{"id":15149,"date":"2018-10-09T14:00:45","date_gmt":"2018-10-09T17:00:45","guid":{"rendered":"http:\/\/www.bibliotecadeseguranca.com.br\/en\/?p=15149"},"modified":"2018-10-09T13:28:49","modified_gmt":"2018-10-09T16:28:49","slug":"strategic-intelligence-business-intelligence-competitive-intelligence-and-knowledge-management","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/livros\/strategic-intelligence-business-intelligence-competitive-intelligence-and-knowledge-management\/","title":{"rendered":"Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-15150\" src=\"http:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-content\/uploads\/2018\/10\/strategic-intelligence-business-intelligence-competitive-intelligence-and-knowledge-management.jpg\" alt=\"Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management\" width=\"145\" height=\"225\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-content\/uploads\/2018\/10\/strategic-intelligence-business-intelligence-competitive-intelligence-and-knowledge-management.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-content\/uploads\/2018\/10\/strategic-intelligence-business-intelligence-competitive-intelligence-and-knowledge-management-97x150.jpg 97w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Jay Liebowitz<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Publisher Auerbach Publications<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Overview:<\/strong><\/span> Strategic intelligence (SI) has mostly been used in military settings, but its worth goes well beyond that limited role. It has become invaluable for improving any organization&#8217;s strategic decision making process. The author of Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management recognizes synergies among component pieces of strategic intelligence, and demonstrates how executives can best use this internal and external information toward making better decisions.<br \/>\nDivided into two major parts, the book first discusses the convergence of knowledge management (KM), business intelligence (BI), and competitive intelligence (CI) into what the author defines as strategic intelligence. The second part of the volume describes case studies written by recognized experts in the fields of KM, BI, and CI. The case studies include strategic scenarios at Motorola, AARP, Northrop Grumman, and other market leaders.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jay Liebowitz Publisher Auerbach Publications Overview: Strategic intelligence (SI) has mostly been used in military settings, but its worth goes well beyond that limited role. It has become invaluable for improving any organization&#8217;s strategic decision making process. The author of Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management recognizes synergies among component pieces of strategic intelligence, and demonstrates how executives can best use this internal and external information toward&hellip; <\/p>\n","protected":false},"author":3,"featured_media":15150,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,30],"tags":[],"class_list":["post-15149","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-livros","category-espionagem-e-inteligencia-competitiva"],"views":436,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/posts\/15149","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/comments?post=15149"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/posts\/15149\/revisions"}],"predecessor-version":[{"id":15151,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/posts\/15149\/revisions\/15151"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/media\/15150"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/media?parent=15149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/categories?post=15149"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/tags?post=15149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}