Home > Store > Business & Management > Management & Strategy

Network Challenge (Chapter 16), The: Extended Intelligence Networks: Minding and Mining the Periphery

Register your product to gain access to bonus material or receive a coupon.

Network Challenge (Chapter 16), The: Extended Intelligence Networks: Minding and Mining the Periphery

eBook (Watermarked)

  • Your Price: $2.39
  • List Price: $2.99
  • About Watermarked eBooks
  • This PDF will be accessible from your Account page after purchase and requires the free Adobe® Reader® software to read it.

    The eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

    Watermarked eBook FAQ


  • Copyright 2009
  • Pages: 24
  • Edition: 1st
  • eBook (Watermarked)
  • ISBN-10: 0-13-702476-2
  • ISBN-13: 978-0-13-702476-6

Although networks in key business areas such as communications, supply chains, R&D, and sales are designed to improve the flow of information, people, or goods, they can also be used to improve the “peripheral vision” of the organization. In this chapter, the authors examine how networks can be used by organizations to scan, sense, and adapt to new and important signals from the organization’s strategic environment beyond its core focus. The first part of the chapter emphasizes the importance of peripheral vision in helping organizations not being blindsided by threats while seeing new opportunities sooner. The authors examine some key obstacles to using networks to better mine the periphery for early insight. They then explore how extended networks can help the organization be a responsive open system adapting faster to changes in the environment. They examine to what extent network constructs such as centrality, hierarchy, self-healing, distributed intelligence, multihoming, and latency can be used to improve organizational networks for scanning the periphery. The last section explores some of the leadership challenges associated with using networks to detect weak signals sooner.

Sample Content

Table of Contents

Minding and Mining the Periphery

Research Literature: Learning, Networks, and Scanning

Types of Extended Intelligence Networks

Utilizing Existing Networks

Improving Your Extended Intelligence Network

The Leadership Challenge: Managing It All


Submit Errata

More Information

Unlimited one-month access with your purchase
Free Safari Membership