期刊文献+

反情报演练中的影子分析方法:应用策略与FAROUT评估 被引量:1

The Shadow Analysis Method in Counter Intelligence Drilling:Application Strategy and FAROUT Evaluation
下载PDF
导出
摘要 反情报演练是检验组织反情报体系是否完善的必要措施,情境拼图、数据挖掘等技术已经对传统的反情报体系构成严重威胁。影子分析法是进行反情报演练的有效方法,本文从应用的流程、团队的组织、长期规划与循环改进等方面详细提出了影子分析法在反情报演练中的应用策略,并使用FAROUT体系对其进行了评估,根据评估结果对其应用中需要注意的问题进行了讨论。本文在反情报工作的方法上进行了一定的创新,在实践方面具有一定的普遍适用意义。 Counter intelligence Drilling is a means to measure the counter intelligence system. Some technologies, such as situational jigsaw puzzle, data mining, have threatened traditional counter intelligence system seriously. Shadow analysis is an effective method. The paper proposed the application policy of shadow analysis with process, organization, planning, etc. Then, an evaluation based on FAROUT system was made to show the practicability of shadow analysis in counter intelligence application. The paper made a contribution to the counter intelligence policy with a new method, and can be used widely in a various kind of organizations.
作者 丁源 周海炜
出处 《情报学报》 CSSCI 北大核心 2013年第8期828-837,共10页 Journal of the China Society for Scientific and Technical Information
关键词 反情报 影子分析 FAROUT评估 counter intelligence, shadow analysis, FAROUT, evaluation
  • 相关文献

参考文献26

  • 1王沙骋,刘洁,赵澄谋.军民融合:21世纪反情报工作的几点探索[J].图书情报工作,2009,53(4):87-90. 被引量:8
  • 2Cunningham, D. The Patterning of Repression: FBI Counterintelligence and the New Left [ J]. Social Forces, 2003,82 ( 1 ) : 209-240.
  • 3Carlton S A. Industrial Espionage:Reality of the Information Age [ J ]. Research Technology Management, 1992,35 (6) : 18.
  • 4Sehweizer P. The Growth of Economic Espionage [ J ]. Foreign Affairs, 1996,75 ( 1 ) : 9-14.
  • 5Teagarden E M. James Bond and George Smiley Go into Business Teaching about Business Espionage[ J]. Journal of Education for Business, 1997,72 (4) : 250-252.
  • 6Clarke D L,Jobnston R. Economic Espionage and Interallied Strategic Cooperation [ J 1- Thunderbird International Business Review, 1998,40(4) : 413-431.
  • 7Samli A C, Jacobs L. Counteracting Global Industrial Espionage:A Damage Control Strategy [ J ]. Business and Society Review, 2003,108 ( 1 ) : 95-113.
  • 8Clough H D, Margulies R A, Douglas M. The Corporate Competitive Intelligence/Counterintelligence Team: a Symbiotic Design for the Future [ J ]. Competitive Intelligence Review, 1994,5 ( 3 ) : 48-50.
  • 9Nolan II1 J A. Confusing Counterintelligence with Security Can Wreck Your Afternoon [ J ]. Competitive Intelligence Review, 1997,8 ( 3 ) : 53-61.
  • 10张法明.竞争情报与企业反情报工作的组织保障[J].情报理论与实践,2001,24(1):43-45. 被引量:9

二级参考文献23

  • 1包昌火.开展竞争情报研究 促进我国信息服务业的发展[J].情报理论与实践,1995,18(1):1-2. 被引量:17
  • 2徐阳.竞争情报与知识产权保护[J].中国软科学,1996(10):97-100. 被引量:3
  • 3缪其浩.市场竞争与竞争情报[M].军事医学科学出版社,1996.106.
  • 4Richelson J T. The US Intelligence Community (5th edition). Boulder, Colo. : Westview Press, 2007:354-412.
  • 5Johnson L K, James J. Intelligence and National Security: the Secret World of Spies:An Anthology. New York: Oxford University Press, 2008:295 - 301.
  • 6[2008-06-16]. http ://www. ncix. gov.
  • 7泰森.竞争情报完全指南(第2版).王玉,郑逢波,张佳浩,等译.北京:中国人民大学出版社,2004:4.
  • 8Rothberg H N. Fortifying competitive intelligence systems with shadow teams. Competitive Intelligence Review,1997,8(2) :3 -11.
  • 9Shaw P. Intervening in the shadow systems of organizations Consulting from a complexity perspective. Journal of Organizational Change Management, 1997,10 ( 3 ) :235 - 249.
  • 10Rothberg H N, Erickson G S. From knowledge to intelligence-Creating competitive advantage in the next economy. Burlington: Elsevier Inc ,2005:3 - 326.

共引文献56

同被引文献76

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部