›› 2017, Vol. 29 ›› Issue (7): 57-60.doi: 10.13998/j.cnki.issn1002-1248.2017.07.013
• Literature study • Previous Articles Next Articles
ZHU Lilong
CLC Number:
[1] Sindhuja P N, Anand S.Kunnathur. Information security in supply chains: a management control perspective [J].Information and Computer Security, 2015, 23(5):476-496. [2] Ramesh Kolluru, Paul H. Meredith. Security and trust management in supply chains[J]. Information Management & Computer Security, 2001,9 Issue(5):233-236 [3] Peter Finch. Supply chain risk management [J]. Supply Chain Management: An International Journal, 2004, 9 (2):183-196. [4] Zachary Williams, Jason E. Lueg, Ronald D. Taylor, Robert L. Cook. Why all the changes?: An institutional theory approach to exploring the drivers of supply chain security (SCS) [J]. International Journal of Physical Distribution & Logistics Management, 2009,39(7):595-618. [5] Tridib B V,Raghunathan S. Information Security in Networked Supply Chains: Impact of Network Vulnerability and Supply Chain Integration on Incentives to Invest [J].Information Technology Management,2010,( 11) : 7-23. [6] Baccara M.Outsourcing, information leakage, and consulting firms[J].RAND Journal of Economics.2007,(1):269-289. [7] 蒋鲁宁.信息安全供应链的安全[J].中国信息安全,2014,(3):111. [8] 刘丹.供应链管理信息系统安全探讨[J].情报探索,2009,143(9):75-78. [9] 齐源.基于第三方及GAHP的供应链信息共享风险预警[J]软科学,2010,(5):64-68. [10] 董绍辉,西宝,田丽娜.供应链信息共享中信息泄露的产生机理及防范措施研究[J].软科学,2009,(5):56-59. [11] 宋伟, 刘卫宁, 孙棣华.供应链协同系统的安全体系的设计与实现[J].计算机集成制造系统,2006,12(2):292-296. [12] 李剑锋,钮亮,段林茂,魏军.供应链信息安全现状及体系框架研究[J].江苏商论,2013,(3):36-38. [13] Fu-Ren Lin,Michael J.Shaw.Reengineering the Order Fulfillment Process in Supply Chain Networks [J].International Journal of Flexible Manufacturing Systems, 1998, 10(3):197-229. [14] Sang Bong Yoo, Yeong Ho Kim.Web-based knowledge management for sharing product data in virtual enterprises[J].International Journal of Production Economics, 2002, 75 (1 /2):173-183. [15] Gordon L,Loeb M.Sharing Information on Computer Systems Security: An Economic Analysis [J].Journal of Accounting and Public Policy, 2003,(22):461-485. [16] Gal–Or E,Ghose A. The Economic Incentives for Sharing Security Information [J].Information Systems Research,2005, (2) :186-208. [17] Chen, Tsung-Yi.Computers in Industry, Knowledge sharing invirtual enterprises via an ontology- based access control approach[J].Computers in Industry; 2008, (5): 502-519. [18] Vlajic, Jelena V.(et al.).Developments in Logistics and Supply Chain Management [M].? The Editors: Kulwant S.Pawar, Helen Rogers, Andrew Potter, Mohamed Naim ISBN: 978-1-349-55848-3 (Print) 978-1-137-54125-3 (Online), 2016. [19] Rong Liu, Akhil Kumar.Leveraging information sharing to configure supply chains[J].Information Systems Frontiers, 2011,13(1): 139-151. [20] 赵丽娜,李培亮.Bertrand 竞争下的供应链信息共享研究[J].企业经济,2011,(4):102-104. [21] 叶飞,等.供应链信息共享影响因素、信息共享程度与企业运营绩效关系研究[J].管理学报,2009,(6):743-750. [22] 张修志,夏志杰,黄立平.基于EIP的供应链信息共享模式研究[J].情报杂志,2007,(3):61-63. [23] 葛慧敏,陈龙.基于按需物流机制的供应链信息共享模式研究[J].中国流通经济,2010,(8):32-34. [24] 李小康.基于牛鞭效应的供应链信息共享集成优化研究[J].武汉理工大学学报(社会科学版),2011,(6):878-881. [25] 王欣欣.基于多Agent的供应链信息共享平台构建[J].现代情报,2011,(1):36-39. [26] Punithavathani, D.S., Sujatha, K., Jain, J.M.. Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence [M]. Cluster Computing, 2015, 18(1):435-451. [27] Jerry P Miller.Counterintelligence.Competitive Intelligence 2004: Frost & Sullivan 11 the Annual Executive Summit[C], West.Rancho Mirage, CA. 2004. [28] M.M.Helms.Viewpoint:The Risk of Information Compromise and Approaches to Prevention[J].Journal of Strategic Information Systems, 2000, (3):5-15. [29] John A, Nolan III.It’s the Third Millennium: Do You Know Where Your Competitor Is? [J].Journal of Business Strategy,1999,(6):11-15. [30] 苏芳荔.企业战略联盟反竞争情报模型与机制研究[J].情报理论与实践,2010,(12):57-59,46. [31] 由振荣,刘东苏,李红艳.基于信息安全策略的反竞争情报模型[J] 情报杂志,2009,(12):78-79,77. [32] 陈旭华,张文德.基于知识产权保护的反竞争情报研究[J].图书情报工作,2009,(2):79-82,110. [33] 张翠英,杨之霞.企业反竞争情报活动中的知识流动模型研究[J].情报理论与实践,2008,(4):539-542. [34] 程娟.网络环境下企业信息泄密与反竞争情报整合[J].情报理论与实践,2008,(3):5 400-5 402,5414. [35] Leslie Ball.Automating social network analysis: A power tool for counter-terrorism[J].Journal of Security Journal,2016,29(2):147-168. [36] Jason K.Deane, Cliff T.Ragsdale, Terry R.Rakes, Loren Paul Rees.Managing supply chain risk and disruption from IT security incidents[J].Journal of Oper Manag Res,2009, (2):4-12. [37] David Watson.Honeynets: a tool for counter- intelligence in online security[J].Journal of Network Security,2007,(1):4-8. [38] Grossklags J,Christin N,Chuang J. Secure or Insure? A Game–Theoretic Analysis of Information Security Games[A].Proceedings of the 17th International World Wide Web Conference,China,2008. [39] Huang C,Hu Q,Behara R. An economic Analysis of the Optimal Information Security Investment in the Case of a Risk – averse Firm[J].International Journal of Production Economics,2008,114: 793-804. [40] John J.McGonagle.Competitive Intelligence,Corporate Security and the War on Terrorism[EB/OL].[2007-10-30].http://www.cio.com/article/150004/Competitive_Intelligence_Corporate_Security_and_the_ War_on_Terrorism. [41] Someswar Kesh, Sam Ramanujan, Sridhar Nerur.A framework for analyzing e-commerce security[J].Journal of Information Management & Computer Security, 2002,(4):149-158. [42] Conor Vibert.Web-Based Analysis for Competitive Intelligence[M].? 2000 Greenwood Publishing Group,2000. [43] 朱礼龙.国际科技合作企业反竞争情报技术支持系统构建及运行机制[J].情报杂志,2014,(11):104-107,158. [44] 齐兴敏.信息安全技术在供应链管理系统中的应用[J].物流技术,2012,(6):51-55. [45] 王洁.基于供应链的网络交易信息安全探讨[J].现代管理科学,2011,(7):115-117. [46] 陈旭华,张文德.基于反竞争情报的信息安全风险评估研究[J].情报探索,2009,(10):52-54. [47] 邵波,宋继伟.反竞争情报流程中的早期预警[J].情报杂志,2007,(7):43-45,48. [48] Ian Smith.Defensive Competitive Intelligence In A Web 2.0 Environment[EB/OL].[2009-09-12].http://www.scip.org/NewsRoom/PRDetail.cfm?ItemNumber=7779. [49] Jordan Shropshire.A canonical analysis of intentional information security breaches by insiders[J].Journal of Information Management & Computer Security, 2009,(4):296-310. [50] Roborta B.Issues in defining competitive intelligence: An exploration[J].Journal of Competitive Intelligence and Management, 2008,(3):3-14. [51] Zhang C, Li S.Secure information sharing in internet-based supply chain management systems[J].Journal of Computer Information Systems.2006,(4): 18-24. [52] Bill DeGenaro.A Case for Business Counterintelligence[J].Journal of Competitive Intelligence Magazine,2005,(5):12-16. [53] Fielding, M.Damage control-firms must plan for counterintelligence[J].Journal of Marketing News, 2004,(38):19-22. [54] Peter R J Trim.Counteracting Industrial Espionage through Counterintelligence: The Case for a Corporate Intelligence Unit and Collaboration with Government Agencies[J].Journal of Security Journal, October 2002, 15(4):7-24. [55] 王丹丹,李玉海.云计算环境下企业反竞争情报体系的构建研究[J].情报科学,2014,(11):36-40,70. [56] 吴琼.网络环境下企业反竞争情报探讨[J].情报探索,2014,(5):61-63. [57] 朱礼龙.科技型企业反竞争情报体系建设水平研究——合芜蚌自主创新综合试验区科技型企业为例[J].安徽科技学院学报,2011,(5):94-99. [58] 周九常.新形势下我国企业情报保护体系的基本架构[J].情报理论与实践,2010,(11):15-18. [59] 刘圣君.基于商业秘密防护的企业反竞争情报体系构建[J].科技情报开发与经济,2010,(7):80-83. |
No related articles found! |
|