Category Archives: CI

News, practices, examples and theory related to competitive intelligence and market intelligence.

Future-Oriented Analytical Models workshop at SLA 2014

Hi, everyone. I’m presenting a workshop “Future-Oriented Analytical Models” at the Special Libraries Association (SLA) conference in Vancouver this June. I’m presenting this workshop to their Information Technology (IT) division and will focus on applying predictive analytical models to cases relevant to an audience focused on IT.

The workshop will focus on IT cases to examine and apply analytical models. Semantic technologies are interesting in this context because semantic technology is likely to change how librarians deliver added value and what that value is. I’d also like to explore the consumerization of IT and what that may mean for the enterprise. I’m open to suggestions about the specific cases related to each question we should examine during the workshop. Are there additional or alternative cases to consider?

STEEP, Porter’s Five Forces and SWOT constitute what I consider the analytical stack; These models describe the macro-environment, the balance of power in an industry and the strengths and weaknesses of each player in that industry. We’ll apply implications wheels to explore the second- and third-order implications of the trends we prioritize in our STEEP analysis. We’ll conclude by applying scenario analysis using two or three of the uncertainties we prioritize from our STEEP analysis. If you know of any other analytical models or methods we should cover please let me know.

Please share any advice or thoughts you have about the plan for the workshop. I’ll also post my updates here from time to time.

What Do We Do About “Peak Intelligence?”

CI colleague and friend Eric Garland wrote a very provocative editorial in the April 2012 edition of The Atlantic entitled “Peak Intel: How So-Called Strategic Intelligence Actually Makes Us Dumber.” This is effectively Eric’s resignation from the field of intelligence along with some very important questions about the value of the intelligence practice in business today. The article is worth a read, and I definitely felt it was worth some commentary. Whether you agree or disagree, it’s worth considering the value competitive and strategic intelligence are delivering in our current environment.

Eric begins his article by telling us that he has observed an “endemic corruption of how decisions are made in our most critical institutions.” He goes on to describe how business decision-makers have become focused on feel-good information that doesn’t challenge their underlying assumptions. Eric says that this preference– nay insistence– on feel-good news has increased since the financial crisis of 2008. An industry has sprung up that feeds in to the executive desire to feel good about the future, executive mastery of their industry and general CYA. These charlatans actually making it harder for those of us who are trying to deliver the real, often uncomfortable intelligence. “Strategic intelligence” firms and many consultancies have become the enablers of senior executives’ addiction to graphs that always move up and to the right.

A tripartite cause for the war on strategic intelligence and emperical insight come in for criticism:

  1. Industry consolidation enabled by cheap capital. It’s intuitive that most mature industries are more concentrated today than they have been in the past. I argue that most industries have a diverse second and third-tier of competitors, there is a tendency towards “too big to fail” market leaders that are given special treatment by central banks, regulators and politicians to maintain their incumbency against market dynamics, disruptive innovation and poor management.
  2. Consolidation has created huge bureaucracies out of once-thriving businesses. The problems of agency in business are well-known, where managers’ and owners’ interests diverge. Firms that have reached this stage do things very differently from smaller, entrepreneurial firms. In these institutions it is better to fail conventionally than to innovate and face risk. Internal politics become the criteria for how decisions are made.
  3. Today’s global economy is driven by policy decision-makers and not by competitive markets. In the wake of 2008 the nation-state has its hands in the economy more than at any time since World War II. I attended a recent session of senior competitive intelligence and strategy executives from diverse industries, and the unanimous top priority for all of the firms represented in that room was regulation. Literally every industry has a set of regulatory and policy priorities that will almost by themselves determine success or failure, or at the very least define the shape of success or failure. The state  of our economy is being decided in Washington, Brussels and Beijing rather than in a competitive market.

Eric finished the editorial with several examples of former clients became frustrated or even enraged when presented with the most basic strategic facts, such as the aging global population or how long it could take for housing prices to regain 2007 levels (if ever). I’ve been here as well, tasked with defending the blatantly obvious against a corporate orthodoxy, only to have decisions put off because “the verdict isn’t in yet” on clearly settled matters of technological disruption or demographic shift.

While I agree with almost everything Eric has to say in his article, he and I diverge  on our personal conclusions about what to do about it:

  • In the last year I’ve moved to a firm where strategic realities are given their day in court. Not all big firms are closed to the value or import of good strategic intelligence. Sometimes you do need to pick your battles.
  • There are smaller firms competing in truly dynamic markets that demand real insight instead of CYA feints at strategic analysis. I’m always happy when I see smaller firms advertising to fill CI positions.
  • Eventually we will see a dramatic scaling back of state intervention into the economy, either at the bond auction or the ballot box. This changeover won’t happen everywhere at the same time, and the transition will be extremely painful to the leading firms in industries that have come to depend on central bank largesse and government intervention, but it will open up a world of opportunity for those small and medium firms to make their marks on their respective industries.

So, what’s your take on “Peak Intelligence?” Do you disagree with the concept entirely? If you agree, where in your career do you see the bright spots? What companies or firms are doing strategic insight the right way to support quality decision making?

As a fun addendum, here is Eric being interviewed about his article on Russia Today. Stick around for the last few seconds because the look on Eric’s face when the anchor has clearly missed the premise of what Eric is trying to convey is really priceless.

How Big Data and the Semantic Web Will Change Competitive Intelligence and Marketing Research

Recently I had the chance to present to the Marketing Research Association corporate practitioners conference. As a competitive intelligence professional, I was particularly interested in how my practice related to marketing research. I also wanted to take a forward-looking perspective, because technology is moving the horizon of where both our practices can deliver value.
View more presentations from August Jackson

SLA Webinar on Using the Internet to Research Private Companies

Today I had the pleasure to talk with the Special Libraries Association‘s Competitive Intelligence Division on tricks and Internet tools to use to research private companies. I always really enjoy presenting to SLA audiences because they are so engaged and tend to teach me new tricks.

Here are the slides from that presentation. I know the CI Division will have replay details shortly. For anyone who has information they would like to add to the discussion or questions they would like to ask please feel free to do so in the Comments to this blog entry.

SLA 2011 Will be a Busy One

Next week is the Special Libraries Association (SLA) annual conference in Philadelphia. SLA is always a great program, and I’m excited to be attending the conference again. I’m looking forward to catching up with my fellow CI professionals in the Competitive Intelligence Division and getting to know the folks from the recently created Taxonomy Division.

Monday night is the Competitive Intelligence Division open house. This year the team from Aurora WDC is sponsoring a Pecha Kucha competition. My topic on creating a professional presence on social media was selected.

I’ll be presenting on using Internet resources to research private companies on Tuesday morning as well.

Inc. Magazine Series on Competitive Intelligence

The April 2011 issue of Inc. Magazine included a series of articles on competitive intelligence by Bill Helm. Helm is a senior writer at the magazine and the former marketing editor of BusinessWeek. For many entrepeneurs this is the first and most detailed view of the deliberate practice of competitive intelligence they will see. Overall the articles are a positive for both for the competitive intelligence practice and entrepreneurs. That said, the series did leave some things to be desired. What I will try to do here is to summarize the series and reflect the good, the bad and the ugly.

Here are the links to the individual articles in the series:

The Good

For many if not most entrepreneurs this will be their introduction to the notion that there is a structured practice of understanding competitive market dynamics. Even for those who are familiar with the practice this is likely to be the most detailed look at the practice. If any press being good press, this series constitutes a win right there. My hope is that entrepreneurs will read this article and realize that they need to make systematic competitive intelligence part of their standard business practice. I hope those same entrepreneurs will follow up with some of the excellent CI resources that are out there.

Helm avoided jargon to make CI accessible to entrepreneurs. CI professionals can fall into the trap of diving too quickly into the details of specific collection or analysis practices. The community that has grown up around the practice can also sometimes be infatuated with the cutting edge of analysis or collection, desirous of expensive tools and is often invested in the narcissism of our minor differences. I know I’ve been guilty of this, and I’ve always tried to correct for this tendency by insisting that every presentation I deliver has to give my audience something new they can take away and try right away at no cost.

The series quotes a number of leading thinkers and figures in the field and mentions SCIP as a professional association for CI professionals. It’s clear that Helm interviewed some of the key people in the field, and this lends legitimacy to the material. Helm also interviews entrepreneurs that have used or conducted CI themselves for great value.

Helm clarifies that it’s best to narrow intelligence requirements at the beginning of the process. AMEN! If entrepreneurs or managers takes only one thing away from this series I hope it is the admonish to not say “I need to know absolutely everything about Company X” but to be laser-focused with their intelligence requirements. If CI customers will remember just this one bit of mindfulness they will save themselves a lot of time, a lot of money and avoid needless frustration. This one piece of advice is the key to getting value from competitive intelligence.

The Bad

Despite the fact that I was pleased to see this series of articles, there were some specific aspects that I didn’t like about the series.

While the series did a good job describing some of the basics of CI as a practice, the collection opportunities described came across as being based on serendipity rather than a systematic and often tedious practice.

Grateful as I am for the admonition to focus on specific needs, the description of the CI practice is over-focused on finding specific pieces of information. The modern CI practice is more about interpretation and analysis of information and data flows rather than uncovering that one hidden gems.

It seems that this series, as with all articles about CI, maintains a sheen of cloak and dagger about the practice. There are numerous mentions of former government, military and law enforcement intelligence types involved in CI. The skill sets are applicable across domains, and many of the best intelligence education opportunities are geared towards these communities. The mark of a good CI professional, though, is their ability to analyze and interpret findings to the world of a profit-making business. A government intelligence background does not guarantee a person will possess these skills.

The Ugly (or “What I Would Have Liked to See”)

Many entrepreneurs who read this series will probably want to learn more about CI. I would have liked to see a brief section on where they could go to find more information and a few of the books they could read to learn more. My top web site candidate is the SCIP web site, a great source in itself and useful jumping off point. While a number of books come to mind as best candidates for your first CI read, Seena Sharp’s Competitive Intelligence Advantage is excellent for an entrepreneur to better understand CI.

I thought the series over-emphasized primary research. Some brief descriptions of basic secondary research would have been a strong addition. Some basics on how to examine a competitor’s web site would have been useful. Maybe the feeling was that this sounds too obvious. As obvious as it is, I’m often surprised how much low-hanging secondary fruit is overlooked. Social media in particular offers some very useful opportunities to easily and inexpensively deliver valuable insight.

It would have also been very valuable to illustrate some of the basic analytical frameworks such as SWOT and Porter’s Five Forces. SWOT is very easy to understand and compile, and when done well quickly summarizes the state of the competitors in a market. I know some in the CI profession look down on SWOT. I still find the framework so readily accessible to be a useful with stakeholders.

Finally I would have also like to have seen greater coverage of the issues of legality and ethics. While the articles hints at some of the questions of legality related to activities like dumpster diving, a whole article is devoted to the subject of eavesdropping at trade shows. Richard Horowitz, one of the CI thought leaders and a practicing attorney referenced in the article has asked the question whether or not CI professionals are obsessed with ethics in past presentations at SCIP conferences and local chapters. I agree with Richard that some organizations apply an overly-strict interpretation of ethics that go far beyond the SCIP Code of Ethics for CI Professionals. However, I do believe that CI practices must be far beyond the standards of behavior laid out in the Economic Espionage Act and guided by SCIP’s code (a policy analysis of the act by Horowitz is here in PDF format).

Ethics and Efficacy of Suggested Practices

Some of the specific practices described in this series create concerns for me that some entrepreneurs may engage in activity that at best runs afoul of ethical standards and at worst may violate the Economic Espionage Act or other laws. These practices include posing as customers, eavesdropping and dumpster diving. To my mind none of these practices constitute ethical or acceptable practices for competitive intelligence professionals.

Posing As Potential Customer

Houston-based Private Investigator J.J. Gradoni is quoted as saying. “I will pose as a potential customer and ask questions about a company’s pricing structure, how fast they ship, turnaround time, number of employees, and so forth. Then I ask for references. I call those people as well.” My interpretation is that this is a wholly unethical practice and very possibly violates some of the specific prohibitions against misrepresentation in the Espionage Act. If any practicing CI professional were exposed engaging in any such behavior I can only hope they would rightly be raked over the coals. Likewise for any executives or managers on whose behalf such a practice were employed.

Dumpster Diving

The series does touch on some examples of the damage to a reputation that can come from having been caught dumpster diving, Toledo-based importer Gary Marck is alleged to have been caught pilfering secrets from his competitor’s trash. The competitor used these stories to besmirch Marck’s reputation. Despite this cautionary tale the article hints that under certain conditions dumpster diving can actually be legal. Perhaps that is true, but my interpretation of SCIP’s ethical standards lead me to question this practice. The thought of rummaging through someone’s trash is absolutely disgusting, but now you know why I have a cross-cutting shredder.

Elicitation

I actually enjoyed some of the basic overview of interview and elicitation. The article illustrates some of the basics of appealing to a target’s self interest and summarizes five types of elicitation targets. Quality elicitation requires a lot of up-front research and is very structured. I was really impressed when we had Catherine Foley of CM2 Limited speak about elicitation at the Washington SCIP chapter in 2009.

Encouraging Staff to Participate in Collection

I agree that the task of collection is shared by everyone in the company, and I believe this works best when each role receives guidance that is specific to their standard activities. This training should also address some of the specific ethical and legal concerns for their collection activities.

Trade Show Eavesdropping

The recommendations to engage in eavesdropping at trade shows is one of the more problematic recommendations of this article series. At least as troubling as the ethics are my concerns I have for the efficacy of eavesdropping as opposed to systematic trade show intelligence. Two very useful sources on trade show intelligence are Conference and Trade Show Intelligence edited by Jonathan Calof and Bonnie Hohhof and The WarRoom Guide to Competitive Intelligence by Steve Shaker and Mark Gembicki.

Get Your Twitter Client Fired Up for the Inaugural Competitive Intelligence Twitter Chat

I’ve written before about how much I enjoy using Twitter at conferences for the back-channel discussion. On April 21st at 5 PM EDT / 2 PM PDT we’ll all have our chance to immerse ourselves in the back-channel discussion without a conference. Along with Sean Campbell and Scott Swigart of Cascade Insights I’ll be hosting the first Competitive Intelligence Twitter chat.

A Twitter chat is a scheduled, semi-structured discussion around a given topic or subject using Twitter. Tweets related to each chat are united by the designated hash tag. For our chat that tag is #cichat. At the designated time run a Twitter search for that hashtag to follow along in the discussion. You can find out more about Twitter chats by reading this article. If you like the concept you can see a schedule of other Twitter chats here.

My Tweetdeck column devoted to #cichat

Our first discussion is going to be about how to move requests for CI support from information-oriented requests to decision support. This is a topic near to my heart because I believe this is a key to maintaining the value that CI can deliver for stakeholders. I’ve written about it here. I interviewed Merrill Brenner on his methods for decision-focused CI on the competitive Intelligence Podcast. After our first Twitter chat our tentative plan is to address another CI topic at that same time every week.

My hope is that #cichat will gain momentum and take on a life of it’s own. Seam, Scott and I will move from being like the expert speakers to being more like producers or facilitators. If there is a topic you would like to see addressed, especially a topic on which you would like to take the lead please feel free to let us know.

Economist’s Briefing on “The Leaky Corporation”

This week’s Economist has an authoritative briefing “The Leaky Corporation” that reflects some of the same trends I illustrated in my recent blog post “Why Wikileaks Doesn’t Matter.” The article reflects the opinion of several experts and studies that provide more detail and authority to the same issues I raised. It is well worth a read.

Why Wikileaks Doesn’t Matter

Wikileaks doesn’t matter in the manner that many of our leaders in government and the corporate world seem to believe. Since the release of several hundred thousand classified documents about the wars in Iraq and Afghanistan there have been a number of efforts to shut the site down or punish those involved:

Activities have come to light recently about “Team Themis” proposing a set of activities to discredit Wikileaks and its supporters to executives at Bank of America. It is believed that Julian Assange has a cache of secret documents and e-mails from a major US bank, generally believed to be Bank of America, that he may release in the event of his arrest or extradition. Team Themis was led by HBGary Federal, an information security firm and also included Palantir Technologies and Berico Technologies. This incident has been covered well by other bloggers, and I will not re-hash the incidents here. If you want more information you can read this excellent summary from CI Law blogger Anne Lee Gibson. Kirby Pleassas of Plessas Expert Networks wrote a thorough and thoughtful analysis of the specific legal and ethical issues related to the Team Themis proposal. Kirby’s post is what got me off the couch to finally write this post.

All of this activity suggests that our corporate and government leaders believe that silencing Wikileaks will bring about an end to the problems and challenges that the organization generates. Quite the contrary, Wikileaks is only relevant of an example of broader trends. The first trend is increasing transparency with which we must all become accustomed. The second is the continuing disintermediation of traditional media as a source of authoritative information and means to disseminate information widely.

Mister Universe

You can't stop the signal.

Radical Transparency: We’re All Naked Now

One would need to be truly oblivious to not have noticed that since the advent of the Internet we are all sharing more about ourselves, whether or not we deliberately choose to do so. We’re all likely aware of how much more we’re sharing with a wider circle on platforms like Facebook, LinkedIn and Twitter. Sometimes we share more than we know or would consciously choose, and there are consequences both positive and negative that come from this sharing.

Companies and government agencies are more transparent today as well:

  • Individual employees are sharing information about their work experience via social networks. In some rare instances this information will be very sensitive. Sometimes this information, placed in the appropriate analytical context, can be far more revealing than anyone would expect. For example, a high-level employee with a lot of Foursquare check-ins at a Starbucks in the distant headquarters city of an industry rival might suggest a possible merger or acquisition.
  • Search engines are making ever-improving search functionality available that reveals information hidden on servers inadvertently connected to the public Internet. We use the “site:” operator on Google to find all kinds of Excel, Powerpoint and PDF documents companies often don’t know they’ve effectively made public.
  • Companies and government agencies continue to increase their reliance on partners, supplies, consultants and contractors. Each one of these interactions moves some corporate information to a more vulnerable environment. Traditionally CI professionals have known to watch the activities of partners and suppliers to predict corporate actions. For example, you might use information from an employee of a strategic parts supplier to estimate the unit production potential of a competitor.
  • It is becoming easier for people without Ph.Ds to perform in-depth analysis of large data sets using readily available tools. Analysis of these data sets reveals activities that might otherwise be considered extremely sensitive. Groups like the Sunlight Foundation are applying this sort of analysis to government data to reveal specific details about government activities.

Everybody Has A Printing Press, Too

It’s self-evident that blogs, Twitter, social networks and the web give each of us a platform to publish information we might not have had otherwise. If you’re not yet convinced of this you can take a look back at my summary of Clay Shirky’s Here Comes Everybody. Better yet, read this fantastic book right now.

There have been a number of corporate and government efforts to shut down Wikileaks and prevent individuals from accessing the information revealed on the site. This has resulted in something of a cat and mouse game of the content being mirrored to multiple sites available from different countries and unique domain name addresses. In this case the mouse has beaten the cat. Wikileaks illustrates just how difficult it can be for government and corporate entities to silence a determined group of technically-savvy users on the global network.

Government and corporate leaders have relied on the ethics and self-interest of traditional journalists to keep some information from seeing an audience. Even the muckiest muckraker might be bribed or threatened with a loss of access presented to the journalist, her editor or publisher.

  • Non-journalists may not be aware of nor feel confined by traditional journalistic standards or ethics. These standards are nebulous enough in professional journalism as it is.
  • Individuals and groups may prioritize resolution of grievances over on-going access. They’re not here to be journalists– they just want the damn potholes fixed.
  • Parties may disseminate information anonymously. While it may be harder than most people think to remain truly anonymous on the Internet it can be done with a little care and application of minimal technical skill.
  • Some groups have outright malicious and destructive intent.
  • Criminal organization could begin to use the publishing of sensitive or classified information for their own ends.

Implications and What To Do

We cannot silence Wikileaks, that much is certain. There are too many mirrors and multiple technical workarounds to keep the information available. Even if we could silence Wikileaks it would not matter in the long run. Already alternative organizations are standing up to continue the mission of increasing transparency. These organizations and sites are only the tip of the spear of the broader trends towards transparency.

So what are we to do? These trends require some fundamental changes in how several corporate functions operate. Here are some specifics I’ve considered. If you have additional examples please feel free to share in the comments.

Human Resources should recognize the need to give employees reasons not to leak. HR along with corporate counsel should strengthen policies to protect and support internal whistleblowers. The bureaucratic imperative has too often been to silence and punish the person who brings problems to senior management’s attention. These are the people who are trying to make positive change inside of the organization– the “good guys” in any sober analysis. If whistleblowers are protected, listened to and their grievances addressed they will be less likely to leak information externally. The first step is to provide the technical means for anonymous reporting of issues and wrong-doings. Managers should be taught how to appropriately handle this kind of information from their direct reports.

Information Security needs to develop a true hierarchy of information protection and increasingly protective means to store and distribute sensitive information. Governments and corporations have erred too far towards trying to protect absolutely everything for the sake of simplicity. The problem with this approach is that operationally critical yet non-sensitive information is treated as top secret. Even low-level employees have to be allowed into the inner sanctum just to do their jobs. Once they’re in there they have access to all kinds of information. Extremely sensitive information needs to have distribution very controlled and be protected through strong measures.

Public Relations may need to move closer to senior management to offer advice on the consequences of the disclosure of certain corporate strategies, policies or plans. PR can be the voice of public perception and skepticism. Organizations will do well to understand that they are judged not by their intentions but by public perception. Many senior officials clearly forget their fallibility in the public eyes. Dennis Kozlowski, anyone?

Greater Transparency and the Competitive Intelligence Professional

Competitive Intelligence professionals are once again faced with a set of trends that will give everyone broader access to the corporate secrets the uncovering of which was once our bread and butter. There was a time when getting your competitor’s annual report made you some kind of CI ninja. This sort of information is now less than a commodity. The secrets and details that once might have only been able to be estimated from considerable primary research and analysis are likely to become more freely available. Once again we will need to move in the direction of excellent analysis and interpretation on the galaxy of information available about our competitors, our industries and the business environment.

Ethics will remain a key concern of the profession, and we must have a conversation about the ethics of using leaked information. We’ve seen examples such as the case of Coke employees trying to sell sensitive documents to Pepsi, where the ethics are very clear. We would all like to believe that in those circumstances we would make the same ethical choice. What are the ethical considerations when a competitor’s information is leaked publicly on a social network or a site such as Wikileaks?

Finally, competitive intelligence can play an educational role in the firm. We should describe our methods and practices to information security to let them know how we can use information that is published and leaked from our competitors to develop our insights. This will help them develop methods and policies to protect the firm’s information. They will not be able to prevent all leaks, so it will be important to minimize the least damaging ones. Some CI groups are already doing something similar to this. As these trends towards transparency progress this may become an important value add of the CI function.

The Competitive Intelligence – IT Interplay

I am currently taking part in a survey of Competitive Intelligence (CI) practitioners by a UK graduate student.  I’ll share more about the survey results once that is complete.  This week the survey included a back-and-forth on the impact of Information Technology (IT) on the effectiveness of the CI team.  While I am a strong proponent of the importance of IT for organizational effectiveness, I was surprised upon reflection that I hadn’t thought about the importance of IT for the effectiveness of CI.  It only makes sense that IT, with its multiplier effect on productivity and communications reach, would contribute (or detract) from the effectiveness of a CI function.  The key attributes that determine this interplay, I believe, are the technical savvy of the CI team (especially the manager) and the enablement mindset of the IT group.

Here is the original survey question that motivated this line of thinking: There could be so much information (data) out there that you have to use technology to filter and aggregate data to help internal clients sort through what they need to read. Also, my thoughts are that technology should be used to capture internal knowledge and disseminate analysis to internal clients. Therefore from your perspective do you believe that leveraging CI as a competitive weapon is dependent on the technology infrastructure that an organisation have? Do you believe the notion that without a technology infrastructure CI data is wasted; thus impacting scenario analysis and competitive advantage?

This was a very interesting question, and this is what motivated my reflection on the topic of the interplay between IT and CI.  Rather than simply conclude that the determining factor is availability of IT, it seems that the CI manager’s ability to get the maximum value from IT was also a critical element.

I’ll apologize in advance that my answer, as written, can be read to reflect the stereotype that tends to equate age inversely with technology savvy.  This is a relationship that is not as simple as generational stereotypes would lead us to believe.  Likewise the tendency to rely or defer to the corporate IT group’s authority on all technology issues is not really directly correlated to the CI manager’s age.

Here is the complete text of my answer on the subject:

An important role for the CI professional to add value is to function as a combination of a human filter and aggregator that also provides historical and industry context for the information that does make it through that filter.  Particularly in circumstances when there is a large volume of data and information, technology can play an important role in the successful execution of this role by the CI professional.

Older professionals tend to be more completely dependent upon the corporate IT function to provide all of the technology tools they will use in the process of doing their job.  These are the CI managers that purchase proprietary CI-specific software packages that purport to simplify the process of information aggregation, analysis, product creation and dissemination.  Often these professionals will rely very heavily on their corporate IT function to install, maintain and train on these custom tools.  The IT staff will not necessarily step up to these expectations,  and often these tools and the support needed to implement and maintain them come at considerable capital and operational expense.  Often technology will be a large part of a CI professionals budget, and these budgets are very often modest.  To the extent that this CI manager sees technology as adding value their ability to leverage that value will be dependent upon the corporate IT function.  Some managers in this situation may decide that technology is not an option that can realistically add value to what they are trying to do.

By comparison, technologically savvy and generally younger CI professionals come to the job with a clear understanding of the functionality that is available from standard tools e.g. Microsoft Office and inexpensive or freely-available hosted solutions e.g. Google Reader.  These professionals will often devote much effort to working around the limitations imposed by the business IT function.   In this paradigm IT’s role can either be an enabler or an obstacle.  In the instances where IT staff is an obstacle, the CI professional must expend effort and budget to work around barriers to use cloud-based services, purchase software or hardware.  In instances where IT is an enabler, technology savvy CI professionals can deliver maximum value for money of technology by leveraging free and low cost solutions as well as engaging with the IT staff for custom or proprietary solutions that will deliver additional value.

As I answered this question a two-by-two matrix became obvious to me based on the technical savvy of the CI professional and also the enablement mindset of the IT staff.  There are really four scenarios for the interplay of CI and IT, and they are as follows:

High Tech Savvy of the CI Professional, High Enablement Mindset of IT Staff

The best of all worlds.  The CI professional is able to leverage the best free and low-cost technologies, and guidance from IT makes sure that this is done in a manner that protects corporate information.  The IT team is also available to support software implementation or custom projects that will deliver additional CI value.  These higher-cost solutions will only be implemented (and hence the costs incurred) when the tech-savvy CI professional can envision and execute to deliver value from these solutions.

High Tech Savvy of the CI Professional, Low Enablement Mindset of IT Staff

In this model the CI professional is able to take advantage of free and low-cost solutions, but incurs risk for themselves and the organization in doing so.  Many of the steps that the CI professional will take to work around obstacles (such as web filters, blocking access to resources, locking down company-owned hardware, etc.) will result in sensitive corporate information placed on key drives, employee-owned equipment and in an unsafe manner in cloud applications.  The CI team will not have any leeway to implement value-added, premium technology solutions.

Low Tech Savvy of the CI Professional, High Enablement Mindset of IT Staff

This is perhaps the scenario that delivers the lowest value for money.  The CI manager will tend to rely on expensive software tools without considering inexpensive means to achieve the same ends.  The IT organization will be able to support these efforts, and often the IT team will be asked to support non-standard applications and actually support the CI team in a highly operational manner.  This comes with great opportunity costs because of the other IT projects that cannot be undertaken or the CI resources that cannot be purchased because of the high-touch support the CI team requires.


Low Tech Savvy of the CI Professional, Low Enablement Mindset of IT Staff

In this scenario the CI team is very limited in their ability to deliver value through manual means only.  In any industry that is even remotely dynamic this scenario cannot stand for long.

Those thoughts are based on quick reflection and some minimal analysis.  I’m interested in hearing what the broader CI community thinks.  A couple of questions bubble to the top for me:

  1. How can CI professionals that might recognize they lack technology savvy address this gap?
  2. What are the most important knowledge and skills of “technology savvy?”
  3. What is the relationship between business risk (usually related to to information security) and cost in IT support for Competitive Intelligence.

I’m interested in reading what you think.  Please share your thoughts in the comments.