期刊文献+

基于固定场所的企业竞争情报作战室的设计与实施 被引量:1

The Design and Implementation of War Room of Enterprise Competitive Information Based on Fixed Location
原文传递
导出
摘要 文章在分析固定作战室产生背景及其特点的基础上,从场所、空间、色彩、安全保护和高技术装备五个方面对基于固定场所的企业竞争情报作战室进行设计,提出固定作战室开发和实施过程。最后以Ford竞争对手分析作战室为案例对其作战室设计进行分析。 This paper analyzes the background and characteristics of physical war room firstly, and discusses the designing of enterprise competitive intelligence war room based on physical location in five respects which are place, space, color, satety and technology equipment. Then the authors put forward that the development and implementation of a war room needs three related processes. At last, the paper discusses the design of Ford war room for analyzing its rivals.
出处 《情报资料工作》 CSSCI 北大核心 2011年第2期97-101,共5页 Information and Documentation Services
基金 国家自然科学基金项目"基于战争游戏法的企业竞争情报作战室设计模式与运行机制研究"(编号:70673044)的研究成果之一
关键词 企业竞争情报 竞争情报作战室 固定场所 enterprise competitive intelligence, competitive intelligence war room, physical location
  • 相关文献

参考文献5

  • 1Bob Donath. War room tactic works liar military and for marketing[J]. Marketing News, 200(1(4) : 19- 20.
  • 2KirkWM Fyson竞争情报完全指南[M].王玉等,译.第2版北京:中国人民大学出版社,2005:12.
  • 3董献洲,胡晓峰,司光亚.信息可视化技术在情报分析中的应用研究[J].计算机工程与应用,2006,42(34):175-177. 被引量:14
  • 4Steven M Shaker, Thodore L Rlee. Beating the competition From war room to board room[C]. Third International Symposium: National Security & National Competitiveness Open Source Solutions Proceedings, 1994(1 ) : 63 - 70.
  • 5Monica Langley, Jeffrey McCracken. Inside CEO Mulally's radical overhaul of Ford[J]. Wall Strecl Journal - Easlcra Edition, 2006, 147(248) :A1 - A10,2.

二级参考文献12

  • 1贺筱媛,胡晓峰,张昱,杨韶云.战争模拟系统中按需数据服务的实现方法[J].系统仿真学报,2005,17(9):2273-2275. 被引量:2
  • 2董献洲,司光亚,胡晓峰,吴琳.战略模拟情报分析与信息可视化服务研究[J].系统仿真学报,2005,17(11):2815-2817. 被引量:4
  • 3HEER J,CARD S K,LANDAY J A.Prefuse:a toolkit for interactive information visualization[C]//Proceedings of the SIGCHI Conference on Human factors in computing Systems.Portland,Oregon,USA:2005,421-430.
  • 4XU J,CHEN H.Criminal network analysis and visualization[J].Communications of the ACM,2005,48(6):101-107.
  • 5XU J,CHEN H.CrimNet explorer-a frame work for criminal network knowledge discovery[J].ACM Transactions on Information Systems,2005,23 (2):201-226.
  • 6HAO M,DAYAL U,HSU M,et al.A Java-based Visual Mining Infrastructure and Applications[Z]Software Technology Laboratory HP Laboratories Palo Alto HPL-1999-49,1999-04.
  • 7Pacific Northwest National Laboratory.Visual information analysis:a picture is worth a thousand words[EB/OL].http://mscf.emsl.pnl.gov/pdf/brochures/visutil.pdf.
  • 8TEOH S T,MA Kwan-Liu.RINGS:A technique for Visualizing Large Hierarchies[C]//Graph Drawing 2002,c2000:268-275.
  • 9HAVRE S,HETZLER B,NOWELL L.ThemeRiver:visualizing theme changes over time[C]//Proceedings of IEEE Symposium on Information Visualization,InfoVis 2000,October 2000,c2000:115-123.
  • 10HAVRE S,HETZLER E,WHITNEY P,et al.ThemeRiver:visualizing thematic changes in large document collections[J].IEEE Transactions on Visualization and Computer Graphics,2002,18(1):9-20.

共引文献13

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部