You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In the years since the first edition, industrial and corporate espionage have not diminished. There has been, however, an increase in awareness about the issues. There are more graduate-level programs in business and in security that are offering courses and training on intelligence gathering in the commercial sector. Training in the protection of confidential documents and materials that forms a part of security certification programs has been updated. With the large amount of outsourcing in the technological sector overseas, information transfer and leakage continues to be a serious problem, and as long as corporations see outsourcing as a way to save money in the short term, dangers will ...
For all interested in the use or manufacture of colours, and in calico printing, bleaching, etc.
None
Cross-cutting analytical chapters explore the emergence and positioning of foresight, approaches and methods, organisational issues, policy transfer and evaluation.
None
This volume covers such topics as business intelligence as a strategic control system, competitive assessment, and intelligence analysis and intelligence collection.
This book aims to identify promising future developmental opportunities and applications for Tech Mining. Specifically, the enclosed contributions will pursue three converging themes: The increasing availability of electronic text data resources relating to Science, Technology and Innovation (ST&I). The multiple methods that are able to treat this data effectively and incorporate means to tap into human expertise and interests. Translating those analyses to provide useful intelligence on likely future developments of particular emerging S&T targets. Tech Mining can be defined as text analyses of ST&I information resources to generate Competitive Technical Intelligence (CTI). It combines bibl...