88:
technologies and ideas, it allows for increased growth. The use of these IT tools like text mining make technology intelligence more efficient and actionable. These tools are very important in planning for technology development by providing frameworks to aid the technology intelligence process. A common tool used is text mining. This tool obtains information from a company's data and analyzes and identifies patterns that will be beneficial to them. The benefit of text mining is that it has a keyword-based morphology analysis that allows you assess the economic and technological value of future technology. Another tool used is Tech-Pioneer. This tool identifies technology opportunities systematically by using a computerized procedure to identify keywords and analyze the architecture and framework of technologies. These tools are mostly used to provide numerous possibilities of future technologies and not necessarily predict the future. These scenarios that the tools provide is pivotal in the technology intelligence process. Scenario planning is also a part of the technology intelligence process. It improves the decision-making process and creates images of how the future might evolve which allows companies to take advantage of opportunities to grow. These scenarios can also identify possible threats.
50:
and businesses to be able to identify emerging technologies in form of opportunities and threats and how this can affect their business. In the past two decades, there has been massive growth in the amount of products and services that technology has produced and this is because it is a lot easier and cheaper to acquire and store data from different sources that can be analyzed and used in different industries. The interest started in 1994 and the technology intelligence process has evolved since then. This process can be used to improve and further the growth of a business because the need to shorten the time lag between data acquisition and decision making is spurring innovations in business intelligence technologies. There are several tools called
67:, there are different stages of the evolution process. The interest started in 1994 with numerous publications on the topic, government efforts to encourage competitive intelligence and the origination of competitive intelligence courses and programs in universities. Then in the 1980s, the work of Michael Porter on strategic management renewed this interest. Between the 1970s and 1980s, a few companies started adopting technology intelligence processes but were not successful. This failure still causes a great uncertainty on how companies can adopt these practices. However, over the past few years, there is still a growing interest in technology intelligence processes.
75:
be easily implemented because they had not adequately planned and were not receptive to recommendations. The technology intelligence processes in this generation were focused on customers in the short term run. Information was collected, analyzed and organized in a controlled manner based on the technology intelligence process of the researcher and this limited the efficiency of the technology intelligence specialists.
79:
grow and take advantage of opportunities. This strengthens the company's learning ability as all necessary parties are involved. This differs from the previous generations as technology intelligence positions have a coordination role and is decentralized. This is the stage that only a few companies have moved to and others are gradually doing the same.
572:
126:
A challenge of technology intelligence is that there isn't much conformity between the analysis generated and the time of the planning. There can also be some difficulties in communication and realization of results. Even when a firm has good technology intelligence, it can be problematic to actually
113:
The planning step involves the company deciding to seize technology-based opportunities. Collecting information involves a number of techniques used to gather insights from data. The third step involves identifying these technological opportunities from the results. The last step involves putting the
70:
The first generation of technology intelligence occurred when there was no long-term strategic framework for
Research and Development (R&D) management. A number of inefficient innovations were created, due to the fact that there wasn't much coordination between the central research department and
117:
Technology
Intelligence is crucial for success in technology based companies. It identifies technology opportunities by generating insights that can affect revenues and profits. It can result in a shift in strategy and improve the quality of a business' products and services. The process also deals
74:
The second generation of technology intelligence tried to strengthen the link between companies and R&D management by offering short term technological needs but this was not enough as the corporate strategy did not offer long term guidance. When it came to emerging technologies, these could not
49:
The
Internet has contributed to the growth of data sources for technology intelligence and this is very important for the advancement of technology intelligence. Technology intelligence gives organizations the ability to be aware of technology threats and opportunities. It is important for companies
54:
and tech-pioneer that make the technology intelligence process actionable and effective. This process consists of 4 steps: organizing the competitive intelligence effort, collecting the information, analyzing the information and disseminating the results. Although this process is very beneficial to
78:
In the third generation of technology intelligence, the corporate and technology management both decide the strategy and content of R&D. The insufficient information about the knowledge of the market in the future is used as an opportunity to introduce long term innovations to help the company
87:
The key to actionable technology is being able to properly implement the use of IT tools to collect and perform analysis on relevant data. The use of open innovation is a good way for businesses to take advantage of technology intelligence. When people within an organization can contribute
71:
their technology needs. Technology monitoring was introduced to the central research department but still, there were errors. The recommendations were not efficient and their presentation was poor and this didn't do much for the resource allocation process.
45:
has defined 'technology intelligence' as "the capture and delivery of technological information as part of the process whereby an organisation develops an awareness of technological threats and opportunities."
38:
identified the exploitation of technology as the most effective foundation for decision making for the complete set of functions within the private and public sectors that determine competitiveness.
63:
Technology intelligence is not new but is more important now that organizations and societies are being disrupted by the shift to an information and networking-based economy. Also known as
42:
332:
Norling, Parry M.; Herring, Jan P.; Rosenkrans, Wayne A.; Stellpflug, Marcia; Kaufman, Stephen B. (September 2000). "Putting
Competitive Technology Intelligence To Work".
23:
opportunities and threats that could affect the future growth and survival of their business. It aims to capture and disseminate the technological information needed for
601:
581:
Vol. 43, No. 5, pp. 23–28, Norling, P. M.; Herring, J. P.; Rosenkrans, W. A.; Stellpflug, M. & Kaufmann, S. B. (2000)
397:
638:
162:
499:
Mietzner, Dana; Reger, Guido (2005). "Advantages and disadvantages of scenario approaches for strategic foresight".
469:
Yoon, B (July 2008). "On the development of a technology intelligence tool for identifying technology opportunity".
200:
55:
organizations, there are some challenges such as communication and interpreting the results the process provides.
578:
228:
Veugelers, Mark; Bury, Jo; Viaene, Stijn (February 2010). "Linking technology intelligence to open innovation".
380:
Savioz, Pascal; Tschirky, Hugo (2004), "Technology
Intelligence System: Benefits and Roles of Top Management",
425:
Lichtenthaler, Eckhard (September 2003). "Third generation management of technology intelligence processes".
201:
A conceptual model for technology intelligence. International
Journal of Technology Intelligence and Planning
628:
575:
Journal of
Engineering and Technology Management,Vol. 21, No. 4, pp. 331–348, Lichtenthaler, E. (2004)
633:
566:
183:
Smith, Esther (1988-05-05). "DoD Unveils
Competitive Tool: Project Socrates Offers Valuable Analysis".
136:
64:
567:
Technology
Intelligence systems: how companies keep track of the latest technological developments
170:
208:
8:
141:
596:
524:
357:
24:
516:
442:
393:
361:
349:
204:
528:
300:
Bergeron, Pierrette; Hiller, Christine A. (2005-02-01). "Competitive intelligence".
160:
Technology intelligence: Identifying threats and opportunities from new technologies
114:
results into action and taking advantage of the knowledge the process has provided.
579:
Putting competitive technology intelligence to work. Research-Technology
Management
551:
508:
478:
434:
385:
345:
341:
309:
271:
241:
237:
35:
166:
118:
with large volumes of data and generates information that humans cannot produce.
27:
and decision making. As technology life cycles shorten and business become more
542:
Brenner, Merrill S. (1996). "Technology intelligence and technology scouting".
482:
512:
622:
520:
446:
389:
353:
438:
313:
276:
259:
573:
Technological change and the technology intelligence process: A case study.
555:
159:
51:
258:
Chaudhuri, Surajit; Dayal, Umeshwar; Narasayya, Vivek (1 August 2011).
100:
Planning, organizing and directing the competitive intelligence effort,
20:
31:
having effective TI capabilities is becoming increasingly important.
28:
211:, Kerr, C. I. V.; Mortara, L.; Phaal, R. & Probert, D. R. (2006)
331:
501:
International Journal of Technology Intelligence and Planning
96:
The technology intelligence process consists of 4 steps:
169:
Mortara, L. and Kerr, C. and Phaal, R. and Probert, D.,
257:
613:
19:
is an activity that enables companies to identify the
382:
Bringing Technology and Innovation into the Boardroom
109:
Disseminating the results of intelligence for action.
302:
Annual Review of Information Science and Technology
227:
127:get the information discovered to decision makers.
260:"An overview of business intelligence technology"
620:
379:
299:
569:, ifM Briefing, University of Cambridge, 2007
498:
424:
597:Technological Forecasting and Social Change
384:, Palgrave Macmillan UK, pp. 220–236,
230:Technological Forecasting and Social Change
275:
541:
58:
621:
494:
492:
464:
462:
460:
458:
456:
182:
468:
420:
418:
416:
414:
412:
410:
408:
375:
373:
371:
327:
325:
323:
295:
293:
291:
289:
287:
253:
251:
223:
221:
219:
217:
196:
194:
103:Collecting intelligence information,
13:
489:
453:
14:
650:
585:
405:
368:
320:
284:
248:
214:
191:
471:Expert Systems with Applications
43:Centre for Technology Management
544:Competitive Intelligence Review
535:
203:Volume 2, Number 1, pp. 73-93.
346:10.1080/08956308.2000.11671377
334:Research-Technology Management
242:10.1016/j.techfore.2009.09.003
176:
153:
1:
147:
121:
17:Technology Intelligence (TI)
7:
639:Business intelligence terms
130:
10:
655:
483:10.1016/j.eswa.2007.06.022
91:
513:10.1504/ijtip.2005.006516
264:Communications of the ACM
390:10.1057/9780230512771_10
137:Competitive intelligence
82:
65:Competitive Intelligence
439:10.1111/1467-9310.00304
314:10.1002/aris.1440360109
277:10.1145/1978542.1978562
171:University of Cambridge
556:10.1002/cir.3880070306
34:In the United States,
185:Washington Technology
59:Historic Development
629:Technology strategy
142:Technology Scouting
106:Analyzing the data,
427:R and D Management
165:2008-04-03 at the
25:strategic planning
634:Business planning
399:978-1-349-43246-2
646:
560:
559:
539:
533:
532:
496:
487:
486:
477:(1–2): 124–135.
466:
451:
450:
422:
403:
402:
377:
366:
365:
329:
318:
317:
297:
282:
281:
279:
255:
246:
245:
225:
212:
198:
189:
188:
180:
174:
157:
36:Project Socrates
654:
653:
649:
648:
647:
645:
644:
643:
619:
618:
588:
563:
540:
536:
497:
490:
467:
454:
423:
406:
400:
378:
369:
330:
321:
298:
285:
256:
249:
226:
215:
199:
192:
181:
177:
167:Wayback Machine
158:
154:
150:
133:
124:
94:
85:
61:
12:
11:
5:
652:
642:
641:
636:
631:
617:
616:
610:
609:
605:
604:
599:
593:
592:
587:
586:External links
584:
583:
582:
576:
570:
562:
561:
534:
488:
452:
433:(4): 361–375.
404:
398:
367:
319:
308:(1): 353–390.
283:
247:
236:(2): 335–343.
213:
190:
175:
151:
149:
146:
145:
144:
139:
132:
129:
123:
120:
111:
110:
107:
104:
101:
93:
90:
84:
81:
60:
57:
9:
6:
4:
3:
2:
651:
640:
637:
635:
632:
630:
627:
626:
624:
615:
612:
611:
607:
606:
603:
600:
598:
595:
594:
590:
589:
580:
577:
574:
571:
568:
565:
564:
557:
553:
549:
545:
538:
530:
526:
522:
518:
514:
510:
506:
502:
495:
493:
484:
480:
476:
472:
465:
463:
461:
459:
457:
448:
444:
440:
436:
432:
428:
421:
419:
417:
415:
413:
411:
409:
401:
395:
391:
387:
383:
376:
374:
372:
363:
359:
355:
351:
347:
343:
339:
335:
328:
326:
324:
315:
311:
307:
303:
296:
294:
292:
290:
288:
278:
273:
269:
265:
261:
254:
252:
243:
239:
235:
231:
224:
222:
220:
218:
210:
206:
202:
197:
195:
186:
179:
172:
168:
164:
161:
156:
152:
143:
140:
138:
135:
134:
128:
119:
115:
108:
105:
102:
99:
98:
97:
89:
80:
76:
72:
68:
66:
56:
53:
47:
44:
39:
37:
32:
30:
26:
22:
21:technological
18:
602:Technovation
550:(3): 20–27.
547:
543:
537:
504:
500:
474:
470:
430:
426:
381:
340:(5): 23–28.
337:
333:
305:
301:
267:
263:
233:
229:
184:
178:
155:
125:
116:
112:
95:
86:
77:
73:
69:
62:
48:
40:
33:
16:
15:
52:text mining
623:Categories
507:(2): 220.
148:References
122:Challenges
29:globalized
521:1740-2832
447:0033-6807
362:150567921
354:0895-6308
270:(8): 88.
209:1740-2832
614:illumin8
608:Products
591:Journals
529:16613397
163:Archived
131:See also
92:Process
527:
519:
445:
396:
360:
352:
207:
173:(2007)
525:S2CID
358:S2CID
83:Tools
517:ISSN
443:ISSN
394:ISBN
350:ISSN
205:ISSN
41:The
552:doi
509:doi
479:doi
435:doi
386:doi
342:doi
310:doi
272:doi
238:doi
625::
546:.
523:.
515:.
503:.
491:^
475:35
473:.
455:^
441:.
431:33
429:.
407:^
392:,
370:^
356:.
348:.
338:43
336:.
322:^
306:36
304:.
286:^
268:54
266:.
262:.
250:^
234:77
232:.
216:^
193:^
558:.
554::
548:7
531:.
511::
505:1
485:.
481::
449:.
437::
388::
364:.
344::
316:.
312::
280:.
274::
244:.
240::
187:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.