketing, Project & Cost Management, Leadership, HR, CSR, e-Business & Software Architecture. He had functioned as Founder, Initiative for Sustainable Business Equity; Chairman of Board, Charisma Broadcast Film Academy; Group Chief Operating Officer, Idova Group; CEO, Rubiini (UAE); Special Advisor, RTEAN; Director, MMNA Investments; Chair, Int’l Board of GCC Business Council (UAE); Senior Partner, Shevach Consulting; Chairman (Certification & Training), Coordinator (Board of Fellows), Lead Assessor & Governing Council Member, Institute of Management Consultants, Nigeria; Lead Resource, Centre for Competitive Intelligence Development; Lead Consultant/ Partner, JK Michaels; Turnaround Project Director, Consolidated Business Holdings Limited; Technical Director, Gestalt; Chief Operating Officer, Rohan Group; Executive Director (Various Roles), Fortuna, Gambia & Malta; Chief Advisor/ Partner, D & E; Vice Chairman of Board, Refined Shipping; Director of Programmes & Governing Council Member, Institute of Business Development, Nigeria; Member of TDD Committee, International Association of Software Architects, USA; Member of Strategic Planning and Implementation Committee, Chartered Institute of Personnel Management of Nigeria; Country Manager (Nigeria) & Adjunct Faculty (MBA Programme), Regent Business School, South Africa; Adjunct Faculty (MBA Programme), Ladoke Akintola University of Technology; Editor-in-Chief, Cost Management Journal; Council Member, Institute of Internal Auditors of Nigeria; Member, Board of Directors (Several Organizations). He holds Doctoral Degree in Management, Master of Business Administration and Fellow of Professional Institutes in North America, UK & Nigeria. He is Innovator of Corporate Investment Structure Based on Financials and Intangibles, for valuation highlighting intangible contributions of host communities and ecological environment: A model celebrated globally as remedy for unmitigated depreciation of ecological capital and developmental deprivation of host communities. He had served as Examiner to Professional