中文    English

›› 2017, Vol. 29 ›› Issue (7): 57-60.doi: 10.13998/j.cnki.issn1002-1248.2017.07.013

• Literature study • Previous Articles     Next Articles

Review of the Enterprise Counterintelligence Literature: A Supply Chain Information Security Perspective

ZHU Lilong   

  1. School of Economics and Management, Chaohu University, Chaohu, 238000, China
  • Received:2016-12-15 Online:2017-07-05 Published:2017-07-31

Abstract: The research on the problem of enterprise counterintelligence based on supply chain information security is involved in two seemingly different but actually closely linked areas between supply chain information security and enterprise counterintelligence. This paper analyzed systematically the enterprise counterintelligence research literature based on supply chain information security from such five aspects as the supply chain system information security research, the supply chain enterprise information sharing research, the supply chain enterprise counterintelligence work process research, the supply chain enterprise counterintelligence technology support system research, the supply chain enterprise counterintelligence strategy system, and briefly reviewed the shortcomings of existing studies.

Key words: supply chain system

CLC Number: 

  • F272
[1] Sindhuja P N, Anand S.Kunnathur. Information security in supply chains: a management control perspective [J].Information and Computer Security, 2015, 23(5):476-496.
[2] Ramesh Kolluru, Paul H. Meredith. Security and trust management in supply chains[J]. Information Management & Computer Security, 2001,9 Issue(5):233-236
[3] Peter Finch. Supply chain risk management [J]. Supply Chain Management: An International Journal, 2004, 9 (2):183-196.
[4] Zachary Williams, Jason E. Lueg, Ronald D. Taylor, Robert L. Cook. Why all the changes?: An institutional theory approach to exploring the drivers of supply chain security (SCS) [J]. International Journal of Physical Distribution & Logistics Management, 2009,39(7):595-618.
[5] Tridib B V,Raghunathan S. Information Security in Networked Supply Chains: Impact of Network Vulnerability and Supply Chain Integration on Incentives to Invest [J].Information Technology Management,2010,( 11) : 7-23.
[6] Baccara M.Outsourcing, information leakage, and consulting firms[J].RAND Journal of Economics.2007,(1):269-289.
[7] 蒋鲁宁.信息安全供应链的安全[J].中国信息安全,2014,(3):111.
[8] 刘丹.供应链管理信息系统安全探讨[J].情报探索,2009,143(9):75-78.
[9] 齐源.基于第三方及GAHP的供应链信息共享风险预警[J]软科学,2010,(5):64-68.
[10] 董绍辉,西宝,田丽娜.供应链信息共享中信息泄露的产生机理及防范措施研究[J].软科学,2009,(5):56-59.
[11] 宋伟, 刘卫宁, 孙棣华.供应链协同系统的安全体系的设计与实现[J].计算机集成制造系统,2006,12(2):292-296.
[12] 李剑锋,钮亮,段林茂,魏军.供应链信息安全现状及体系框架研究[J].江苏商论,2013,(3):36-38.
[13] Fu-Ren Lin,Michael J.Shaw.Reengineering the Order Fulfillment Process in Supply Chain Networks [J].International Journal of Flexible Manufacturing Systems, 1998, 10(3):197-229.
[14] Sang Bong Yoo, Yeong Ho Kim.Web-based knowledge management for sharing product data in virtual enterprises[J].International Journal of Production Economics, 2002, 75 (1 /2):173-183.
[15] Gordon L,Loeb M.Sharing Information on Computer Systems Security: An Economic Analysis [J].Journal of Accounting and Public Policy, 2003,(22):461-485.
[16] Gal–Or E,Ghose A. The Economic Incentives for Sharing Security Information [J].Information Systems Research,2005, (2) :186-208.
[17] Chen, Tsung-Yi.Computers in Industry, Knowledge sharing invirtual enterprises via an ontology- based access control approach[J].Computers in Industry; 2008, (5): 502-519.
[18] Vlajic, Jelena V.(et al.).Developments in Logistics and Supply Chain Management [M].? The Editors: Kulwant S.Pawar, Helen Rogers, Andrew Potter, Mohamed Naim ISBN: 978-1-349-55848-3 (Print) 978-1-137-54125-3 (Online), 2016.
[19] Rong Liu, Akhil Kumar.Leveraging information sharing to configure supply chains[J].Information Systems Frontiers, 2011,13(1): 139-151.
[20] 赵丽娜,李培亮.Bertrand 竞争下的供应链信息共享研究[J].企业经济,2011,(4):102-104.
[21] 叶飞,等.供应链信息共享影响因素、信息共享程度与企业运营绩效关系研究[J].管理学报,2009,(6):743-750.
[22] 张修志,夏志杰,黄立平.基于EIP的供应链信息共享模式研究[J].情报杂志,2007,(3):61-63.
[23] 葛慧敏,陈龙.基于按需物流机制的供应链信息共享模式研究[J].中国流通经济,2010,(8):32-34.
[24] 李小康.基于牛鞭效应的供应链信息共享集成优化研究[J].武汉理工大学学报(社会科学版),2011,(6):878-881.
[25] 王欣欣.基于多Agent的供应链信息共享平台构建[J].现代情报,2011,(1):36-39.
[26] Punithavathani, D.S., Sujatha, K., Jain, J.M.. Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence [M]. Cluster Computing, 2015, 18(1):435-451.
[27] Jerry P Miller.Counterintelligence.Competitive Intelligence 2004: Frost & Sullivan 11 the Annual Executive Summit[C], West.Rancho Mirage, CA. 2004.
[28] M.M.Helms.Viewpoint:The Risk of Information Compromise and Approaches to Prevention[J].Journal of Strategic Information Systems, 2000, (3):5-15.
[29] John A, Nolan III.It’s the Third Millennium: Do You Know Where Your Competitor Is? [J].Journal of Business Strategy,1999,(6):11-15.
[30] 苏芳荔.企业战略联盟反竞争情报模型与机制研究[J].情报理论与实践,2010,(12):57-59,46.
[31] 由振荣,刘东苏,李红艳.基于信息安全策略的反竞争情报模型[J] 情报杂志,2009,(12):78-79,77.
[32] 陈旭华,张文德.基于知识产权保护的反竞争情报研究[J].图书情报工作,2009,(2):79-82,110.
[33] 张翠英,杨之霞.企业反竞争情报活动中的知识流动模型研究[J].情报理论与实践,2008,(4):539-542.
[34] 程娟.网络环境下企业信息泄密与反竞争情报整合[J].情报理论与实践,2008,(3):5 400-5 402,5414.
[35] Leslie Ball.Automating social network analysis: A power tool for counter-terrorism[J].Journal of Security Journal,2016,29(2):147-168.
[36] Jason K.Deane, Cliff T.Ragsdale, Terry R.Rakes, Loren Paul Rees.Managing supply chain risk and disruption from IT security incidents[J].Journal of Oper Manag Res,2009, (2):4-12.
[37] David Watson.Honeynets: a tool for counter- intelligence in online security[J].Journal of Network Security,2007,(1):4-8.
[38] Grossklags J,Christin N,Chuang J. Secure or Insure? A Game–Theoretic Analysis of Information Security Games[A].Proceedings of the 17th International World Wide Web Conference,China,2008.
[39] Huang C,Hu Q,Behara R. An economic Analysis of the Optimal Information Security Investment in the Case of a Risk – averse Firm[J].International Journal of Production Economics,2008,114: 793-804.
[40] John J.McGonagle.Competitive Intelligence,Corporate Security and the War on Terrorism[EB/OL].[2007-10-30].http://www.cio.com/article/150004/Competitive_Intelligence_Corporate_Security_and_the_
War_on_Terrorism.
[41] Someswar Kesh, Sam Ramanujan, Sridhar Nerur.A framework for analyzing e-commerce security[J].Journal of Information Management & Computer Security, 2002,(4):149-158.
[42] Conor Vibert.Web-Based Analysis for Competitive Intelligence[M].? 2000 Greenwood Publishing Group,2000.
[43] 朱礼龙.国际科技合作企业反竞争情报技术支持系统构建及运行机制[J].情报杂志,2014,(11):104-107,158.
[44] 齐兴敏.信息安全技术在供应链管理系统中的应用[J].物流技术,2012,(6):51-55.
[45] 王洁.基于供应链的网络交易信息安全探讨[J].现代管理科学,2011,(7):115-117.
[46] 陈旭华,张文德.基于反竞争情报的信息安全风险评估研究[J].情报探索,2009,(10):52-54.
[47] 邵波,宋继伟.反竞争情报流程中的早期预警[J].情报杂志,2007,(7):43-45,48.
[48] Ian Smith.Defensive Competitive Intelligence In A Web 2.0 Environment[EB/OL].[2009-09-12].http://www.scip.org/NewsRoom/PRDetail.cfm?ItemNumber=7779.
[49] Jordan Shropshire.A canonical analysis of intentional information security breaches by insiders[J].Journal of Information Management & Computer Security, 2009,(4):296-310.
[50] Roborta B.Issues in defining competitive intelligence: An exploration[J].Journal of Competitive Intelligence and Management, 2008,(3):3-14.
[51] Zhang C, Li S.Secure information sharing in internet-based supply chain management systems[J].Journal of Computer Information Systems.2006,(4): 18-24.
[52] Bill DeGenaro.A Case for Business Counterintelligence[J].Journal of Competitive Intelligence Magazine,2005,(5):12-16.
[53] Fielding, M.Damage control-firms must plan for counterintelligence[J].Journal of Marketing News, 2004,(38):19-22.
[54] Peter R J Trim.Counteracting Industrial Espionage through Counterintelligence: The Case for a Corporate Intelligence Unit and Collaboration with Government Agencies[J].Journal of Security Journal, October 2002, 15(4):7-24.
[55] 王丹丹,李玉海.云计算环境下企业反竞争情报体系的构建研究[J].情报科学,2014,(11):36-40,70.
[56] 吴琼.网络环境下企业反竞争情报探讨[J].情报探索,2014,(5):61-63.
[57] 朱礼龙.科技型企业反竞争情报体系建设水平研究——合芜蚌自主创新综合试验区科技型企业为例[J].安徽科技学院学报,2011,(5):94-99.
[58] 周九常.新形势下我国企业情报保护体系的基本架构[J].情报理论与实践,2010,(11):15-18.
[59] 刘圣君.基于商业秘密防护的企业反竞争情报体系构建[J].科技情报开发与经济,2010,(7):80-83.
No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!