Strategic & Business Intelligence (S.B.I.)

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

According to Christian Harbulot, what is the purpose of systematic research and interpretation of information?

  • To distribute information effectively to economic actors.
  • To decipher intentions of actors and understand their capabilities. (correct)
  • To ensure data exploitation with a view to its distribution.
  • To carry out actions legally while protecting the company's assets.

In the context of Strategic & Business Intelligence (SBI), which of the following is NOT typically considered a key element?

  • Analysis
  • Protection
  • Espionage (correct)
  • Monitoring

Which of the following best describes the relationship between Strategic & Business Intelligence (SBI), Competitive Intelligence (CI), and Corporate Intelligence in France?

  • CI is a more comprehensive approach than SBI, emphasizing lobbying and PR activities.
  • They are identical concepts used interchangeably across different countries.
  • Corporate Intelligence is uniquely focused on technological advancements and innovation.
  • SBI in France encompasses a broader scope than CI, incorporating elements of secrecy/protection and influence. (correct)

Which of the following sequences correctly orders the dimensions of an S.B.I. approach?

<p>Integrate &amp; guide, monitor environment, process &amp; analyze, manage intelligence, protect assets, influence environment. (B)</p> Signup and view all the answers

How does hybrid warfare impact corporations compared to traditional security threats?

<p>It poses challenges to traditional organizational structures and risk management processes. (D)</p> Signup and view all the answers

What exemplifies the impact of geopolitical and technology dynamics on multinational corporations in the context of hybrid warfare?

<p>Greater exposure to extra-territorial legislative actions and biased industry standards. (B)</p> Signup and view all the answers

How does the weaponization of nationalistic sentiment impact corporations in the context of business?

<p>It results in a new challenging business environment fostering boycotts, name-and-shame campaigns, and cyber warfare. (D)</p> Signup and view all the answers

What is a key security measure companies use to proactively counter hybrid warfare's non-traditional risks?

<p>Transforming security management to an enterprise-wide, whole-of-company approach. (C)</p> Signup and view all the answers

What is the role of cross-competency experts in mitigating risks associated with hybrid warfare?

<p>To drive change and lead holistic security risk management practices. (C)</p> Signup and view all the answers

During geopolitical conflicts, how might trade and finance be used to influence business?

<p>As a tit-for-tat response to skirmishes through economic sanctions or supply chain diversification efforts. (B)</p> Signup and view all the answers

How have technology-driven social movements affected business?

<p>They have led to enhanced stakeholderism and diffused responsibility. (B)</p> Signup and view all the answers

Which of the following is a potential business impact of technology-driven social movements?

<p>Disrupted workflows and negative brand reputation due to slanderous communication. (D)</p> Signup and view all the answers

What measures can companies take to mitigate the impact of technology-driven social movements?

<p>Implementing robust Business Continuity Management (BCM) plans and stakeholder engagement. (C)</p> Signup and view all the answers

In the context of Strategic Business Intelligence (SBI), what does the 'Age of Lawfare' refer to?

<p>The use of legal systems and institutions to achieve strategic goals and exert influence. (B)</p> Signup and view all the answers

What does the concept of 'Unrestricted Warfare' emphasize?

<p>The use of various dimensions like lawfare, economic warfare, and information warfare in conflict. (A)</p> Signup and view all the answers

What is one of the criticisms of Porter's Five Forces model?

<p>It overlooks the potential for disruptive innovation to shift the zone of power. (D)</p> Signup and view all the answers

According to D'Aveni's Five Zones of Strategic Supremacy, how should a company consider its competitive landscape?

<p>By carefully considering the relationships between its core business, vital interests, buffer zone, pivot zone, and forward positions. (B)</p> Signup and view all the answers

Within the contributions of SBI to a company, what does BTDE stand for?

<p>Business Threat Detection &amp; Evaluation (A)</p> Signup and view all the answers

According to the material, what does effective information monitoring achieve?

<p>Moving from information to usable intelligence. (C)</p> Signup and view all the answers

How does using Really Simple Syndication (RSS) feeds enhance information monitoring for SBI?

<p>By automating the process of staying current with changes in open-source content. (C)</p> Signup and view all the answers

In intelligence gathering, what are OSINT, HUMINT and SOCMINT examples of?

<p>Intelligence Sources (-INTS) (C)</p> Signup and view all the answers

Why is HUMINT considered to have higher added value compared to other intelligence sources?

<p>It provides first-hand information that has not been treated. (D)</p> Signup and view all the answers

What characterizes the use of 'secondary' sources in intelligence gathering?

<p>Using information that has already received at least one level of treatment. (D)</p> Signup and view all the answers

What constitutes 'primary' sources in intelligence gathering?

<p>Accessing first-hand information and observations. (B)</p> Signup and view all the answers

Based on the data provided in the slides on average S.B.I reports, which sources contains the highest percentage of the data?

<p>Secondary sources. (B)</p> Signup and view all the answers

In qualifying intelligence sources, what should be done if information is trustworthy but cannot be verified or confirmed by other sources?

<p>Avoid using it. (D)</p> Signup and view all the answers

What should analysts do to protect the integrity of intelligence when using any source?

<p>Assess the reliability and relevancy of the source. (D)</p> Signup and view all the answers

How can cognitive biases affect strategic business intelligence?

<p>By leading to misinterpretations and poor decision-making. (C)</p> Signup and view all the answers

What does the 'conjunction fallacy' refer to amidst cognitive biases?

<p>Overestimating the probability of combined events based on stereotypes. (A)</p> Signup and view all the answers

How does 'availability bias' affect our judgment?

<p>It causes us to assign excessive weight to emotional and recent events. (C)</p> Signup and view all the answers

What cognitive bias explains our reaction to a 250g yogurt labeled '80% fat free' versus one labeled 'contains 15% fat'?

<p>Framing Bias. (B)</p> Signup and view all the answers

What step should an analyst take to protect the integrity of intelligent production?

<p>Use structured methodologies for unbiased analysis. (D)</p> Signup and view all the answers

In stakeholder mapping, what is 'identifying' intended to achieve?

<p>Categorize all the parties impacted. (D)</p> Signup and view all the answers

When conducting stakeholder mapping, what is 'Prioritization'?

<p>An internal assessment that represents the biggest threat. (B)</p> Signup and view all the answers

What is the goal when performing 'Focus' during the analysis process of stakeholder mapping?

<p>Strategic move that maximizes impact. (D)</p> Signup and view all the answers

With 'Sociodynamic Chessboards', how would a party expressing limited investment to your idea be labeled?

<p>Hesitant. (D)</p> Signup and view all the answers

How to 'manage stakeholders' when implementing a 'strategic dynamic chessboard'?

<p>Understand the strategic value that each can bring. (A)</p> Signup and view all the answers

According to the documentation what are three elements to 'gain strategic alignment' during stakeholder analysis?

<p>Understand dynamics, identify major and minor influences, leverage all possible resources. (D)</p> Signup and view all the answers

Flashcards

Strategic & Business Intelligence (SBI)

Coordinated actions researching, processing, and distributing information useful to economic actors, legally and securely.

Strategic & Business Intelligence (SBI)

Systematic research and interpretation of public information to understand actors' intentions and capacities.

Hybrid Warfare

Multi-dimensional offensive actions creating instability to justify kinetic action.

Asymmetric Warfare

Non-conventional action countering stronger force.

Signup and view all the flashcards

Grey-zone tactics

Action occurring between statecraft/diplomacy and military action.

Signup and view all the flashcards

Risk Management in Hybrid Warfare

Traditional risk management struggles to address the non-traditional risk of hybrid warfare.

Signup and view all the flashcards

Risk Management in Hybrid Warfare

Traditional risk management struggles to address the non-traditional risk of hybrid warfare.

Signup and view all the flashcards

Resources: Cross-competency experts

Expertise, collaboration, and new capabilities are essential to drive change.

Signup and view all the flashcards

Structures: Integration

Integration of holistic security risk management from silos to fusion centers.

Signup and view all the flashcards

Potential Mitigating Actions

Traditional risk management struggles to address the non-traditional risk of hybrid warfare

Signup and view all the flashcards

Impact of Digitization

Transformational power of digitization changing social movements.

Signup and view all the flashcards

Impact on Business

Trade losses, stocks fell, and brand was impacted.

Signup and view all the flashcards

Mitigation Strategies

Measures taken during trade disputes and crises.

Signup and view all the flashcards

Lawfare

Economic conflict using laws.

Signup and view all the flashcards

Intelligence Plan

Collection of informational needs defining who does what and how.

Signup and view all the flashcards

OSINT

Open Source Intelligence

Signup and view all the flashcards

HUMINT

HUMan INTelligence

Signup and view all the flashcards

SOCMINT

SOCial Media INTelligence

Signup and view all the flashcards

FININT

FINancial Intelligence

Signup and view all the flashcards

CYBINT

CYBer INTelligence

Signup and view all the flashcards

SIGINT

SIGnals INTelligence

Signup and view all the flashcards

COMINT

Communications INTelligence

Signup and view all the flashcards

ELINT

ELectronic INTelligence

Signup and view all the flashcards

Secondary Sources

Sources such as OSINT, internet and basic background information.

Signup and view all the flashcards

Primary Sources

Original, first-hand accounts and data.

Signup and view all the flashcards

Conjunction Fallacy

Reliance on stereotypes biases reality.

Signup and view all the flashcards

Availability Bias

Using information from recent events too heavily in decision-making.

Signup and view all the flashcards

Framing Bias

Cognitive pitfall involving how data is presented.

Signup and view all the flashcards

Contradictor's Course

Identify, deter, and weaken these.

Signup and view all the flashcards

Committed's Course

Weaponize & control their moves more closely.

Signup and view all the flashcards

Creative Recommendations

Create a process and monitoring for it.

Signup and view all the flashcards

Combine Recommendations

Understand how it all can work together.

Signup and view all the flashcards

Conserve strength

Conserve resources to win battles.

Signup and view all the flashcards

Concentrate recommendations

Focusing on a single point to help win.

Signup and view all the flashcards

Sho shin

The 'beginner's spirit.'

Signup and view all the flashcards

Wu wei

conscious refusal to act

Signup and view all the flashcards

Study Notes

  • Strategic & Business Intelligence (S.B.I.) is a foresight and decision-making tool for managers.
  • Nicolas Michelon is the CEO of Asia Intelligence Advisory, editor at asiapowerwatch.com, and holds an MSc in International Business & Diplomacy from ESCP.

Definitions of Strategic & Business Intelligence

  • Strategic & Business Intelligence involves coordinated research, processing, and distribution to exploit information that is useful to economic actors.
  • Actions are legally carried out with necessary protection measures to preserve company assets as noted in the Martre Report, 1994.
  • It is the systematic research and interpretation of information available to decipher the intentions and capacities of actors, according to Christian Harbulot, Ecole de Guerre Economique.
  • S.B.I. includes monitoring, analysis, protection, and influence.

S.B.I. in France vs. Competitive Intelligence in the US/UK

  • France focuses on secrecy/protection via Competitive Intelligence and Corporate Intelligence and S.B.I.
  • The United States and the United Kingdom use lobbying and PR.

6 Dimensions of an S.B.I. Approach

  • Integrate & guide an S.B.I. approach.
  • Monitor the environment.
  • Process & analyze strategic intelligence.
  • Manage intelligence & knowledge.
  • Protect intangible assets.
  • Influence the environment.

Geopolitical & Geo-economic Context

  • Conflicts between state actors and economic players increasingly consist of hybrid, asymmetric, and grey-zone tactics.

Hybrid Warfare

  • It employs multi-dimensional offensive action, creating instability or justifying kinetic action.

Asymmetric Warfare

  • It is non-conventional offensive or defensive actions to counter a superior force.

Grey-Zone Tactics

  • They are offensive or defensive actions occurring between classical statecraft/diplomacy and military action.

Relevance of Hybrid Warfare to Corporations

  • Geopolitical and technological dynamics have a greater impact on corporates, multinational AND local.
  • Hybrid warfare challenges traditional organizational structures and risk management.
  • Corporations are facing increasing government pressure through extra-territorial legislative arsenals and biased industry norms & standards.
  • Non-economic actors are being weaponized to wage hybrid warfare on economic interests.

Why hybrid warfare matters to corporates

  • Threat: An increase is expected across almost all industries, due to hybrid warfare challenging traditional threat assessment processes.
  • Vulnerability: Varies by company profile/operating context; operations and personnel exposed to "two-way risk"; traditional risk management processes are challenged.
  • Consequence: The types of impacts are generally well understood, however the indirect implications of hybrid warfare events can be overlooked or underestimated.

Potential Impact on Business

  • « Doomed if you do, doomed if you don't ».
  • Hegemonic power rivalry & weaponization of nationalistic sentiment pose business challenges.
  • Escalating conflicts disrupt supply chains.
  • Nationalistic/value-based backlash use boycotts, name-and-shame tactics, and cyber warfare against corporations from "offender nations."
  • Trade & finance weaponized as tit-for-tat responses, using economic sanctions or supply chain diversification efforts.
  • Potential conflicts arise over resource access.

Mitigating Actions

  • Traditional risk management struggles with the non-traditional risks of hybrid warfare.
  • Resources, structures & processes must be reimagined for proactive rather than reactive crisis management.
  • Security transformation requires shifting to a whole-of-company approach.
  • Cross-competency experts who can drive change are crucial, as is leveraging new capabilities and partnerships.
  • Integration is key for holistic security risk management, breaking silos to create fusion centers; security risk management needs to be enterprise risk management.

Movements in Civil Society

  • Movements in civil society are increasingly technology driven.
  • "Arab Springs" occurred from December 2010 to December 2012.
  • “Occupy” included 951 cities across 82 countries beginning in September 2011.
  • “Black Lives Matter” which began in July 2013, had 67% popular support, and raised $10.6 bn in six months.
  • "Yellow vests” occurred in November 2018.
  • "Global Week for Future" on 15 March 2019 involved 4500 locations, 150 countries, and 6 mn people.
  • The Farmers strike (India) spanned from September 2020 to November 2021.
  • “Freedom Convoys" happened January-February 2022.

Impact of Technology-Driven Social Movements

  • Transformational power of digitization, enhanced stakeholderism, state interventionism, diffused responsibility, and ESG and industrial disarray.

Impact on Business

  • Farmers' strike in India led to trade losses of Rs 70,000 crores in Q3 FY20-21.
  • The Global week for future caused stocks of Carbon intensive firms to fall by about 40 basis points.
  • Investors are shying away from Carbon Intensive firms due to the Climate Strikes campaign.
  • Investors are withdrawing from companies sourcing labour from Xinjiang after human rights group action.
  • Miscommunication and negative brand reputations led to disrupted workflows and a driven down value proposition.

Mitigation Strategies

  • Employ Crisis Communication, and a Business Continuity Management (BCM) Plan
  • Incorporate Risk Anticipation, Stakeholder Engagement, Drills and Procedures, and ESG Audits.

S.B.I., Trade Wars, and Lawfare

  • Non-Covid19-related import-restrictive/facilitating measures are factors related to Strategic & Business Intelligence.
  • The US uses extra-territorial legislative arsenals like FCPA, ITAR, EAR, and FATCA.
  • China is snapping up strategic assets & growing influence on EU institutions & FDI legislation (CAI).
  • The US controls FDI with CFIUS and EEA.
  • China controls FDI with MOFCOM « negative lists ».
  • Pressure to provide evidence against Huawei's CFO in Iran-embargo (CAATSA) violation case.
  • Pressure to participate in the freezing of PRC & HKG officials' assets as a result of crackdown on HKG protests.
  • Pressure to condemn violent demonstrations and support National Security Legislation in HKG.
  • Pressure to participate in the freezing of HKG democratic opponents' assets at home and overseas.

"Unrestricted Warfare"

  • QIAO Liang & WANG Xiang Sui wrote the book « UNRESTRICTED WARFARE » in 1999.
  • Multidimensional conflict includes lawfare, economic warfare, information warfare, and terrorism/organized crime.
  • The military dimension becomes one of many dimensions of conflict.
  • The principles of unrestricted warfare are omini-directionality, synchrony, limited objectives, unlimited measures, asymmetry, adjustment, multi-dimensional coordination and minimal consumption.

Cases of Economic Warfare

  • Airbus vs Boeing due to slowing down development of A380.
  • Renault vs Nissan weakening FRA influence.
  • Alstom vs US Dept. of Justice / General Electric due to taking over major competitor.
  • Naval Group vs Mitsubishi Heavy / ThyssenKrupp Marine weakening chances to close « deal of the century ».
  • Aixtron vs San'an Optoelectronics / Fujian Grand Chip attempt at hostile takeover.
  • LafargeHolcim vs NGOs/employees/media/FRA justice financing Islamic State in Syria.
  • Uniqlo (Fast Retailing) / Zara (Inditex) vs NGOs purchasing Xinjiang cotton involving forced labour.

Managerial Context

  • S.B.I. is a benefit to the company and its managers.
  • Porter's Five Forces are threat of substitution, suppliers' negotiating power, intra-sector rivalry, clients negotiating power, threat of new entrants
  • Boulding's Three Faces of Power are Power of substitution, Power of integration and Power of coercion.
  • D'Aveni's Five Zones of Strategic Supremacy are core business, vital interests, buffer zone, pivot zone and forward positions.
  • Lafon, 2019 states S.B.I. is about managing risk & information in a controlled way through open source intelligence gathering & influence strategies
  • The components of that are strategic & tactical decision, business threat detection & evaluation, business opportunity detection & evaluation and Information Risk Mitigation.

Managerial Context

  • S.B.I. should help with monitoring, analysis, protection and influence.

Protection - Patent or Secret

  • Jacques Bauvir, Head of IP, Michelin states "our principle is to patent everything that is seen and to keep secret everything that can be, especially with regard to manufacturing"

Intelligence Cycle

  • The intelligence cycle involves direction, collection, processing, analysis, dissemination.

Direction: Building an intelligence plan

  • It summarizes the collection of informational needs of an organization, progressing from strategic to operational levels via a research plan that defines who does what, how, and on what deadlines.

Intelligence Plan example

  • Who,where, how, when: Past strategy: John, EU, Web - database, Mid-June, Current strategy: Sara, EU, Web – press releases,Mid-July, Shareholding structure: Becky, Worldwide , Annual reports - web, May, Main suppliers: William, France - Italy, Database - Web, Mid-June, BoD structure Jack,Worldwide, Annual reports - filings, May, Financial data, Cynthia, EU,Annual, reports - filings, Mid-July

Monitoring

  • Monitoring involves human, subjective elements and is contextual and tacit.
  • Transferability requires codifiable and explicit data as its easily transferrable.
  • Monitoring employs RSS (« Really Simple Syndication ») feeds & feed aggregators.
  • RSS feed is a XML file describing in a synthetic way the content of a website, including title, short description, and corresponding HTML links.
  • It’s a simple, efficient & time-saving (automated) way to remain informed of content changes from an open source (OSINT), without manually accessing sources.
  • RSS feed aggregators: Inoreader / Digimind / Sindup / Queryfeed (SOCMINT).
  • To conduct monitoring using a PULL method you must manually search for information
  • PUSH method monitoring automatically delivers the information

Intelligence Gathering

  • OSINT – Open Source Intelligence
  • HUMINT – Human Intelligence
  • SOCMINT – Social Media Intelligence
  • FININT – Financial Intelligence
  • CYBINT – Cyber Intelligence
  • SIGINT – Signals Intelligence
  • COMINT – Communications Intelligence
  • ELINT – Electronic Intelligence
  • Hierarchy, added value, and cognitive bias are the core sources.

Intelligence Sources

  • Secondary sources, OSINT, Internet, research & analysis documents and databases have been already received at least one level of treatment.
  • Acquiring basic information & basic knowledge.
  • Identify secondary sources, expert reports, research authors, list of participants to a conference and employee yearbook.
  • Identify “dead angles” and validate information gathered from PRIMARY sources.
  • With Primary sources first-hand information has not received any or minimal treatment.
  • Acquiring missing information after a research on SECONDARY sources.
  • Identifying qualified human sources: experts, Key Opinion Leaders – KOL.
  • acquire information by elicitation

Intelligence Gathering

  • A.k.a. « spying ».
  • Includes, acquiring not publically-available information and /or acquiring it illegally, spying, theft, hacking.
  • Confidential information, industrial/technological/trade secrets,sensitive biographical information.
  • On average, an S.B.I. report is made up of: 80% volume, 10% cost by secondary sources, 80% cost/value by primary sources & unknown for « Other Sources."

Source Qualification

  • Is confirmation/cross-reference by other information possible?
  • Should you trust the information and/or verified sources?
  • A checklist confirms source's expertise, is the information objective, and verifiable.
  • The intention/objective of source, relevance to timeframe/context, and how primary the source is.

Cognitive Bias

  • Cognitive bias can impact strategic & business Intelligence.
  • Maréchal Foch, 1911 said"Aeroplanes are interesting scientific toys, but are of no military value".
  • Robert Millikan, physics Nobel Prize laureate, 1928 said “There is no likelihood that man can ever tap the power of the atom".
  • Irving Fisher, prof. of economics at Yale University predicted that “Stock prices have reached what looks like a permanently high plateau” only 10 days prior to the Wall Street Crash of 1929.
  • Darryl Zanuck, CEO of 20th Century Fox, 1946: Television won't be able to hold on to any market it captures after the first 6 months".
  • Sir Harold Spencer Jones, UK Astronomer Royal, 1957 said "Space travel is bunk » 2 weeks before Sputnik orbited the Earth.
  • attriuted to Bill Gates in 1981 "640K ought to be enough for anybody"

Types of Cognitive Bias

  • There are Conjuction Fallacy, Availability, and Framing Bias.
  • Conjuction Fallacy affects probability assessments based on stereotypes.
  • Availability bias influences when people rely on information that comes readily to mind when evaluating situations or making decisions.
  • Framing Bias influences decisions based on information presentation.
  • To avoid bias you must use structured analysis methodologies, carefully select the intelligence, cultivate a high degree of critical sensein your findings.
  • It is also important to confront your hypothesis and that of the other actors involved in the process.

Stakeholder mapping

  • Stakeholder Mapping is an exercise that allows to Identify who your direct/indirect, internal/external stakeholders are, determine how much engagement, communication, prioritise stakeholders and focus on making tatcial and strategical moves to maximise on impact.
  • There are also those what are deemed defenders, promoters apethetics or latents.
  • A framework of analysis from Mitchell, Agle & Wood states Power, Legitimacy and urgency.
    • Stakeholder Mapping is a "Local and Static approach" and a "Global and Static Approach".
  • Strategic chessboards serve as a simplified tool to analyze & act.
  • The strategic chessboard aims to better formalize and understand games of power and can widen strategic focus, determine ranges of responses, elaborate prospective scenarios, and inform influence strategies thereby escaping cognitive encirclement.
  • Chessboards, are an objective grid of analysis of stakeholders allowing synthetic analyses and identification of maneuver margins that is the perspective of influence.
  • Chessboards aid control of business, identify internal and external stakeholders, show the balance of power, show possibility bounds, and provide a competitive advantage.
  • There are multi-dimensional strategic chessboards where you must consider multi-dimensional strategic chessboards - competitive, society and geo-economic chessboards.
  • Sociodynamic chessboards also consider allied, committed, hesitant, neutral forces and passive forces, advesaries among other groups.

Characteristics of stakeholders

  • Committed- has a direct & durable interest in supporting, allied- has a direct & immediate interest in supporting. passive- dows not feel concerned, neutral- refuses to take sides.
  • Hesitant – does not commit but could easily change sides, Contradictor – has an interest in not supporting.
  • Opponent has interests opposed to ours and Adversary has a strategy hostile to ours.
  • Some chessboards in the global market are France's Banque Mondiale, US, Exxon, Elf, Shell, GReen Peace and WWF
  • To appropriately course of action should be to weaponise and ensure flipping, influence for commitment, coerce into tactical commitment, avoid conflict and stabilise.

Steps to take:

  • The recommendations are to be creative & Combine different actions into one strategy.
  • Keep in mind to save your strength with military force, concentrate your forces & keep the initiative.
  • To continue success of "Strategic & Business Intelligence" one must keep practive & culture, and cultural intelligence in mind for those in business, law, finance and human resoures.
  • The concept of intelligence can also be taken into the past, with the art of war and swindling while considering future business & technological developments.
  • Lastly in asian culture, you must look at business warfare by studying shoshin, wu wei, go and shogi.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser