4U.S.Department of Defense, Military Transformation: A Strategic Approach(2003 ) ,p-25.http://www.ofi.osd.mil/library/li brary_fdes/document_297_MT_StrategyDoe l.pdf.
4Helms M M. Viewpoint:The Risk of Information Compromise and Approaches to Prevention[J ]. Journal of Strate- gic Information Systems, 2000 (3) : 5-15.
5John A,Nolan III. It's the Third Millennium:Do You Know Where Your Competitor Is? [J]. Journal of Business Strat- egy, 1999(6) : 11-15.
6Ian Smith. Defensive Competitive Intelligence in a Web 2. 0 Environment [EB/OL]. [2014-06-14]. http://www. scip. org/N cfm?ItemNumber=-7779.
7Bill DeGenaro. A Case for Business Counterintelli- gence [J]. Journal of Competitive Intelligence Magazine,2005 (5):12-16.
8Fielding M. Damage control-firms must plan for counterintelligence [ J ]. Journal of Marketing News, 2004 (38) : 19-22.
9Bill Hutchinson,Mat Warren. Information Warfare: Corporate attack and defense in a digital world. Reed Educa- tional and Professional Publishing Ltd,2001.
10Alexander H. Joffe. Dismantling intelligence agen- cies,Crime,Law & Social Change [M]. Kluwer Academic Pub- lishers, 1999.