Using information security as a response to competitor analysis systems
暂无分享,去创建一个
[1] S. Ghoshal,et al. Building effective intelligence systems for competitive advantage: Sloan Management Review, 1, 49–58 (Fall 1986) , 1987 .
[2] Max Chen. Competitor analysis and interfirm riva-lry: toward a theoretical integration , 1996 .
[3] M. Young,et al. Research notes and communications sources of competitive data for the management strategist , 1989 .
[4] Ken G. Smith,et al. Action characteristics as predictors of competitive responses , 1992 .
[5] Gustavus J. Simmons,et al. Cryptanalysis and protocol failures , 1994, CACM.
[6] Christopher John Guilding,et al. Competitor-focused accounting: an exploratory note , 1999 .
[7] Charles P. Pfleeger,et al. Security in computing , 1988 .
[8] M. Bazerman,et al. BLIND SPOTS IN INDUSTRY AND COMPETITOR ANALYSIS: IMPLICATIONS OF INTERFIRM (MIS)PERCEPTIONS FOR STRATEGIC DECISIONS , 1991 .
[9] Sumantra Ghoshal,et al. Organizing competitor analysis systems , 1991 .
[10] Allen Roginsky,et al. Hash-based encryption system , 1999, Comput. Secur..
[11] Dorothy E. Denning,et al. A taxonomy for key escrow encryption systems , 1996, CACM.