The Network Challenge (Chapter 16)

Extended Intelligence Networks: Minding and Mining the Periphery

Business & Finance, Management & Leadership, Planning & Forecasting
Cover of the book The Network Challenge (Chapter 16) by George S. Day, Paul J. H. Schoemaker, Scott T. Snyder, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: George S. Day, Paul J. H. Schoemaker, Scott T. Snyder ISBN: 9780137015115
Publisher: Pearson Education Publication: May 19, 2009
Imprint: FT Press Language: English
Author: George S. Day, Paul J. H. Schoemaker, Scott T. Snyder
ISBN: 9780137015115
Publisher: Pearson Education
Publication: May 19, 2009
Imprint: FT Press
Language: English

Although networks in key business areas such as communications, supply chains, R&D, and sales are designed to improve the flow of information, people, or goods, they can also be used to improve the “peripheral vision” of the organization. In this chapter, the authors examine how networks can be used by organizations to scan, sense, and adapt to new and important signals from the organization’s strategic environment beyond its core focus. The first part of the chapter emphasizes the importance of peripheral vision in helping organizations not being blindsided by threats while seeing new opportunities sooner. The authors examine some key obstacles to using networks to better mine the periphery for early insight. They then explore how extended networks can help the organization be a responsive open system adapting faster to changes in the environment. They examine to what extent network constructs such as centrality, hierarchy, self-healing, distributed intelligence, multihoming, and latency can be used to improve organizational networks for scanning the periphery. The last section explores some of the leadership challenges associated with using networks to detect weak signals sooner.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Although networks in key business areas such as communications, supply chains, R&D, and sales are designed to improve the flow of information, people, or goods, they can also be used to improve the “peripheral vision” of the organization. In this chapter, the authors examine how networks can be used by organizations to scan, sense, and adapt to new and important signals from the organization’s strategic environment beyond its core focus. The first part of the chapter emphasizes the importance of peripheral vision in helping organizations not being blindsided by threats while seeing new opportunities sooner. The authors examine some key obstacles to using networks to better mine the periphery for early insight. They then explore how extended networks can help the organization be a responsive open system adapting faster to changes in the environment. They examine to what extent network constructs such as centrality, hierarchy, self-healing, distributed intelligence, multihoming, and latency can be used to improve organizational networks for scanning the periphery. The last section explores some of the leadership challenges associated with using networks to detect weak signals sooner.

More books from Pearson Education

Cover of the book Microsoft Office Publisher 2007 Step by Step by George S. Day, Paul J. H. Schoemaker, Scott T. Snyder
Cover of the book Credibility by George S. Day, Paul J. H. Schoemaker, Scott T. Snyder
Cover of the book Learn How to Lead and Succeed (Collection) by George S. Day, Paul J. H. Schoemaker, Scott T. Snyder
Cover of the book Apple Pro Training Series by George S. Day, Paul J. H. Schoemaker, Scott T. Snyder
Cover of the book The iPod touch Pocket Guide by George S. Day, Paul J. H. Schoemaker, Scott T. Snyder
Cover of the book Inside Microsoft SQL Server 2008 T-SQL Querying by George S. Day, Paul J. H. Schoemaker, Scott T. Snyder
Cover of the book NCLEX-PN Exam Cram by George S. Day, Paul J. H. Schoemaker, Scott T. Snyder
Cover of the book Adobe Audition CS6 Classroom in a Book by George S. Day, Paul J. H. Schoemaker, Scott T. Snyder
Cover of the book Microsoft SQL Server 2008 Internals by George S. Day, Paul J. H. Schoemaker, Scott T. Snyder
Cover of the book The Truth About Identity Theft by George S. Day, Paul J. H. Schoemaker, Scott T. Snyder
Cover of the book The Management Consultant by George S. Day, Paul J. H. Schoemaker, Scott T. Snyder
Cover of the book Network Forensics by George S. Day, Paul J. H. Schoemaker, Scott T. Snyder
Cover of the book The Craft of System Security by George S. Day, Paul J. H. Schoemaker, Scott T. Snyder
Cover of the book The Truth About Maximizing College 529 Accounts by George S. Day, Paul J. H. Schoemaker, Scott T. Snyder
Cover of the book Windows via C/C++ by George S. Day, Paul J. H. Schoemaker, Scott T. Snyder
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy