© 2019 All Rights Reserved
We use cookies to help make our website better. If you continue to use our site we'll assume this is OK
About Cookies OKWhat is Competitive Intelligence
This is an extract from a lecture we gave to MBAs, business school students & graduates at the University of Westminster in London. Watch for a taste or click here for the full lecture.
We’ve done many other presentations including Zoom / online presentations and webinars. You can view more on our Videos / Webinars page which includes a 2024 talk on how AI (artificial intelligence) can be used to support competitive intelligence.
Contact us if you would also like us to talk to your employees or students on any aspect of competitive or marketing intelligence.
There is no “formula” for collecting information on competitors – but there is a process. First you need to differentiate between passive collection and active collection.
Passive collection involves collecting and storing information that comes your way through the daily operations of the company. You need to categorise and store this information and encourage its collection. Ensure all staff with access to competitor information pass it on to you (or the CI department / analysts) when they encounter it. For example, when a sales person visits a client and is given a snippet of competitor information then the sales person should pass this to you. With passive collection there is no targeted collection plan as such – and what comes in is essentially random. The quantity that comes in depends on the culture of your organisation and how competitor focused it is. If it is weakly competitor focused, without a strong awareness of the need to monitor competitors then even when competitor information is encountered it will remain in the heads of those that encounter it and not be passed back to the CI department. The opposite will be the case in a strongly competitor focused organisation.
The situation for active collection is different – with three types of collection process. All require planning.
For type 1 and type 2 active questions you need a formal search strategy. Generally start with desk research checking out secondary resources to gain a background. Then move onto direct primary research, interviewing as required. For an e-business do not just look at the Internet itself. Your competitors will also be in the “real world” so you need to look at bricks and mortar type businesses as well as clicks or clicks and mortar businesses. (Especially as bricks can usually become clicks very easily!)
When deciding on what to look for, you need to understand why you are looking for the information. The “why” needs to answer the strategic purpose for the information required. There is no point saying “we want everything” as not everything will be usable or collectable, and more importantly, collecting “everything” will be highly expensive. So you need to focus on what is needed.
More importantly, answering the “why” can help lead to a source. Ask a second “why” question – namely “why will the information I need be publicly available?” Answering this question should help lead you to a source for the information. As an example if you want to find financial information: the reason it is available is that there is often a legal requirement to file accounting information. Even if there is no requirement, many firms like to show their size by publishing turnover figures. So – sources will include
a) the legal repositories for accounting information.
b) the company itself for the latest turnover values.
In the case of e-business firms, many will want to raise capital and so publish sales figures and growth figures. Also for an IPO the company will have had to publish a lot of information about itself.
With regards to collecting publicly available information: Publicly is not necessarily published – but it is in the public domain. If a sales contact tells you something as part of a sale – even if it is not written anywhere, then it is legitimate information. Hidden pages on a web-site that are NOT password protected are publicly available if you discover them. What is not legitimate in CI (and becomes industrial espionage) is hacking into a competitor site by breaking passwords, or looking for information that is viewed as a trade secret.