{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T00:26:30Z","timestamp":1777854390082,"version":"3.51.4"},"reference-count":40,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2004,4,1]],"date-time":"2004-04-01T00:00:00Z","timestamp":1080777600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Information Science"],"published-print":{"date-parts":[[2004,4]]},"abstract":"<jats:p>The paper argues that competitive intelligence is a vital function and attempts to study how it is distributed, especially by technologies, within organizations. Related topics, the sources of competitive intelligence, and who distributes and receives competitive intelligence, are also addressed. A literature-based study is extended by a quantitative survey of members of the Society of Competitive Information Professionals (SCIP) and email interviews with a self-chosen sample of respondees. The paper concludes that the distribution of competitive intelligence can be aided by technology but to be effective must be primarily \u2018person-focused\u2019. Competitive intelligence itself needs to be seen as a form of knowledge management rather than an information provision function. This has implications for sources and for the professional roots of those who provide competitive intelligence. Evaluation of competitive information provision is seen as a next step for research.<\/jats:p>","DOI":"10.1177\/0165551504042806","type":"journal-article","created":{"date-parts":[[2004,5,27]],"date-time":"2004-05-27T11:59:35Z","timestamp":1085659175000},"page":"165-180","source":"Crossref","is-referenced-by-count":36,"title":["Dissemination of Competitive Intelligence"],"prefix":"10.1177","volume":"30","author":[{"given":"Jane","family":"Marin","sequence":"first","affiliation":[]},{"given":"Alan","family":"Poulter","sequence":"additional","affiliation":[{"name":"Graduate School of Informatics, University of Strathclyde, UK"}]}],"member":"179","published-online":{"date-parts":[[2004,4,1]]},"reference":[{"issue":"50","key":"atypb1","volume":"176","author":"G. Anders","year":"2001","journal-title":"Fast Company"},{"key":"atypb2","volume-title":"Competitive Intelligence: harvesting information to compete and market intelligently","author":"S. Brod","year":"1999"},{"key":"atypb3","first-page":"133","volume-title":"Millennium Intelligence","author":"B. Hohhof","year":"2000"},{"key":"atypb4","volume-title":"IT is helping companies dig up vital information on their archenemies","author":"G. H. Anthes"},{"issue":"7","key":"atypb5","first-page":"24","volume":"5","author":"M. Gallagher","year":"2001","journal-title":"Information Outlook"},{"key":"atypb6","unstructured":"[6] S. Brod, 1999, op.cit., p.9."},{"key":"atypb7","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1520-6386(200031)11:1<17::AID-CIR4>3.0.CO;2-3"},{"key":"atypb8","volume-title":"Competitive Intelligence: an overview","author":"S.H. Miller","year":"2002"},{"key":"atypb9","doi-asserted-by":"crossref","unstructured":"[9] C.L. Lackman, K. Saban, and J.M. Lanasa, 2000, op.cit., p.18.","DOI":"10.1108\/02634500010308530"},{"key":"atypb10","doi-asserted-by":"crossref","unstructured":"[10] C.L. Lackman, K. Saban, and J.M. Lanasa, 2000, op.cit., p.18.","DOI":"10.1108\/02634500010308530"},{"issue":"9","key":"atypb11","volume":"13","author":"L.C. Ray","year":"2002","journal-title":"Business Leader"},{"key":"atypb12","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1520-6386(200032)11:2<4::AID-CIR3>3.0.CO;2-E"},{"key":"atypb13","unstructured":"[13] H. Gieskes, 2000, op.cit., p.10."},{"issue":"2","key":"atypb14","volume":"1","author":"L. Rosen","year":"1998","journal-title":"Competitive Intelligence Magazine"},{"key":"atypb15","unstructured":"[15] H. Gieskes, 2000, op.cit., p.7."},{"key":"atypb16","unstructured":"[16] L.C. Ray, 2002, op.cit."},{"key":"atypb17","unstructured":"[17] C.L. Lackman, K. Saban, and J.M. Lanasa, 2000, op.cit., p.21."},{"issue":"4","key":"atypb18","first-page":"42","volume":"126","author":"N. Oder","year":"2001","journal-title":"Library Journal"},{"key":"atypb19","volume-title":"Society of Competitive Intelligence Professionals, What is CI?","year":"2002"},{"key":"atypb20","doi-asserted-by":"publisher","DOI":"10.1108\/01435120010342770"},{"key":"atypb21","first-page":"43","volume-title":"Millennium Intelligence","author":"K.A. Sawka","year":"2000"},{"issue":"5","key":"atypb22","volume":"4","author":"E. Codogno","year":"2001","journal-title":"CI Magazine"},{"key":"atypb23","unstructured":"[23] B. Hohhof, 2000, op.cit., p.137."},{"key":"atypb24","unstructured":"[24] H. Gieskes, 2000, op.cit., 8-9."},{"key":"atypb25","unstructured":"[25] L. Rosen, 1998, op.cit."},{"key":"atypb26","unstructured":"[26] Gary H. Anthes, 1998, op.cit."},{"key":"atypb27","unstructured":"[27] H. Gieskes, 2000, op.cit., p.7."},{"key":"atypb28","unstructured":"[28] L. Rosen, 1998, op.cit."},{"key":"atypb29","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1520-6386(199801\/03)9:1<4::AID-CIR3>3.0.CO;2-T"},{"key":"atypb30","first-page":"155","volume-title":"Millennium Intelligence","author":"R.O. Barclay","year":"2000"},{"issue":"3","key":"atypb31","first-page":"17","volume":"25","author":"K. Guenther","year":"2001","journal-title":"Online"},{"key":"atypb32","volume-title":"The death of the intranet: long live the corporate portal quantifying ROI","author":"I. Wells"},{"key":"atypb33","unstructured":"[33] I. Wells, 2002, op.cit."},{"key":"atypb34","doi-asserted-by":"publisher","DOI":"10.1108\/13673270010350048"},{"key":"atypb35","doi-asserted-by":"publisher","DOI":"10.1629\/14179"},{"key":"atypb36","unstructured":"[36] N. Oder, 2001, op.cit., p.42."},{"issue":"4","key":"atypb37","first-page":"187","volume":"34","author":"M. Bexon","year":"2002","journal-title":"Journal of Librarianship and Information Science"},{"key":"atypb38","doi-asserted-by":"crossref","volume-title":"The next society","author":"P. Drucker","DOI":"10.4324\/9780080942377-24"},{"key":"atypb39","doi-asserted-by":"publisher","DOI":"10.1002\/aris.1440360109"},{"issue":"2","key":"atypb40","volume":"6","author":"R. Chamberlain","year":"2003","journal-title":"Competitive Intelligence Magazine"}],"container-title":["Journal of Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0165551504042806","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0165551504042806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T23:06:48Z","timestamp":1777504008000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/0165551504042806"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,4]]},"references-count":40,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2004,4]]}},"alternative-id":["10.1177\/0165551504042806"],"URL":"https:\/\/doi.org\/10.1177\/0165551504042806","relation":{},"ISSN":["0165-5515","1741-6485"],"issn-type":[{"value":"0165-5515","type":"print"},{"value":"1741-6485","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004,4]]}}}