article thumbnail

First Steps to a Competitive Intelligence function

Chartered Management Institute

You may be interested in Competitive Intelligence, already have a function or you may be thinking about setting up some sort of Competitive Intelligence (CI) operation within your company. What do you need to do to set up a Competitive Intelligence function.

article thumbnail

Companies Collect Competitive Intelligence, but Don’t Use It

Harvard Business Review

The second requirement is to anticipate response to your competitive moves so that they are not derailed by unexpected reactions. In my experience, the competitive perspective is almost always the least important aspect in managerial decision-making. This competitive intelligence sign-off is simple to institutionalize.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Are Apple’s Patent Wars a Marketing Strategy?

Harvard Business Review

Often, managers think about patent litigation as a “narrow” strategy to protect a particular technology against a specific infringer. The Apple-Samsung battle shows that patent litigation can be a much broader and powerful strategy. The real enemy of Apple is Google, whose Android operating system runs on Samsung’s phones.

article thumbnail

Viral By Design: Teams in the Networked World

Harvard Business Review

Common Operating Pictures. Now you can line them all up, from social media, consumer insights, competitive intelligence, marketplace measurement, sales, and distribution. Transforming effects to results requires strategy, management, and even more collaboration. Yes, you can download an app for that! That's by design.

Team 13
article thumbnail

Cyber Security in the Internet of Things

Harvard Business Review

In particular, expect it to challenge your conception of cybersecurity and your ability to deliver it in IoT-enabled digital networks, your commercial operations, and your partner ecosystems. The IoT will demand another round of risk management strategy review, new network security evaluation tools, and business model revisions.