We never expected that – a corporative study of failures in national and business intelligence by Avner Barnea
Keywords:israeli intelligence, The Johari Window Model
AbstractFor JISIB Barnea has previously written aboutcompetitive intelligence in Israel (2016), aboutIsraeli start-ups in cyber security (2018), andabout how AI will change intelligence anddecision-making (2020).The book, We never expected that – Acorporative study of failures in national andbusiness intelligence, is not on Israeliintelligence per se. Still, the best documentedof the four cases presented come from the FirstIntifada in 1993 when Barnea was wellsituated to observe what was going on behindthe scenes. For 27 years, until 1997, he was theSenior Official for Intelligence in the PrimeMinister’s office. Since then, he has been acompetitive intelligence consultant, a teacherand student of intelligence studies and sine2016 a research fellow at the National SecurityStudies Center, NSSC.The book, which is a translation of a book inHebrew, which again builds on the author’sPhD thesis, proposes an analysis of a series ofintelligence failures. To study failures is a goodway to learn. It is a good methodology, maybethe best. To present a book with bothgovernment and state failures is also a goodidea from the perspective that there are boundto be fruitful parallels. So far so good.
Barnea, A. (2015). Failures in National and
Business Intelligence: a Comparative
Study. PhD Diss., University of Haifa, 66-129.
Barnea, A. (2016). Study on competitive
intelligence in Israel: 2016 update. Journal of
Intelligence Studies in Business, 6(2).
Barnea, A. (2018). Israeli start-ups–especially in
cyber security: Can a new model enhance their
survival rate? Journal of Intelligence Studies
in Business, 8(1).
Barnea, A. (2020). How will AI change
intelligence and decision-making? Journal of
Intelligence Studies in Business, 1(1).
Barnea, A. (2021). We Never Expected That: A
Comparative Study of Failures in National
and Business Intelligence. Rowman &
Behnke, L., & Slayton, P. (1998). Shaping a
corporate competitive intelligence function at
IBM. Competitive Intelligence Review:
Published in Cooperation with the Society of
Competitive Intelligence Professionals, 9(2), 4-
Cockburn, A., & Cockburn, L. (1991). Dangerous
liaison: the inside story of the US-Israeli covert
Denning, Steve (2011). “Why did IBM Survive”,
Forbes, Jul 10th Handel, M. I. (1984).
Intelligence and the problem of strategic
surprise. The Journal of Strategic
Studies, 7(3), 229-281
Kahana, E. (2006). Historical dictionary of Israeli
intelligence. Scarecrow Press.
Knight, F. H. (1921). Risk, uncertainty and
profit (Vol. 31). Houghton Mifflin.
Prescott, J. E., & Williams, R. (2003). The userdriven competitive intelligence model: a new
paradigm for CI. Competitive intelligence
magazine, 6(5), 10-14.
Singer, J. D. (1958). Threat-perception and the
armament-tension dilemma. Journal of
Conflict Resolution, 2(1), 90-105.
Copyright (c) 2022 Journal of Intelligence Studies in Business
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).