{"title":"保守公司秘密","authors":"Arion N. Pattakos CPP, OCP","doi":"10.1002/(SICI)1520-6386(199723)8:3<71::AID-CIR14>3.0.CO;2-3","DOIUrl":null,"url":null,"abstract":"<p>Information security professionals and those they support must understand the threat to company secrets posed by foreign intelligence services, and foreign and domestic competitors, who may use legal or illegal means to acquire those secrets. Implementing protection policies and control measures to prevent the exploitation of corporate secrets requires support from senior management. An eight-step counter-competitor intelligence model is proposed for determining what information requires protection; analyzing, assessing and ranking risks; developing security controls; and conducting an effectiveness review. Once this analysis is completed, an information protection program can be developed or revised, and communicated throughout the corporation. © 1997 John Wiley & Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"71-78"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<71::AID-CIR14>3.0.CO;2-3","citationCount":"7","resultStr":"{\"title\":\"Keeping company secrets secret\",\"authors\":\"Arion N. Pattakos CPP, OCP\",\"doi\":\"10.1002/(SICI)1520-6386(199723)8:3<71::AID-CIR14>3.0.CO;2-3\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>Information security professionals and those they support must understand the threat to company secrets posed by foreign intelligence services, and foreign and domestic competitors, who may use legal or illegal means to acquire those secrets. Implementing protection policies and control measures to prevent the exploitation of corporate secrets requires support from senior management. An eight-step counter-competitor intelligence model is proposed for determining what information requires protection; analyzing, assessing and ranking risks; developing security controls; and conducting an effectiveness review. Once this analysis is completed, an information protection program can be developed or revised, and communicated throughout the corporation. © 1997 John Wiley & Sons, Inc.</p>\",\"PeriodicalId\":100295,\"journal\":{\"name\":\"Competitive Intelligence Review\",\"volume\":\"8 3\",\"pages\":\"71-78\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-03-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<71::AID-CIR14>3.0.CO;2-3\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Competitive Intelligence Review\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/%28SICI%291520-6386%28199723%298%3A3%3C71%3A%3AAID-CIR14%3E3.0.CO%3B2-3\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Competitive Intelligence Review","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/%28SICI%291520-6386%28199723%298%3A3%3C71%3A%3AAID-CIR14%3E3.0.CO%3B2-3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7