Acessibilidade / Reportar erro

Inteligência empresarial: a revolução informacional da ação competitiva

Resumos

Esta pesquisa apresenta o estado da arte da Inteligência Empresarial, discutindo sua imporiãncia no Planejamento Estratégico, Processo Decisório, Implantação de Programas de Qualidade Total e Competitividade. Analisa os diversos arranjos organizacionais necessários e os recursos tecnológicos disponfveis para uma bem-sucedida atividade de Inteligência Empresarial. Destaca a importância das fontes de informações, indicando que é necessário um correto monitoramento das mesmas. Por fim, discute temas mais abrangentes como Implicações Legais e Éticas, diferenças entre Inteligência Empresarial e Espionagem e o papel da Inteligência Empresarial para as Estratégias de Globalização.

Inteligência; Inteligência Empresarial; Planejamento Estratégico; Processo Decisório; Concorrência e Competitividade; Qualidade Total; Mudança Organizacional; Informática; Fontes de Informação; Monitoramento de Ambiente; Ética; Espionagem; Globalização


This survey shows the "State-of-the-art" of Business Intelligence (BI), discussing its importance in Strategic Planning, Decision-Making Process, Total Quality Programs Implementation and Competitiveness. This work analyses several required organizational configurations and available technological resources for a succesful BI activity achievement. Emphasizes the importance of the Information Sources, pointing out that it is vital their correct scanning. At last, broader issues are discussed such as: legal and ethics implications for BI, differences between BI and Espionage and BI role in Globalization Strategies.

Intelligence; Business Intelligence; Strategic Planning; Decision-Making Process; Competition; Competitiveness; Total Quality; Organizational Change; Informatics; Information Sources; Environment Scanning; Ethics; Espionage; Globalization


PESQUISA BIBLIOGRÁFICA

Inteligência empresarial: a revolução informacional da ação competitiva

Arão Sapiro

Professor dos Cursos de Pós-Graduação em Marketing da FAAP e UNIP e do Curso de Graduação em Marketing Internacional da FASP. Mestrando na EAESP/FGV

RESUMO

Esta pesquisa apresenta o estado da arte da Inteligência Empresarial, discutindo sua imporiãncia no Planejamento Estratégico, Processo Decisório, Implantação de Programas de Qualidade Total e Competitividade. Analisa os diversos arranjos organizacionais necessários e os recursos tecnológicos disponfveis para uma bem-sucedida atividade de Inteligência Empresarial. Destaca a importância das fontes de informações, indicando que é necessário um correto monitoramento das mesmas. Por fim, discute temas mais abrangentes como Implicações Legais e Éticas, diferenças entre Inteligência Empresarial e Espionagem e o papel da Inteligência Empresarial para as Estratégias de Globalização.

Palavras-chave: Inteligência, Inteligência Empresarial, Planejamento Estratégico, Processo Decisório, Concorrência e Competitividade, Qualidade Total, Mudança Organizacional, Informática, Fontes de Informação, Monitoramento de Ambiente, Ética, Espionagem, Globalização.

ABSTRACT

This survey shows the "State-of-the-art" of Business Intelligence (BI), discussing its importance in Strategic Planning, Decision-Making Process, Total Quality Programs Implementation and Competitiveness. This work analyses several required organizational configurations and available technological resources for a succesful BI activity achievement. Emphasizes the importance of the Information Sources, pointing out that it is vital their correct scanning. At last, broader issues are discussed such as: legal and ethics implications for BI, differences between BI and Espionage and BI role in Globalization Strategies.

Key words: Intelligence, Business Intelligence, Strategic Planning, Decision-Making Process, Competition, Competitiveness, Total Quality, Organizational Change, Informatics, Information Sources, Environment Scanning, Ethics, Espionage, Globalization.

Texto completo disponível apenas em PDF.

Full text available only in PDF format.

LIVROS

1992

001. COMBS, Richard E.; MOORHEAD, John D. The competitive intelligence handbook. Metuchen: Scarecrow Press. 1992. 187 p,

002. SIGURDSON, Jon; TAGERUD, Yael (eds.). The intelligence corporation: the privatisation of intetligence: a tribute to Stevan Dedijer on his 80th birthday, July 6, 1991. London: Taylor Graharn, 1992. 199 p.

003. STEEPLES, Marion Miles. The corporate guide to the Malcolm Baldrige National Quality Award: proven strategies for building quality into your cruanizatíon. Milwaukee: ASQC Quality Press, 1992. 383 p.

1991

004. BARABBA, Vincent P.; ZALTMAAN, Gerald. Hearing the voice of the market. 1991.

1990

005. *GORDON, Ian. Beat the competition; how to use competitive intelligence to develop winning business strategies. Cambridge: Basil Blackwell, 1990.

006. JAIN, Subhash C. Marketing planning & strategy. 3.ed. Cincinnati: South-Western Pubfishing Co., 1990. 916 p.

007. McGONAGLE JR., John J.; VERA, Carolyn M. Outsmarting the competition; practical approach to finding and using competitive information. Naperville: Sourcebooks, 1990. 388 p.

008. ROUKIS, George S.; CONWAY, Hugh; CHARNOV, Bruce. Global corporate intelligence; opportunities, technologies, and threats in the 1990s. Weslport: Ouorum Bks, 1990. 335 p.

009. SCHWElTZER, James A. Managing information security; administrative, electronic, and legal measures to protect business information 2. ed. Kent: Butterworths, 1990. 197 p.

010. STANAT, Ruth. The intelligent corporation; creating a shared network for information and profit. New York: American Mgt Assn., 1990. 270 p.

011. TOFFLER, Alvin; TOFFLER, Heidi. Powershift: as mudanças do poder. Rio de Janeiro: Hecoro, 1990. 613 p.

012. TYSON, Kirk W.M. Competitor intelligence manual and guide; gathering, analyzing, and using business intelligence. Englewood Cliffs: Prentice-Hall, 1990. 376 p.

1989

013. CAMP, Robert C. Benchmarking; the search for industry best otsctices that lead to superior performance. Milwaukee: ASQC Quality Press, 1989.299 p.

014. DRUCKER, Peter F. The new realities. 1989.

015. PRAYTOR, Frank D. Small tnerketers bible; bssic marketing and advertising intelligence for buslnesses in rummetro merkets. Durango: Rocky Market Res, 1989. 114 p,

016. PRESCOTT, John E. Advances in competitive intelligence. Vienna: Society of Competitor Intelligence Professionals, 1989. 228 p.

1988

017. FIFER, R.M. Beating the competltion: a praticai guide to bench marking. Vienna: Kaiser Associates, 1988.

018. FULD, Leonard M. Monitoring the competition: find out what's really going on over thers. New York: Wiley, 1988 204p.

019. GILAD, B.; GILAD, T. The business intelligence system. New York: American Managemenl Association, 1988.

020. JOHNSON, W. Who's stealing your business? New York: AMACON, 1988.

021. McCARTNEY, Laton. Friend in high places: the bechtel story. New York: Simon & Schuster, 1988.

022. MEYER, H. Real world intelligence. New York: Weidenfeld and Nicolson, 1988.

023. SUTION, H. Competitive intelligence. New York: The Conference Board, Inc, 1988. (Research Report nº 913).

024. VELLA, Carolyn M. & McGONAGLE JR., John J. Improved business planning using competitive intelligence. Westport: Quorum Books, 1988.148 p.

1987

025. PAINE, Lauran. Silicon spies. New York: St. Martin's Press, 1987. 219 p.

1986

026. TYSON, Kirk W.M. Business intelligence: putting it all together. Lombard: Leading Edge Publications, 1986. 270 p.

1985

027. *FULD, Leonard M. Competitor intelligence: how to get it, how to use it. New York: Wiley, 1985.479 p.

028. *PORTER, Michael E. Competitive advantage. New York: Free Press, 1985. 557 p.

1984

029. EELLS, R.; NEHEMKIS, P. Corporate intelligence and espionage: a blueprint for executive decision making. New York: Macmillan Publishing Co., 1984.

030. *SAMMON, William L.; KURLAND, Mark A.; SPITALNIC, Robert. Business competitor intelligence: methods for collection, organising, and using information. New York: Ronald Press, 1984.357 p.

1980

031. *PORTER, Michael E. Competitive strategy: techniques for analysing industries an competitors. New York: Free Press, 1980.396 p.

1979

032. *RATINER, Henrique. Estudos do futuro: introdução à antecipação tecnológica e social. Rio de Janeiro: Fundação Getulio Vargas, 1979. 206 p.

1977

033. *BARRAL, Jean. Espionagem industrial. 3.ed. Rio de Janeiro: Agents, 1977. 201 p.

1974

034. TWISS, B.C. Managing technological innovation. Essex: Longman Group Ltda. 1974.

1969

035. *BERGIER, Jacques. L'espionnage industriel. Paris: Hachette, 1969. 254 p.

1968

036. *WADE, Worth. Contre l'espionnage industriel. Paris: 'Editions d'Organization, 1968. 164 p.

1967

037. WILENKY, H.L. Organizational intelligence. New York: Basic Books, 1967.

1946

038. ZACHARIS, Ellis M. USN, secret mission: the story of an intelligence officer. New York: Putnam, 1946. p. 117-18.

TRABALHO

1992

039. PISERNI, V.C. Informação e sistemas de informações automatizadas em ciência e tecnologia. São Paulo: FEA/USP, 1992. 22 p.

PERIÓDICOS

1993

040. * Barter: fast trading with computers (utilizes Ultra-Trade software). Inc., Boulder, v. 15, n. 3, p. 37, Mar. 1993.

041. Heffernan, Richard J.; Swartwood, Dan T. Trends in competitive intelligence. Security Management, Arlington, v. 37, p. 70-3, Jan. 1993.

042. *MacDonald, Stuart. Nothing either good or bad: industrial espionage and technology transfer. International Journal of Technology Management, v. 8, n. 1/2, p. 95-105, 1993.

043. *McNEILLY, Mark; Gessner, Steve. Business insights: an expert system for strategic analysis. Planning Review, Oxford, v. 21, n. 2, p. 32-33, Mar.lApr. 1993.

044. Smith, Geoffrey N. The French connection (editorial). Financial World, New York, v. 162, p. 6, Feb. 16 1993.

045. To spy or not to spy. Security Management, Arlington, v. 37, p. 13, Jan. 1993.

046. Titch, Steven. AT&T implements multivendor ATM service strategy (AT& T Business Communications Services). Telephony, Overland Park, v. 224, p. 8, Jan. 18 1993.

1992

047. * ALSTER, N. The valley of the soles (industrial espionage operations against Silicon Valley high-tech firms). Forbes, New York, v. 150, n. 10, p. 200-1+, Oct. 261992.

048. * AR MS for Iraq: scandal hits fan (Britain's illegal export of machine tools). The Economist, New York, v. 325, n. 7785, p. 44-5, Nov. 14 1992.

049. BEDI, Hari. Getting your ideas across (exoatriate managers in Asia). Asian Business, New York ,v. 28, p. 4, Aug. 1992.

050. BIRD, Robert J. Security circles (approach to keeping trade secrets hidden). Security Management, Arlington, v. 36, p. 46-7+, Aug. 1992.

051. THE BOOK he read (M. Bellas; H. Myers' Real-world intelligence; Metamorph intelligence retrieval system). Beverage World, Great Neck, v. 111, p. 30, Mar. 1992.

052. THE BRAVE new world of artificial intelligence (mortgage lending). Mortgage Banking, Washington, v. 53, p. 58-61 +, Oct. 1992.

053. *BREMNER, Brian. Fear and trembling among the Kremlin watchers: Sovietologists find demand is plunging for their academic wares. Business Week, Hightstown, n. 3239, p. 17, Jan. 27 1992.

054. *BROWNING, John. Artificial Intelligence. The Economist, New York, v. 322, n. 7750, p. 58+, Mar. 141992. (Supp. )

055. BUSINESS abroad: how not to be an ugly Canadian (business etiquette guidebooks). Canadian Business, Toronto, v. 65, p. 21, oct. 1992.

056. CALHOUN, J. Clear the air with TSCM (technical surveilhance countermeasures survey). Security Management, Arlington, v. 36, p. 54, Sept. 1992.

057. CARROL, J.A. Online intelligence (searching for financial information). CA Magazine, Toronto, v. 125, p. 26-31, Aug. 1992.

058. *CHURBUCK, David C. Learning by example (case-based reasoning). Forbes, New York, v. 149, n. 12, p. 130-1, June 8 1992.

059. *COGHLAN, Jill. The business of technology in Japan: a review of the Japan Technology Database. Database, Weston, v. 15, n. 2, p. 42-6, Apr. 1992.

060. CRONIN, Michael P.; HISE, Phaedra. scouting out the competition. Inc., Boulder, v. 14, p. 79, Aug. 1992.

061. DAVIS, Donald L. OPSEC: not for government use only (corporate operations security). Security Management, Arlington, v. 36, p. 48-9+, Feb.1992.

062. DAVIS, Dwight B. The path to exports: as cold war - era export controls slowly abate, new U.S. policies burden electronics shippers (cover story). Electronic Business, Denver, v. 18, p. 22­4+, Mar. 161992.

063. DOESCHER, William F. Rent-a-diplomat (small companies buy expertise of forme r members of the U.S. foreign service). D&B Reports, New York, v. 41, p. 10-11, Sept./Oct. 1992.

PESQUISA BIBLIOGRÁFICA

064. DOW'S Popoff is CMRA's executive excellence awardee. Chemical & Engineering News, Columbus, v. 70, p. 10, May 4 1992.

065. EYE on intelligence. Security Management, Arlington, v. 36, p. 12, July 1992.

066. FALVEY, Jack. Field intelligence (utilizing sales force feedback). Sales and Marketing Management, Southeastern, v. 144, p. 10+, Nov. 1992.

067. FLEMING, Al. Get smart: U.S. lags behind in corporate espionage. Automotive News, Detroit, p. 20i, Mar. 91992. (supp Insight)

068. *FULD, Leonard M. Achieving total quality through intelligence (Corning's corporate intelligence system). Long Range Planning, Oxford, v. 25,n. 1,p. 109-15, Feb. 1992.

069. _______. Intelligence comes to utilities (using intelligence gathering techniques to enhance competitiveness). Public Utilities Fortnightly, Arlington, v. 130, p. 24+, Nov. 15 1992.

070. GLOBAL warning. Security Management, ArIington, v. 36, p. 14, July 1992.

071. GOODBOE, Michael E. A trained eye will see the spy (teaching employees how to recognize signs of espionage). Security Management, Arlington, v. 36, p. 49+, Apr. 1992.

072. GOODMAN, E.M. The Japanese informationgatherers. Research Technology Management, Lancaster, v. 35, p. 47, July/Aug. 1992.

073. GRIESSER, John W. Experts among uso Business Horizons, Bloomington, V. 35, p. 77-80, May/June 1992.

074. *GROSS, Neil. A Japanese flop that became a launching pad (Fifth Generation Project's tollow-on effort Real-World Computing Project). Business Week, Hightstown, n. 3258, p. 75, June 8 1992.

075. GUPTA, Uma G.; GUPTA, Ashok. Outsourcing the IS functions: is it necessary for your organization? Information Systems Management, Boston, V. 9, p. 44-50, Summer 1992.

076. HANSEN, Michael. Counterespionage techniques that work (safeguarding proprietary lntormation). Security Management, Arlington, V. 36, p. 44+, Sept. 1992.

077. *HARKLEROAD, David H. Competitive intelligence: a new benchmarking tool. Management Review, Saranac Lake, V. 81, n. 10, p. 26-9, Oct. 1992.

078. *HEFFERNAN, Richard J. The role of intelligence in formulating strategy. The Journal of Business Strategy, Boston, V. 13, n. 5, p. 54-60, Sept./Oct. 1992.

079. ________. Who's on the line? (securing proprietary information). Security Management, Arlington, V. 36, p. 59-60, Sept. 1992.

080. HOW to handle an information heist. security Management, Arlington, V. 36, p. 11-12, June 1992.

081. HUMPHRIES, Frank. Essential too for executives (Asia). Asian Business, New York, V. 28, p. 64, Aug. 1992.

082. JONES, A. "CI" versus spy (competitive intelligence). Financial World, New York, V. 161, p. 62-4, Apr. 28 1992.

083. KLEIN, Elizabeth. Thinking machines add new expertise to banking functions: but high cost prevents more widespread use of artificial intelligence. Savings Institutions, Wacker, V. 113, p. 37-8, Feb. 1992.

084. *KODAMA, Fumio. Technology fusion and the new R&D (joint research in Japan). Harvard Business Review, Boston, V. 70, n. 4, p. 70-78, July/Aug.1992.

085. KOKUBO, Atsuro. Japanese competitive intelligence for R&D. Research Technology Management, Lancaster, v. 35, p. 33-4, Jan./Feb. 1992.

086. LEWIS, Richard. Putting sales on the map (using computer-generated maps for planning sales territories). Sales and Marketing Management, Southeastern, V. 144, p. 76-80, Aug. 1992.

087. LINDSTROM, Ann H. Competition spawns new emphasis on corporate G-2. Telephony, Overland Park, V. 223, p. 9+, Nov. 23 1992.

088. McCLENAHEN, John S. A job for CIA? Should the agency focus íts expertise on industries? Industry Week, Cleveland, V. 241, p. 53, May 4 1992.

089. McELROY, J. Business intelligence (SAE show coverage by auto motive companies). Automotive Industries, Radnor, V. 172, p. 5, May 1992.

090. MARTIN, Dave. Luch with (confidentiality, ad agencies and the media). Mediaweek, Brewster, v. 2, p. 12, Oct. 1992.

091. MOCKLER, Robert J. Strategic intelligence systems: competitive intelligence systems to support strategic management decision making. Advanced Management Journal, Vinton, V. 57, p. 4­9, Winter 1992.

092. MURRAY, Kevin D. Espionage 101 - and much more. Security Management, Arlington, V. 36, p. 106-14, July 1992.

093. NAHMIAS, Richard H. Keeping an eye on the competition (insurers' competitive intelligence program). Best's Review (Life/Health Insurance Edition), Oldwick, v. 93, p. 43-4+, July 1992.

094. NECHES, Philip M. Technology frontiers go beyond smaller, faster, better. Business Credit, Columbia, v. 94, p. 16-17, May 1992.

095. NELSON, Charles S. Systems need a customer focus. National Underwriter (Ufe & Health/Financial Services Edition), Cincinnati, V. 96, p. 2+, May 251992.

096. NOTHING personal, this is business (Overseas Security Advisory Council's annual briefing). Security Management, Arlington, v. 60, p. 10, Mar. 1992.

097. PAVLICEK, L. Developing a counter intelligence mind-set. Security Management, Arlington, V. 36, p. 54-6, Apr. 1992.

098. *REHKOP, Barbara L. "Quick-and-dirty" company searches: four options (Dow Jones OuickSearch, Dialog Business Connection Descriptions). Database, Weston, v. 15, n. 6, p. 40-3, Dec.1992.

099. ROSENBERG, Jim. The CIA at RIT (Rochester Institute of Technology's CIA afiliation: implications for the news paper business). Editor & Publisher, The Fourth Estate, New York, V. 125, p. 30-1 +, Jan. 18 1992.

100. *ROTHSCHILD, Michael. How to be a high 10 company (adapting to the information age). Forbes, New York, V. 150, p. 17-18, Dec. 1992. (supp. ASAP)

101. SCHWEITZER, James A. Defining the rníssion (guidelines for information security management and policies). Security Management, Arlington, v. 36, p. 53-4, Feb. 1992.

102. ______. Votre secrets, Monsier? (General Directorate of External Security). Security Management, Arlington, V. 36, p. 35-6, Oct. 1992.

103. TANZER, M. Foiling the new corporate spy (competitive intelligence; cover story). Security Management, Arlington, V. 36, p. 38-42, Sept. 1992.

104. *TEITELBAUM, Richard S. The new race for intelligence. Fortune, New York, v. 126, n. 10, p. 66-68, Nov. 2 1992.

1991

105. ANDERSON, Donald. Letter from the president: a welcome challenge. China Business Review, Washington, V. 18, p. 6, May/June 1991.

106. * ARTIFICIAL intelligence: brain teaser. The Economist, London, V. 320, n. 7720, p. 64-5, Aug.171991.

107. BARLAS, Stephen. Does CIA have role in toreign market research? Marketing News, Chicago, v. 25, p. 2+, Jan. 7 1991.

108. *BARNDT JR., Walter D. Profiling rival decision makers. The Journal of Business Strategy, Boston, v. 12, n. 1, p. 8-11, Jan./Feb. 1991.

109. BAVARIA, Steven. Corporate ethics should start in the boardroom. Business Horizons, Bloomington, V. 34, p. 9-12, Jan./Feb. 1991.

110. BERRY, S.L. Faxpionage! Security Management, Arlington, v. 35, p. 59-60, Apr. 1991.

111. *BIRD, Jane. Let your fingers do the walking. Management Today, London, p. 97-8+, Nov. 1991.

112. *BORRUS, Amy; HOOTS, Charles; BRADY, Rose. Should the CIA start spying for corporate Ameriea? Business Week, Hightstown, n. 3225, p. 52+, Oet. 141991.

113. *BROCKHOFF, Klaus. Competitor technology intelligence in German companies. Industrial Marketing Management, New York, v. 20, n. 2, p. 91-8, May 1991.

114. BYLlNSKY, Gene. DARPA: a big pot of unrestricted money. Fortune, New York, v. 123, p. 65, Spring/Summer 1991.

115. *THE CHALLENGES emerging in the new Europe. Planning Review, Oxford, v. 19, n. 4, p. 1­48, July/Aug. 1991. (Special issue)

116. COMMERCIAL loan credit scoring: keeping score on commercial loans. Bankers Monthly, New York, v. 108, p. 30+, Nov. 1991.

117. COUNTERSPY (selling electronic counterespionage equipment and services). D&B Reports, New York, v. 39, p. 12-13, Jan./Feb. 1991.

118. COVAULT, Craig. Soviet military satellites offered for civilian use (international consortium formed). Aviation Week & Space Technology, Hightstown, v. 134, p. 69, Mar. 25 1991.

119. DROBIS, David R. Taking corporate strategy seriously (competitive intelligence and strategic communication). Public Relations Journal, New York,v.47, p.32+,Aug. 1991.

120. ENEMIES disguised as friends (international security systems symposium and exhibits). Security Management, Arlington, v. 35, p. 13-14, Dec. 1991.

121. EVERETI, Martin; WIESENDANGER, Betsy (eds.). The scoop on snoops (sleuthing at trade shows). Sales and Marketing Management, Southeastern, v. 143, p. 32, Sept. 1991.

122. FLANNERY, Russell. Taiwan companies switch to hi-tech. Asian Business, New York, v. 27, p. 52-4, Apr. 1991.

123. FRENCH spy. Security Management, Arlington,v.35,p. 10, Nov. 1991.

124. FULD, Leonard M. The intelligence process: a management checklist (competitor intelligence). The Canadian Business Review, Ottawa, v. 18, p. 39-42, Summer 1991.

125. * _____ . A recipe for business intelligence success. The Journal of Business Strategy, Boston, v. 12, n. 1, p. 12-17, Jan./Feb. 1991.

126. *GALEN, Michele; WEBER, Joseph; FOREST, Stephanie Anderson. These guys aren't spooks. They're "competitive analysts". Business Week, Hightstown, n. 3225, p. 53, Oct. 14 1991.

127. *GARFIELD, Bob. After this ad, CIA should take pitches undercover (Ebony ad). Advertising Age, Chicago, v. 62, n. 47, p. 54, Nov. 4 1991.

128. GELB, Betsy D. et al. Competitive intelligence: insights from executives. Business Horizons, Bloomington, v. 34, p. 43-7, Jan./Feb. 1991.

129. *GHOSHAL, Sumantra; WESTNEY, D. Eleanor. Organizing competitor analysis systems. Strategic Management Journal, Chichester, v. 12, n. 1, p. 17-31, Jan. 1991.

130. *GIB, André G.; MARGULlES, Robert A. Making competitive intelligence relevant to the user (McDonnell Douglas Corp.). Planning Review, Oxford, v. 19, n. 3, p. 16-22, May/June 1991.

131. *GILAD, Benjamin. U.S. Intelligence system: model for corporate chiefs? (national security intelligence model for corporate intelligence). The Journal of Business Strategy, Boston, v. 12, n. 3, p. 20-5, May/June 1991.

132. GLUCH-RUCYS, Marc; WALKER, Daniel. Underwriting intelligence (IBM and United Guaranty develop artificial intelligence technology). Mortgage Banking, Washington, v. 52, p. 60-6, Dec. 1991.

133. GORDON, Jack. The skilling of America. Training, Minneapolis, v. 28, p. 27-35, Mar. 1991.

134. GRAHAM, S.DA Two levels of managing records and information (tactical and strategic management). The Office, Stamford, v. 114, p. 56-7, Dec.1991.

135. GREENFIELD, David. Fax servers succeed in business by really trying. Data Communications, New York, v. 20, p. 57-60+, June 21 1991.

136. GRUENWALD, George Vou don't have to wallow in garbage to compete (competitive intelligence essential in marketing research). Marketing News, Chicago, v. 25, p. 20, July 22 1991.

137. GURBAXANI, Vijay; WHANG, Seungjin. The impact of information systems an organizations and markets. Communications of the ACM, v. 34, P.59-73, Jan. 1991

138. GURUGÉ, Anura. Open SNA's untimely, unnecessary demise (Advanced Peer-to-Peer Networking specifications turn SNA into a closed, proprietary architecture). Data Communications, New York, v. 20, p. 45-6, Apr. 1991.

139. HAMIT, Francis. Taking on corporate counterintelligence. Security Management, Arlington, v. 35, p. 34-5+, Oct. 1991.

140. HEATHERMAN, Dena J.; KLEINER, Brian H. Training and technology: the future is now. Training and Development, Alexandria, v. 45, p. 49­51 +, Sept. 1991.

141. HELLER, Martin. Al in practice (DEC). Byte, Peterborough, v. 16, n. 1, p. 267-8, Jan. 1991.

142. *HERRING, Jan P Senior management must champion business intelligence programs. The Journal of Business Strategy, Boston, v. 12, n. 5, p. 48-52, Sept./Oct. 1991.

143. HESS, George W. Moving toward intelligent operations: push-button steel production emerges on the horizon as researchers strive to improve sensors and control technology. Iron Age, Southeastern, v. 7, p. 18-20+, Nov. 1991.

144. HOWARD, J.S. Mr. Nice Guy, meet the garbologist (industrial spíes). D&B Reports, New York, v. 39, p. 20-3+, July/Aug. 1991.

145. *INFORMATION technology transtorrns the corporation. Planning Review, Oxford, v. 19, n. 3, p. 4-48, May/June 1991. (Special issue)

146. IS competitor intelligence important to your sales and marketing efforts? Sales and Marketing Management, Southeastern, v. 143, p. 24-5, Sept. 1991.

147. KASTRUD, Ruth G. Artificial intelligence conference-achieving efficiencies through expert systems (Boston). Best's Review (Property/Casualty Insurance Edition), Oldwick, v. 91, p. 97-9, Jan. 1991.

148. LEE, Chris. Followership: the essence of leadership. Training, Minneapolis, v. 28, p. 27-35, Jan. 1991.

149. ON MARKETING research. Marketing News, Chicago, v. 25, p. 1-50, Sept. 2 1991. (Special tssue)

150. MARTIN, Dave. An end must come to staff cutbacks or companies, no matter how brilliant top management is, won't be able to compete. Mediaweek, Brewster, v. 1, p. 16, Aug. 26 1991.

151. MARTIN, Justin. Keeping the lid on (protecting a company's garbage). Across the Board, New York, v. 28, p. 53-5, Oct. 1991.

152. MARTlN, Justin; STEDMAN, Michael J. Still a distant second (American managers lagging behind Japanese competitor intelligence practices). Across the Board, New York, v. 28, p. 42-7, Nov. 1991.

153. *MARTIN, Warren S. et aI. Developing artificial intelligence applications: a srnall business development center case study. The Journal of Small Business Management, Wichita, v. 29, n. 4, p. 28-33, Oct. 1991.

154. *MILLER, Howard W. Information technology: creation or evolution? (evolution of a software system). Journal of Systems Managementa<I>, Cleveland, v. 42, n. 4, p. 23-7, Apr. 1991.

155. MINTZ, James B. Have I got a deal for you (protecting companies against bad-deals). Across the Board, New York, v. 28, p. 56-8, Nov. 1991.

156. *O'BRIEN, Virginia; FULD, Leonard M. Business intelligence and the new Europe. Planning Review, Oxford, v. 19, n. 4, p. 29-34, July/Aug. 1991.

157. *PAINE, Lynn Sharp. Corporate policy and the ethics of competitor intelligence gathering. Journal of Business Ethics, Guelph, v. 10, n. 6, p. 423-36, June 1991.

158. *PRESCOTI, John E.; GIBBONS, Patrick T. Europe '92 provides new impetus for competitive intelligence. The Journal of Business Strategy, Boston, v. 12, n. 6, p. 20-6, Nov./Dec. 1991.

159. *RECOVERY eary warning system (British Steel Distribution's executive information system). Management Today, London, p. 12, Nov.1991.

160. *ROUSH, Gary B. A program for sharing corporate intelligence (Corning). The Journal of Business Strategy, Boston, v. 12, n. 1, p. 4-7, Jan./Feb. 1991.

161. *SAMPER, J. Philip. Senior management commitment: Eastman Kodak's policy on the use of information (market intelligence system). Planning Review, Oxford, v. 19, n. 2, p. 47, Mar.lApr. 1991.

162. *SIMONS, Robert. Strategic orientation and top management attention to control systems. Strategic Management Joumal, Chichester, v. 12, n. 1, p.49-62, Jan. 1991.

163. STEDMAN, Michael J. The business of counterespionage. Across the Board, New Vork, v. 28, p. 45, Nov. 1991.

164. ______. Can the government help? (economic espionage and foreign intelligence). Across the Board, New Vork, V. 28, p. 46, Nov. 1991.

165. _______. Industrial espionage: what you don't know can hurt you. Business and Society Review, Stroudsburg, n. 76, p. 25-32, Winter 1991.

166. ______. Still a distant second (American managers lagging behind Japanese competitor intelligence practices). Across the Board, New Vork, V. 28, p. 42-7, Nov. 1991.

167. SWIFT, Clinton R. Technology outlook (Ieveraging technology investments). Bank Management, Rolling Meadows, V. 67, p. 30-2, Jan. 1991.

168. TUOHY, James C. Competitor intelligence: work smarter technique. Marketing News, Chicago, v. 25, p. 25, Sept. 2 1991.

169. ZAHEDI, Fatemeh. An introduction to neural networks and a comparison with artificial intelligence and expert systems. Interfaces, Providence, V. 21, p. 25-38, Mar./Apr. 1991.

170. *ZELLNER, Wendy; HAGER, Bruce. Dumpster raids? That's not very ladylike, Avon (spying on Mary Kay). Business Week, Hightstown, n. 3197, p. 30, Apr. 1 1991.

171. ZIPPER, Stuart. Automotive electronics (Hewlett-Packard and IBM marketing computer-based test equipment). Electronic News, New Vork, V. 37, p. 15, June 10 1991.

1990

172. *TO AVOID surprises, some go to the library (information sources that provide competitive intelligence). Personnel, Saranac Lake, V. 67, n. 12, p. 10, Dec. 1990.

173. *BERRY, S.L. Faxpionage: a new threat hits Mahogany Row. Management Review, Saranac Lake, V. 79, n. 7, p. 58-60, July 1990.

174. *BERTRAND, Kate. The global spyglass (U.S. marketers seek an edge with competitive intelligence). Business Marketing, Chicago, V. 75, n. 9, p. 52-3+, Sept. 1990.

175. CHOATES, Pat. Political advantage: Japan's compaign for America. Harvard Business Review, Boston, V. 68, n. 5, p. 87-103, Sept.lOct. 1990.

176. *COMBS, Richard; MOORHEAD, John. Competitive intelligence: finding the clues online. Database, Weston, V. 13, n. 5, p. 15-18, Oct. 1990.

177. CRAFT, James A.; FLEISHER, Craig; SCHOENFELD, Gerald. Human resources competitor intelligence: concept, focus, and issues. Human Resource Planning, New Vork, V. 13, n. 4, p. 265-80, 1990.

178. DRUMMOND, James. Résumé for a spy (Parvus Company's G.P. Burke; international intelligence for U.S. corporations). Forbes, New Vork, V. 145, p. 148-9, May 14 1990.

179. *DUGGAN, Patrice; EISENSTODT, Gale. The new face of Japanese espionage (in U.S.). Forbes, New Vork, V. 146, n. 11, p. 96, Nov. 12 1990.

180. FALCONER, Tim. Investigative report: industrial espionage. Canadian Business, Toronto, V. 63, p. 53-5+, Feb. 1990.

181. FULD, Leonard M. Did you hear the one about the oil spots? Marketing News, Chicago, V. 24, p. 30, Sept. 3 1990.

182. GAUTHIER, Mark. Technology intelligence (bank technology). Bankers Monthly, New Vork, V. 107, p. 51, June 1990.

183. GOCHBERG, Howard. Watch new developments and assess their importance. Marketing News, Chicago, V. 24, p. 14, Sept. 171990.

184. HEFFERNAN, Richard J. A little TSCM (technical surveillance countermeasures). Security Management, Arlington, V. 34, p. 35+, Dec. 1990.

185. *HOPPER, Max D. Rattling SABRE - new ways to compete on information. Harvard Business Review, Boston, V. 68, n. 3, p. 118-125, May/June 1990.

186. *HUBER, George P. A theory of the effects of advanced information technologies on organizational design, intelligence, and decision making. The Academy of Management Review, Saranac Lake, V. 15, n. 1, p. 47-71,Jan. 1990.

187. *IACOCCA, Lee A. Is Japan "buying" U.S. politics? Harvard Business Review, Boston, V. 68, n. 6, p. 184+, Nov.lDec. 1990.

188. Is your financial data secure? (panel discussion with Information Security International's CEO G.P. Burke, preso W.H. Jenkins and TA Prugh). Financial Executife, Memstown, V. 6, p. 42-6, Jan./Feb. 1990.

189. JONES, Patrick. When competitors really bug you (industrial espionage). Security Management, Arlington, V. 34, p. 44-7+, Dec. 1990.

190. *KARSEGARD, Olof. MNS: market intelligence for export decisions (Market News Service). Intemational Trade Forum, Geneva, V. 26, n. 2, p. 22-7, Apr./June 1990.

191. *KELL Y, Joe. Nynex. Datamation, Denver, V. 36, n. 12, p. 100-1, June 15 1990. (Datamation 100 Survey)

192. *KOHLI, Ajay K.; JAWORSKI, Bernard J. Market orientation: the construct, research propositions, and managerial implications. Journal of Marketing, Chicago, V. 54, n. 2, p. 1-18, Apr. 1990.

193. LEE, Paula Munier. Keeping Your ear to the ground (competitive intelligence). Small Business Reports, Monterey, V. 15, p. 27-34+, May 1990.

194. LEWIS, Jordan D. Scanning for opportunities (book adaptation from Partnerships for profit). Across the Board, New Vork, V. 27, p. 52-7, May 1990.

195. MARINO, Carolann. The spy who loves you (protecting corporate information). ARMA Records Management Quarterly, Prairie Village, V. 24, p. 24-6, Apr. 1990.

196. MASON, Charles. FBI investigates US Sprint for FTS 2000 espionage. Telephony, Overland Park, V. 218, p. 10, Feb. 26 1990.

197. *MEADOR, Lawrence; MAHLER, Ed. G. Choosing an expert systems game plan. Datamatian, Denver, V. 36, n. 15, p. 64-9, Aug. 1 1990.

198. MENKUS, Belden. Cellular telephone use can be dangerous (auto safety and exposure of confidential and sensitive business information). Modem Office Technology, Cleveland, V. 35, p. 60+, Aug.1990.

199. MILLER, Cyndee. Dialog moves out of the libraries (Dialog Information Services). Marketing News, Chicago, V. 24, p. 20+, July 91990.

200. MORTENSEN, Erik. Accessing information is a growing global asset (corporate intelligence). The Office, Stamford, V. 111, p. 41-2+, Apr. 1990.

201. PARK, C. Whan; SMITH, Daniel C. Product class competitors as sources of innovative marketing strategies. Journal of Consumer Marketing, Denville, V. 7, n. 2, p. 27-38, Spring 1990.

202. READERS favor customer satisfaction research (over competitive intelligence). Marketing News, Chicago, V. 24, p. 4, May 28 1990.

203. SCHLOSSBERG, Howard. Competitive intelIigence pros seek formal role in marketing. Marketing News, Chicago, V. 24, p. 2+, Mar. 5 1990.

204. Vou learn to think like the other guys think (competitive intelligence). Marketing News, Chicago, V. 24, p. 2, Mar. 5 1990.

205. SKYRME, David J. Developing successful marketing intelligence: a case study. Management Decision, Vorkshire, V. 28, n. 1, 1990.

206. SMITH, J. Clarke. A neural network-could it work for you? (financial decision making). Financial Executive, Morristown, v. 6, p. 26-30, May/June 1990.

207. *STEVENS, Robert I. More about dangerous corporate leaks (Iadies' powder rooms). Journal of Systems Management, Cleveland, v. 41, n. 3, p. 42, Mar. 1990.

208. *STRYKER, Charles W. The revolution on your desktop. Business Marketing, Chicago, v. 75, n. 6, p. 96, June 1990.

209. STUDHOLME, Barbara. SDI - The database news section. Database, Denver, v. 13, n. 3, p. 12-3+, June 1990.

210. WHAT role does marketing intelligence play in effective marketing? Management Decision, Yorkshire, v. 28, n. 2, p. 129-34, 1990. (Maximising Eftectiveness issue)

211. *WINTERS, Patricia; FREEMAN, Laurie. Can marketing leaks be plugged? (confidentiality agreements with ad agencies). Advertising Age, Chicago, v. 61, n. 51, p. 53, Dec. 10 1990.

1989

212. BEISWINGER, George L. Intorrnation leaks: how to spot the often overlooked. The Office, Stamford, v. 110, p. 48+, Nov. 1989.

213. BUTLER, Charles W.; CHERREY, John J.; SCHULTZ, Norman O. Talking trash (acquiring competitive intelligence through trash analysis). The Internal Auditor, Altamonte Sprlnqs, v. 46, p. 35-40, Dec. 1989.

214. CARTER, Roy. Careless words cost business (industrial espionage). Accountancy, London, v. 103, p. 158-60, Mar. 1989.

215. *competitive analysis. Planning Review, Oxford, v. 17, n. 3, p. 1-47, May/June 1989. (Special issue)

216. *EISENHART, Tom. Where to go when you need to know (competitive intelligence; special report). Business Marketing, Chicago, v. 74, n. 11, p. 38-40+, Nov. 1989.

217. ENGLADE, Kenneth F. Competitor intelligence comes in from the cold. Across the Board, New York, v. 26, p. 18-25, Apr. 1989.

218. *EWUSI-MENSAH, Kweku. Developing a competitive intelligence system for IT. Long Range Planning, Oxtord, v. 22, n. 5, p. 121-7, Oct. 1989.

219. FAHEY, Liam. Mis-intelligence (analysis of competitor intelligence). Across the Board, New York, v. 26, p. 26-7+, Apr. 1989.

220. FULD, Leonard M. Competitor intelligence: can you plug the leaks? Security Management, Arlington, v. 33, p. 84-7, Aug. 1989.

221. *GILAD, Benjamin. The role of organized competitive intelligence in corporate strategy. The Columbia Journal of World Business, New York, v. 24, n. 4, p. 29-35, Winter 1989.

222. *GROVER, Ronald; WEBER, Joseph; HAMMONDS, Keith H. That's Sam Spade leafing through the ledgers (using private eyes in takeover battles). Business Week, Hightstown, n. 3101, p. 37-8, May 291989.

223. GUIDA, Richard A. The costs of free information (possible amendments to FOIA). The Public Interest, Denville, v. 97, p. 87-95, Fall 1989.

224. GUILLERMIN, Lisa. Export licenses: a national security issue. Security Management, Arlington,v.33,p. 113+, Nov. 1989.

225. HOWARD, James S. Corporate intelligence at your fingertips. D&B Reports, New York, v. 37, p. 26-9+, Sept./Oct. 1989.

226. * KIGHT, Leila K. The search for intelligence on divisions and subsidiaries (competitive intelligence on business units hidden within large corporation). Planning Review, Oxtord, v. 17, n. 3, p. 40-1, May/June 1989.

227. LITHWICK, David. Be on the lookout for corporate spies. Marketing, Toronto, v. 94, p. 37, Oct. 161989.

228. MELLOW, Craig. The best source of competitive intelligence (your sales force). Sales and Marketing Management, Southeastern, v. 141, p. 24-6+, Dec. 1989.

229. NEVER mind MIS; consider M15. Business Month, New York, v. 133, p. 15, Feb. 1989.

230. *PRESCOTT, John E.; SMITH, Daniel C. The largest survey of "leading-edge" competitor intelligence managers. Planning Review, Oxford, v. 17, n. 3, p. 6-13, May/June 1989.

231. RAUTER, Thomas C. Spi versus spy (safeguarding proprietary information program). Security Management, Arlington, v. 33, p. 58+, Feb. 1989.

232. RUBINSTEIN, Ed. Food manufacturers dlscover value of intelligence systems (strategic information systems for marketing). Marketing News, Chicago, v. 23, p. 11-12, May 22 1989.

233. STEELE, J. Michael. Models for managing secrets. Management Science, Providence, v. 35, n. 2, p. 240-8, Feb. 1989.

234. *STEVENS, Robert I. The dangerous corporate world in which we Iive. Joumal of Systems Management, Cleveland, v. 40, n. 5, p. 42, May 1989.

235. SUTION, Howard. Competitive intelligence: keep tabs on the competition. Marketing Communications, New York, v . 14, p. 42-5, Jan. 1989.

1988

236. * AEH, Richard K. Knowledge systems in business and industry. Journal of Systems Management, Cleveland, v. 39, n. 11, p. 7-9, Nov. 1988.

237. * ATIANASIO, Dominick B. The multiple benefits of competitor intelligence. The Journal of Business Strategy, Boston, v. 9, n. 3, p. 16-19, May/June 1988.

238. *BENNETI, Steven J.; SNELL, Michael. A corporate spy on your own team (in introducing a new product). Sales and Marketing Management, Southeastern, v. 140, n. 2, p. 60-5, Feb. 1988.

239. THE BUSINESS of business is spying (competitor intelligence). Security Management, Arlington, v. 32, p. 15, July 1988.

240. COMBS, Richard; MOORHEAD, John. The quest for corporate excellence begins with competitive intelligence. Marketing News, Chicago, v. 22, p. 11 +, May 9 1988.

241. COMPETITIVE intelligence eftorts on the rise (tracking competitors and predicting their movements). Marketing Communications, New York, v. 13, p. 8,O ct.

1988.

242. *DRUCKER, Peter F. The coming of the new organization. Harvard Business Review, Boston, v. 88, n. 1, p. 45-53, Jan./Feb. 1988.

243. *DUMAINE, Brian. Corporate spies snoop to conquer (value of competitive intelligence). Fortune, New York, v. 118, n. 11, p. 66-8+, Nov. 7 1988.

244. *EISENHART, Tom. Developing IR intelligence (investor relations). Business Marketing, Chicago,v. 73, n. 1,p.62,Jan. 1988.

245. FULD, Leonard M. How to gather foreign intelligence without leaving home. Marketing News, Chicago, v. 22, p. 24+, Jan. 4 1988.

246. GAUDET, Larry. Mental detectors. Canadian Business, Toronto, v. 61, p. 25-6, Mar. 1988.

247. HENRICKS, Mark. Spying's straitlaced sibling (book review article). Venture, New York, v. 10, n. 10, p. 18, Oct. 1988.

248. *HERRING, Jan P. Building a business intelligence system. The Journal of Business Strategy, Boston, v. 9, n. 3, p. 4-9, May/June 1988.

249. JOHNSTON, H. Russell; VITALE, Michael R. Creating competitive advantage with interorganizational informantion systems. MIS Duarterly, Minneapolis, p. 153-67, June 1988.

250. KOCO, Linda. Who watches the product watchers? (insurers monitor competition). National Underwriter (Life & Health/Financial Services Edition), Cincinnati, v. 92, p. 13+, Feb. 291988.

251. MANGAN, Doreen. None of your secrets are safe. Venture, New York, v. 10, p. 61-2+, Feb. 1988.

252. *MARKETERS turn to competitive intelligence. Business Marketing, Chicago, v. 73, n. 12, p. 23-4, Dec. 1988.

253. MEYER, Herbert E. Marketing intelligence to the boss (marketing intelligence to policy makers). Across the Board, New York, v. 25, p. 6-8, Apr. 1988.

254. MILLER, Cyndee. Intelligence systems: no matter what they're called, they're called essential tor marketers. Marketing News, Chicago, v. 22, p. 2+, May 91988.

255. OLNEY, Claude W. The secret world of the industrial spy, Business and Society Review, Boston, n. 64, p. 28-32, Winter 1988.

256. PELL, Eve. Friend or FOIA? (Freedom of information Act). Venture, New York, v. 10, p. 48­51, Aug. 1988.

257. PETERS, Tom. Restorms american competitiveness. The Academy of Management Executive, p. 103-109, May 1988.

258. PREBLE, J.F.; Rao, P.A.; Reichel, A. The environmental scanning practices of U.S. multinationals in the late 1980s. International Management Review, v. 28, p. 4-14, 1988.

259. PSSSSST! (Do you want to know a secret?) (commercial intelligence). Inc., Boulder, v. 10, Nov. 1988. (supp, Small Business)

260. *SACKETT, Samuel J. Computers, customer communications and the need tor human intelligence. Computers and People, Newtonville, v. 37, n. 1, p. 18-23, Jan./Feb. 1988.

261. SPYING on competitors. Electrical World, Hightstown, v. 202, p. 23, Nov. 1988.

1987

262. *BALL, Richard. Assessing your competitor's people and organization. Long Range Planning, Oxlord, v. 20, n. 2, p. 32-41, 1987.

263. *BERTRAND, Kate. Sales sleuths tap customer grapevine (use of sales representatives in gathering inlormation about the competition). Business Marketing, Chicago, v. 72, n. 8, p. 40, Aug. 1987.

264. CHADBOURNE, Robert D. Industrial espionage. Supervision, Burlington, v. 49, p. 14-17, Apr.1987.

265. CIA points to Soviet chamber of commerce in technology diversion. Research & Development, Denver, v. 29, p. 46+, Aug. 1987.

266. CROSS, Allan J. Say I do to proposal security (protecting proprietary information). Security Management, Arlington, v. 31, p. 71-3, Mar. 1987.

267. ENGEL, Alan K. Number on in competitor intelligence (Japanese access to business inlormation). Across the Board, New York, v. 24, p. 43-7, Dec. 1987.

268. *GORDON, William Larry; KEY, Jeffrey R. Artificial intelligence in support of small business information needs. Journal of Systems Management, Cleveland, v. 38, n. 1, p. 24-8, Jan. 1987.

269. *HAMMER, Michael; MANGURIAN, Glenn E. The changing value of communication technology. Sloan Management Review, Cambridge, v. 28, n. 2, p. 65-71, Winter 1987.

270. JONES, Kirk. Technology: intelligent computers for business needs. Financial Executive, Morristown, v. 3, n. 5, p. 13-15, Sept./Oct. 1987.

271. JONES, Robert R. Industrial espionage: stolen Kevex window points to industrial espionage (Amray microscope). Research & Development, Denver, v. 29, p. 46-7, Apr. 1987.

272. McAWARD, Jeremiah. Byte-ing the hand (electronic theft). Personnel Administrator, Alexandria, v. 32, p. 37-8, Feb. 1987.

273. *McGRANE, James M. Going on-Iine for planning and competitive intelligence. Management Review, New York, v. 76, n. 10, p. 55-6, Oct. 1987.

274. MICHAELSON, Gerald A. Control your information belore it controls you. Marketing News, Chicago, v. 21, p. 30-1, Nov. 6 1987.

275. PATTAKOS, Arion N. Sneaky people. Security Management, Arlington, v. 31, p. 76-8, June 1987.

276. *PRESCOTT, John E.; SMITH, Daniel C. A project-based approach to competitive analysis (compared to comprehensive competitive intelligence systems). Strategic Management Journal, Chichester, v. 8, n. 5, p. 411-23, Sept./Oct. 1987.

277. REDDICK, Steve. Keeping your secrets (voice encryption). Security Management, Arlington, v. 31, p. 71-7, Feb. 1987.

278. SENATE report warns of Soviet penetration of U.S. R&D industry. Research & Development, Denver, v. 29, p. 52, Jan. 1987.

279. *SMITH, Daniel C.; PRESCOTT, Jonh E. Demystifying competitive analysis, Planning Review, Oxford (USA), v. 15, n. 5, p. 8-13, Sept./Oct. 1987.

280. SURVEY uncovers ideal intelligence gatherer. Marketing News, Chicago, v. 21, p. 11 +, Jan. 21987.

281. *TUCKER, F.G.; ZIVAN, S.M.; CAMP, R.C. How to measure yoursell against the best. Harvard Business Review, Boston, v. 65, n. 1, p. 8­10+, Jan./Feb. 1987.

282. WICK, Allan. When's the time to sweep out the bugs? (electronic countermeasures). Security Management, Arlington, v. 31, p. 138+, Aug. 1987.

1986

283. *BEHOF, Kathleen. The right way to snoop on the competition. Sales and Marketing Management, Southeastern, v. 136, n. 7, p. 46-8, May 1986.

284. *THE BIG peep. The Economist, London, v. 298, n. 7431, p. 80-1, Feb. 1 1986.

285. BISHOP, Willard R. Competitive intelligence: getting personal with shoppers. Progressive Grocer, Stamlord, v. 65, p. 135, Mar. 1986.

286. BRANDENBERG, Mary. Are your premises clean and free of bugs? Accountancy, London, v. 98, p. 66-7, July 1986.

287. CARTER, Roy. Management accountability and corporate security. Administrative Management, New York, v. 47, p. 52-3, June 1986.

288. CHRISTIE, Bert. Closing the door on electronic espionage (RF-shielded rooms). Security Management, Arlington, v. 30, p. 65-6, Nov. 1986.

289. COMER, Mike. Thieves steal when they get an opportunity. Accountancy, London, v. 98, p. 70-2, July 1986.

290. COMPANY sees benelits in centralizing its system of competitor intelligence (Motorola's strategic information system). Marketing News, Chicago, v. 20, p. 39, Sept. 12 1986.

291. EPA's aerial scrutiny of Dow plant held legal (Supreme Court decision). Chemical & Engineering News, Columbus, v. 64, p. 5, May 261986.

292. FULD, Leonard M. Don't confuse corporate intelligence with I spy. Marketing News, Chicago, v. 20, p. 38+, Sept. 12 1986.

293. *GHOSHAL, Sumantra; KIM, Seok Ki. Building effective intelligence systems for competitive advantage. Sloan Management Review, Knoxville, v. 28, n. 1, p. 49-58, Fali 1986.

294. *GILAD, Tamar; GILAD, Benjamin. Business intelligence - the quiet revolution. Sloan Management Review, Knoxville, v. 27, n. 4, p. 53-61, Summer 1986.

295. GORDON, Ian. Exit "marketing concept" enter "competitive concept" (competitive intelligence). Business Quarterly, London, v. 51, n. 2, p. 28-32, Summer 1986.

296. HOW to lind business intelligence in Washington . 8th ed reviewed by Copler, Judith A. Online, Weston, v. 10, p. 110-11, Nov. 1986. (Book Review)

297. *HYDE, Charles K. Undercover and underground: labor spies and mine management in the early twentieth century (Quincy Mining Company). Business History Review, Boston, v. 60, n. 1, p. 1-27, Spring 1986.

298. *KAPP, Sue. Gunning for nº 1 (O. Wolkins programs lor collecting competitor inlormation and quality control at GTE Corp.). Business Marketing, Chicago, v. 71, n. 4, p. 12+, Apr. 1986.

299. LASDEN, Martin. MIS/DP espionage: the inside story (competitive intelligence gathering on new data processing activities). Computer Decisions, Teaneck, v. 18, p. 66-8+, Apr. 8 1986.

300. LI PMAN, And rew D. Let the marketer beware: what Uncle Sam knows is a matter of public record (competitors obtain information under Freedom of Information Act). Telephony, Overland Park, v. 211, p. 48-9, July 7 1986.

301. McCULLOUGH, Robert; WOLVERTON, Lincoln. The competitor intelligence concept applied to power marketing (major industrial energy users). Publie Utilities Fortnightly, Arlington, v. 118, p. 11-17, Sept. 181986.

302. *MILES, Gregory L. Information thieves are now corporate enemy nº 1. Business Week, Hightstown, n. 2944, p. 81-2, May 5 1986.

303. RUSSO, Robert J. Prying eyes: OPSEC can keep your company's plans out of sight (operations security). Security Management, Arlington, v. 30, p. 46-8, June 1986.

304. STUDY: many firms foolish with intelligence funds. Marketing News, Chicago, v. 20, p. 44, Jan. 3 1986.

305. THE VALUE of a visual sighting. Business, Atlanta, v. 36, p. 61, Jan./Mar. 1986.

306. VELLA, Carolyn M.; McGONAGLE, John J. Competitive intelligence: plugging information voids. Mergers & Acquisitions, Philadelphia, v. 21, p. 43-7, July/Aug. 1986.

307. ________. Just call your computer 007 (competitive intelligence; valuable tool in marketing). Bank Marketing, Chicago, v. 18, p. 36+, June 1986.

308. *WILLIS, Rod. Corporate cloaks and daggers. Management Review, Saranac Lake, v. 75, n. 2, p. 41-5, Feb. 1986.

1985

309. BEQUAI, August. The industrial spy: red flags and recourse. Security Management, Arlington, v. 29, p. 93-4, Aug. 1985.

310. * _____ . Management can prevent industrial espionage. SAM Advanced Management Journal, Vinton, v. 50, n. 1, p. 17-19, Winter 1985.

311. *BIRD-dogging the competition. Sales and Marketing Management, Southeastern, v. 135, n. 8, p. 52-3, Dec. 9 1985.

312. BISHOP, Willard R. Competitive intelligence (store formats). Progressive Groeer, Stamford, v. 64, p. 87, Jan. 1985.

313. *BLOTNICK, Srully. Job-hopping (leakage of information through employees who leave for competitive firms). Forbes, New York, v. 135, n. 7, p. 188, Apr. 8 1985.

314. *CASH, J.I.; KONSYNSKI, B.R. Is redraws competitive boundaries. Harvard Business Review, Boston, v. 64, n. 2, p. 134-142, Mar./Apr. 1985.

315. DEVELOPING The right marketing intelligence system. Business, Atlanta, v. 35, p. 56, Oct./Dec. 1985.

316. *DWYER, Paula. The EPA's eye in the sky has companies seeing red (aerial photograph of Dow Chemical's plant). Business Week, Hightstown, n. 2918, p. 35-6, Oct. 28 1985.

317. FRASER, Bruce W. Shark watchers to the rescue (proxy firms identifying raiders). Financial World, New York, v. 154, p. 85-9, Aug. 21/Sept. 3 1985.

318. FULD, Leonard M. Competitive intelligence: it may be right under your (contacts within your own company). Marketing News, Chicago, v. 19, p. 7, Jan. 4 1985.

319. ______. Sizing up the competition. The Canadian Business Review, Ottawa, v. 12, p. 35­7, Summer 1985.

320. GILAD, Benjamin; GILAD, Tamar. Strategic planning: improving the input (business intelligence). Managerial Planning, Oxford, v. 33, p. 10-3+, May/June 1985.

321. *GILAD, Benny; GILAD, Tamar. A systems approach to business intelligence. Business Horizons, Bloomington, V. 28, n. 5, p. 65-70, Sept./Oct. 1985.

322. HARMON, Paul; KING, David. Expert systems; artificial intelligence in business (book review). Training, Minneapolis, v. 22, p. 84, Aug. 1985.

323. *INDUSTRIAL espionage: east-west trade (East Germany has about 1, 000 people assigned to economic espionage in West Germany). The Economist, London, v. 296, n. 7412, p. 72, Sept. 21 1985.

324. THE INTELLIGENCE system: business market example. Marketing News, Chicago, V. 19, p. 22-3, Jan. 4 1985.

325. KAPLAN, Elizabeth. Spotting takeover sharks, Dun's Business Month, New York, V. 125, p. 36-8, Feb. 1985.

326. *KAPSTEIN, Jonathan; FRANCE, Boyd. The West's crackdown on high-tech smuggling starts to pay olf (flow of strategic hardware to Societs). Business Week, Hightstown, n. 2905, p. 64-6, July 29 1985.

327. LaROSA, Sharon M. First look: INVESTEXT the business intelligence database. Online, Weston, V. 9, p. 41-5, Sept. 1985.

328. LEARNING about competition-creatively. Marketing News, Chicago, v. 19, p. 40+, Sept. 13 1985.

329. MAURO, Tony. Federal prying from the sky (EPA's overflights of Dow Chemical plants). Nation's Business, Washington, v. 73, p. 34+, Oct. 1985.

330. *NEWPORT JR., John Paul. The Kremlin's high-tech hit list of U.S. companies. Fortune, New York, v. 112, n. 12, p. 82, Nov. 25 1985.

331. *RHINES, Wally. Artificial intelligence: out of the lab and into business. The Journal of Business Strategy, Boston, v. 6, n. 1, p. 50-7, Summer 1985.

332. *ZINKHAN, George M.; GELB, Betsy D. Competitive intelligence practices of industrial marketers. Industrial Marketing Management, New York,v. 14, n.4, p.269-75, Nov. 1985.

1984

333. ALLING, Philip C. Gathering intelligence for transportation planning. Handling & Shipping Management, V. 25, p. 11, Oct. 1984.

334. ALPERT, William M. What's on tap? The latest poop on industrial espionage (and counterespionage). Barron's, Chicopee, v. 64, p. 30, June 181984.

335. BISHOP, Willard R. Competitive intelligence. Progessive Groeer, Stamford, V. 63, p. 101, Nov. 1984.

336. BRAXTON, Meredith. Symposium examines terrorism, espionage and computer fraudo Risk Management, New York, v. 31, p. 74, Oct. 1984.

337. Chase, Martyn. Spies: you ain't seen nothin' yet (Operation Exodus; export-control violations). Eleetronie Business, Denver, V. 10, p. 76+, Jan. 1984.

338. *Flax, Steven. How to snoop on your competitors. Fortune, New York, V. 109, n. 10, p. 12-7, May 141984.

339. GREENE, Richard. Never mind R&D, how about T&G? (theft of trade secrets). Forbes, New York, V. 134, p. 142, Sept. 241984.

340. JOHNSON, Tim. Is someone bugging you? (countermeasures survey). Security Management, Arlington, v. 28, p. 141-4, Sept. 1984.

341. KOVACH, Jeffrey L. Corporate espionage: competitive intelligence. Industry Week, Cleveland, v. 223, p. 50-3, Nov. 12 1984.

342. *McFARLAN, F. Warren. Information technology changes the way you compete. Harvard Business Review, Boston, V. 62, n. 3, p. 98-103, May/June 1984.

343. *McManus, Kevin. Double edge (competitors using Freedom of Information Act to spy). Forbes, New York, V. 133, n. 12, p. 46+, May 21 1984.

344. *McPherson, Joseph. How to ward off invaders through better use of your eyes and ears. International Management (Europe edition), Berkshire, v. 39, n. 3, p. 28+, Mar. 1984.

345. *MAHER, Philip. Corporate espionage: when market research goes toa far (ethics of information gathering). Business Marketing, Chicago, v. 69, n. 10, p. 50-66, Oct. 1984.

346. * A SPY-catcher on the payroll? (industrial espionage) The Economist, London, V. 291, n. 7346, p. 58, June 16 1984.

347. SPY vs. spy (companies use FOIA to obtain information about competitors). Security Management, Arlington, v. 28, p. 33-4, Aug. 1984.

348. Whalen, Bernie. Report rise in use of J.R. research tactics (J.R. Ewing on TV's Dallas). Marketing News, Chicago, v. 18, p. 1 +, May 25 1984.

1983

349. Eason, Henry. Soviet spies: your firm could be their next target. Natian's Business, Washington, v. 71, p. 22-5, June 1983.

350. *Karrass, Chester L. Spying and bugging. Purchasing, Denver, v. 94, n. 7, p. 35, Apr. 14 1983.

351. McLellan, Vin. Friday the 13th (W. Erdman, IBM executive, asked for meeting with M. Alpert of Tecman). Inc., Boulder, v. 5, p. 109-12+, Del. 1983.

352. Mino, Hokaji. Social misfit becomes easy ploy for Soviet agents (industrial espionage case against Hitachi Ltd's executive). Business Japan, New York, v. 28, p. 25-8, Sept. 1983.

353. Mirin, Kathleen. Competitive intelligence. Venture, New York, v. 5, p. 29-30, July 1983.

354. Moad, Jeff. Hitachi admits guilt in trade secrets suit. Electronic News, New York, v. 29, p. 16+, Feb. 141983.

355. ______. IBM settles thefts suit, to police new Hitachi units. Electranic News, New York, V. 29, p. 1+, Oct. 10 1983.

356. *The real punishment for Hitachi. Business Week, Hightstown, n. 2778, p. 19-20, Feb. 21 1983.

357. RUSSELL, Sabin. Government agents raid Fairchil Linear division (seized documents recording testing procedures for ICs). Electronic News, New York, v. 29, p. 1+, Dec. 1983.

358. Schwartz, Lloyd. Hint Hitachi case bared tip of the iceberg (theft of U.S. computer secrets). Electronic News, New York, v. 29, p. supp a, July 181983.

359. *Tinnin, David B. How IBM stung Hitachi. Fortune, New York, V. 107, n. 5, p. 50-6, Mar. 7 1983.

360. * _____ . A school for counterspies (Bad Dldesloe in northern Germany). Fortune, New York, v. 107, n. 11, p. 107, May 30 1983.

361. Whalen, Bernie. Marketing detective reveals competitive-intelligence secrets (Leonard M. Fuld). Marketing News, Chicago, V. 17, p. 1+, Sept. 16 1983.

362. Zipper, Stuart. TI charges Compaq took CPU secrets. Electronic News, New York, v. 29, p. 1 +, Feb. 7 1983.

1982

363. * Arbose, Jules R. How Japan has "won" the peace (interview with Richard Deacon). International Management, Berkshire, v. 37, n. 4, p. 23­4, Apr. 1982.

364. *Computers; throwing the book at industrial spies. Business Week, Hightstown, n. 2759, p. 69+, Del. 4 1982.

365. Court frees 3 in IBM secrets case. Electranic News, New York, V. 28, p. 20, Del. 4 1982.

366. Foreign industrial spies seek vanguard technology in Japan. Business Japan, New York, V. 27,p. 14, Nov. 1982.

367. *Gordon, lan. Competitive intelligence: a key to marketplace survival. Industrial Marketing, Chicago, V. 67, n. 11, p. 69-71+, Nov. 1982.

368. Your survival kit competitive intelligence (Canada). Business Quarterly, London, v.47,p.65-7,Aug.1982.

369. Gross, Laurence H. Intelligence networks replace gimmickry for overseas execs. Business Insurance, Chicago, v. 16, p. 70-1, Nov. 22 1982.

370. *Grossman, Robin. Has Japan's high-tech rivalry gone toa far? Business Week, Hightstown, n. 2746, p. 24, July 5 1982.

371. Howe, Charles L. Industrial espionage: a wolf at industry's door. Data Cammunicatians, New York, V. 11, p. 37-8+, Aug. 1982.

372. IBM chief raps critics of trade secrets scam. Electronic News, New York, V. 28, p. 31, Nov. 1 1982.

373. IBM claims 2 employes gave advice to competitor (Syntrex). Electronic News, New York, V. 28, p. 51, Nov. 29 1982.

374. *IBM pulls the plug on cheap imitators. The Economist, London, V. 284, n. 7247, p. 77-8, July 241982.

375. Inaba, Minoru. Japanese execs deny wrongdoing (IBM documents case). Electronic News, New York, V. 28, p. 21 +, June 28 1982.

376. *Industrial espionage: inscrutable computer scam (Mitsubishi Electric and Hitachi). The Economist, London, v. 283, n. 7243, p. 74, June 26 1982.

377. Japanese computer caper. Dun's Business Manth, New York, V. 120, p. 26, Aug. 1982.

378. *"Japscam" for computer spies. Fortune, New York, V. 106, n. 2, p. 7, July 26 1982.

379. Menkus, Belden. A ten-point program to safeguard against industrial espionage is essential for adequate protection. Administrative Management, New York, v. 43, p. 75, Dec. 1982.

380. Moad, Jeff. PCM Pace seen prod to secrets buy. Electronic News, New York, v. 28, p. 1 +, June 281982.

381. *Moore, Thomas. Industrial espionage at the Harvard B-School (business game). Fortune, New York, V. 106, n. 5, p. 70-2+, Sept. 61982.

382. New "bugs" make spying easier. Business Week, Hightstown, n. 2747, p. 47+, July 121982.

383. *D'REILLY, R.A. Variation in decision-makers use of information sources: the impact of quality and accessibility of information. Academy of Management Journal, Mississippi State, v. 25, n. 4, p. 756-71, 1982.

384. Trifari, John. Lessons to be learned (editorial; Techscam). Mini-Micro Systems, Boston, V. 15,p.97,Aug.1982.

1981

385. THIETART, R.A.; VIVAS, R. Strategic intelligence activity: the management of the sales force as a source of strategic information. Strategic Management Journal, Chichester, V. 2, p. 15-22, 1981.

1980

386. *Gibson, Paul. How the Germans dominate the world chemical industry. Farbes, New York, V. 126, n. 8, p. 155-61+, Del. 131980.

387. *HERSHEY, Robert. Commercial intelligence on a shoestring. Harvard Business Review, Boston, V. 58, n. 5, p. 22-24+, Sept./Dct. 1980.

388. LEAF, Robin. How to pick up tips from your competitors. Director, London, p. 61-62, Feb. 1980.

1979

389. *MONTGOMERY, David B.; WEINBERG, Charles B. Toward strategic intelligence systems. Journal of Marketing, Chicago, v. 43, n. 4, p. 41­52, Fall 1979.

390. *ROTHSCHILD, William E. Competitor analysis: the missing link in strategy. Management Review, New York, V. 68, n. 7, p. 22-28, July 1979.

1978

391. *BYLINSKY, Gene. The Japanese spies in Silicon Valley. Fortune, New York, v. 97, n. 4, p. 74­79, Feb. 27 1978.

392. LEAF, Robin. Learning from your competition. The McKinsey Quarterly, New York, p. 52­60, Spring 1978.

1974

393. *WALL, Jerry L. What the competitor is doing: your need to know. Harvard Business Review, Boston, V. 52, n. 6, p. 22-4+, Nov./Dec. 1974.

1958

394. *CHEYFITZ, Eddie. A new revolution in the U.S. "class structure and labor force". Fortune, New York, V. 57, n. 4, p. 215-16+, Apr. 1958. O

  • 001. COMBS, Richard E.; MOORHEAD, John D. The competitive intelligence handbook. Metuchen: Scarecrow Press. 1992. 187 p,
  • 002. SIGURDSON, Jon; TAGERUD, Yael (eds.). The intelligence corporation: the privatisation of intetligence: a tribute to Stevan Dedijer on his 80th birthday, July 6, 1991. London: Taylor Graharn, 1992. 199 p.
  • 003. STEEPLES, Marion Miles. The corporate guide to the Malcolm Baldrige National Quality Award: proven strategies for building quality into your cruanizatíon. Milwaukee: ASQC Quality Press, 1992. 383 p.
  • 004. BARABBA, Vincent P.; ZALTMAAN, Gerald. Hearing the voice of the market. 1991.
  • 005. *GORDON, Ian. Beat the competition; how to use competitive intelligence to develop winning business strategies. Cambridge: Basil Blackwell, 1990.
  • 006. JAIN, Subhash C. Marketing planning & strategy. 3.ed. Cincinnati: South-Western Pubfishing Co., 1990. 916 p.
  • 007. McGONAGLE JR., John J.; VERA, Carolyn M. Outsmarting the competition; practical approach to finding and using competitive information. Naperville: Sourcebooks, 1990. 388 p.
  • 008 ROUKIS, George S.; CONWAY, Hugh; CHARNOV, Bruce. Global corporate intelligence; opportunities, technologies, and threats in the 1990s. Weslport: Ouorum Bks, 1990. 335 p.
  • 009. SCHWElTZER, James A. Managing information security; administrative, electronic, and legal measures to protect business information 2. ed. Kent: Butterworths, 1990. 197 p.
  • 010. STANAT, Ruth. The intelligent corporation; creating a shared network for information and profit. New York: American Mgt Assn., 1990. 270 p.
  • 011. TOFFLER, Alvin; TOFFLER, Heidi. Powershift: as mudanças do poder. Rio de Janeiro: Hecoro, 1990. 613 p.
  • 012. TYSON, Kirk W.M. Competitor intelligence manual and guide; gathering, analyzing, and using business intelligence. Englewood Cliffs: Prentice-Hall, 1990. 376 p.
  • 013. CAMP, Robert C. Benchmarking; the search for industry best otsctices that lead to superior performance. Milwaukee: ASQC Quality Press, 1989.299 p.
  • 014. DRUCKER, Peter F. The new realities. 1989.
  • 015. PRAYTOR, Frank D. Small tnerketers bible; bssic marketing and advertising intelligence for buslnesses in rummetro merkets. Durango: Rocky Market Res, 1989. 114 p,
  • 016. PRESCOTT, John E. Advances in competitive intelligence. Vienna: Society of Competitor Intelligence Professionals, 1989. 228 p.
  • 017. FIFER, R.M. Beating the competltion: a praticai guide to bench marking. Vienna: Kaiser Associates, 1988.
  • 018. FULD, Leonard M. Monitoring the competition: find out what's really going on over thers. New York: Wiley, 1988 204p.
  • 019. GILAD, B.; GILAD, T. The business intelligence system. New York: American Managemenl Association, 1988.
  • 020. JOHNSON, W. Who's stealing your business? New York: AMACON, 1988.
  • 021. McCARTNEY, Laton. Friend in high places: the bechtel story. New York: Simon & Schuster, 1988.
  • 022. MEYER, H. Real world intelligence. New York: Weidenfeld and Nicolson, 1988.
  • 023. SUTION, H. Competitive intelligence. New York: The Conference Board, Inc, 1988. (Research Report nş 913).
  • 024. VELLA, Carolyn M. & McGONAGLE JR., John J. Improved business planning using competitive intelligence. Westport: Quorum Books, 1988.148 p.
  • 025. PAINE, Lauran. Silicon spies. New York: St. Martin's Press, 1987. 219 p.
  • 026 TYSON, Kirk W.M. Business intelligence: putting it all together. Lombard: Leading Edge Publications, 1986. 270 p.
  • 027. *FULD, Leonard M. Competitor intelligence: how to get it, how to use it. New York: Wiley, 1985.479 p.
  • 028. *PORTER, Michael E. Competitive advantage. New York: Free Press, 1985. 557 p.
  • 029. EELLS, R.; NEHEMKIS, P. Corporate intelligence and espionage: a blueprint for executive decision making. New York: Macmillan Publishing Co., 1984.
  • 030. *SAMMON, William L.; KURLAND, Mark A.; SPITALNIC, Robert. Business competitor intelligence: methods for collection, organising, and using information. New York: Ronald Press, 1984.357 p.
  • 031. *PORTER, Michael E. Competitive strategy: techniques for analysing industries an competitors. New York: Free Press, 1980.396 p.
  • 032. *RATINER, Henrique. Estudos do futuro: introduçăo ŕ antecipaçăo tecnológica e social. Rio de Janeiro: Fundaçăo Getulio Vargas, 1979. 206 p.
  • 033. *BARRAL, Jean. Espionagem industrial. 3.ed. Rio de Janeiro: Agents, 1977. 201 p.
  • 034. TWISS, B.C. Managing technological innovation. Essex: Longman Group Ltda. 1974.
  • 035. *BERGIER, Jacques. L'espionnage industriel. Paris: Hachette, 1969. 254 p.
  • 036. *WADE, Worth. Contre l'espionnage industriel. Paris: 'Editions d'Organization, 1968. 164 p.
  • 037. WILENKY, H.L. Organizational intelligence. New York: Basic Books, 1967.
  • 038. ZACHARIS, Ellis M. USN, secret mission: the story of an intelligence officer. New York: Putnam, 1946. p. 117-18.
  • 039. PISERNI, V.C. Informaçăo e sistemas de informaçőes automatizadas em cięncia e tecnologia Săo Paulo: FEA/USP, 1992. 22 p.
  • 040. * Barter: fast trading with computers (utilizes Ultra-Trade software). Inc., Boulder, v. 15, n. 3, p. 37, Mar. 1993.
  • 042. *MacDonald, Stuart. Nothing either good or bad: industrial espionage and technology transfer. International Journal of Technology Management, v. 8, n. 1/2, p. 95-105, 1993.
  • 043. *McNEILLY, Mark; Gessner, Steve. Business insights: an expert system for strategic analysis. Planning Review, Oxford, v. 21, n. 2, p. 32-33, Mar.lApr. 1993.
  • 044. Smith, Geoffrey N. The French connection (editorial). Financial World, New York, v. 162, p. 6, Feb. 16 1993.
  • 045. To spy or not to spy. Security Management, Arlington, v. 37, p. 13, Jan. 1993.
  • 046. Titch, Steven. AT&T implements multivendor ATM service strategy (AT& T Business Communications Services). Telephony, Overland Park, v. 224, p. 8, Jan. 18 1993.
  • 047. * ALSTER, N. The valley of the soles (industrial espionage operations against Silicon Valley high-tech firms). Forbes, New York, v. 150, n. 10, p. 200-1+, Oct. 261992.
  • 048. * AR MS for Iraq: scandal hits fan (Britain's illegal export of machine tools). The Economist, New York, v. 325, n. 7785, p. 44-5, Nov. 14 1992.
  • 049 BEDI, Hari. Getting your ideas across (exoatriate managers in Asia). Asian Business, New York ,v. 28, p. 4, Aug. 1992.
  • 050. BIRD, Robert J. Security circles (approach to keeping trade secrets hidden). Security Management, Arlington, v. 36, p. 46-7+, Aug. 1992.
  • 051. THE BOOK he read (M. Bellas; H. Myers' Real-world intelligence; Metamorph intelligence retrieval system). Beverage World, Great Neck, v. 111, p. 30, Mar. 1992.
  • 052. THE BRAVE new world of artificial intelligence (mortgage lending). Mortgage Banking, Washington, v. 53, p. 58-61 +, Oct. 1992.
  • 053. *BREMNER, Brian. Fear and trembling among the Kremlin watchers: Sovietologists find demand is plunging for their academic wares. Business Week, Hightstown, n. 3239, p. 17, Jan. 27 1992.
  • 054 *BROWNING, John. Artificial Intelligence. The Economist, New York, v. 322, n. 7750, p. 58+, Mar. 141992. (Supp.
  • 055. BUSINESS abroad: how not to be an ugly Canadian (business etiquette guidebooks). Canadian Business, Toronto, v. 65, p. 21, oct. 1992.
  • 056. CALHOUN, J. Clear the air with TSCM (technical surveilhance countermeasures survey). Security Management, Arlington, v. 36, p. 54, Sept. 1992.
  • 057. CARROL, J.A. Online intelligence (searching for financial information). CA Magazine, Toronto, v. 125, p. 26-31, Aug. 1992.
  • 058. *CHURBUCK, David C. Learning by example (case-based reasoning). Forbes, New York, v. 149, n. 12, p. 130-1, June 8 1992.
  • 059. *COGHLAN, Jill. The business of technology in Japan: a review of the Japan Technology Database. Database, Weston, v. 15, n. 2, p. 42-6, Apr. 1992.
  • 060. CRONIN, Michael P.; HISE, Phaedra. scouting out the competition. Inc., Boulder, v. 14, p. 79, Aug. 1992.
  • 061. DAVIS, Donald L. OPSEC: not for government use only (corporate operations security). Security Management, Arlington, v. 36, p. 48-9+, Feb.1992.
  • 062. DAVIS, Dwight B. The path to exports: as cold war - era export controls slowly abate, new U.S. policies burden electronics shippers (cover story). Electronic Business, Denver, v. 18, p. 224+, Mar. 161992.
  • 063. DOESCHER, William F. Rent-a-diplomat (small companies buy expertise of forme r members of the U.S. foreign service). D&B Reports, New York, v. 41, p. 10-11, Sept./Oct. 1992.
  • 064. DOW'S Popoff is CMRA's executive excellence awardee. Chemical & Engineering News, Columbus, v. 70, p. 10, May 4 1992.
  • 065. EYE on intelligence. Security Management, Arlington, v. 36, p. 12, July 1992.
  • 066. FALVEY, Jack. Field intelligence (utilizing sales force feedback). Sales and Marketing Management, Southeastern, v. 144, p. 10+, Nov. 1992.
  • 067. FLEMING, Al. Get smart: U.S. lags behind in corporate espionage. Automotive News, Detroit, p. 20i, Mar. 91992. (supp Insight)
  • 068. *FULD, Leonard M. Achieving total quality through intelligence (Corning's corporate intelligence system). Long Range Planning, Oxford, v. 25,n. 1,p. 109-15, Feb. 1992.
  • 069. _______. Intelligence comes to utilities (using intelligence gathering techniques to enhance competitiveness). Public Utilities Fortnightly, Arlington, v. 130, p. 24+, Nov. 15 1992.
  • 070. GLOBAL warning. Security Management, ArIington, v. 36, p. 14, July 1992.
  • 071. GOODBOE, Michael E. A trained eye will see the spy (teaching employees how to recognize signs of espionage). Security Management, Arlington, v. 36, p. 49+, Apr. 1992.
  • 072. GOODMAN, E.M. The Japanese informationgatherers. Research Technology Management, Lancaster, v. 35, p. 47, July/Aug. 1992.
  • 073. GRIESSER, John W. Experts among uso Business Horizons, Bloomington, V. 35, p. 77-80, May/June 1992.
  • 074. *GROSS, Neil. A Japanese flop that became a launching pad (Fifth Generation Project's tollow-on effort Real-World Computing Project). Business Week, Hightstown, n. 3258, p. 75, June 8 1992.
  • 075. GUPTA, Uma G.; GUPTA, Ashok. Outsourcing the IS functions: is it necessary for your organization? Information Systems Management, Boston, V. 9, p. 44-50, Summer 1992.
  • 076. HANSEN, Michael. Counterespionage techniques that work (safeguarding proprietary lntormation). Security Management, Arlington, V. 36, p. 44+, Sept. 1992.
  • 077. *HARKLEROAD, David H. Competitive intelligence: a new benchmarking tool. Management Review, Saranac Lake, V. 81, n. 10, p. 26-9, Oct. 1992.
  • 078. *HEFFERNAN, Richard J. The role of intelligence in formulating strategy. The Journal of Business Strategy, Boston, V. 13, n. 5, p. 54-60, Sept./Oct. 1992.
  • 079. ________. Who's on the line? (securing proprietary information). Security Management, Arlington, V. 36, p. 59-60, Sept. 1992.
  • 080. HOW to handle an information heist. security Management, Arlington, V. 36, p. 11-12, June 1992.
  • 081. HUMPHRIES, Frank. Essential too for executives (Asia). Asian Business, New York, V. 28, p. 64, Aug. 1992.
  • 082. JONES, A. "CI" versus spy (competitive intelligence). Financial World, New York, V. 161, p. 62-4, Apr. 28 1992.
  • 083. KLEIN, Elizabeth. Thinking machines add new expertise to banking functions: but high cost prevents more widespread use of artificial intelligence. Savings Institutions, Wacker, V. 113, p. 37-8, Feb. 1992.
  • 084. *KODAMA, Fumio. Technology fusion and the new R&D (joint research in Japan). Harvard Business Review, Boston, V. 70, n. 4, p. 70-78, July/Aug.1992.
  • 085. KOKUBO, Atsuro. Japanese competitive intelligence for R&D. Research Technology Management, Lancaster, v. 35, p. 33-4, Jan./Feb. 1992.
  • 086. LEWIS, Richard. Putting sales on the map (using computer-generated maps for planning sales territories). Sales and Marketing Management, Southeastern, V. 144, p. 76-80, Aug. 1992.
  • 087. LINDSTROM, Ann H. Competition spawns new emphasis on corporate G-2. Telephony, Overland Park, V. 223, p. 9+, Nov. 23 1992.
  • 088. McCLENAHEN, John S. A job for CIA? Should the agency focus íts expertise on industries? Industry Week, Cleveland, V. 241, p. 53, May 4 1992.
  • 089. McELROY, J. Business intelligence (SAE show coverage by auto motive companies). Automotive Industries, Radnor, V. 172, p. 5, May 1992.
  • 090. MARTIN, Dave. Luch with (confidentiality, ad agencies and the media). Mediaweek, Brewster, v. 2, p. 12, Oct. 1992.
  • 091. MOCKLER, Robert J. Strategic intelligence systems: competitive intelligence systems to support strategic management decision making. Advanced Management Journal, Vinton, V. 57, p. 49, Winter 1992.
  • 092. MURRAY, Kevin D. Espionage 101 - and much more. Security Management, Arlington, V. 36, p. 106-14, July 1992.
  • 093. NAHMIAS, Richard H. Keeping an eye on the competition (insurers' competitive intelligence program). Best's Review (Life/Health Insurance Edition), Oldwick, v. 93, p. 43-4+, July 1992.
  • 094. NECHES, Philip M. Technology frontiers go beyond smaller, faster, better. Business Credit, Columbia, v. 94, p. 16-17, May 1992.
  • 095. NELSON, Charles S. Systems need a customer focus. National Underwriter (Ufe & Health/Financial Services Edition), Cincinnati, V. 96, p. 2+, May 251992.
  • 096. NOTHING personal, this is business (Overseas Security Advisory Council's annual briefing). Security Management, Arlington, v. 60, p. 10, Mar. 1992.
  • 097. PAVLICEK, L. Developing a counter intelligence mind-set. Security Management, Arlington, V. 36, p. 54-6, Apr. 1992.
  • 098. *REHKOP, Barbara L. "Quick-and-dirty" company searches: four options (Dow Jones OuickSearch, Dialog Business Connection Descriptions). Database, Weston, v. 15, n. 6, p. 40-3, Dec.1992.
  • 099. ROSENBERG, Jim. The CIA at RIT (Rochester Institute of Technology's CIA afiliation: implications for the news paper business). Editor & Publisher, The Fourth Estate, New York, V. 125, p. 30-1 +, Jan. 18 1992.
  • 100. *ROTHSCHILD, Michael. How to be a high 10 company (adapting to the information age). Forbes, New York, V. 150, p. 17-18, Dec. 1992. (supp. ASAP)
  • 101. SCHWEITZER, James A. Defining the rníssion (guidelines for information security management and policies). Security Management, Arlington, v. 36, p. 53-4, Feb. 1992.
  • 102. ______. Votre secrets, Monsier? (General Directorate of External Security). Security Management, Arlington, V. 36, p. 35-6, Oct. 1992.
  • 103. TANZER, M. Foiling the new corporate spy (competitive intelligence; cover story). Security Management, Arlington, V. 36, p. 38-42, Sept. 1992.
  • 104. *TEITELBAUM, Richard S. The new race for intelligence. Fortune, New York, v. 126, n. 10, p. 66-68, Nov. 2 1992.
  • 105. ANDERSON, Donald. Letter from the president: a welcome challenge. China Business Review, Washington, V. 18, p. 6, May/June 1991.
  • 106. * ARTIFICIAL intelligence: brain teaser. The Economist, London, V. 320, n. 7720, p. 64-5, Aug.171991.
  • 107. BARLAS, Stephen. Does CIA have role in toreign market research? Marketing News, Chicago, v. 25, p. 2+, Jan. 7 1991.
  • 108. *BARNDT JR., Walter D. Profiling rival decision makers. The Journal of Business Strategy, Boston, v. 12, n. 1, p. 8-11, Jan./Feb. 1991.
  • 109. BAVARIA, Steven. Corporate ethics should start in the boardroom. Business Horizons, Bloomington, V. 34, p. 9-12, Jan./Feb. 1991.
  • 110. BERRY, S.L. Faxpionage! Security Management, Arlington, v. 35, p. 59-60, Apr. 1991.
  • 111. *BIRD, Jane. Let your fingers do the walking. Management Today, London, p. 97-8+, Nov. 1991.
  • 112. *BORRUS, Amy; HOOTS, Charles; BRADY, Rose. Should the CIA start spying for corporate Ameriea? Business Week, Hightstown, n. 3225, p. 52+, Oet. 141991.
  • 113. *BROCKHOFF, Klaus. Competitor technology intelligence in German companies. Industrial Marketing Management, New York, v. 20, n. 2, p. 91-8, May 1991.
  • 114. BYLlNSKY, Gene. DARPA: a big pot of unrestricted money. Fortune, New York, v. 123, p. 65, Spring/Summer 1991.
  • 115. *THE CHALLENGES emerging in the new Europe. Planning Review, Oxford, v. 19, n. 4, p. 148, July/Aug. 1991. (Special issue)
  • 116. COMMERCIAL loan credit scoring: keeping score on commercial loans. Bankers Monthly, New York, v. 108, p. 30+, Nov. 1991.
  • 117
    117. COUNTERSPY (selling electronic counterespionage equipment and services). D&B Reports, New York, v. 39, p. 12-13, Jan./Feb. 1991.
  • 118. COVAULT, Craig. Soviet military satellites offered for civilian use (international consortium formed). Aviation Week & Space Technology, Hightstown, v. 134, p. 69, Mar. 25 1991.
  • 119. DROBIS, David R. Taking corporate strategy seriously (competitive intelligence and strategic communication). Public Relations Journal, New York,v.47, p.32+,Aug. 1991.
  • 120. ENEMIES disguised as friends (international security systems symposium and exhibits). Security Management, Arlington, v. 35, p. 13-14, Dec. 1991.
  • 121. EVERETI, Martin; WIESENDANGER, Betsy (eds.). The scoop on snoops (sleuthing at trade shows). Sales and Marketing Management, Southeastern, v. 143, p. 32, Sept. 1991.
  • 122. FLANNERY, Russell. Taiwan companies switch to hi-tech. Asian Business, New York, v. 27, p. 52-4, Apr. 1991.
  • 123. FRENCH spy. Security Management, Arlington,v.35,p. 10, Nov. 1991.
  • 124. FULD, Leonard M. The intelligence process: a management checklist (competitor intelligence). The Canadian Business Review, Ottawa, v. 18, p. 39-42, Summer 1991.
  • 125. * _____ . A recipe for business intelligence success. The Journal of Business Strategy, Boston, v. 12, n. 1, p. 12-17, Jan./Feb. 1991.
  • 126. *GALEN, Michele; WEBER, Joseph; FOREST, Stephanie Anderson. These guys aren't spooks. They're "competitive analysts". Business Week, Hightstown, n. 3225, p. 53, Oct. 14 1991.
  • 127. *GARFIELD, Bob. After this ad, CIA should take pitches undercover (Ebony ad). Advertising Age, Chicago, v. 62, n. 47, p. 54, Nov. 4 1991.
  • 128. GELB, Betsy D. et al. Competitive intelligence: insights from executives. Business Horizons, Bloomington, v. 34, p. 43-7, Jan./Feb. 1991.
  • 129. *GHOSHAL, Sumantra; WESTNEY, D. Eleanor. Organizing competitor analysis systems. Strategic Management Journal, Chichester, v. 12, n. 1, p. 17-31, Jan. 1991.
  • 130. *GIB, André G.; MARGULlES, Robert A. Making competitive intelligence relevant to the user (McDonnell Douglas Corp.). Planning Review, Oxford, v. 19, n. 3, p. 16-22, May/June 1991.
  • 131. *GILAD, Benjamin. U.S. Intelligence system: model for corporate chiefs? (national security intelligence model for corporate intelligence). The Journal of Business Strategy, Boston, v. 12, n. 3, p. 20-5, May/June 1991.
  • 132. GLUCH-RUCYS, Marc; WALKER, Daniel. Underwriting intelligence (IBM and United Guaranty develop artificial intelligence technology). Mortgage Banking, Washington, v. 52, p. 60-6, Dec. 1991.
  • 133. GORDON, Jack. The skilling of America. Training, Minneapolis, v. 28, p. 27-35, Mar. 1991.
  • 134. GRAHAM, S.DA Two levels of managing records and information (tactical and strategic management). The Office, Stamford, v. 114, p. 56-7, Dec.1991.
  • 135. GREENFIELD, David. Fax servers succeed in business by really trying. Data Communications, New York, v. 20, p. 57-60+, June 21 1991.
  • 136. GRUENWALD, George Vou don't have to wallow in garbage to compete (competitive intelligence essential in marketing research). Marketing News, Chicago, v. 25, p. 20, July 22 1991.
  • 137. GURBAXANI, Vijay; WHANG, Seungjin. The impact of information systems an organizations and markets. Communications of the ACM, v. 34, P.59-73, Jan. 1991
  • 138. GURUGÉ, Anura. Open SNA's untimely, unnecessary demise (Advanced Peer-to-Peer Networking specifications turn SNA into a closed, proprietary architecture). Data Communications, New York, v. 20, p. 45-6, Apr. 1991.
  • 139. HAMIT, Francis. Taking on corporate counterintelligence. Security Management, Arlington, v. 35, p. 34-5+, Oct. 1991.
  • 140. HEATHERMAN, Dena J.; KLEINER, Brian H. Training and technology: the future is now. Training and Development, Alexandria, v. 45, p. 4951 +, Sept. 1991.
  • 141. HELLER, Martin. Al in practice (DEC). Byte, Peterborough, v. 16, n. 1, p. 267-8, Jan. 1991.
  • 142. *HERRING, Jan P Senior management must champion business intelligence programs. The Journal of Business Strategy, Boston, v. 12, n. 5, p. 48-52, Sept./Oct. 1991.
  • 143. HESS, George W. Moving toward intelligent operations: push-button steel production emerges on the horizon as researchers strive to improve sensors and control technology. Iron Age, Southeastern, v. 7, p. 18-20+, Nov. 1991.
  • 144. HOWARD, J.S. Mr. Nice Guy, meet the garbologist (industrial spíes). D&B Reports, New York, v. 39, p. 20-3+, July/Aug. 1991.
  • 145. *INFORMATION technology transtorrns the corporation. Planning Review, Oxford, v. 19, n. 3, p. 4-48, May/June 1991. (Special issue)
  • 146
    146. IS competitor intelligence important to your sales and marketing efforts? Sales and Marketing Management, Southeastern, v. 143, p. 24-5, Sept. 1991.
  • 147. KASTRUD, Ruth G. Artificial intelligence conference-achieving efficiencies through expert systems (Boston). Best's Review (Property/Casualty Insurance Edition), Oldwick, v. 91, p. 97-9, Jan. 1991.
  • 148. LEE, Chris. Followership: the essence of leadership. Training, Minneapolis, v. 28, p. 27-35, Jan. 1991.
  • 149. ON MARKETING research. Marketing News, Chicago, v. 25, p. 1-50, Sept. 2 1991. (Special tssue)
  • 150. MARTIN, Dave. An end must come to staff cutbacks or companies, no matter how brilliant top management is, won't be able to compete. Mediaweek, Brewster, v. 1, p. 16, Aug. 26 1991.
  • 151. MARTIN, Justin. Keeping the lid on (protecting a company's garbage). Across the Board, New York, v. 28, p. 53-5, Oct. 1991.
  • 152. MARTlN, Justin; STEDMAN, Michael J. Still a distant second (American managers lagging behind Japanese competitor intelligence practices). Across the Board, New York, v. 28, p. 42-7, Nov. 1991.
  • 153. *MARTIN, Warren S. et aI. Developing artificial intelligence applications: a srnall business development center case study. The Journal of Small Business Management, Wichita, v. 29, n. 4, p. 28-33, Oct. 1991.
  • 154. *MILLER, Howard W. Information technology: creation or evolution? (evolution of a software system). Journal of Systems Managementa, Cleveland, v. 42, n. 4, p. 23-7, Apr. 1991.
  • 155. MINTZ, James B. Have I got a deal for you (protecting companies against bad-deals). Across the Board, New York, v. 28, p. 56-8, Nov. 1991.
  • 156. *O'BRIEN, Virginia; FULD, Leonard M. Business intelligence and the new Europe. Planning Review, Oxford, v. 19, n. 4, p. 29-34, July/Aug. 1991.
  • 157. *PAINE, Lynn Sharp. Corporate policy and the ethics of competitor intelligence gathering. Journal of Business Ethics, Guelph, v. 10, n. 6, p. 423-36, June 1991.
  • 158. *PRESCOTI, John E.; GIBBONS, Patrick T. Europe '92 provides new impetus for competitive intelligence. The Journal of Business Strategy, Boston, v. 12, n. 6, p. 20-6, Nov./Dec. 1991.
  • 159. *RECOVERY eary warning system (British Steel Distribution's executive information system). Management Today, London, p. 12, Nov.1991.
  • 160. *ROUSH, Gary B. A program for sharing corporate intelligence (Corning). The Journal of Business Strategy, Boston, v. 12, n. 1, p. 4-7, Jan./Feb. 1991.
  • 161. *SAMPER, J. Philip. Senior management commitment: Eastman Kodak's policy on the use of information (market intelligence system). Planning Review, Oxford, v. 19, n. 2, p. 47, Mar.lApr. 1991.
  • 162. *SIMONS, Robert. Strategic orientation and top management attention to control systems. Strategic Management Joumal, Chichester, v. 12, n. 1, p.49-62, Jan. 1991.
  • 163. STEDMAN, Michael J. The business of counterespionage. Across the Board, New Vork, v. 28, p. 45, Nov. 1991.
  • 164. ______. Can the government help? (economic espionage and foreign intelligence). Across the Board, New Vork, V. 28, p. 46, Nov. 1991.
  • 165. _______. Industrial espionage: what you don't know can hurt you. Business and Society Review, Stroudsburg, n. 76, p. 25-32, Winter 1991.
  • 166
    166. ______. Still a distant second (American managers lagging behind Japanese competitor intelligence practices). Across the Board, New Vork, V. 28, p. 42-7, Nov. 1991.
  • 167. SWIFT, Clinton R. Technology outlook (Ieveraging technology investments). Bank Management, Rolling Meadows, V. 67, p. 30-2, Jan. 1991.
  • 168. TUOHY, James C. Competitor intelligence: work smarter technique. Marketing News, Chicago, v. 25, p. 25, Sept. 2 1991.
  • 169. ZAHEDI, Fatemeh. An introduction to neural networks and a comparison with artificial intelligence and expert systems. Interfaces, Providence, V. 21, p. 25-38, Mar./Apr. 1991.
  • 170. *ZELLNER, Wendy; HAGER, Bruce. Dumpster raids? That's not very ladylike, Avon (spying on Mary Kay). Business Week, Hightstown, n. 3197, p. 30, Apr. 1 1991.
  • 171. ZIPPER, Stuart. Automotive electronics (Hewlett-Packard and IBM marketing computer-based test equipment). Electronic News, New Vork, V. 37, p. 15, June 10 1991.
  • 172. *TO AVOID surprises, some go to the library (information sources that provide competitive intelligence). Personnel, Saranac Lake, V. 67, n. 12, p. 10, Dec. 1990.
  • 173. *BERRY, S.L. Faxpionage: a new threat hits Mahogany Row. Management Review, Saranac Lake, V. 79, n. 7, p. 58-60, July 1990.
  • 174. *BERTRAND, Kate. The global spyglass (U.S. marketers seek an edge with competitive intelligence). Business Marketing, Chicago, V. 75, n. 9, p. 52-3+, Sept. 1990.
  • 175. CHOATES, Pat. Political advantage: Japan's compaign for America. Harvard Business Review, Boston, V. 68, n. 5, p. 87-103, Sept.lOct. 1990.
  • 176. *COMBS, Richard; MOORHEAD, John. Competitive intelligence: finding the clues online. Database, Weston, V. 13, n. 5, p. 15-18, Oct. 1990.
  • 177. CRAFT, James A.; FLEISHER, Craig; SCHOENFELD, Gerald. Human resources competitor intelligence: concept, focus, and issues. Human Resource Planning, New Vork, V. 13, n. 4, p. 265-80, 1990.
  • 178. DRUMMOND, James. Résumé for a spy (Parvus Company's G.P. Burke; international intelligence for U.S. corporations). Forbes, New Vork, V. 145, p. 148-9, May 14 1990.
  • 179. *DUGGAN, Patrice; EISENSTODT, Gale. The new face of Japanese espionage (in U.S.). Forbes, New Vork, V. 146, n. 11, p. 96, Nov. 12 1990.
  • 180. FALCONER, Tim. Investigative report: industrial espionage. Canadian Business, Toronto, V. 63, p. 53-5+, Feb. 1990.
  • 181. FULD, Leonard M. Did you hear the one about the oil spots? Marketing News, Chicago, V. 24, p. 30, Sept. 3 1990.
  • 182. GAUTHIER, Mark. Technology intelligence (bank technology). Bankers Monthly, New Vork, V. 107, p. 51, June 1990.
  • 183. GOCHBERG, Howard. Watch new developments and assess their importance. Marketing News, Chicago, V. 24, p. 14, Sept. 171990.
  • 184. HEFFERNAN, Richard J. A little TSCM (technical surveillance countermeasures). Security Management, Arlington, V. 34, p. 35+, Dec. 1990.
  • 185. *HOPPER, Max D. Rattling SABRE - new ways to compete on information. Harvard Business Review, Boston, V. 68, n. 3, p. 118-125, May/June 1990.
  • 186. *HUBER, George P. A theory of the effects of advanced information technologies on organizational design, intelligence, and decision making. The Academy of Management Review, Saranac Lake, V. 15, n. 1, p. 47-71,Jan. 1990.
  • 187. *IACOCCA, Lee A. Is Japan "buying" U.S. politics? Harvard Business Review, Boston, V. 68, n. 6, p. 184+, Nov.lDec. 1990.
  • 188
    188. Is your financial data secure? (panel discussion with Information Security International's CEO G.P. Burke, preso W.H. Jenkins and TA Prugh). Financial Executife, Memstown, V. 6, p. 42-6, Jan./Feb. 1990.
  • 189. JONES, Patrick. When competitors really bug you (industrial espionage). Security Management, Arlington, V. 34, p. 44-7+, Dec. 1990.
  • 190. *KARSEGARD, Olof. MNS: market intelligence for export decisions (Market News Service). Intemational Trade Forum, Geneva, V. 26, n. 2, p. 22-7, Apr./June 1990.
  • 191. *KELL Y, Joe. Nynex. Datamation, Denver, V. 36, n. 12, p. 100-1, June 15 1990. (Datamation 100 Survey)
  • 192. *KOHLI, Ajay K.; JAWORSKI, Bernard J. Market orientation: the construct, research propositions, and managerial implications. Journal of Marketing, Chicago, V. 54, n. 2, p. 1-18, Apr. 1990.
  • 193. LEE, Paula Munier. Keeping Your ear to the ground (competitive intelligence). Small Business Reports, Monterey, V. 15, p. 27-34+, May 1990.
  • 194. LEWIS, Jordan D. Scanning for opportunities (book adaptation from Partnerships for profit). Across the Board, New Vork, V. 27, p. 52-7, May 1990.
  • 195. MARINO, Carolann. The spy who loves you (protecting corporate information). ARMA Records Management Quarterly, Prairie Village, V. 24, p. 24-6, Apr. 1990.
  • 196. MASON, Charles. FBI investigates US Sprint for FTS 2000 espionage. Telephony, Overland Park, V. 218, p. 10, Feb. 26 1990.
  • 197. *MEADOR, Lawrence; MAHLER, Ed. G. Choosing an expert systems game plan. Datamatian, Denver, V. 36, n. 15, p. 64-9, Aug. 1 1990.
  • 198. MENKUS, Belden. Cellular telephone use can be dangerous (auto safety and exposure of confidential and sensitive business information). Modem Office Technology, Cleveland, V. 35, p. 60+, Aug.1990.
  • 199. MILLER, Cyndee. Dialog moves out of the libraries (Dialog Information Services). Marketing News, Chicago, V. 24, p. 20+, July 91990.
  • 200. MORTENSEN, Erik. Accessing information is a growing global asset (corporate intelligence). The Office, Stamford, V. 111, p. 41-2+, Apr. 1990.
  • 201. PARK, C. Whan; SMITH, Daniel C. Product class competitors as sources of innovative marketing strategies. Journal of Consumer Marketing, Denville, V. 7, n. 2, p. 27-38, Spring 1990.
  • 202. READERS favor customer satisfaction research (over competitive intelligence). Marketing News, Chicago, V. 24, p. 4, May 28 1990.
  • 203. SCHLOSSBERG, Howard. Competitive intelIigence pros seek formal role in marketing. Marketing News, Chicago, V. 24, p. 2+, Mar. 5 1990.
  • 204. Vou learn to think like the other guys think (competitive intelligence). Marketing News, Chicago, V. 24, p. 2, Mar. 5 1990.
  • 205. SKYRME, David J. Developing successful marketing intelligence: a case study. Management Decision, Vorkshire, V. 28, n. 1, 1990.
  • 206. SMITH, J. Clarke. A neural network-could it work for you? (financial decision making). Financial Executive, Morristown, v. 6, p. 26-30, May/June 1990.
  • 207. *STEVENS, Robert I. More about dangerous corporate leaks (Iadies' powder rooms). Journal of Systems Management, Cleveland, v. 41, n. 3, p. 42, Mar. 1990.
  • 208. *STRYKER, Charles W. The revolution on your desktop. Business Marketing, Chicago, v. 75, n. 6, p. 96, June 1990.
  • 209. STUDHOLME, Barbara. SDI - The database news section. Database, Denver, v. 13, n. 3, p. 12-3+, June 1990.
  • 210. WHAT role does marketing intelligence play in effective marketing? Management Decision, Yorkshire, v. 28, n. 2, p. 129-34, 1990. (Maximising Eftectiveness issue)
  • 211. *WINTERS, Patricia; FREEMAN, Laurie. Can marketing leaks be plugged? (confidentiality agreements with ad agencies). Advertising Age, Chicago, v. 61, n. 51, p. 53, Dec. 10 1990.
  • 212. BEISWINGER, George L. Intorrnation leaks: how to spot the often overlooked. The Office, Stamford, v. 110, p. 48+, Nov. 1989.
  • 213. BUTLER, Charles W.; CHERREY, John J.; SCHULTZ, Norman O. Talking trash (acquiring competitive intelligence through trash analysis). The Internal Auditor, Altamonte Sprlnqs, v. 46, p. 35-40, Dec. 1989.
  • 214. CARTER, Roy. Careless words cost business (industrial espionage). Accountancy, London, v. 103, p. 158-60, Mar. 1989.
  • 215. *competitive analysis. Planning Review, Oxford, v. 17, n. 3, p. 1-47, May/June 1989. (Special issue)
  • 216. *EISENHART, Tom. Where to go when you need to know (competitive intelligence; special report). Business Marketing, Chicago, v. 74, n. 11, p. 38-40+, Nov. 1989.
  • 217. ENGLADE, Kenneth F. Competitor intelligence comes in from the cold. Across the Board, New York, v. 26, p. 18-25, Apr. 1989.
  • 218. *EWUSI-MENSAH, Kweku. Developing a competitive intelligence system for IT. Long Range Planning, Oxtord, v. 22, n. 5, p. 121-7, Oct. 1989.
  • 219. FAHEY, Liam. Mis-intelligence (analysis of competitor intelligence). Across the Board, New York, v. 26, p. 26-7+, Apr. 1989.
  • 220. FULD, Leonard M. Competitor intelligence: can you plug the leaks? Security Management, Arlington, v. 33, p. 84-7, Aug. 1989.
  • 221. *GILAD, Benjamin. The role of organized competitive intelligence in corporate strategy. The Columbia Journal of World Business, New York, v. 24, n. 4, p. 29-35, Winter 1989.
  • 222. *GROVER, Ronald; WEBER, Joseph; HAMMONDS, Keith H. That's Sam Spade leafing through the ledgers (using private eyes in takeover battles). Business Week, Hightstown, n. 3101, p. 37-8, May 291989.
  • 223. GUIDA, Richard A. The costs of free information (possible amendments to FOIA). The Public Interest, Denville, v. 97, p. 87-95, Fall 1989.
  • 224. GUILLERMIN, Lisa. Export licenses: a national security issue. Security Management, Arlington,v.33,p. 113+, Nov. 1989.
  • 225. HOWARD, James S. Corporate intelligence at your fingertips. D&B Reports, New York, v. 37, p. 26-9+, Sept./Oct. 1989.
  • 226. * KIGHT, Leila K. The search for intelligence on divisions and subsidiaries (competitive intelligence on business units hidden within large corporation). Planning Review, Oxtord, v. 17, n. 3, p. 40-1, May/June 1989.
  • 227. LITHWICK, David. Be on the lookout for corporate spies. Marketing, Toronto, v. 94, p. 37, Oct. 161989.
  • 228. MELLOW, Craig. The best source of competitive intelligence (your sales force). Sales and Marketing Management, Southeastern, v. 141, p. 24-6+, Dec. 1989.
  • 229. NEVER mind MIS; consider M15. Business Month, New York, v. 133, p. 15, Feb. 1989.
  • 230. *PRESCOTT, John E.; SMITH, Daniel C. The largest survey of "leading-edge" competitor intelligence managers. Planning Review, Oxford, v. 17, n. 3, p. 6-13, May/June 1989.
  • 231. RAUTER, Thomas C. Spi versus spy (safeguarding proprietary information program). Security Management, Arlington, v. 33, p. 58+, Feb. 1989.
  • 232. RUBINSTEIN, Ed. Food manufacturers dlscover value of intelligence systems (strategic information systems for marketing). Marketing News, Chicago, v. 23, p. 11-12, May 22 1989.
  • 233. STEELE, J. Michael. Models for managing secrets. Management Science, Providence, v. 35, n. 2, p. 240-8, Feb. 1989.
  • 234. *STEVENS, Robert I. The dangerous corporate world in which we Iive. Joumal of Systems Management, Cleveland, v. 40, n. 5, p. 42, May 1989.
  • 235. SUTION, Howard. Competitive intelligence: keep tabs on the competition. Marketing Communications, New York, v . 14, p. 42-5, Jan. 1989.
  • 236. * AEH, Richard K. Knowledge systems in business and industry. Journal of Systems Management, Cleveland, v. 39, n. 11, p. 7-9, Nov. 1988.
  • 237. * ATIANASIO, Dominick B. The multiple benefits of competitor intelligence. The Journal of Business Strategy, Boston, v. 9, n. 3, p. 16-19, May/June 1988.
  • 238. *BENNETI, Steven J.; SNELL, Michael. A corporate spy on your own team (in introducing a new product). Sales and Marketing Management, Southeastern, v. 140, n. 2, p. 60-5, Feb. 1988.
  • 239. THE BUSINESS of business is spying (competitor intelligence). Security Management, Arlington, v. 32, p. 15, July 1988.
  • 240. COMBS, Richard; MOORHEAD, John. The quest for corporate excellence begins with competitive intelligence. Marketing News, Chicago, v. 22, p. 11 +, May 9 1988.
  • 241. COMPETITIVE intelligence eftorts on the rise (tracking competitors and predicting their movements). Marketing Communications, New York, v. 13, p. 8,O ct.
  • 242. *DRUCKER, Peter F. The coming of the new organization. Harvard Business Review, Boston, v. 88, n. 1, p. 45-53, Jan./Feb. 1988.
  • 243. *DUMAINE, Brian. Corporate spies snoop to conquer (value of competitive intelligence). Fortune, New York, v. 118, n. 11, p. 66-8+, Nov. 7 1988.
  • 244. *EISENHART, Tom. Developing IR intelligence (investor relations). Business Marketing, Chicago,v. 73, n. 1,p.62,Jan. 1988.
  • 245. FULD, Leonard M. How to gather foreign intelligence without leaving home. Marketing News, Chicago, v. 22, p. 24+, Jan. 4 1988.
  • 246. GAUDET, Larry. Mental detectors. Canadian Business, Toronto, v. 61, p. 25-6, Mar. 1988.
  • 247. HENRICKS, Mark. Spying's straitlaced sibling (book review article). Venture, New York, v. 10, n. 10, p. 18, Oct. 1988.
  • 248. *HERRING, Jan P. Building a business intelligence system. The Journal of Business Strategy, Boston, v. 9, n. 3, p. 4-9, May/June 1988.
  • 249. JOHNSTON, H. Russell; VITALE, Michael R. Creating competitive advantage with interorganizational informantion systems. MIS Duarterly, Minneapolis, p. 153-67, June 1988.
  • 250. KOCO, Linda. Who watches the product watchers? (insurers monitor competition). National Underwriter (Life & Health/Financial Services Edition), Cincinnati, v. 92, p. 13+, Feb. 291988.
  • 251. MANGAN, Doreen. None of your secrets are safe. Venture, New York, v. 10, p. 61-2+, Feb. 1988.
  • 252. *MARKETERS turn to competitive intelligence. Business Marketing, Chicago, v. 73, n. 12, p. 23-4, Dec. 1988.
  • 253. MEYER, Herbert E. Marketing intelligence to the boss (marketing intelligence to policy makers). Across the Board, New York, v. 25, p. 6-8, Apr. 1988.
  • 254. MILLER, Cyndee. Intelligence systems: no matter what they're called, they're called essential tor marketers. Marketing News, Chicago, v. 22, p. 2+, May 91988.
  • 255. OLNEY, Claude W. The secret world of the industrial spy, Business and Society Review, Boston, n. 64, p. 28-32, Winter 1988.
  • 256. PELL, Eve. Friend or FOIA? (Freedom of information Act). Venture, New York, v. 10, p. 4851, Aug. 1988.
  • 257. PETERS, Tom. Restorms american competitiveness. The Academy of Management Executive, p. 103-109, May 1988.
  • 258. PREBLE, J.F.; Rao, P.A.; Reichel, A. The environmental scanning practices of U.S. multinationals in the late 1980s. International Management Review, v. 28, p. 4-14, 1988.
  • 259. PSSSSST! (Do you want to know a secret?) (commercial intelligence). Inc., Boulder, v. 10, Nov. 1988. (supp, Small Business)
  • 260. *SACKETT, Samuel J. Computers, customer communications and the need tor human intelligence. Computers and People, Newtonville, v. 37, n. 1, p. 18-23, Jan./Feb. 1988.
  • 261. SPYING on competitors. Electrical World, Hightstown, v. 202, p. 23, Nov. 1988.
  • 262. *BALL, Richard. Assessing your competitor's people and organization. Long Range Planning, Oxlord, v. 20, n. 2, p. 32-41, 1987.
  • 263. *BERTRAND, Kate. Sales sleuths tap customer grapevine (use of sales representatives in gathering inlormation about the competition). Business Marketing, Chicago, v. 72, n. 8, p. 40, Aug. 1987.
  • 264. CHADBOURNE, Robert D. Industrial espionage. Supervision, Burlington, v. 49, p. 14-17, Apr.1987.
  • 265. CIA points to Soviet chamber of commerce in technology diversion. Research & Development, Denver, v. 29, p. 46+, Aug. 1987.
  • 266. CROSS, Allan J. Say I do to proposal security (protecting proprietary information). Security Management, Arlington, v. 31, p. 71-3, Mar. 1987.
  • 267. ENGEL, Alan K. Number on in competitor intelligence (Japanese access to business inlormation). Across the Board, New York, v. 24, p. 43-7, Dec. 1987.
  • 268. *GORDON, William Larry; KEY, Jeffrey R. Artificial intelligence in support of small business information needs. Journal of Systems Management, Cleveland, v. 38, n. 1, p. 24-8, Jan. 1987.
  • 269. *HAMMER, Michael; MANGURIAN, Glenn E. The changing value of communication technology. Sloan Management Review, Cambridge, v. 28, n. 2, p. 65-71, Winter 1987.
  • 270. JONES, Kirk. Technology: intelligent computers for business needs. Financial Executive, Morristown, v. 3, n. 5, p. 13-15, Sept./Oct. 1987.
  • 271. JONES, Robert R. Industrial espionage: stolen Kevex window points to industrial espionage (Amray microscope). Research & Development, Denver, v. 29, p. 46-7, Apr. 1987.
  • 272. McAWARD, Jeremiah. Byte-ing the hand (electronic theft). Personnel Administrator, Alexandria, v. 32, p. 37-8, Feb. 1987.
  • 273. *McGRANE, James M. Going on-Iine for planning and competitive intelligence. Management Review, New York, v. 76, n. 10, p. 55-6, Oct. 1987.
  • 274. MICHAELSON, Gerald A. Control your information belore it controls you. Marketing News, Chicago, v. 21, p. 30-1, Nov. 6 1987.
  • 275. PATTAKOS, Arion N. Sneaky people. Security Management, Arlington, v. 31, p. 76-8, June 1987.
  • 276. *PRESCOTT, John E.; SMITH, Daniel C. A project-based approach to competitive analysis (compared to comprehensive competitive intelligence systems). Strategic Management Journal, Chichester, v. 8, n. 5, p. 411-23, Sept./Oct. 1987.
  • 277. REDDICK, Steve. Keeping your secrets (voice encryption). Security Management, Arlington, v. 31, p. 71-7, Feb. 1987.
  • 278
    278. SENATE report warns of Soviet penetration of U.S. R&D industry. Research & Development, Denver, v. 29, p. 52, Jan. 1987.
  • 279. *SMITH, Daniel C.; PRESCOTT, Jonh E. Demystifying competitive analysis, Planning Review, Oxford (USA), v. 15, n. 5, p. 8-13, Sept./Oct. 1987.
  • 280. SURVEY uncovers ideal intelligence gatherer. Marketing News, Chicago, v. 21, p. 11 +, Jan. 21987.
  • 281. *TUCKER, F.G.; ZIVAN, S.M.; CAMP, R.C. How to measure yoursell against the best. Harvard Business Review, Boston, v. 65, n. 1, p. 810+, Jan./Feb. 1987.
  • 282. WICK, Allan. When's the time to sweep out the bugs? (electronic countermeasures). Security Management, Arlington, v. 31, p. 138+, Aug. 1987.
  • 283. *BEHOF, Kathleen. The right way to snoop on the competition. Sales and Marketing Management, Southeastern, v. 136, n. 7, p. 46-8, May 1986.
  • 284. *THE BIG peep. The Economist, London, v. 298, n. 7431, p. 80-1, Feb. 1 1986.
  • 285. BISHOP, Willard R. Competitive intelligence: getting personal with shoppers. Progressive Grocer, Stamlord, v. 65, p. 135, Mar. 1986.
  • 286. BRANDENBERG, Mary. Are your premises clean and free of bugs? Accountancy, London, v. 98, p. 66-7, July 1986.
  • 287. CARTER, Roy. Management accountability and corporate security. Administrative Management, New York, v. 47, p. 52-3, June 1986.
  • 288. CHRISTIE, Bert. Closing the door on electronic espionage (RF-shielded rooms). Security Management, Arlington, v. 30, p. 65-6, Nov. 1986.
  • 289. COMER, Mike. Thieves steal when they get an opportunity. Accountancy, London, v. 98, p. 70-2, July 1986.
  • 290. COMPANY sees benelits in centralizing its system of competitor intelligence (Motorola's strategic information system). Marketing News, Chicago, v. 20, p. 39, Sept. 12 1986.
  • 291
    291. EPA's aerial scrutiny of Dow plant held legal (Supreme Court decision). Chemical & Engineering News, Columbus, v. 64, p. 5, May 261986.
  • 292. FULD, Leonard M. Don't confuse corporate intelligence with I spy. Marketing News, Chicago, v. 20, p. 38+, Sept. 12 1986.
  • 293. *GHOSHAL, Sumantra; KIM, Seok Ki. Building effective intelligence systems for competitive advantage. Sloan Management Review, Knoxville, v. 28, n. 1, p. 49-58, Fali 1986.
  • 294. *GILAD, Tamar; GILAD, Benjamin. Business intelligence - the quiet revolution. Sloan Management Review, Knoxville, v. 27, n. 4, p. 53-61, Summer 1986.
  • 295. GORDON, Ian. Exit "marketing concept" enter "competitive concept" (competitive intelligence). Business Quarterly, London, v. 51, n. 2, p. 28-32, Summer 1986.
  • 296. HOW to lind business intelligence in Washington . 8th ed reviewed by Copler, Judith A. Online, Weston, v. 10, p. 110-11, Nov. 1986. (Book Review)
  • 297. *HYDE, Charles K. Undercover and underground: labor spies and mine management in the early twentieth century (Quincy Mining Company). Business History Review, Boston, v. 60, n. 1, p. 1-27, Spring 1986.
  • 298. *KAPP, Sue. Gunning for nş 1 (O. Wolkins programs lor collecting competitor inlormation and quality control at GTE Corp.). Business Marketing, Chicago, v. 71, n. 4, p. 12+, Apr. 1986.
  • 299. LASDEN, Martin. MIS/DP espionage: the inside story (competitive intelligence gathering on new data processing activities). Computer Decisions, Teaneck, v. 18, p. 66-8+, Apr. 8 1986.
  • 300. LI PMAN, And rew D. Let the marketer beware: what Uncle Sam knows is a matter of public record (competitors obtain information under Freedom of Information Act). Telephony, Overland Park, v. 211, p. 48-9, July 7 1986.
  • 301. McCULLOUGH, Robert; WOLVERTON, Lincoln. The competitor intelligence concept applied to power marketing (major industrial energy users). Publie Utilities Fortnightly, Arlington, v. 118, p. 11-17, Sept. 181986.
  • 302. *MILES, Gregory L. Information thieves are now corporate enemy nş 1. Business Week, Hightstown, n. 2944, p. 81-2, May 5 1986.
  • 303. RUSSO, Robert J. Prying eyes: OPSEC can keep your company's plans out of sight (operations security). Security Management, Arlington, v. 30, p. 46-8, June 1986.
  • 304. STUDY: many firms foolish with intelligence funds. Marketing News, Chicago, v. 20, p. 44, Jan. 3 1986.
  • 305. THE VALUE of a visual sighting. Business, Atlanta, v. 36, p. 61, Jan./Mar. 1986.
  • 306. VELLA, Carolyn M.; McGONAGLE, John J. Competitive intelligence: plugging information voids. Mergers & Acquisitions, Philadelphia, v. 21, p. 43-7, July/Aug. 1986.
  • 307. ________. Just call your computer 007 (competitive intelligence; valuable tool in marketing). Bank Marketing, Chicago, v. 18, p. 36+, June 1986.
  • 308. *WILLIS, Rod. Corporate cloaks and daggers. Management Review, Saranac Lake, v. 75, n. 2, p. 41-5, Feb. 1986.
  • 309. BEQUAI, August. The industrial spy: red flags and recourse. Security Management, Arlington, v. 29, p. 93-4, Aug. 1985.
  • 310. * _____ . Management can prevent industrial espionage. SAM Advanced Management Journal, Vinton, v. 50, n. 1, p. 17-19, Winter 1985.
  • 311. *BIRD-dogging the competition. Sales and Marketing Management, Southeastern, v. 135, n. 8, p. 52-3, Dec. 9 1985.
  • 312 BISHOP, Willard R. Competitive intelligence (store formats). Progressive Groeer, Stamford, v. 64, p. 87, Jan. 1985.
  • 313. *BLOTNICK, Srully. Job-hopping (leakage of information through employees who leave for competitive firms). Forbes, New York, v. 135, n. 7, p. 188, Apr. 8 1985.
  • 314 *CASH, J.I.; KONSYNSKI, B.R. Is redraws competitive boundaries. Harvard Business Review, Boston, v. 64, n. 2, p. 134-142, Mar./Apr. 1985.
  • 315 DEVELOPING The right marketing intelligence system. Business, Atlanta, v. 35, p. 56, Oct./Dec. 1985.
  • 316. *DWYER, Paula. The EPA's eye in the sky has companies seeing red (aerial photograph of Dow Chemical's plant). Business Week, Hightstown, n. 2918, p. 35-6, Oct. 28 1985.
  • 317. FRASER, Bruce W. Shark watchers to the rescue (proxy firms identifying raiders). Financial World, New York, v. 154, p. 85-9, Aug. 21/Sept. 3 1985.
  • 318. FULD, Leonard M. Competitive intelligence: it may be right under your (contacts within your own company). Marketing News, Chicago, v. 19, p. 7, Jan. 4 1985.
  • 319. ______. Sizing up the competition. The Canadian Business Review, Ottawa, v. 12, p. 357, Summer 1985.
  • 320. GILAD, Benjamin; GILAD, Tamar. Strategic planning: improving the input (business intelligence). Managerial Planning, Oxford, v. 33, p. 10-3+, May/June 1985.
  • 321. *GILAD, Benny; GILAD, Tamar. A systems approach to business intelligence. Business Horizons, Bloomington, V. 28, n. 5, p. 65-70, Sept./Oct. 1985.
  • 322. HARMON, Paul; KING, David. Expert systems; artificial intelligence in business (book review). Training, Minneapolis, v. 22, p. 84, Aug. 1985.
  • 323. *INDUSTRIAL espionage: east-west trade (East Germany has about 1, 000 people assigned to economic espionage in West Germany). The Economist, London, v. 296, n. 7412, p. 72, Sept. 21 1985.
  • 324. THE INTELLIGENCE system: business market example. Marketing News, Chicago, V. 19, p. 22-3, Jan. 4 1985.
  • 325. KAPLAN, Elizabeth. Spotting takeover sharks, Dun's Business Month, New York, V. 125, p. 36-8, Feb. 1985.
  • 326. *KAPSTEIN, Jonathan; FRANCE, Boyd. The West's crackdown on high-tech smuggling starts to pay olf (flow of strategic hardware to Societs). Business Week, Hightstown, n. 2905, p. 64-6, July 29 1985.
  • 327. LaROSA, Sharon M. First look: INVESTEXT the business intelligence database. Online, Weston, V. 9, p. 41-5, Sept. 1985.
  • 328. LEARNING about competition-creatively. Marketing News, Chicago, v. 19, p. 40+, Sept. 13 1985.
  • 329. MAURO, Tony. Federal prying from the sky (EPA's overflights of Dow Chemical plants). Nation's Business, Washington, v. 73, p. 34+, Oct. 1985.
  • 330. *NEWPORT JR., John Paul. The Kremlin's high-tech hit list of U.S. companies. Fortune, New York, v. 112, n. 12, p. 82, Nov. 25 1985.
  • 331. *RHINES, Wally. Artificial intelligence: out of the lab and into business. The Journal of Business Strategy, Boston, v. 6, n. 1, p. 50-7, Summer 1985.
  • 332. *ZINKHAN, George M.; GELB, Betsy D. Competitive intelligence practices of industrial marketers. Industrial Marketing Management, New York,v. 14, n.4, p.269-75, Nov. 1985.
  • 333. ALLING, Philip C. Gathering intelligence for transportation planning. Handling & Shipping Management, V. 25, p. 11, Oct. 1984.
  • 334. ALPERT, William M. What's on tap? The latest poop on industrial espionage (and counterespionage). Barron's, Chicopee, v. 64, p. 30, June 181984.
  • 335. BISHOP, Willard R. Competitive intelligence. Progessive Groeer, Stamford, V. 63, p. 101, Nov. 1984.
  • 336. BRAXTON, Meredith. Symposium examines terrorism, espionage and computer fraudo Risk Management, New York, v. 31, p. 74, Oct. 1984.
  • 337. Chase, Martyn. Spies: you ain't seen nothin' yet (Operation Exodus; export-control violations). Eleetronie Business, Denver, V. 10, p. 76+, Jan. 1984.
  • 338. *Flax, Steven. How to snoop on your competitors. Fortune, New York, V. 109, n. 10, p. 12-7, May 141984.
  • 339. GREENE, Richard. Never mind R&D, how about T&G? (theft of trade secrets). Forbes, New York, V. 134, p. 142, Sept. 241984.
  • 340. JOHNSON, Tim. Is someone bugging you? (countermeasures survey). Security Management, Arlington, v. 28, p. 141-4, Sept. 1984.
  • 341. KOVACH, Jeffrey L. Corporate espionage: competitive intelligence. Industry Week, Cleveland, v. 223, p. 50-3, Nov. 12 1984.
  • 342. *McFARLAN, F. Warren. Information technology changes the way you compete. Harvard Business Review, Boston, V. 62, n. 3, p. 98-103, May/June 1984.
  • 343. *McManus, Kevin. Double edge (competitors using Freedom of Information Act to spy). Forbes, New York, V. 133, n. 12, p. 46+, May 21 1984.
  • 344. *McPherson, Joseph. How to ward off invaders through better use of your eyes and ears. International Management (Europe edition), Berkshire, v. 39, n. 3, p. 28+, Mar. 1984.
  • 345. *MAHER, Philip. Corporate espionage: when market research goes toa far (ethics of information gathering). Business Marketing, Chicago, v. 69, n. 10, p. 50-66, Oct. 1984.
  • 346. * A SPY-catcher on the payroll? (industrial espionage) The Economist, London, V. 291, n. 7346, p. 58, June 16 1984.
  • 347. SPY vs. spy (companies use FOIA to obtain information about competitors). Security Management, Arlington, v. 28, p. 33-4, Aug. 1984.
  • 348. Whalen, Bernie. Report rise in use of J.R. research tactics (J.R. Ewing on TV's Dallas). Marketing News, Chicago, v. 18, p. 1 +, May 25 1984.
  • 349. Eason, Henry. Soviet spies: your firm could be their next target. Natian's Business, Washington, v. 71, p. 22-5, June 1983.
  • 350. *Karrass, Chester L. Spying and bugging. Purchasing, Denver, v. 94, n. 7, p. 35, Apr. 14 1983.
  • 351. McLellan, Vin. Friday the 13th (W. Erdman, IBM executive, asked for meeting with M. Alpert of Tecman). Inc., Boulder, v. 5, p. 109-12+, Del. 1983.
  • 352. Mino, Hokaji. Social misfit becomes easy ploy for Soviet agents (industrial espionage case against Hitachi Ltd's executive). Business Japan, New York, v. 28, p. 25-8, Sept. 1983.
  • 353. Mirin, Kathleen. Competitive intelligence. Venture, New York, v. 5, p. 29-30, July 1983.
  • 354. Moad, Jeff. Hitachi admits guilt in trade secrets suit. Electronic News, New York, v. 29, p. 16+, Feb. 141983.
  • 355. ______. IBM settles thefts suit, to police new Hitachi units. Electranic News, New York, V. 29, p. 1+, Oct. 10 1983.
  • 356. *The real punishment for Hitachi. Business Week, Hightstown, n. 2778, p. 19-20, Feb. 21 1983.
  • 357. RUSSELL, Sabin. Government agents raid Fairchil Linear division (seized documents recording testing procedures for ICs). Electronic News, New York, v. 29, p. 1+, Dec. 1983.
  • 358. Schwartz, Lloyd. Hint Hitachi case bared tip of the iceberg (theft of U.S. computer secrets). Electronic News, New York, v. 29, p. supp a, July 181983.
  • 359. *Tinnin, David B. How IBM stung Hitachi. Fortune, New York, V. 107, n. 5, p. 50-6, Mar. 7 1983.
  • 360. * _____ . A school for counterspies (Bad Dldesloe in northern Germany). Fortune, New York, v. 107, n. 11, p. 107, May 30 1983.
  • 361. Whalen, Bernie. Marketing detective reveals competitive-intelligence secrets (Leonard M. Fuld). Marketing News, Chicago, V. 17, p. 1+, Sept. 16 1983.
  • 362. Zipper, Stuart. TI charges Compaq took CPU secrets. Electronic News, New York, v. 29, p. 1 +, Feb. 7 1983.
  • 363. * Arbose, Jules R. How Japan has "won" the peace (interview with Richard Deacon). International Management, Berkshire, v. 37, n. 4, p. 234, Apr. 1982.
  • 364. *Computers; throwing the book at industrial spies. Business Week, Hightstown, n. 2759, p. 69+, Del. 4 1982.
  • 365 Court frees 3 in IBM secrets case. Electranic News, New York, V. 28, p. 20, Del. 4 1982.
  • 366. Foreign industrial spies seek vanguard technology in Japan. Business Japan, New York, V. 27,p. 14, Nov. 1982.
  • 367. *Gordon, lan. Competitive intelligence: a key to marketplace survival. Industrial Marketing, Chicago, V. 67, n. 11, p. 69-71+, Nov. 1982.
  • 368. Your survival kit competitive intelligence (Canada). Business Quarterly, London, v.47,p.65-7,Aug.1982.
  • 369. Gross, Laurence H. Intelligence networks replace gimmickry for overseas execs. Business Insurance, Chicago, v. 16, p. 70-1, Nov. 22 1982.
  • 370. *Grossman, Robin. Has Japan's high-tech rivalry gone toa far? Business Week, Hightstown, n. 2746, p. 24, July 5 1982.
  • 371. Howe, Charles L. Industrial espionage: a wolf at industry's door. Data Cammunicatians, New York, V. 11, p. 37-8+, Aug. 1982.
  • 372. IBM chief raps critics of trade secrets scam. Electronic News, New York, V. 28, p. 31, Nov. 1 1982.
  • 373. IBM claims 2 employes gave advice to competitor (Syntrex). Electronic News, New York, V. 28, p. 51, Nov. 29 1982.
  • 374. *IBM pulls the plug on cheap imitators. The Economist, London, V. 284, n. 7247, p. 77-8, July 241982.
  • 375. Inaba, Minoru. Japanese execs deny wrongdoing (IBM documents case). Electronic News, New York, V. 28, p. 21 +, June 28 1982.
  • 376. *Industrial espionage: inscrutable computer scam (Mitsubishi Electric and Hitachi). The Economist, London, v. 283, n. 7243, p. 74, June 26 1982.
  • 377. Japanese computer caper. Dun's Business Manth, New York, V. 120, p. 26, Aug. 1982.
  • 378. *"Japscam" for computer spies. Fortune, New York, V. 106, n. 2, p. 7, July 26 1982.
  • 379. Menkus, Belden. A ten-point program to safeguard against industrial espionage is essential for adequate protection. Administrative Management, New York, v. 43, p. 75, Dec. 1982.
  • 380. Moad, Jeff. PCM Pace seen prod to secrets buy. Electronic News, New York, v. 28, p. 1 +, June 281982.
  • 381. *Moore, Thomas. Industrial espionage at the Harvard B-School (business game). Fortune, New York, V. 106, n. 5, p. 70-2+, Sept. 61982.
  • 382. New "bugs" make spying easier. Business Week, Hightstown, n. 2747, p. 47+, July 121982.
  • 383. *D'REILLY, R.A. Variation in decision-makers use of information sources: the impact of quality and accessibility of information. Academy of Management Journal, Mississippi State, v. 25, n. 4, p. 756-71, 1982.
  • 384. Trifari, John. Lessons to be learned (editorial; Techscam). Mini-Micro Systems, Boston, V. 15,p.97,Aug.1982.
  • 385. THIETART, R.A.; VIVAS, R. Strategic intelligence activity: the management of the sales force as a source of strategic information. Strategic Management Journal, Chichester, V. 2, p. 15-22, 1981.
  • 386. *Gibson, Paul. How the Germans dominate the world chemical industry. Farbes, New York, V. 126, n. 8, p. 155-61+, Del. 131980.
  • 387. *HERSHEY, Robert. Commercial intelligence on a shoestring. Harvard Business Review, Boston, V. 58, n. 5, p. 22-24+, Sept./Dct. 1980.
  • 388. LEAF, Robin. How to pick up tips from your competitors. Director, London, p. 61-62, Feb. 1980.
  • 389. *MONTGOMERY, David B.; WEINBERG, Charles B. Toward strategic intelligence systems. Journal of Marketing, Chicago, v. 43, n. 4, p. 4152, Fall 1979.
  • 390. *ROTHSCHILD, William E. Competitor analysis: the missing link in strategy. Management Review, New York, V. 68, n. 7, p. 22-28, July 1979.
  • 391. *BYLINSKY, Gene. The Japanese spies in Silicon Valley. Fortune, New York, v. 97, n. 4, p. 7479, Feb. 27 1978.
  • 392. LEAF, Robin. Learning from your competition. The McKinsey Quarterly, New York, p. 5260, Spring 1978.
  • 393. *WALL, Jerry L. What the competitor is doing: your need to know. Harvard Business Review, Boston, V. 52, n. 6, p. 22-4+, Nov./Dec. 1974.
  • 394. *CHEYFITZ, Eddie. A new revolution in the U.S. "class structure and labor force". Fortune, New York, V. 57, n. 4, p. 215-16+, Apr. 1958. O

Datas de Publicação

  • Publicação nesta coleção
    13 Jun 2013
  • Data do Fascículo
    Jun 1993
Fundação Getulio Vargas, Escola de Administração de Empresas de S.Paulo Av 9 de Julho, 2029, 01313-902 S. Paulo - SP Brasil, Tel.: (55 11) 3799-7999, Fax: (55 11) 3799-7871 - São Paulo - SP - Brazil
E-mail: rae@fgv.br