Home Page Icon
Home Page
Table of Contents for
Summary of Volume 2
Close
Summary of Volume 2
by Philippe Clerc, Alain Juillet, Henri Dou
Strategic Intelligence for the Future 1
Cover
Preface
Introduction
1 For a New Strategic and Competitive Intelligence
1.1. Our assessment
1.2. The present day
1.3. Tomorrow
1.4. Conclusion
1.5. References
2 Geopolitics and Strategic Intelligence
2.1. Principles of analysis
2.2. The evolving world
2.3. A changing world
2.4. Increased risks
2.5. Conclusion
2.6. References
3 Competitive Intelligence Schools Across the World: Foundations, Influence and Perspectives
3.1. Introduction: what is the competitive intelligence school?
3.2. Visions that inspire schools of thought
3.3. The advent of the competitive intelligence schools
3.4. The “nourishing disciplines” of competitive intelligence and communities of public/private practice
3.5. Conclusion
3.6. References
4 Competitive Intelligence as a Vehicle for International Collaboration
4.1. The arrival of new signs
4.2. Increasing instability
4.3. The French example
4.4. Collaboration
4.5. Conclusion
4.6. References
5 Regional Competitive Intelligence
5.1. What do we mean by territories?
5.2. A typology of territories
5.3. Definition of territorial intelligence
5.4. The challenges of territorial intelligence
5.5. Rethinking our intelligence capabilities in territorial situations
5.6. The intelligence of situations
5.7. The main areas of intervention of this competitive intelligence and regional strategic facility or organization
5.8. The generic configuration of the facility
5.9. Strategic management approach: mapping and analysis tools
5.10. Operational implementation
5.11. Conclusion
5.12. References
6 Influence
6.1. The current foundations of influence
6.2. Who is going to communicate?
6.3. Knowledge of the target and information
6.4. Rumors
6.5. The “media sounding board”
6.6. Cultural or public diplomacy
6.7. Positive influence
6.8. Conclusion
6.9. References
7 Sphere of Influence
7.1. The return of geopolitics in the economic field
7.2. Power strategy and influence strategy
7.3. The sphere of influence: illustrations
7.4. Conclusion
7.5. References
8 Organizational Intelligence
8.1. Definition
8.2. Organizational intelligence and cognitive pathologies
8.3. An example: the US–Japan FSX Fighter program or “thinking out of the silos”
8.4. Organizational intelligence and strategies
8.5. Collective intelligence and organization of sensor networks
8.6. Conclusion
8.7. References
9 From Military Intelligence to Competitive Intelligence
9.1. From the military to the economy
9.2. Forms and aims of intelligence
9.3. The practice of intelligence
9.4. Intelligence and its cycle
9.5. Analysis
9.6. The synthesis of information and its dissemination
9.7. Conclusion
9.8. References
Conclusion
C.1. References
Index
Summary of Volume 2
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Index
Next
Next Chapter
Other titles from iSTE in Innovation, Entrepreneurship and Management
Summary of Volume 2
Preface
Introduction
Chapter 1. From Information Metabolism to Economic Intelligence
1.1. Introduction
1.2. Information metabolism according to Timothy Powell
1.3. Let us examine this concept in more detail
1.4. Organizations and human beings
1.4.1. Individuation according to Jung
1.4.2. Individuation according to Simondon
1.5. Change within organizations via the information function and an epigenetic approach
1.6. The zone of proximal development
1.7. Conclusion
1.8. References
Chapter 2. Changing Our Way of Thinking
2.1. Plato’s cave, or the fight against the world of received ideas
2.2. A society without schools
2.3. On the intelligence cycle
2.4. Thinking outside the box and the iron cage
2.4.1. Thinking outside the box
2.4.2. The iron cage
2.5. Holistic thinking
2.6. Lateral thinking
2.7. To unravel Parkinson’s law and received ideas
2.7.1. Parkinson’s law
2.7.2. The cost of received ideas
2.8. The individual and their behavior
2.9. Thinking about the future or a return to future studies
2.9.1. General remarks on future studies
2.9.2. Foresight in business
2.9.3. Regional prospective
2.10. Conclusion
2.11. References
Chapter 3. Innovation
3.1. Some definitions
3.2. The innovation mechanism
3.3. Different types of innovation
3.3.1. The development of innovation
3.4. Restraints on developing innovation
3.5. Science, technology and innovation policies
3.5.1. Innovation systems
3.5.2. A quick comparison between France and Germany
3.5.3. The evolution of innovation policy in the United States
3.5.4. Innovation in Asia
3.5.5. The European Union and innovation
3.5.6. The role of cities in innovation systems
3.6. Public innovation policies in France
3.6.1. Innovation and territories
3.7. Conclusion
3.8. References
Chapter 4. Formal Information Research
4.1. The importance of the time factor in scientific data
4.2. Different information typologies
4.3. Information research
4.4. Research practices: reductionist, holistic
4.4.1. The reductionist approach
4.4.2. The holistic approach
4.4.3. Holistic approach and meta-information or metadata
4.5. On scientific journals
4.6. Conclusion
4.7. References
Chapter 5. Examples of Bibliometric Analysis of Scientific Information and Patents
5.1. Specialist search engines
5.1.1. Carrot
2
5.1.2. Wikimindmap
5.1.3. Newsmap
5.2. Scientific publications
5.2.1. Google Scholar
5.2.2. Access to Google Scholar since PoP (Publish or Perish)
5.2.3. The Web of Science (WoS)
5.2.4. Pubmed
5.3. Information contained in the patents
5.3.1. General remarks on patents
5.3.2. Analyzing patent information
5.4. Text mining from unstructured texts
5.5. Automatic summaries
5.6. Conclusion
5.7. References
Chapter 6. Social Networks
6.1. Different types of social networks
6.2. General remarks on social networks
6.2.1. Why use social networks in a business?
6.2.2. The risks of social networks in a business
6.3. The dangers of social networks
6.4. Minimizing negative influence on social networks
6.5. An example of an international social network: the Confucius Institutes
6.5.1. Public diplomacy and Confucius Institutes
6.5.2. Structuring the network of Confucius Institutes
6.6. Examples of software enabling analysis of social networks
6.6.1. Analyzing tweets
6.6.2. Sentiment mining or opinion mining
6.6.3. A more general approach: analyzing tweets in social networks
6.7. Beyond socialbots and other IT systems, human action: fake news
6.7.1. The fake news dynamic
6.7.2. Beyond publishing online
6.8. You love, you “like”, you click, you evaluate, but beware of “click farms”
6.8.1. Calling Facebook into question?
6.8.2. Click farms
6.8.3. A new type of fake news
6.9. Big Data
6.9.1. The development of Big Data analytics
6.10. Conclusion
6.11. References
Chapter 7. Information and Economic Security
7.1. Security
7.1.1. Physical security
7.1.2. Security, personnel and visitors
7.1.3. Security of immaterial goods
7.2. Disinformation and image management
7.3. Pressure groups and NGOs
7.4. IT security
7.5. Safeguarding data
7.6. Respecting security clearance
7.7. Crisis management
7.8. Conclusion
7.9. References
Conclusion
Index
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset