首页 | 本学科首页   官方微博 | 高级检索  
     检索      

反竞争情报技术系统视角的供应链情报泄密机理的研究
引用本文:朱礼龙.反竞争情报技术系统视角的供应链情报泄密机理的研究[J].现代情报,2017,37(3):26-31.
作者姓名:朱礼龙
作者单位:巢湖学院经济与管理学院, 安徽 巢湖 238000
基金项目:安徽省自然科学基金项目"面向供应链信息安全的企业反竞争情报系统构建研究"(项目编号:1508085MG143)。
摘    要:从信息安全决策中心、信息安全反竞争情报中心、蜜网技术支持的网络反竞争情报系统、人际情报网络系统、供应链集成化信息系统等五个方面构建了基于反竞争情报技术系统的供应链信息安全系统模型;系统梳理了供应链信息安全系统的安全隐患;探究了供应链系统情报泄密的路径,认为信息安全治理过程监管不力造成供应链系统情报泄密、信息安全策略管理工作滞后于供应链系统信息安全的需要、蜜网技术的双刃剑特征危及网络反竞争情报系统安全、人际情报网络维护成本高,监管困难,已成供应链系统安全短板、供应链集成化信息系统自身的安全漏洞给竞争情报方以可乘之机。

关 键 词:供应链系统  情报泄密  机理  信息安全  反竞争情报  

On the Mechanism of Supply Chain Information Leakage from the Perspective of the Counterintelligence Technical Support System
Authors:Zhu Lilong
Institution:School of Economics and Management, Chaohu University, Chaohu 238000, China
Abstract:The paper,from the perspective of the counterintelligence technical support system,constructed the supply chain information security system model from such five parts as the information security decision center,the information security counterintelligence center,the network counterintelligence system supported by the honeynet technology,the human intelligence network system and the integrated supply chain information system;combed the security hidden danger of information security system in supply chain;and explored the path of the supply chain system information leakage to find that the ineffective supervision of information security governance process caused the leakage of supply chain system information,information security policy management lags behind the information security needs of the supply chain system,the feature of the double edged sword of the honeynet technology threatened the security of the network counter competitive intelligence system,the human intelligence network with high maintenance cost and the regulatory difficulties had become the supply chain system security short board,and the security vulnerabilities of integrated information system in supply chain was the basis of competitive intelligence.
Keywords:supply chain system  information leakage  mechanism  information security  counterintelligence  
点击此处可从《现代情报》浏览原始摘要信息
点击此处可从《现代情报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号