PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Leveraging competitive intelligence in offensive cyber counterintelligence: An operational approach for the shipping industry

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In the contemporary landscape of rapid digitalisation, the shipping industry is increasingly confronted with unparalleled cybersecurity threats, necessitating a transition towards proactive strategies to address these evolving risks. Traditional methodologies have proven inadequate, thereby necessitating the integration of competitive intelligence (CI) within offensive cyber counterintelligence (OCCI) frameworks. This paper investigates the interdependent relationship between CI and OCCI, underscoring their combined potential to safeguard organisational interests and enhance cybersecurity resilience. The primary objectives of this study are to elucidate the foundational principles and significance of CI within business contexts, to explore the theoretical underpinnings of OCCI, and to propose a structured framework for the integration of CI into OCCI operations specifically tailored to the shipping sector. Theoretical constructs highlight the critical importance of proactive measures in mitigating cyber threats and sustaining a competitive advantage in the digital era. Through a comprehensive analysis of the literature, this interdisciplinary approach provides practitioners with the opportunity to evaluate and implement the proposed framework. The insights garnered from this study hold significant implications for both academic research and industry practice, promoting ongoing collaboration in the development of robust frameworks for integrating CI within OCCI operations.
Rocznik
Strony
80--92
Opis fizyczny
Bibliogr. 100 poz.
Twórcy
  • Department of Business Administration, Athens University of Economics and Business, Patision 76, 112 57, Athens, Greece
  • Department of Business Administration, Athens University of Economics and Business, Patision 76, 112 57, Athens, Greece
Bibliografia
  • 1. Abraham, S.C. (2012) Strategic planning: A practical guide for competitive success. Leeds: Emerald Group Publishing.
  • 2. ABS Group. (2021) Safety, risk and compiance management – A primer in IMO cyber risk management guidlines. Available at: https://www.american-club.com/files/files/A_Primer_on_IMO_Cyber_Risk_Management_ Guidelines.pdf (Accessed: 27 March 2024).
  • 3. Adidam, P.T, Gajre, S. and Kejriwal, S. (2009) ‘Cross-cultural competitive intelligence strategies’, Marketing Intelligence & Planning, 27(5), pp. 666–680. doi: 10.1108/02634500910977881.
  • 4. Aguilar, F. (1967) Scanning the Business Environment. New York, NY: MacMillan.
  • 5. Akpan, F., Bendiab, G., Shiaeles, S., Karamperidis, S. and Michaloliakos, M. (2022) ‘Cybersecurity challenges in the maritime sector’, Network, 2(1), pp. 123–138. doi: 10.3390/network2010009.
  • 6. Alcaide, J.I. and Llave, R.G. (2020) ‘Critical infrastructures cybersecurity and the maritime sector’, Transportation Research Procedia, 45, pp. 547–554. doi: 10.1016/j.trpro.2020.03.058.
  • 7. Androjna, A., Perkovič, M., Pavic, I. and Mišković, J. (2021) ‘AIS data vulnerability indicated by a spoofing case-study’. Applied Sciences, 11(11), 5015. doi: 10.3390/app11115015.
  • 8. Auster, E. and Choo, C.W. (1994) ‘How senior managers acquire and use information in environmental scanning’, Information Processing & Management, 30(5), pp. 607–618. doi: 10.1016/0306-4573(94)90073-6.
  • 9. Babbar, S. and Rai, A. (1993) ‘Competitive intelligence for international business’, Long Range Planning, 26(3), pp. 103–113. doi: 10.1016/0024-6301(93)90012-5.
  • 10. Ball, K. (2021) ‘Electronic monitoring and surveillance in the workplace’, Joint Research Center – European Commission. Available at: https://publications.jrc.ec.europa.eu/repository/handle/JRC125716 (Accessed: 27 March 2024).
  • 11. Barnea, A. (2017) ‘Counterintelligence: Stepson of the intelligence discipline’, Israel Affairs, 23(4), pp. 715– 726. doi: 10.1080/13537121.2017.1333725.
  • 12. Barnea, A. (2021) ‘Big data can boost the value of competitive intelligence’, Competitive Intelligence Magazine, 26(1). Available at: https://www.scip.org/page/Big-Data-Boost-Competitive-Intelligence (Accessed: 27 March 2024).
  • 13. BIMCO, Chamber of Shipping of America, Digital Containership Association, International Association of Dry Cargo Shipowners (INTERCARGO), InterManager, International Association of Independent Tanker Owners (INTERTANKO), International Chamber of Shipping (ICS), International Union of Marine Insurance (IUMI), Oil Companies International Marine Forum (OCIMF), Superyacht Builders Association (Sybass) and World Shipping Council (WSC). (2021) The guidelines on cyber security onboard ships. Available at: https://www.ics-shipping.org/wp-content/uploads/2021/02/2021-Cyber-Security-Guidelines.pdf (Accessed: 27 March 2024).
  • 14. Boncella, R.J. (2003) ‘Competitive intelligence and the web’, Communications of the Association for Information Systems (CAIS), 12(1), pp. 326–341. doi: 10.17705/1CAIS.01221.
  • 15. Bose, R. (2008) ‘Competitive intelligence process and tools for intelligence analysis’, Industrial Management & Data Systems, 108(4), pp. 510–528. doi: 10.1108/02635570810868362.
  • 16. Bouthillier, F. and Jin, T. (2005) ‘Competitive intelligence professionals and their interactions with CI technology: A reseach agenda’, Journal of Competitive Intelligence and Management (Special SCIP04 Conference Issue), 3(1), pp. 41–53.
  • 17. Boyd, B.K. and Fulk, J. (1996) ‘Executive scanning and perceived uncertainty: A multidimensional model’, Journal of Management, 22(1), pp. 1–21. doi: 10.1177/014920639602200101.
  • 18. Calof, J. (1997) ‘For king and country and company’, Business Quarterly, 61(1), pp. 32–39.
  • 19. de Carvalho, P.S. (2021) ‘Fundamentals of competitive intelligence (CI)’. IF Insight & Foresight. Available at: https://paulosoeirodecarvalho.medium.com/fundamentals-of-competitive-intelligence-ci-1-ebf07520746e (Accessed: 27 March 2024).
  • 20. Catrantzos, N. (2023) Managing the insider threat no dark corners and the rising tide menace. Boca Raton, FL: CRC Press.
  • 21. Cho, I. and K., Lee (2016) ‘Advanced risk measurement approach to insider threats in Cyberspace’, Intelligent Automation & Soft Computing, 22(3), pp. 405–413. doi: 10.1080/10798587.2015.1121617.
  • 22. Cloutier, A. (2013) ‘Competitive intelligence process integrative model based on a scoping review of the literature’, International Journal of Strategic Management, 13(1), pp. 57–72. doi: 10.18374/ijsm-13-1.7.
  • 23. Cottrill, K. (1998) ‘Turning competitive intelligence into business knowledge’, Journal of Business Strategy, 19(4), pp. 27–30. doi: 10.1108/eb039948.
  • 24. Cybersecurity and Infrastructure Security Agency (CISA). (2021) Defending against software supply chain attacks. Available at: https://www.cisa.gov/sites/default/files/publications/defending_against_software_supply_ chain_attacks_508_1.pdf (Accessed: 27 March 2024).
  • 25. Dabrowski, D. (2018) ‘Sources of market information, its quality and new product financial performance’, Engineering Economics, 29(1), pp. 115–122. doi: 10.5755/j01.ee.29.1.13405.
  • 26. D’agostini, E., Nam, H.-S. and Kang, S.-H. (2019) ‘Gaining competitive advantage at sea: An overview of shipping lines’ strategic decisions’, International Journal of Transportation Engineering and Technology, 5(4), p. 74. doi: 10.11648/j.ijtet.20190504.12.
  • 27. David, F.R. (2013) Strategic management concepts and cases: A competitive advantage approach. London: Pearson.
  • 28. Dishman, P. and Pearson, T. (2003) ‘Assessing intelligence as learning within an industrial marketing group: A pilot study’, Industrial Marketing Management, 32(7), pp. 615–620. doi: 10.1016/s0019-8501(03) 00030-0.
  • 29. Du Plessis, T. and Gulwa, M. (2016) ‘Developing a competitive intelligence strategy framework supporting the competitive intelligence needs of a financial institution’s decision makers’, SA Journal of Information Management, 18(2), pp. 2–8. doi: 10.4102/sajim.v18i2.726.
  • 30. Du Toit, A.S.A. (2015) ‘Competitive intelligence research: An investigation of trends in the literature’, Journal of Intelligence Studies in Business, 5(2), pp. 14–21. doi: 10.37380/jisib.v5i2.127.
  • 31. Duvenage, P., Jaquire, V. and Solms, S. (2018) ‘Towards a literature review on cyber counterintelligence’, Journal of Information Warfare, 17(4), pp. 284–297. Available at: https://www.jstor.org/stable/26783824 (Accessed: 27 March 2024).
  • 32. Duvenage, P., Sithole, T. and Solms, S. (2017) ‘A conceptual framework for cyber counterintelligence – Theory that really matters’, in 16th European conference in cyber warfare and security. Available at: https://www.cybersecurity. org.za/docs/ECCWS_2017_DSV_Prof_MS.pdf (Accessed: 27 March 2024).
  • 33. Duvenage, P. and Solms, S. (2014) ‘Putting counterintelligence in cyber counterintelligence’, in Adrew Liaropoulos and George Tsihrintzis (Eds.) 13th European conference on cyber warfare and security. Available at: https:// www.researchgate.net/publication/328732134_Putting_Counterintelligence_in_Cyber_Counterintelligence (Accessed: 27 March 2024).
  • 34. Estay, D. (2020) ‘Cyber resilience for the shipping industry’, CyberShip Project. Available at: https://www.dendanske maritimefond.dk/wp-content/uploads/2017/03/Cybership_Report_WP_5.pdf (Accessed: 27 March 2024).
  • 35. Ettore, B. (1995) ‘Managing competitive intelligence’, Management Review, 10, pp. 15–19. Available at: https://go.gale. com/ps/i.do?id=GALE%7CA17551795&sid=googleScholar&v=2.1&it=r&linkaccess=abs&issn=00251895&p= AONE&sw=w&userGroupName=anon%7E68ba059b&aty=open-web-entry (Accessed: 27 March 2024).
  • 36. Fahey, L. and Herring, J. (2007) ‘Intelligence teams’, Strategy & Leadership, 35(1), pp. 13–20. doi: 10.1108/10878570710717245.
  • 37. Finklea, K., Christensen, M., Fischer, E., Lawrence, S. and Catherine, T. (2015) ‘Cyber intrusion into U.S. office of personnel management: In brief’, Congressional Research Service. Available at: https://sgp.fas.org/crs/ natsec/R44111.pdf (Accessed: 27 March 2024).
  • 38. Franco, M., Magrinho, A. and Ramos Silva, J. (2011) ‘Competitive intelligence: A research model tested on Portuguese firms’, Business Process Management Journal, 17(2), pp. 332–356. doi: 10.1108/14637151111122374.
  • 39. Frates, J. and Sharp, S. (2005) ‘Using business intelligence to discover new market opportunities’, Journal of Competitive Intelligence and Management, 3(3), pp. 16–28. Available at: https://www.sharpmarket.com/wpcontent/pdfs/article-new-market-opps.pdf (Accessed: 27 March 2024).
  • 40. Gaidelys, V. and Meidute, I. (2012) ‘Instruments and methods of competitive intelligence’, Economics and Management, 17(3), pp. 971–977. doi: 10.5755/j01.em.17.3.2122.
  • 41. García-Madurga, M. and Esteban-Navarro, M. (2020) ‘A project management approach to competitive intelligence’, Journal of Intelligence Studies in Business, 10(3), pp. 9–23. doi: 10.37380/jisib.v10i3.636.
  • 42. Gaspareniene, L., Remeikiene, R. and Gaidelys, V. (2013) ‘The opportunities of the use of competitive intelligence in business: Literature review’, Journal of Small Business and Entrepreneurship Development, 1(2), pp. 9–16.
  • 43. Gelb, B. and Zinkhan, G. (1985) ‘Competitive intelligence practices of industrial marketers’, Industrial Marketing Management, 14, pp. 269–275. doi: 10.1016/0019-8501(85)90019-7.
  • 44. Gelles, M.G. (2021) ‘Insider threat prevention, detection, and mitigation: Building an insider threat program’, in J. Reid Meloy, Jens Hoffmann (Eds.) International handbook of threat assessment, 2 edn, New York: Oxford Academic, pp. 669–679. doi: 10.1093/med-psych/9780190940164.003.0037.
  • 45. Ghoshal, S. and Westney, D.E. (1991) ‘Organizing competitor analysis systems’, Strategic Management Journal, 12(1), pp. 17–31. doi: 10.1002/smj.4250120103.
  • 46. Grammenos, Th. C. (2010) The Handbook of maritime economics and business. Lloyd’s list. London Informa Law PLC.
  • 47. Greenberg, A. (2018, August 22) The untold story of notpetya, the most devastating cyberattack in history. Available at: https://cyber-peace.org/wp-content/uploads/2018/10/The-Untold-Story-of-NotPetya-the-MostDevastating-Cyberattack-in-History-_-WIRED.pdf (Accessed: 27 March 2024).
  • 48. Greene, R. (1966) Business intelligence and espionage. Homewood, IL: Dow Jones-Irwin.
  • 49. Griffioen, J., van der Drift, M. and van den Broek, H. (2021) ‘Enhancing maritime crew resource management training by applying resilience engineering: A case study of the bachelor maritime officer training programme in Rotterdam’, Education Sciences, 11(8), p. 378–389. doi: 10.3390/educsci11080378.
  • 50. Guitton, M.J. and J., Fréchette (2023) ‘Facing cyberthreats in a crisis and post-crisis ERA: Rethinking security services response strategy’, Computers in Human Behavior Reports, 10, p. 100282. doi: 10.1016/j. chbr.2023.100282.
  • 51. Hedin, H. (2004) ‘Introduction to competitive intelligence (1/2004)’, GIA white paper. Available at: https:// www.academia.edu/33107462/INTRODUCTION_TO_COMPETITIVE_INTELLIGENCE (Accessed: 27 March 2024).
  • 52. Heppes, D. and Du Toit, A. (2009) ‘Level of maturity of the competitive intelligence function’, Aslib Proceedings, 61(1), pp. 48–66. doi: 10.1108/00012530910932285.
  • 53. Jaquire, V. and von Solms, S. (2017) ‘Towards a cyber counterintelligence maturity model’, in Juan R. Lopez, Adam R. Bryant, Robert F. Mills (Eds.) Proceedings of the 12th international conference on cyber warfare and security. Available at: https://adam.uj.ac.za/csi/docs/Jaquire%20&%20von%20Solms%20-%20Towards%20 a%20Cyber%20Counterintelligence%20Maturity%20Model.pdf (Accessed: 27 March 2024).
  • 54. Johns, P. and Van Doren, D.C. (2010) ‘Competitive intelligence in service marketing’, Marketing Intelligence & Planning, 28(5), pp. 551–570. doi: 10.1108/02634501011066492.
  • 55. Johnson, G., Scholes, K. and Whittington, R. (2009) Exploring corporate strategy. Essex: Pearson Education.
  • 56. Kaminska, M., Broeders, D. and Cristiano, F. (2021) ‘Limiting viral spread: Automated cyber operations and the principles of distinction and discrimination in the grey zone’, in 13th International conference on cyber conflict. Available at: https://ieeexplore.ieee.org/document/9468290 (Accessed: 27 March 2024).
  • 57. Kanellopoulos, A.N. (2022) ‘The importance of counterintelligence culture in state security’, Global Security and Intelligence. Note 5. Available at: https://www.buckingham.ac.uk/wp-content/uploads/2022/07/GSIN_5a. pdf (Accessed: 27 March 2024).
  • 58. Kanellopoulos, A.N. (2024) ‘Insider threat mitigation through human intelligence and counterintelligence: A case study in the shipping industry’, Defense and Security Studies, 5(1), pp. 10–19. doi: 10.37868/dss.v5.id261.
  • 59. Kanellopoulos, A.N. and Ioannidis, A. (2023) ‘The dimensions of counterintelligence and their role in national security’, Journal of European and American Intelligence Studies, 6(2), pp. 85–104.
  • 60. Kars-Unluoglu, S. and Kevill, A. (2021) ‘Emotional foundations of capability development: An exploration in the SME context’, Journal of Management & Organization, 27(4), pp. 1–20. doi: 10.1017/jmo.2020.38.
  • 61. Kump, B., Engelmann, A., Kessler, A. and Schweiger, C. (2018) ‘Toward a dynamic capabilities scale: Measuring organizational sensing, seizing, and transforming capacities’, Industrial and Corporate Change. 28(5), pp. 1149–1172. doi: 10.1093/icc/dty054.
  • 62. Leibowitz, J. (2006) Strategic intelligence: Business intelligence, competitive intelligence, and knowledge management. Boca Raton, FL: Auerbach Publications.
  • 63. Lloyd’s List Intelligence. (2023) The case of the Shanaye queen. Available at: https://www.lloydslistintelligence. com/knowledge-hub/risk-and-compliance/the-case-of-the-shanaye-queen (Accessed: 9 July 2024).
  • 64. Markovich, A., Raban, D.R. and Efrat, K. (2022) ‘Tailoring competitive information sources to the sequence of dynamic capabilities’, Journal of Management & Organization, 28(3), pp. 480–501. doi: 10.1017/jmo.2022.35.
  • 65. McGonagle, J.J. and Vella, C.M. (2002) Bottom line competitive intelligence. Westport, CT: Quorum Books.
  • 66. Miller, S. (2001) ‘Competitive intelligence – An overview’, Society of Competitive Intelligence Professionals. pp. 1–14.
  • 67. Miller, J.P. (2005) ‘Information science and competitive intelligence: Possible collaborators?’, Bulletin of the American Society for Information Science and Technology, 23(1), pp. 11–13. doi: 10.1002/bult.33.
  • 68. Morrow, A.B. (2021) ‘Information security and cyber threats and vulnerabilities’, in Gordon G.A, and Young R.Y. (Eds.) Intermodal Maritime Security: Supply Chain Risk Mitigation, Amsterdam: The Netherlands, pp. 169–193. doi: 10.1016/b978-0-12-819945-9.00010-1.
  • 69. Mraković, I. and Vojinović, R. (2019) ‘Maritime cyber security analysis – How to reduce threats?’, Transactions on Maritime Science, 8(1), pp. 132–139. doi: 10.7225/toms.v08.n01.013.
  • 70. Pawelski, J. (2023) ‘Cyber threats for present and future commercial shipping’, TransNav, the International Journal on Marine Navigation and Safety of Sea Transportation, 17(2), pp. 261–267. doi: 10.12716/1001.17.02.01.
  • 71. Peddie, J. (1992) ‘The corporate culture and use of competitive intelligence’, Competitive Intelligence Review, 3(1), pp. 7–10. doi: 10.1002/cir.3880030104.
  • 72. Pellissier, R. and Nenzhelele, T.E. (2013) ‘Towards a universal definition of competitive intelligence’, SA Journal of Information Management, 15(2), pp. 559–566. doi: 10.4102/sajim.v15i2.559.
  • 73. Petersson, N.P., Tenold, S. and White, N.J. (2019) Shipping and globalization in the post-war era. Palgrave Studies in Maritime Economics. New York, NY: Springer.
  • 74. Pirttimäki, V. (2007) Business intelligence as a managerial tool in large Finnish companies. Doctoral thesis. Tampere: Tampere University of Technology (TUT). Available at: https://trepo.tuni.fi/handle/10024/114315 (Accessed: 27 March 2024).
  • 75. Porter, M. (1991) ‘Towards a dynamic theory of strategy’, Strategic Management Journal, 12(S2), pp. 95–117. doi: 10.1002/smj.4250121008.
  • 76. Pöyhönen, J. and Lehto, M. (2022) ‘Assessment of cybersecurity risks: Maritime automated piloting process’, International Conference on Cyber Warfare and Security, 17(1), pp. 262–271. doi: 10.34190/iccws.17.1.18.
  • 77. Pranjic, G. (2011) ‘Influence of business and competitive intelligence on making right business decisions’, Ekonomska Misao Praksa, 20(1), pp. 271–288. Available at: https://hrcak.srce.hr/69721 (Accessed: 27 March 2024).
  • 78. Prescott, J. (1999) ‘The evolution of competitive intelligence: Designing a process for action’, APMP Professional Journal, pp. 37–52.
  • 79. Prescott, J.E. (2001) ‘Competitive intelligence: Lessons from the trenches’, Competitive Intelligence Review, 12(2), pp. 5–19. doi: 10.1002/cir.1013.
  • 80. Prunckun, H. (2019) Counterintelligence theory and practise. New York, NY: Rowman & Littlefield.
  • 81. Ruhli, E. and Sachs, S. (1997) ‘Challenges for strategic competitive intelligence at the corporate level’, Competitive Intelligence Review, 8(4), pp. 54–64. doi: 10.1002/(sici)1520-6386(199724)8:43.0.co;2-s.
  • 82. Sangher, K.S., Singh, A., Pandey, H.M. and Kumar, V. (2023) ‘Towards safe cyber practices: Developing a proactive cyber-threat intelligence system for dark web forum content by identifying cybercrimes’, Information, 14(6), p. 349. doi: 10.3390/info14060349.
  • 83. Sapkauskiene, A. and Leitoniene, S. (2010) ‘The concept of time-based competition in the context of management theory’, Inzinerine Ekonomika (Engineering Economics), 21(2), pp. 205–2013. Available at: https://epubl. ktu.edu/object/elaba:3041519/ (Accessed: 27 March 2024).
  • 84. Sawka, K. (1996) ‘Demystifying competitive intelligence’, Management Review, 85(10), pp. 47–51. Available at: https://go.gale.com/ps/i.do?id=GALE%7CA18730946&sid=googleScholar&v=2.1&it=r&linkaccess=abs&issn=00251895&p=AONE&sw=w&userGroupName=anon%7Efe57ae9&aty=open-web-entry (Accessed: 27 March 2024).
  • 85. Schwarz, M., Marx, M. and Federrath, H. (2021) ‘A structured analysis of information security incidents in the maritime sector’, Cornell University archives. Available at: https://arxiv.org/pdf/2112.06545.pdf (Accessed: 27 March 2024).
  • 86. Seng Yap, C., Zabid Abdul Rashid, M. and Amat Sapuan, D. (2013) ‘Perceived environmental uncertainty and competitive intelligence practices’, VINE, 43(4), pp. 462–481. doi: 10.1108/vine-11-2011-0058.
  • 87. Sewdass, N. (2012) ‘Proposing a competitive intelligence (CI) framework for public service departments to enhance service delivery’, SA Journal of Information Management, 14(1), pp. 1–13. doi: 10.4102/sajim.v14i1.491.
  • 88. Shinde, S. and Mehta, H. (2023) ‘Defending marine ships against ethernet based cyberattacks’, in 2023 Fifth international conference on electrical, computer and communication technologies (ICECCT). New York, NY: IEEE. doi: 10.1109/icecct56650.2023.10179830.
  • 89. Sigholm, J. and Bang, M. (2013) ‘Towards offensive cyber counterintelligence’, in 2013 European intelligence and security informatics conference, pp. 166–171. doi: 10.1109/EISIC.2013.37.
  • 90. Sliton, P. (1998) ‘Society of competitive intelligence professionals, various proceedings and publications’, Competitive Review, 9(2), pp. 4–9.
  • 91. Stack, K.P. (1998) ‘Competitive intelligence’, Intelligence and National Security, 13(4), pp. 194–202. doi: 10.1080/02684529808432511.
  • 92. Stouder, M.D. and Gallagher, S. (2013) ‘Crafting operational counterintelligence strategy: A guide for managers’, International Journal of Intelligence and Counterintelligence, 26(3), pp. 583–596. doi: 10.1080/08850607.2013.780560.
  • 93. Strauss, A. and Du Toit, A. (2010) ‘Skills shortages and competitiveness in South Africa: The need for competitive intelligence skills’, Journal of Contemporary Management, 7, pp. 307–324.
  • 94. Svilicic, B., Kamahara, J., Rooks, M. and Yano, Y. (2019) ‘Maritime cyber risk management: An experimental ship assessment’, Journal of Navigation, 72(5), pp. 1108–1120. doi: 10.1017/s0373463318001157.
  • 95. Tahmasebifard, H. (2018) ‘The role of competitive intelligence and its sub-types on achieving market performance’, Cogent Business & Management, 5(1), p. 1540073. doi: 10.1080/23311975.2018.1540073.
  • 96. Viviers, W., Saayman, A. and Muller, M.L. (2005) ‘Enhancing a competitive intelligence culture in SouthAfrica’, International Journal of Social Economics, 32(7), pp. 576–589. doi: 10.1108/03068290510601117.
  • 97. VristRonn, K. (2016) ‘Intelligence ethics: A critical review and future perspectives’, International Journal of Intelligence and Counterintelligence, 29(4), pp. 760–784. doi: 10.1080/08850607.2016.1177399.
  • 98. Wettering, F. (2000) ‘Counterintelligence: The broken triad’, International Journal of Intelligence and Counterintelligence, 13(3), pp. 265–300. doi: 10.1080/08850600050140607.
  • 99. Wright, S. (2010) ‘Capitalising on intelligence: Converting input to output to insight and competitive advantage’, Journal of Strategic Marketing, 18(7), pp. 517–521. doi: 10.1080/0965254x.2010.529159.
  • 100. Zha, X. and Chen, M. (2009) ‘Competitive intelligence monitoring in the risk prevention of SMES’, Journal of Service Science and Management, 02(03), pp. 230–235. doi: 10.4236/jssm.2009.23028.
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa nr POPUL/SP/0154/2024/02 w ramach programu "Społeczna odpowiedzialność nauki II" - moduł: Popularyzacja nauki i promocja sportu (2025).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-318df2f8-a526-4167-87e1-6f9c453598a9
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.