Theo Tryfonas Centre in Systems, Faculty of Engineering Embedding Competitor Intelligence Capability in the Software Development Lifecycle Security and.

Slides:



Advertisements
Similar presentations
Components of a Product Vision/Strategy
Advertisements

Definition Competitive Advantage
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Principal Patent Analyst
Industry Analysis - Porter's Five Forces
EVALUATING A COMPANY’S EXTERNAL ENVIRONMENT
Lecture 2 External Environment Analysis & Globalisation.
1 MIS, Chapter 1 ©2011 Course Technology, a part of Cengage Learning INFORMATION SYSTEMS: AN OVERVIEW CHAPTER 1 Hossein BIDGOLI MIS Cambios en este color.
Dr Neil Bradshaw Director of Enterprise The role of IPR as seen by the academic community LES Annual Conference, Bristol, June 24, 2004.
© 2004 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Holistic View of the Enterprise Business Development Operations.
1 5 FORCES DRIVING INDUSTRY 5 FORCES DRIVING INDUSTRY COMPETITION COMPETITION ( Porter, 1980 ) INDUSTRY POTENTIAL ENTRANTS BUYERS SUBSTITUTES SUPPLIERS.
Vulnerability Testing Approach Prepared By: Phil Cheese Nov 2008.
Developing A Strategy For The Internet Age The Five Forces Model
Organization Development and Change
Strategic Management: Concepts and Cases
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
CHAPTER ONE OVERVIEW SECTION 1.1 – BUSINESS DRIVEN MIS
Organization Development and Change
Presented By: Lindsey Moore John Limberg Matt Martinez Joseph Morgan.
SDLC. Information Systems Development Terms SDLC - the development method used by most organizations today for large, complex systems Systems Analysts.
How to Do an Industry and Competitive Analysis Dr. Stan Abraham MHR 423Spring 2010.
Economic Gardening The Role of Competitive Market Intelligence Michael W. Trahan 25 September 2011.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER ONE MANAGEMENT INFORMATION SYSTEMS: BUSINESS DRIVEN.
Chapter 2: The External Environment: Opportunities, Threats, Industry Competition and Competitor Analysis Overview: The firm’s external environment.
Chapter One Copyright © 2006 McGraw-Hill/Irwin Marketing Research For Managerial Decision Making.
Mantova 18/10/2002 "A Roadmap to New Product Development" Supporting Innovation Through The NPD Process and the Creation of Spin-off Companies.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Current situation of use of business information in Slovene organizations with focus on competitive intelligence Ines Vrenko Peruško, MBA, GfK Gral-Iteo.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Cyber Security: Now and.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER ONE MANAGEMENT INFORMATION SYSTEMS: BUSINESS DRIVEN.
Strategic Management Concepts and Cases
CHAPTER ONE MANAGEMENT INFORMATION SYSTEMS BUSINESS DRIVEN MIS
PO320: Reporting with the EPM Solution Keshav Puttaswamy Program Manager Lead Project Business Unit Microsoft Corporation.
@ ?!.
Chapter 5 Managing Across Cultures Schneider & Barsoux RBC p 428
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 1 The Information Age in Which You Live: Changing the.
1 GE Fanuc ©2008 GE Fanuc Intelligent Platforms All Rights Reserved Proficy* DataMart v1.0 Barry Lynch Product Manager GE Fanuc Software Puts the “E” in.
Ch2-1 Chapter 4: Competitor Analysis “What are they going to do?”
Business Driven Technology Unit 1
BUSINESS DRIVEN TECHNOLOGY
McGraw-Hill/Irwin McGraw-Hill/Irwin Copyright © 2009 by The McGraw-Hill Companies, Inc. All rights reserved.
IDENTIFYING COMPETITIVE ADVANTAGES Three common tools used in industry to analyze and develop competitive advantages include: – Porter’s Five Forces Model.
Business Driven Information Systems
Strategic analysis: searching for opportunities and threats Focus: Daisytek  Assignment: Study H&W Ch 3 Environmental scanning and industry analysis and.
Organizations and Information Systems – Economic Effects MIS 2000.
Review Exam 2 Chapters 6 – 10. Chapter 6 – Systems Development Systems Development Concepts Challenges in Systems Development Types of System Development.
Lecture No 08. Lecture Outline Key Political, Government & Legal Variables Technological Forces Competitive Forces Porter’s Five-Forces Model Industry.
SAM for SQL Workloads Presenter Name.
Chapter 1 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
A global nonprofit: Focusing on IP Protection and Anti-Corruption Sharing leading practices based on insights from global companies, academics, organizations.
Strategy and applications Digital business strategy
IoT Security Market to Global Analysis and Forecasts by Type, Solution and Application No of Pages: 150 Publishing Date: Apr 2017 Single User PDF:
IoT Security Market to Global Analysis and Forecasts by Type, Solution and Application No of Pages: 150 Publishing Date: Apr 2017 Single User PDF:
Popular Database Management Systems
Unit 1: Marketing Competitor analysis 05/02/2018.
Risk management «Once we know our weaknesses, they cease to do us any harm.» G.C. Lichtenberg.
MGMT 452 Corporate Social Responsibility
Strategic Marketing, 3rd edition
Information Systems: Concepts and Management
EXTERNAL ENVIRONMENT ANALYSIS (Competitive analysis)
EXTERNAL ENVIRONMENT ANALYSIS (Competitive analysis)
Information Systems, Organizations, and Strategy
Strategic Management B O S.
Vertical and Horizontal Integration
Strategic Management: Concepts and Cases
Organization Development and Change
IS Risk Management Framework Overview
The Organization Development
Frameworks Porter’s Five Forces Value Disciplines
Managing Marketing Information
Presentation transcript:

Theo Tryfonas Centre in Systems, Faculty of Engineering Embedding Competitor Intelligence Capability in the Software Development Lifecycle Security and Protection of Information Brno, Czech Republic

2 Outline Competitor Intelligence (CI) and tools Software development process and informational requirements An integration framework Relationship to infosec and challenges

3 The importance of Intelligence “If you know the enemy and know yourself, you need not fear the result of 100 battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle” General Sun-Tzu, c BC (?)

Recent industrial espionage cases 4

5 Competitor Intelligence and competitive advantage Many forms of intelligence –National Intelligence, Military Intelligence, Criminal Intelligence, Corporate Intelligence, Business Intelligence, Competitive Intelligence etc. CI: A systematic and ethical program for gathering, analyzing, and managing information that can affect a company's plans, decisions, and operations.

6 The CI process The process of monitoring the competitive environment. –80% of large multinationals have an organized system for collecting intelligence –60% of US companies (of that review sample) It includes competitive, technical, people, and market intelligence.

7 The CI process Integrative CI model showing intelligence information processing stages (Bouthilier & Shearer, 2003)

8 CI tools and applications... Generic (e.g. databases) and specific (e.g. price monitoring agents) –Mind mapping, system dynamics, textual analysis, … Knowledge management/information engineering focused –Requirements elicitation, Data mining, Artificial intelligence, OLAP, Visualisation, Collaboration portals etc. The Internet! (table 1 in the paper: tool/function/description)

9... facilitating Porter’s five forces analysis (consumer, vendor, competitor, new entrants, substitutes) SWOT analysis (strength-weakness-opportunity- threat) Competitor profiling Benchmarking (measuring against competition) Customer-led/requirements-driven design Etc. etc.

10 The software market: Monopolies and ‘The cathedral and the bazaar’ The software industry faces extreme pressures to provide new applications that add value in today's competitive environment. (authors’ JCIM paper) ‘Siloed’ market with near-monopolies for core technologies –E.g. OS (Microsoft), database (Oracle) Intellectual property protection drive, s/w licencing and (personal view) misunderstanding of the digital product in pricing strategy – OSS/FS vs. commercial

11 Software processes and development lifecycles Developing a product in isolation is impossible – especially software –User needs, technology platforms, development tools, laws and regulations, available products and their shortcomings etc. etc. Information gathering is critical throughout the development lifecycle –Both technical and organisational/market driven –To appreciate cost and risk and anticipated revenue

12 SDLC The informational requirements are similar regardless of the nature of the process (linear, iterative,...) Fig from Fig. from

13 Indicative informational requirements in the SDLC – intelligence input Requirements analysis –User needs and preferences, threats and threat agents, existing products, emerging markets,... Design –Input from previous stage –Competitive products designs,... Coding –Input from previous stage –Target platform APIs, threats and threat agent tools, target platform or build technology known vulnerabilities and exploits,... Testing –Input from previous stage –User needs and preferences,... Etc. etc.

Integration of CI into SDLC 14

Integration of CI into SDLC (cont’d) 15

16 CI/Infosec interface: Knowing others, protecting yourself Information security practices can assure the ethical gathering and processing of information (e.g. via compliance with Data Protection Acts) as well as protection from unethical gathering (industrial espionage of third parties, risk of internal threat etc.)

17 Conclusions Understanding the market, user needs and how to price the resulting product has a profound impact on software – and its security –Piracy and IP protection, put-to-market pressure etc. Competitor intelligence is usually viewed as a task of marketers – it isn’t –Many technical aspects, threat environment and hi-tech espionage, need for professional integrity assurance Software processes are now (after many years of preaching) being modified to meet infosec requirements – perhaps they could also formalise the intelligence input to the development/security processes –to capitalise on the maturity of the CI discipline and on the interface of security with real-life business