Tech Mining: Exploiting New Technologies for Competitive Advantage / Edition 1

Hardcover (Print)
Buy New
Buy New from BN.com
$106.58
Used and New from Other Sellers
Used and New from Other Sellers
from $30.44
Usually ships in 1-2 business days
(Save 78%)
Other sellers (Hardcover)
  • All (7) from $30.44   
  • New (4) from $94.66   
  • Used (3) from $30.44   

Overview

Tech Mining makes exploitation of text databases meaningful to those who can gain from derived knowledge about emerging technologies. It begins with the premise that we have the information, the tools to exploit it, and the need for the resulting knowledge.
The information provided puts new capabilities at the hands of technology managers. Using the material present, these managers can identify and access the most valuable technology information resources (publications, patents, etc.); search, retrieve, and clean the information on topics of interest; and lower the costs and enhance the benefits of competitive technological intelligence operations.

Read More Show Less

Editorial Reviews

From the Publisher
"...useful to a variety of institutions, programs, and people." (E-STREAMS, August 2005)

"Two data mining practitioners explain how to use the available software tools…to quickly access the technological information needed to gain competitive advantage." (Research Technology Management, May-June 2005)

Read More Show Less

Product Details

Meet the Author

ALAN L. PORTER's major concentration is technology intelligence, forecasting, and assessment. He has led the development of "technology opportunity analysis"—mining electronic bibliographic data sources to generate intelligence on emerging technologies. He holds a BS in chemical engineering from the California Institute of Technology, and a PhD in engineering psychology from UCLA. He is currently Director, Research & Development, for Search Technology, Inc., in Norcross, Georgia.

SCOTT W. CUNNINGHAM worked for the Technology Policy & Assessment Center at the Georgia Institute of Technology. He has worked in industry as a data mining and machine learning consultant, working chiefly in the e-commerce and retail industries. He holds a BEng in engineering science and mechanics from Georgia Tech and a DPhil in science, technology, and innovation policy from the University of Sussex, UK. He currently serves as an assistant professor on the Technology, Policy, and Management faculty of TU Delft.

Read More Show Less

Table of Contents

List of Figures.

Preface.

Acknowledgments.

Acronyms & Shorthands—Glossary.

PART I. UNDERSTAND TECH MINING.

Chapter 1. Technological Innovation and the Need for Tech Mining.

1.1 Why Innovation is Significant.

1.2 Innovation Processes.

1.3 Innovation Institutions and Their Interests.

1.4 Innovators and Their Interests.

1.5 Technological Innovation in an Information Age.

1.6 Information About Emerging Technologies.

Chapter 1 Take-Home Messages.

Chapter Resources.

Chapter 2. How Tech Mining Works.

2.1 What is Tech Mining?

2.2 Why Do Tech Mining?

2.3 What Is Tech Mining’s Ancestry?

2.4 How to Conduct the Tech Mining Process?

2.5 Who Does Tech Mining?

2.6 Where Is Tech Mining Most Needed?

Chapter 2 Take-Home Messages.

Chapter Resources.

Chapter 3. What Tech Mining Can Do for You.

3.1 Tech Mining Basics.

3.2 Tech Mining Analyses.

3.3 Putting Tech Mining Information to Good Use.

3.4 Managing and Measuring Tech Mining.

Chapter 3 Take-Home Messages.

Chapter 4. Example Results: Fuel Cells Tech Mining.

4.1 Overview of Fuel Cells.

4.2 Tech Mining Analyses.

4.3 Tech Mining Results.

4.4 Tech Mining Information Processes.

4.5 Tech Mining Information Products.

Chapter 4 Take-Home Messages.

Chapter Resources.

Chapter 5. What to Watch For in Tech Mining.

5.1 Better Basics.

5.2 Research Profiling and Other Perspectives on the Data.

5.3 More Informative Products.

5.4 Knowledge Discovery.

5.5 Knowledge Management.

5.6 New Tech Mining Markets.

5.7 Dangers.

Chapter 5 Take-Home Messages.

Chapter Resources.

PART II. DOING TECH MINING.

Chapter 6. Finding the Right Sources.

6.1 R&D Activity.

6.2 R&D Output Databases.

6.3 Determining the Best Sources.

6.4 Arranging Access to Databases.

Chapter 6 Take-Home Messages.

Chapter Resources.

Chapter 7. Forming the Right Query.

7.1 An Iterative Process.

7.2 Queries Based on Substantive Terms.

7.3 Nominal Queries.

7.4 Tactics and Strategies for Query Design.

7.5 Changing the Query.

Chapter 7 Take-Home Messages.

Chapter 8. Getting the Data.

8.1 Accessing Databases.

8.2 Search and Retrieval from a Database.

8.3 What to Do, and Not to Do.

Chapter 8 Take-Home Messages.

Chapter 9. Basic Analyses.

9.1 In the Beginning.

9.2 What You Can Do with the Data.

9.3 Relations Among Documents and Terms Occurring in Their Information Fields.

9.4 Relationships.

9.5 Helpful Basic Analyses.

Chapter 9 Take-Home Messages.

Chapter 10. Advanced Analyses.

10.1 Why Perform Advanced Analyses?

10.2 Data Representation.

10.3 Analytical Families.

Chapter 10 Take-Home Messages.

Chapter Resources.

Chapter 11. Trend Analyses.

11.1 Perspective.

11.2 An Example Time Series Description and Forecast.

11.3 Multiple Forecasts.

11.4 Research Fronts.

11.5 Novelty.

Chapter 11 Take-Home Messages.

Chapter Resources.

Chapter 12. Patent Analyses.

12.1 Why patent Analyses?

12.2 Getting Started.

12.3 The ‘What’ and ‘Why’ of patent Analysis.

12.4 Tech Mining Patent Analysis Case Illustration: Fuel Cells.

12.5 Patent Citation Analysis.

12.6 For Whom?

12.7 TRIZ.

12.8 Reflections.

Chapter 12 Take-Home Messages.

Chapter Resources.

Chapter 13. Generating and Presenting Innovation Indicators.

13.1 Expert Opinion in Tech Mining.

13.2 Innovation Indicators.

13.3 Information Representation and Packaging.

13.4 Examples of Putting Tech Mining Information Representation to Use.

13.5 Summing Up.

Chapter Resources.

Chapter 14. Managing the Tech Mining Process.

14.1 Tough Challenges.

14.2 Tech Mining Communities.

14.3 Process Management.

14.4 Enhancing the Prospects of Tech Mining Utilization.

14.5 Institutionalizing the Tech Mining Function.

14.6 The Learning Curve.

Chapter 14 Take-Home Messages.

Chapter 15. Measuring Tech Mining Results.

15.1 Why Measure?

15.2 What to Measure.

15.3 How to Measure.

15.4 Enabling Measurement.

15.5 Effective Measurement.

15.6 Using Measurements to Bolster Tech Mining.

Chapter 15 Take-Home Messages.

Chapter Resources.

Chapter 16. Examples Process: Tech Mining on Fuel Cells.

16.1 Introduction.

16.2 First Step: Issue Identification.

16.3 Second Step: Selection of Information Sources.

16.4 Third Step: Search Refinement and Data Retrieval.

16.5 Fourth Step: Data Cleaning.

16.6 Fifth Step: Basic Analyses.

16.7 Sixth Step: Advanced Analyses.

16.8 Seventh Step: Representation.

16.9 Eight Step: Interpretation.

16.10 Ninth Step: Utilization.

16.11 What Can We Learn.

Chapter 6 Take-Home Messages.

Chapter Resources.

Appendix A: Selected Publication and patent Databases.

Appendix B: Text Mining Software.

Appendix C: What You Can Do Without Tech Mining Software.

Appendix D: Statistics and Distributions for Analyzing Text Entities.

References.

Index.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)