{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T15:28:12Z","timestamp":1759937292256,"version":"3.33.0"},"reference-count":28,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2000,6,1]],"date-time":"2000-06-01T00:00:00Z","timestamp":959817600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Information Science"],"published-print":{"date-parts":[[2000,6]]},"abstract":"<jats:p> The chances of firms achieving, or being subjected to, strategic surprise have escalated with the growth of internetworking technologies and the opportunities these afford for various forms of information warfare (IW) and net terrorism. The more a business depends on sophisticated information systems, the greater its vulnerability to stealth attack. Defensive IW will soon become a necessary cost of doing business. In practical terms, this means identifying mission-critical information assets, conducting threat assessments, implementing information systems security procedures and developing strategic intelligence and counter-intelligence capability. <\/jats:p>","DOI":"10.1177\/016555150002600302","type":"journal-article","created":{"date-parts":[[2004,12,18]],"date-time":"2004-12-18T01:36:35Z","timestamp":1103333795000},"page":"133-138","source":"Crossref","is-referenced-by-count":9,"title":["Strategic intelligence and networked business"],"prefix":"10.1177","volume":"26","author":[{"given":"Blaise","family":"Cronin","sequence":"first","affiliation":[{"name":"Indiana University, USA,"}]}],"member":"179","published-online":{"date-parts":[[2000,6,1]]},"reference":[{"key":"atypb1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1520-6386(199933)10:3<58::AID-CIR9>3.0.CO;2-N"},{"volume-title":"The Innovator\u2019s Dilemma: When New Technologies Cause Great Firms to Fail","year":"1997","author":"C.M. Christensen","key":"atypb2"},{"volume-title":"The Next World War: Computers are the Weapons and the Front Line is Everywhere","year":"1998","author":"J. Adams","key":"atypb3"},{"key":"atypb4","doi-asserted-by":"publisher","DOI":"10.1080\/019722499128420"},{"volume-title":"Information Warfare and Security","year":"1999","author":"D.E. Denning","key":"atypb5"},{"key":"atypb6","unstructured":"[6] Available at: http:\/\/www\/infowar.com"},{"volume-title":"Current and Future Danger: A CSI Primer on Computer Crime and Information Warfare","year":"1998","author":"R. Power","key":"atypb7"},{"volume-title":"Cyber-crime... Cyberterrorism... Cyberwarfare: Averting an Electronic Waterloo","year":"1998","author":"Center for Strategic and International Studies","key":"atypb8"},{"key":"atypb9","doi-asserted-by":"publisher","DOI":"10.21236\/ADA385640"},{"key":"atypb10","doi-asserted-by":"publisher","DOI":"10.7249\/MR661"},{"key":"atypb11","volume-title":"Information Warfare. Cyber-terrorism: Protecting Your Personal Security in the Information Age","author":"W. Schwartau","year":"1996","edition":"2"},{"key":"atypb12","unstructured":"[12] Available at: http:\/\/www.pccip.gov\/"},{"volume-title":"Information Warfare Delphi: Raw Results","year":"1996","author":"R. Garigue","key":"atypb13"},{"key":"atypb14","first-page":"8","volume-title":"Information Warfare. Cyberterrorism: Protecting Your Personal Security in the Information Age","author":"J.I. Alger","year":"1996","edition":"2"},{"volume-title":"Information Warfare Delphi: Raw Results","year":"1996","author":"K. King","key":"atypb15"},{"key":"atypb16","doi-asserted-by":"publisher","DOI":"10.1016\/S0024-6301(98)80051-4"},{"volume-title":"Who Knows Wins: Using Information to Create and Sustain Strategic Advantage","year":"1996","author":"K.J. Patel","key":"atypb17"},{"volume-title":"Competitive Strategy: Techniques for Analyzing Industries and Competitors","year":"1980","author":"M.E. Porter","key":"atypb18"},{"key":"atypb19","unstructured":"[19] Available at: http:\/\/www.infowar.com\/class_2\/99\/class2_021199b_j.shtml"},{"volume-title":"War By Other Means: Economic Espionage in America","year":"1997","author":"J.F. Fialka","key":"atypb20"},{"issue":"2","key":"atypb21","first-page":"27","volume":"2","author":"S. Savitz","year":"1999","journal-title":"Competitive Intelligence Magazine"},{"volume-title":"Current and Projected National Security Threats to the US","year":"1998","author":"G. Tenet","key":"atypb22"},{"key":"atypb23","first-page":"1","author":"J. Donnelly","year":"1999","journal-title":"Defense Week"},{"key":"atypb24","unstructured":"[24] Available at: http:\/\/www.gocsci\/prelea990301.htm"},{"key":"atypb25","first-page":"64","author":"D. Foote","year":"1999","journal-title":"Newsweek"},{"key":"atypb26","first-page":"86","author":"M. France","year":"1999","journal-title":"Business Week"},{"journal-title":"Forbes","year":"1999","author":"M. Fumento","key":"atypb27"},{"key":"atypb28","first-page":"78","author":"K. Perine","year":"1999","journal-title":"The Industry Standard"}],"container-title":["Journal of Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/016555150002600302","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/016555150002600302","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T00:46:11Z","timestamp":1738025171000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/016555150002600302"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,6]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2000,6]]}},"alternative-id":["10.1177\/016555150002600302"],"URL":"https:\/\/doi.org\/10.1177\/016555150002600302","relation":{},"ISSN":["0165-5515","1741-6485"],"issn-type":[{"type":"print","value":"0165-5515"},{"type":"electronic","value":"1741-6485"}],"subject":[],"published":{"date-parts":[[2000,6]]}}}