Korporativna varnost
Ključne besede:
korporativna varnost, organizacije, varnost, tveganja, krizeKratka vsebina
Področje korporativne varnosti postaja v sodobnem poslovnem okolju vse bolj pomembno za stabilno in trajnostno delovanje organizacij. Pri tem gre za celovit sistem upravljanja tveganj, zagotavljanja odpornosti, in vzdrževanja zaupanja deležnikov. Korporativna varnost je v najširšem pomenu besede dejavnost, ki identificira in izvaja ukrepe za obvladovanje tveganj v organizaciji. Njena naloga je zaščititi organizacijo, njene tehnologije, zaposlene, tehnične vire ter vse podatke in informacije strank pred notranjimi ter tudi zunanjimi grožnjami. Izvajanje korporativne varnosti mora potekati v skladu z delovanjem organizacije in njenih poslovnih procesov.
Prenosi
Literatura
Aarons, G. A. in Sawitzky, A. C. (2006). Organizational climate partially mediates the effect of culture on work attitudes and staff turnover in mental health services. Administration and Policy in Mental Health and Mental Health Services Research, 33(3), 289–301.
Abdullah, M., Shukor, Z. A. in Rahmat, M. M. (2017). The influences of risk management committee and audit committee towards voluntary risk management disclosure. Journal pengurusan, 50, 83–95.
Abood, N. (2019). Big five traits: A critical review. Gadjah Mada International Journal of Business, 21(2), 159–186.
Abrahamsen, R. in Williams, M. C. (2011). Security Beyond the State: Private Security in International Politics. Cambridge University Press.
Aguinis, H. (2019). Performance Management for Dummies. John Wiley & Sons, Inc.
Ahmed, P. K. (1998). Culture and climate for innovation. European Journal of Innovation Management, 1(1), 30–43.
AJP – 2. (2003). Skupna zavezniška obveščevalna, protiobveščevalna in varnostna doktrina. NATO Standardisation Agency.
Alavi, M. in Leidner, D. E. (1999). Knowledge management systems: Issues, challenges and benefits. Communications of the AIS, 1(7), 1–28.
Al-Fedaghi, S. in Alsumait, O. (2019). Towards a conceptual foundation for physical security: Case study of an it department. International journal of safety and security engineering, 9(2), 137–156.
Almeida, F., Vieira, M. in Santos, J. (2021). Cybersecurity Risks and Management in Information Systems: A Systematic Review. Information Systems Frontiers, 23(4), 1087-1104.
Alvarez, A., Azevedo, C. in Vieira, D. (2022). An Integrated Framework for Cybersecurity Risk Management in Organizations. Journal of Information Security and Applications, 69, 103234.
Alvarez, R. M. (2020). Data Privacy: A Practical Guide to Data Protection. Springer.
American Bar Association. (2016). 8 must-dos to protect your trade secrets. ABA. https://www.americanbar.org/publications/youraba/2016/may-2016/8-must-dos-to-protect-your-tradesecrets.html
Andales, J. (2023). Risk Assessment. Safety Culture. https://safetyculture.com/topics/risk-assessment/
Anderson, J. M. (2003). Why we need a new definition of information security. Computers & security, 22(4), 308–313.
Anicent, T. N. (2014). The role of private security in community policing: Case of Kikuyu Sub County, Kiambu County, Kenya. Department of Sociology and Social Work.
Arain, M. A., Tarraf, R. in Ahmad, A. (2019). Assessing staff awareness and effectiveness of educational training on IT security and privacy in a large healthcare organization. Journal of multidisciplinary healthcare, 12, 73–81.
Arion, S. (2010). 21st century security manager. Annals of the Academy of romanian scientists, 2(2), 65–76.
Ashenden, D. (2008). Information security management: a human challenge? Information security technical report, 13(4), 195–201.
Asif, F. (1996). What is the Difference between Organizational Culture and Organizational Climate? A Native’s Point of View on a Decade of Paradigm Wars. Journal of Business Research, 21(3), 619–654.
Australian government. (2009). Safety at work. Comcare. http://www.comcare.gov.au/__data/assets/pdf_file/0010/40978/Safety_at_work_OHS_ 60_Feb_09.pdf
Aven, T. (2016). Risk assessment and risk management: Review of recent advances on their foundation. European Journal of Operational Research, 253(1), 1-13.
Aven, T. (2021). Risk Analysis: Assessing Uncertainties Beyond Expected Values and Probabilities. Wiley.
Baba, H., Watanabe, T., Nagaishi, M. in Matsumoto, H. (2014). Area Business Continuity Management, a New Opportunity for Building Economic Resilience. Procedia Economics and Finance, 18, 296–303. https://doi.org/10.1016/S2212- 5671(14)00943-5
Bakan, I. in Buyukbese, T. (2013). The Relationship between Employees’ Income Level and Employee Job Satisfaction: An Empirical Study. International Journal of Business and Social Science, 4(7), 18–25.
Bakar, Z. A., Azbiya Yaacob, N. ul S. in Udin, Z. M. (2015). Business Continuity Management Factors and Organizational Performance: A study on the Moderating Role of it Capability. Journal of Management Info, 2(3), 5–12. https://doi.org/10.31580/jmi.v7i1.38
Baldwin, A. D. (2001). The concept of security. Cambridge University Press.
Baldwin, D. A. (1997). The concept of security. Review of International Studies, 23, 5–26.
Baldwin, R. (2016). The Great Convergence: Information Technology and the New Globalization. Harvard University Press.
Barker, A., Singh, K. in Phan, H. (2022). Understanding the Role of Employee Awareness in Corporate Information Security. Journal of Cybersecurity, 8(1), 45-62.
Barney J. in Hesterly, JZ. (2005). Strateško upravljanje in konkurenčna prednost. Prentice hall.
Barney, N. (2023). Crisis management plan (CMP). Tech Target. https://www.techtarget.com/searchdisasterrecovery/definition/crisis-management-plan-CMP
Barton, L. (1993). Crisis in organizations. South-Western college.
Belič, I. in Lesjak, B. (2006). Varovanje informacijskih sistemov pred kriminalnimi napadi. V A. Dvoršek in L. Selinšek (ur.), Kriminalni napadi na premoženje gospodarskih subjektov (varnostni, pravni in zavarovalni vidik) (str. 117–128). Pravna fakulteta in Fakulteta za policijsko-varnostne vede.
Bennett, R. (1999). International Business. Financial Times, Pitman Publishing.
Benoit, F., Linkov, I. in Ahearn, J. (2022). Risk Management for Security: A Comprehensive Approach. Journal of Risk Analysis, 42(1), 25-40.
Benoit, M. in Linkov, I. (2006). Environmental Security and Environmental Management: The Role of Risk Assessment. Springer.
Berard C. in Delarue H. (2010). A cross-cultural analysis of intellectual asset protection in SMEs: The effect of environmental scanning. Journal of Small Business and Enterprise Development, 17(2), 167–183.
Berk, T., Peterlin, J. in Ribarič, P. (2005). Obvladovanje tveganja. GV Založba.
Bernik, I., Hribar, G. in Ivanuša, T. (2012). Informacijsko bojevanje kot del obveščevalne dejavnosti zasebnih podjetij. V B. Dobovšek, T. Pavšič Mravlje in P. Umek (ur.), 13. slovenski dnevi varstvoslovja, zbornik povzetkov. Fakulteta za varnostne vede. http://www.fvv.unimb.si/DV2012/zbornik/varnostno_obvescevalna_dejavnost/hribar_bernik_ivan usa.pdf
Beršnak, J. (ur.). (2016). Upravljanje kompleksnih kriz v Republiki Sloveniji. Ministrstvo za obrambo
Bertino, E. in Islam, N. (2018). Cybersecurity for Industrial Control Systems: A Survey. IEEE Transactions on Dependable and Secure Computing, 15(1), 70-85.
Bertoncelj, A., Meško, M., Naraločnik, A. in Nastran, B. (2011). Trajnostni razvoj organizacije. GV Založba.
Bertoncelj, B. (1999). Beloovratniški kriminal [Diplomsko delo]. Fakulteta za družbene vede.
Bilban, M. (2007). Izgorelost. Delo in varnost, 52(1), 22–29.
Bilton, K. (2010). Menadžment i kreativnost. Clio.
Biočić, A. (1978). Vojna enciklopedija. Vojnoizdavački zavod.
Blind K., Edler J., Frietsch R. in Schmoch U. (2006). Motives to patent: Empirical evidence from Germany. Research Policy, 35(5), 655–672.
Bojanc, R., Jerman-Blažič, B., Tekavčič, M., Klobučar, T. in Turk, T. (2014). Informacijska varnost v podjetniškem okolju. Ekonomska fakulteta v Ljubljani.
Bologna, J. in Shaw, P. (1997). Corporate Crime Investigation. Elsevier Science.
Borko, H. (1975). Information science: What it is and what it should be. Journal of the American Society for Information Science, 26(1), 3-9.
Breeden, J. (2019). Open source intelligence isn't just for spies. Nextgov. https://www.nextgov.com/emerging-tech/2019/11/how-agencies-can-use-opensource-intelligence-close-cybersecurity-loopholes/161580/ isnet
Bressler, M. (2009). Houston Baptist UniversityThe Impact of Crime on Business: A Model for Prevention. Houston Baptist University.
Breznik, M. (2012). Za učinkovito zaščito pred vlomilci ni dovolj le mehansko varovanje. Revija Varnost, 60(3), 27–31.
Britovšek, J., Tičar, B. in Sotlar, A. (2017). Private intelligence in the Republic of Slovenia: Theoretical, legal, and practical aspects. Security Journal, 31(2), 410–427.
Britsafe. (2023). What is a risk assessment? British Safety Council. https://www.britsafe.org/training-and-learning/informational-resources/risk-assessments-what-they-are-why-they-re-important-and-how-to-complete-them
Brock, E. (2019). What is OSINT and Why Is It Important To A Private Investigator? Rootinvestigations. https://rootinvestigations.com/what-is-osint-and-why-are-publicrecords-iimportant-to-a-private-investigator/
Broder, J. F. in Tucker, E. (2011). Risk Analysis and the Security Survey. Butterworth-Heinemann.
Brooks, D. J. (2010). What is security: definition through knowledge categorization. Security journal, 23, 225–239. https://link.springer.com/article/10.1057/sj.2008.18
Brotby, K. (2016). Information Security Governance: Guidance for Boards of Directors and Executive Management. Routledge.
Brynjolfsson, E. in McAfee, A. (2014). The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies. W. W. Norton & Company.
Buchanan, D. in Huczynski, A. (2020). Organisational Behavior. Prentice Hall.
Buckbee, M. (2015). How to Create a Good Security Policy. Varonis. https://www.varonis.com/blog/how-to-create-a-good-security-policy
Burke, C. (5. 1. 2007). Freeing Knowledge, telling secrets: Open source intelligence anddevelopment. Bond University.
Burton, R. M., Lauridsen, J. in Obel, B. (2004). The impact of organizational climate and strategic fit on firm performance. Human Resource Management, 43(1), 67–82.
Button, M. (2020). Private Security and the Modern State: The Regulation of Private Security in Europe and America. Taylor & Francis.
Buzan B. (1991). People, States and Fear: An agenda for International Security Studies in the Post- Cold War Era. Harvester Wheatsheaf.
Buzan, B., Wæver, O. in de Wilde, J. (1998). Security: A New Framework for Analysis. Lynne Rienner Publishers.
Cabric, M. (2015). Corporate security management: challenges, risks, and strategies. Butterworth-Heinemann. https://dl.acm.org/doi/pdf/10.5555/2843502
Cameron, K. S. in Quinn, R. E. (2006). Diagnosing and Changing Organizational Culture Based on Competing Values Framework. Jossey-Bass.
Cavanagh, T. E. (2005). Corporate security measures and practices: an overview of security since 9/11. The Conference Board.
Chan, B. S. B. (2014). A human rights debate on physical security, political liberty, and the confucian tradition. Dao, 13(4), 567–588.
Chandler, A. D. (1990). Scale and Scope: The Dynamics of Industrial Capitalism. Harvard University Press.
Chang, S. E., in Lin, C.-S. (2017). Exploring organizational culture for information security management. Industrial Management & Data Systems. https://www.researchgate.net/profile/Shuchih-ErnestChang/publication/220672511_Exploring_organizational_culture_for_information 65 _security_management/links/5630edba08ae13bc6c3549a3/Exploringorganizational-culture-for-information-security-management.pdf
Chen, H., Chiang, R. H. L. in Storey, V. C. (2012). Business intelligence and analytics: From big data to big impact. MIS Quarterly, 36(4), 1165–1188.
Choi, Y., Kim, Y. in Lee, J. (2020). A Study on the Security of Critical Infrastructure. Journal of Safety Research, 73, 134-144.
Cimerman, M., Jerman, S., Klarič, R., Ložar, B. in Sušanj, Z. (2003). Manager, prvi med enakimi: knjig o slovenskem managementu z mislimi 50 vodilnih direktorjev. GV Založba.
Cisco Systems, Inc. (2024). What Is Business Continuity? Cisco. https://www.cisco.com/c/en/us/solutions/hybrid-work/what-is-businesscontinuity.html#~related-topics
Climer, S. in White, E. (04. 05. 2021). Communicating Your Business Continuity Plan: Public Or Private? A Disaster Recovery Report. Gomindsight. https://gomindsight.com/insights/blog/communicating-your-business-continuityplan/
Cockburn, B. (ur.). (2000). Winning With Integrity: A Guide to Social Responsibility. Berrett-Koehler Publishers.
Coombs, W. T. (2014). Ongoing Crisis Communication: Planning, Managing, and Responding. Sage.
Craighead, G. (2009). High-rise security and fire safety. ButterworthHeinemann/Elsevier.
Creemers, R. (2021). Cybersecurity in Modern National Security Strategies. Journal of Information Security, 14(1), 55-68.
Cubbage, C. J. in Brooks, D. J. (2012). Corporate security in the Asia-Pacific region: Crisis, crime, fraud, and misconduct. CRC Press.
Cvijanović J. (2014). Organizacione promene. Ekonomski institut.
Čaleta, D. (2008). Vloga poslovnih procesov pri preprečevanju gospodarskega vohunstva. Ics-institut.com. http://www.icsinstitut.com/raziskovalno-podrocje/clanki-in-ostale-objave
Čaleta, D. (2018). Korporativna varnost je še v iskanju ustreznega mesta v poslovnem svetu. Korporativna varnost, 18(17), 5–8.
Čas, T. (2005). Konceptualizacija različnih pojavnih oblik varnosti s poudarkom na zasebni varnosti in zasebnem varstvu. Fakulteta za policijsko-varnostne vede.
Čas, T. (2006). Zasebno varovanje za uporabnike varnostnih storitev. Atelje Kresnik.
Čas, T. (2010). Zasebno varovanje in nekatere druge oblike nedržavnega varovanja. Čas–Zasebna šola za varnostno izobraževanje.
Čokelc, S. (1998). Pojavi in odkrivanja davčnih utaj. V B. Turk (ur.), Zbornik referatov – 30. simpozij o sodobnih metodah v računovodstvu, financah in reviziji, (str. 271-284). Zveza ekonomistov Slovenija in Zveza računovodij, finančnikov in revizorjev Slovenije.
Črnčec, D. (2009). Obveščevalna dejavnost v informacijski dobi. Defensor.
Davenport, T. H. in Prusak, L. (1998). Working knowledge: How organizations manage what they know. Harvard business press.
Deal, T. E. in Kennedy, A. A. (1982). Corporate Cultures: The Rites and Rituals of Corporate Life. Addison Wesley Publishing Company.
Delen, D. (2014). Real-world data mining: Applied business analytics and decision making. FT Press.
Dermol, V. (2010). Vpliv usposabljanj na učenje v podjetju in na njegovo uspešnost. Mednarodna fakulteta za družbene in poslovne študije.
Dillon, M. (1996). Politics of Security: Towards a Political Philosophy of Conti- nental Thought. Routledge.
Djiann, D. (2020). ISO 22301:2019 vs ISO 22301:2012. Evalian. https://evalian.co.uk/iso-223012019-vs-iso-223012012/
Dobrovoljc, A. (2018). Odkrivanje potencialnih groženj za informacijski sistem. Revija za univerzalno odličnost, 7(4), 334–346.
Dorfman, S. M. (2007). Introduction to risk management and insurance (9th edition). Pearson College Div.
Dragišić Z. (2006). Uloga međunarodne zajednice u suprotstavljanju savremenom terorizmu. Zbornik radova Fakulteta bezbednosti, Beograd, (str. 303).
Drobnič, N. in Brodnjak A. (2004). Obdavčitev v Off-shore centrih po svetu. 5.davčna konferenca Slovenskega inštituta za revizijo-zbornik referatov 14. in 15. oktober, 149-167.
Dubrovski, D. (2000). Krizni management. Visoka šola za management.
Dubrovski, D. (2004). Krizni management in prenova podjetja. Fakulteta za management.
Dubrovski, D. (2011). Razsežnosti kriznega managementa. Mednarodna fakulteta za družbene in poslovne vede.
Duh, M. (2011). Razvoj dinamičnega podjetja - zapiski predavanj. Maribor.
Duh, M. (2016). Upravljanje podjetja in strateški management. GV Založba
Dunn, M. (2005). The socio-political dimensions of Critical Information Infrastructure Protection (CIIP). International Journal of Critical Infrastructures, 1(2/3), 258–268.
Duplain, R. (2023). Understanding, Writing, & Communicating Crisis Management Plans. Podium. https://www.podium.com/article/crisis-management-plan/
Duvnjak, N. (2004). Fizično in tehnično varovanje organizacij v varnostni službi. Defendologija, 15–16, 56.
Dvojmoč, M. (2017). Integralna korporativna varnost. Varstvoslovje, 19(3), 252–272.
Dvojmoč, M. (2019). Korporativna obveščevalna dejavnost kot nova realnost: nujnost korporativne varnosti v sodobnem globalnem podjetništvu. Varstvoslovje, 21(2), 205–223.
Dvojmoč, M. (2021). Corporate Intelligence as the New Reality: The Necessity of Corporate Security in Modern Global Business. Journal of Criminal Justice and Security, 2, 205 – 223.
Dvojmoč, M. (powerpoint). (n. d.). Integralna korporativna varnost. Fakulteta za varnostne vede.
Dvojmoč, M. in Sotlar, A. (2018). Profesionalizacija zasebnega varstva v Sloveniji. Varstvoslovje, 20(3), 358–380.
Dvoršak, A. (2004). Zbiranje relevantnih podatkov o proizvodnji, konkurenci in poslovanju. Varstvoslovje, 6(2), 141-147.
Dvoršek. A. (2009). Kriminalistični vidiki odkrivanja in preiskovanja nekaterih oblik korporacijske kriminalitete. V L. Selinšek in A. Dvoršek (ur.), Korporacijski kriminal – praktični in teoretični vidiki (str. 91–105). Univerza v Mariboru, Fakulteta za varnostne vede.
Edelbacher, M., Kratcoski, P. in Theil, M. (2012). Financial Crimes: A threat to global security. CRC Press.
Edmonds, M. (1988). Armed Services and Society. Leicester University Press.
Elkington, J. (1998). Cannibals with Forks: The Triple Bottom Line of 21st Century Business. Capstone Publishing.
Encyclopaedia Britanica. (n. d.). Security and protection system. Pridobljeno na https://www.britannica.com/technology/security-and-protection-system
Esposito, C., Ficco, M., Palmieri, F. in Castiglione, A. (2018). A knowledge-based platform for big data analytics based on publish/subscribe services and stream processing. Knowledge-Based Systems, 79, 3-17.
Farooq, M., Waseem, M. K. in Sadia, M. (2015). Critical Analysis on the Security Concerns of Internet of Things (IoT). Computer Science. https://www.semanticscholar.org/paper/Security-in-the-Internet-of-Things%3A-AReview-Suo-Wan/a325897dec4dd76dc5d7825396a3e800ccaca3fc#citing-papers
Fefer, D. (2013). Sistemi tehničnega varovanja. Zbornica za razvoj slovenskega zasebnega varovanja.
Ferguson, C. (2016). Ethics and Human Intelligence: The Importance of Ethical Decision-Making in Human Intelligence Collection. Journal of Military Ethics, 15(4), 292-307.
Fisher, NI. in Hall, RG. (1969). Risk and corporate rates of return. The Quarterly Journal of Economics, 83(1), 79–92.
Flander, B. in Tičar, B. (2021). Pravica do varnosti – sinteza pravne ureditve na mednarodni, državni in lokalni ravni. V G. Meško (ur.), Varnost v lokalnih skupnostih – med ruralnimi in urbanimi perspektivami (str. 53–79). Univerza v Mariboru.
Florida R. (2002). The rise of the creative class. Basic Books.
Floridi, L. (2010). Information: A Very Short Introduction. Oxford University Press.
Frandsen, F. in Johansen W. (2017). Strategic Communication. The International Encyclopedia of Organizational Communication. https://doi.org/10.1002/9781118955567.wbieoc194
Friedman, G. (2019). The Future of War: A History. Knopf.
Friedman, T. L. (2005). The World Is Flat: A Brief History of the Twenty-First Century. Farrar, Straus and Giroux.
Furgison, L. (2020). SWOT Analysis Step 4: How to Identify Threats. Bp plans.
Gartner. (2024). Analytics and business intelligence (ABI). Gartner. https://www.gartner.com/it-glossary/business-intelligence-bi/
Geissdoerfer, M., Savaget, P., Bocken, N. M. P. in Hultink, E. J. (2017). The circular economy – A new sustainability paradigm? Journal of Cleaner Production, 143, 757-768.
Gerginova, T. (2016). Role of corporate security. V G. Meško in B. Lobnikar (ur.), Criminal justice and security in Central and Eastern Europe: Safety, security, and social control in local communities: Conference proceedings (str. 490–497). Faculty of Criminal Justice and Security.
Gerginova, T. (2018). Policy for Effective Realization of Corporate Security. V. G. Meško, B. Lobnikar, K. Prislan in R. Hacin (ur.), Criminal Justice and Security in Central and Eastern Europe: From Common Sense to Evidence-based Policy-making (str. 381–392). Faculty of Criminal Justice and Security.
Ghemawat, P. (2007). Globalization: Time to Rethink. Harvard Business Review, 85(5), 139-147.
Gheorghe, A. V., Masera, M., Weijnen, M. in De Vries, L. (2017). Critical Infrastructures at Risk: Securing the European Electric Power System. Springer.
Gill, M. (2014). Handbook of Security. Palgrave Macmillan.
Gillis, A. S. (2021). Business Continuity. TechTarget. https://www.techtarget.com/searchdisasterrecovery/definition/business-continuity
Golob, R. (2013). Varnostni sistem – Ocena varnostnih tveganj in varnostni ukrepi. Samozaložba.
Gostič, Š. (2008). Osnovni principi organizacije korporativne varnosti. V J. Šifrer (ur.), Javna in zasebna varnost: zbornik prispevkov, 9. slovenski dnevi varstvoslovja, Bled, 5. in 6. junij 2008 (str. 1–8). Fakulteta za varnostne vede.
Gostič, Š. (2014). Odgovornost korporativno varnostnega menedžerja. Korporativna varnost, (9), 16–19.
Graham, J., Howard, R. in Olson, R. (2011). Cyber Security Essentials. Taylor and Francis group.
Grant, R. M. (2021). Contemporary Strategy Analysis (11th ed.). Wiley.
Gregorc. M. (2009). Praktični problemi pri pregonu korporacijskega kriminala s poudarkom na sodelovanju med policijo in državnim tožilstvom. V L. Selinšek in A. Dvoršek (ur.), Korporacijski kriminal – praktični in teoretični vidiki (str. 25–39). Univerza v Mariboru, Fakulteta za varnostne vede.
Gregory, S. (1997). Economic Intelligence in the Post-Cold War Era: Issues for Reform. V E. Cheng in D. C. Snyder (ur.), The Final Report of the Snyder Commission. Princeton, The Woodrow Wilson School of Public and International Affairs. http://www.fas.org/irp/eprint/snyder/economic.htm
Grizold, A. (1992). Oblikovanje slovenske nacionalne varnosti. V A. Grizold (ur.), Razpotja nacionalne varnosti (59–93). Univerza v Ljubljani, Fakulteta za družbene vede.
Gupta, R., in Agarwal, S. P. (2017). A comparative study of cyber threats in emerging economies. Globus Journal.
Haimes, Y. Y. (2009). On the complex definition of risk: A systems‐based approach. Risk Analysis: An International Journal, 29(12), 1647–1654.
Hanaysha, J. in Tahir, P. R. (2016). Examining the Effects of Employee Empowerment, Teamwork, and Employee Training on Job Satisfaction. Procedia – social and behavioral sciences, 219(3), 272–282.
Harris, S. (2019). Corporate Security Management: Challenges, Risks, and Strategies. Palgrave Macmillan.
Harris, S. (2019). Corporate Security Management: Challenges, Risks, and Strategies. Palgrave Macmillan.
Harrison, J. S. in Wicks, A. C. (2018). Stakeholder Theory, Value, and Firm Performance. Business Ethics Quarterly, 28(1), 1-22.
Hassan, A., Majeed, M. in Shahbaz, M. (2023). The Importance of Training in Securing Business Secrets: A Review of Current Practices. International Journal of Information Management, 63, 102458.
Heilig, L., Kessler, T., Thilo, K., John, P. in Thaler-Mieslinger, K. (2012). SAP NetWeaver BW and SAP BusinessObjects. The Comprehensive Guide. Galileo Press.
Heinze, J. (27. 05. 2020). History of Business Intelligence. Betterbuys. https://www.betterbuys.com/bi/history-of-business-intelligence/
Heisbourg, F. (2016). The Future of National Security: A European Perspective. The Washington Quarterly, 39(4), 93-106. https://doi.org/10.1080/0163660X.2016.1261903
Herbane, B., Elliott, D. in Swartz, E. M. (2004). Business Continuity Management: Time for a Strategic Role? Long Range Planning, 37(5), 386. https://doi.org/10.1016/j.lrp.2004.07.010
Herfried, K. (2020). Standards for Management Systems, a Comprehensive Guide to Content, Implementation Tools, and Certification Schemes. Springer.
Heršak G. B. (1992). Pranje novca I policija. Policija I sigurnost, II-III, 221-228.
Hill, Terry in Westbrook, Roy. (1997). SWOT Analysis: it's Time for a product Recall. Long range planning, 30(1), 46-52
Hoffman, B. (2021). K Cybersecurity and National Security. The American Interest, 6(4), 23-35.
Holt, T. J. in Bossler, A. M. (2019). Cybercrime and Digital Crime: An Overview. Crime and Justice Research Alliance.
Höne, K. in Eloff, J. H. P. (2002). What makes an effective information security policy? Network security, (6), 14–16.
Horvath, I. (2023). Top 5 Risk Analysis Methods That You Should Know. Invensis. https://www.invensislearning.com/blog/risk-analysis-methods/
Humphreys, E. (2020). Implementing the ISO/IEC 27001:2013 ISMS Standard. Artech House.
Hunter, J. M. D. (2001). Physical security. V J. M. D. Hunter (ur.), An information security handbook. (str. 29–34). Springer. https://link.springer.com/chapter/10.1007/978-1-4471-0261-8_3
Hutter, B. (2021). The Politics of Risk: Exploring the Governance of Risk in Contemporary Societies. Risk, Hazards & Crisis in Public Policy, 12(3), 244-263.
ICS. (2019a). Integralni varnostni sistemi. https://www.ics-institut.si/korporativna-varnost/integralni-varnostni-sistemi
ICS. (2019b). Fizična varnost. https://www.ics-institut.si/korporativna-varnost/fizi%C4%8Dna-varnost
ICS. (2019c). Neprekinjeno poslovanje. https://www.ics-institut.si/korporativna-varnost/neprekinjeno-poslovanje
Infocenter. (2023). Ocena tveganja za varnost in zaščito organizacij pred tveganji in neželenimi posledicami. https://infocenter.si/ocena-tveganja-za-varnost-in-zascito-organizacij-pred-tveganji-in-nezelenimi-posledicami/
Infocenter. (n. d.). Neprekinjeno poslovanje. https://infocenter.si/neprekinjeno-poslovanje/
IPCC. (2021). Sixth Assessment Report. Intergovernmental Panel on Climate Change. https://www.ipcc.ch/assessment-report/ar6/
ISJFR ZRC SAZU. (2022). Obvladovati. Fran.si. https://fran.si/130/sskj-slovar-slovenskega-knjiznegajezika/3570171/obvladovati?View=1&Query=vplivati&All=vplivati&FilteredDictionaryI ds=130
ISO 22300:2012. (2012). ISO 22300:12 Security and resilience.
Ivanov, D., Dolgui, A. in Sokolov, B. (2022). Ripple Effect in Supply Chains: A Review and Future Directions for Research. International Journal of Production Research, 60(3), 1046–1062.
Javorović, B. in Bilandžić, M. (2007). Poslovne informacije i business intelligence. Golden marketing & Tehnička knjiga.
Jelen, L. (2008). Ekonomsko vohunstvo in upravljanje tveganj. V I. Podbregar, Vohunska dejavnost in gospodarstvo (str. 185-303). Fakulteta za varnostne vede, Univerza v Mariboru.
Jha, V. (2016). Training and Development Program and its Benefits to Employee and Organization: A Conceptual Study. International Journal of Scientific Research in Science and Technology IJSRST, 2(5), 80–86.
Joia, L. A. (2000). W3E – a web-based instruction system for leveraging corporate intelligence. Journal of Workplace Learning, 12(1), 5–13. https://doi.org/10.1108/13665620010309747
Jones, R. (2020). Implementing ISO 27001: A Practical Guide to Information Security. Security Journal, 33(2), 254-270. https://doi.org/10.1057/sj.2020.1
Kanduč, Z. (1994). Beloovratniški kriminal: Kriminološki, kazenskopravni in kriminalnopolitični pogled. Pravnik, 49(10-12), 411-423.
Kastelic, Z. (2016). Izobraževanje znotraj organizacije. Revija za univerzalno odličnost, 5(3), 233–241.
Katz, H. (1994). The Business Corporation: A Legal and Economic History. Business History Review, 68(1), 1-30.
Kazenski zakonik (KZ-1-UPB2). (2008). Uradni list RS, (55/08, 66/08, 39/09, 91/11, 50/12).
Kenda, V. (2001). Mednarodno poslovanje. Ekonomsko-poslovna fakulteta Maribor.
Kenton, W. (2023). SWOT Analysis: How To With Table and Example. Investopedia. https://www.investopedia.com/terms/s/swot.asp
Kešetović, Ž. in Toth, I. (2012). Problemi kriznog menadžmenta. Veleučilište Velika Gorica.
Kešetović, Ž., Korajlić, N. in Toth, J. (2013). Krizni menadžment. Fakultet za kriminalistiku, kriminologiju i sigurnosne studije Univerziteta u Sarajevu ; Veleučilište Velika Gorica.
Khodarahmi, E. (2009). Crisis management. Disaster prevention and management: an international journal, 18(5), 523–528.
Kirn, A. (1995). Tveganje kot družbenovrednotna kategorija. Teorija in praksa, 32(3/4), 212‒219.
Klein, L. (2022). Climate Change and National Security: A Growing Threat. Environmental Security Journal, 18(4), 112-130.
Koch, J. A. (2001). SWOT Does Not Need To Be Recalled. Part 2: Fundamentals of enhancement. Westga. http://www.westga.edu/bquest/2001/swot2.htm
Kohont, A. (2019). Menedžment človeških virov: stično področje za svetovanje v izobraževanju in usposabljanju zaposlenih. V Vilič Klenovšek T. (Ured.), S svetovanjem za zaposlene do večje vključenosti v izobraževanje in usposabljanje (str. 16-44). Andragoški center Slovenije.
Komninos, A. (2017). Safety: Maslow's Hierarchy of Needs. Interaction design foundation. https://www.interaction-design.org/literature/article/safety-maslow-s-hierarchy-of-needs
Kop, I. (1995). Varovanje in zaščita poslovnih skrivnosti. Gospodarski vestnik.
Koren, B. (2018). Osnove Obveščevalne dejavnosti: povzetek predavanj.
Kos, B. (2020). SWOT analiza. Blazkos. https://www.blazkos.com/swot-analiza/
Kovačević, Ž. (2002). Srpsko-engleski frazeološki rečnik. Filip Višnjić.
Kovačič, A. in Podvršič, A. (2014). Korporativni varnostni management – nujnost sodobnih organizacij. Korporativna varnost, 14(7), 9–11.
Krajnc Pavlica, M. (09. 11. 2004). Mirno proti krizi: o krizi v podjetju govorimo takrat, ko je podjetje izgubilo nadzor nad ključnimi dejavniki, ki vplivajo na njegovo delovanje in na delovne procese. Podjetnik. http://www.podjetnik.si/clanek/mirno-proti-krizi-20040911
Kralj, R. (2012) Varnostna politika informacijskega sistema. Fakulteta za varnostne vede, Univerza v Mariboru. http://www.fvv.um.si/konferencaiv/zbornik/Kralj.pdf
Kropfberger, D. (2003). Od reaktivnega kriznega managementa k proaktivnemu managementu priložnosti. MER, 139-152.
Kržalić, A. (2009). Stanje zasebnega varovanja v Bosni in Hercegovini. Center za varnost študij.
Kuhar, A. (1954). Delovna varnost: bistvo, dolžnosti in organizacija borbe prosti obratnim nesrečam v industriji in obrti: Primeri iz železarn. Državni zavarovalni zavod-Direkcija za Slovenijo, Zaščitna služba.
Kumar, R. in Nandhini, M. (2018). ISO Standards and Organizational Performance: A Comparative Study. International Journal of Business Management, 8(4), 45-55.
Kumar, S. (18. 06. 2014). The challenges of corporate security? Linkedin. https://www.linkedin.com/pulse/20140618052131-41375523-the-challenges-of-corporate-security
Labus, A., Despotović-Zrakić, M., Bogdanović, Z., Barać, D., in Popović, K. (2020). Improving Business Continuity Management Systems by Formalizing Business Continuity Audits. Sustainability, 12(10), 554–580.
Lapuh Bele, J. (2021). Informacijska varnost. Visoka šola za poslovne vede.
Leal, R. (02. 12. 2019). Infographic: ISO 22301:2012 vs. ISO 22301:2019 revision – What has changed? Advisera. https://advisera.com/27001academy/blog/2019/12/02/iso-22301-2019-vs-iso-22301-2012-key-changes-infographic/
Lee Seungmug, Z. (2020). A basic principle of physical security and its link to cybersecurity. International Journal Of Cyber Criminology, 14(1), 203–219.
Lerner, J. (2017). Human Intelligence in the Twenty-First Century: The Importance of Context and Analysis. Intelligence and National Security, 32(3), 389-407.
Lewis, T. G. (2019). Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation. John Wiley & Sons.
Lichte, D., Witte, D., Termin, T. in Wolf, K.-D. (2021). Representing uncertainty in physical security risk assessment. European Journal for Security Research, 6, 189–209.
Lincke, S. (2015). Desining physical security. V S. Lincke (ur.), Security planning (str. 159–170) Springer. https://link.springer.com/chapter/10.1007/978-3-319-16027-6_9
Liu, X., Wang, Y. in Zhou, J. (2023). Cultivating a Security-Conscious Culture: Employee Engagement and Information Security. Journal of Business Ethics, 178(2), 321-337.
Loader, I. in Walker, N. (2007). Civilizing Security. Cambridge University Press.
Lobnikar, B. in Dvojmoč, M. (2017). Korporativna obveščevalna dejavnost. Ljubljana: povzetek predavanj (Korporativna obveščevalna dejavnost).
Lobnikar, B. in Sotlar, A. (2006). Celovito upravljanje z varnostnimi tveganji kot dejavnik dolgoročne uspešnosti podjetja. V A. Dvoršek in L. Selinšek (ur.), Kriminalni napadi na premoženje gospodarskih subjektov (varnostni, pravni in zavarovalni vidik) (str. 9–20).
Lorbar, M. in Stare, J. (1998). Upravno poslovanje 2. Gospodarski vestnik.
Lowenthal, M. M. (2016). Intelligence: From Secrets to Policy.
Ludbey, C. (2016). The corporate security stratum of work: identifying levels of work in the domain. Edith Cowan University.
Malešič, M., Sandra, B. in Polič, H. M., (2006). Komuniciranje v krizi. Fakulteta za družbene vede.
Marker, A. (2020). ISO 22301 Business Continuity Simplified: Fortify Your Business Against Disruption. Smartsheet. https://www.smartsheet.com/content/iso22301-business-continuity-guide
Markovič, S. (2007). Osnove podjetja in industrijski varnost. Fakulteta za pravni in posel študij.
Meoli, M. in Vismara, S. (2021). Information manipulation in equity crowdfunding markets. Journal of Corporate Finance, 67, 101866. https://doi.org/10.1016/j.jcorpfin.2020.101866
Merkač Skok, M. (2013). Mentorstvo, trenerstvo, karierno svetovanje: vplivni dejavniki razvoja kariere. V Dermol V. (ur.), Sodobni izzivi managementa človeških virov (str. 153–165). Mednarodna fakulteta za družbene in poslovne študije.
Meško, G. in Sotlar, A. (2012). Preprečevanje kriminalitete v lokalnih skupnostih –med ad hoc pristopi in na znanju temelječih preventivnih dejavnostih. Revija za kriminalistiko in kriminologijo, 63(2), 229–239.
Michael, P. in Brooks, D. J. (2021). Physical security: best practices. V L. R. Shapiro in M. H. Maras (ur.), Enyclopedia of security and emergeny managment. (str. 730–737). Springer.
Mihalič, R. (2006). Management človeškega kapitala. Mihalič in Partner.
Mijalković S. in Milošević M. (2011). Obavještajno-bezbjednosna djelatnost i službe. Visoka škola unutrašnjih poslova.
Miloševič, M. (1.3.2015). Kaj sploh je korporativna varnost. ICS.
Miloš-Sprčić, D., Tekavčič, M. in Šević, Ž. (2007). „The Relevance of Corporate Risk Management Function and Its Influence on the Company’s Value“. Računovodstvo, Revizija i Financije, 5-6, 5-26.
Ministrstvo za finance Republike Slovenije. (2016). Delovna področja. Gov. http://www.uppd.gov.si/si/delovna_podrocja/vsebinska_podrocja/tipologije/zaz nane_tipologije/
Ministrstvo za javno upravo. (2020). CAF 2020: priročnik za uporabo modela CAF 2020. https://www.gov.si/assets/ministrstva/MJU/Kakovost-in-inovativnost-v-javni-upravi/CAF/CAF-prirocnik_A4_WEB.pdf
Mintzberg, H. (2000). The Rise and Fall of Strategic Planning. Financial Times Prentice Hall.
Modic, M., Lobnikar, B. in Meško, G. (2009). The role of perceived relationships between Slovenian police officers vis-a-vis private security personnel in predicting job satisfaction. Varstvoslovje, 11(2), 329-344.
Molak, V. (1997). Fundamentals of risk analysis and risk management. CRC Press.
Moore, A. P. in Rid, T. (2016). Cyber Warfare: A New Kind of War. International Security, 41(2), 7-39.
Moteff, J. in Parfomak, P. (2004). Critical Infrastructure and Key Assets: Definition and Identification. Congressional Research Seervice, The library of congress. www.fas.org/sgp/crs/RL32631.pdf
Müller, J. (2020). Technology and National Security: Emerging Challenges and Opportunities. International Security, 45(2), 101-130.
Mullins, L. in Rees, G. (2023). Management and Organisational Behavior. Pearson.
Murray, A. H. J. (ur.). (1933). The Oxford English Dictionary, IX. Clarendon Press.
Niemimaa, M., Järveläinen, J., Heikkilä, M. in Heikkilä, J. (2019). Business continuity of business models: Evaluating the resilience of business models for contingencies. International Journal of Information Management, 49, 208–216.
Nobilo, M. (1988). Pojam sigurnosti u terminologiji međunarodnih odnosa. Politička misao: časopic za politologiju, 25(4), 69–80.
Noe, R. A. in Kodwani, A. D. (2018). Employee training and development, 7e. McGraw Hill Education.
Noe, R. A., Hollenbeck, J. R., Gerhart, B. in Wright, P. M. (2013). Fundamentals of Human Resource Management. Mcgraw Hill.
Norrman, A. in Jansson, U. (2021). Supply Chain Risk Management: Review and Future Research Directions. International Journal of Logistics Management, 32(3), 573–588.
OECD. (2008). Protection of Critical Infrastructure and the role of investment polices relating to national security. Paris: Investment Division, directorate for financial and enterprise affairs: Organization for Economic Co-operation and development.
Ollivier, P. in De Leon, V. N. (2021). Business secrets are at the heart of a good intangible asset strategy for company executives. Les Nouvelles ‒ Journal of the Licensing Executives Society, LVI(4), 316–320.
O'Rourke, D. (2003). A New Politics of Consumption: Why Fair Trade Matters. The Journal of Business Ethics, 53(1-2), 53-65.
Oxford Advanced Learners Dictionary. (2024). Corporation. Oxford University Press. https://www.oxfordlearnersdictionaries.com/definition/english/corporation?q=corporation
Paltrinieri, N., Comfort, L. in Reiniers, G. (2019). Learning about risk: Machine learning for risk assessment. Safety Science, 118, 475–486.
Panagioutou, G. (2003). Bringing SWOT into focus. Business Strategy review, 14(2), 8–10.
Paton, D. in Johnston, D. (2017). Disaster Resilience: An Integrated Approach. Charles C Thomas Publisher.
Pečar, J. (1973). »Kriminaliteta belega ovratnika« in družbeno nadzorstvo. Revija za kriminalistiko in kriminologijo, 24(1), 25–38.
Petar, S., Marjanović, B. in Laušić, M. (2008): “Jeste li još uvijek sigurni da ste sigurni?”. Mozaik knjiga.
Peterson, T. in Pinkelman, J. (2000). Microsoft OLAP unleshead, Second edition. Sams Publishing.
Podbevšek, B. (1993). Organizirani gospodarski kriminal in pranje denarja. Revija policija, Ljubljana, 13(1), 7-18.
Podbregar I. in Ivanuša T. (2010). Javni viri in analitika v obveščevalni dejavnosti. Revija za kriminalistiko in kriminologijo, 61/2, 191- 198.
Podbregar, I. (2007). Varnostni in varstveni standardi v podjetju. Yumpu.com. https://www.yumpu.com/xx/document/view/48570075/varnostni-in-varstveni-standardi-v-podjetju/2
Podbregar, I. (2008). Nekateri elementi obveščevalne dejavnosti. V I. Podbregar in T. Ivanuša (ur.), Vohunska dejavnost in gospodarstvo (str. 21-73). Fakulteta za varnostne vede.
Podbregar, I. in Slapar, M. (2007). Razsežnosti gospodarskega vohunstva v 21. stoletju – primer gospodarskega vohunstva s pomočjo trojanskega konja. Dnevi varstvoslovja, 8, 6-12.
Podbregar, I., in Šprajc, P. (2017). Krizno upravljanje: Učno gradivo. Univerza v Mariboru, Fakulteta za organizacijske vede.
Podbregar, I., Mulej, M., Pečan, S., Podbregar, N. in Ivanuša, T. (2010). Informacije kot »bojna« podpora kriznemu odločanju, krizni komunikaciji in delovanju. Zavod za varnostne strategije pri Univerzi Maribor
Policija. (2013). Varovanje oseb in objektov. http://www.policija.si/index.php/delovna-podroja/varovanje-oseb-inobjektov
Policija. (n. d.). Varovanje oseb in objektov. https://www.policija.si/index.php/component/content/article/188-varovanje-oseb-in-objektov/69999-varovanje-oseb-in-objektov
Portal vlade Republike Slovenije za komuniciranje. (2024). Krizno upravljanje in vodenje. GOV. https://www.gov.si/teme/krizno-upravljanje-in-vodenje/
Porter, M. E. (1985). Competitive Advantage: Creating and Sustaining Superior Performance. Free Press.
Porter, M. E. (2001). Strategy and the Internet. Harvard Business Review, 79(3), 62-78.
Porter, M. E. in Kramer, M. R. (2011). Creating Shared Value. Harvard Business Review, 89(1/2), 62-77.
Potočnik, V. (2004). Trženje storitev s primeri iz prakse. GV Založba.
Potparič, D. in Dvoršek, A. (2012). Oblikovanje osnovne terminologije na področju kriminalistično obveščevalne dejavnosti. Revija za kriminalistiko in kriminologijo, 63(1), 39-49.
Powell, L. J. in Edwards, M. (2003). Risk and youth: a critical sociological narrative. International Journal of sociology and social policy, 23(12), 81–94.
Pravilnik o požarnem redu. (2007). Uradni list RS, (52/07).
Pravilnik o zahtevah za zagotavljanje varnosti in zdravja delavcev na delovnih mestih. (1999, 2005). Uradni list RS, (89/99, 39/05).
Prezelj, I. (2009). Nacionalna kritična infrastruktura v Republiki Sloveniji. Teorija in praksa 4 (46), 464‒484
Prezelj, I. (2010). Kritična infrastruktura v Sloveniji. Fakulteta za družbene vede.
Prezelj, I., Jelušič, L. in Anžič, A. (2007). Model celovitega ocenjevanja ogrožanja nacionalne varnosti RS. Ministrstvo za obrambo.
Priročnik za delo z izpisi klicev. (2010). Ministrstvo za notranje zadeve.
Prislan Mihelič, K., Modic, M., Lobnikar, B., Slak, B. in Mihelič, A. (2024). Ko se srečata znanje in odločanje: Pristopi k ocenjevanju varnostnih tveganj. Univerza v Mariboru, Univerzitetna založba. https://doi.org/10.18690/um.fvv.1.2024
Prislan, K. (2016). Večkriterijski model učinkovitosti informacijske varnosti v organizacijah. [Doktorska disertacija]. Fakulteta za varnostne vede.
Prislan, K. in Bernik, I. (2019). Informacijska varnost in organizacije. Fakulteta za varnostne vede.
Putra, I. H. in Purba, E. D. (2020). Effects of satisfaction, subjective norms, and self-efficacy on job application intentions of student interns. http://proust.ui.ac.id/index.php/journal/article/view/92
Radkovič, R. (2015). Varnostni menedžment: načrtovanje varovanja in sistemi nadzora nad zasebnim varovanjem (priročnik). Čas − zasebna šola za zasebno izobraževanje.
Rakar, A. (2006). Upravljanje z varnostnim tveganjem informacijskih sistemov. V A. Novaković, M. Indihar Štemberger, M. Bajec in J. Poženel (ur.), V partnerstvu z informatiko do poslovne odličnosti: zbornik posvetovanja: Dnevi slovenske informatike 2006 ‒ DSI, Portorož, Slovenija, 19.‒21. april (str. 1–7). Slovensko društvo Informatika.
Ranjan, J. (2008). Business intelligence: Concepts, components, techniques and benefits. Journal of Theoretical and Applied Information Technology, 9(1), 60–70.
Rao, M., Kumar, K. S. in Tripathi, V. (2021). Cybersecurity Threats and Challenges: A Systematic Review. Journal of Cybersecurity and Privacy, 1(2), 234-250.
Rashid, R. M., Zakaria, O. in Zulhemay, N. M. (2013). The Relationship of Information Security Knowledge (Isk) and Human Factors: Challenges and Solution. Journal of Theoretical and Applied Information Technology, 57(1), 67–75.
Rebernik, M. (1999). Ekonomika podjetja. Gospodarski Vestnik.
Reinfelder, L., Landwirth, R. in Benenson, Z. (2019). Security managers are not the enemy either. V S. Brewster in G. Fitzpatrick (ur.), Proceedings of the 2019 CHI conference on human factors in computing systems (str. 1–7). Association for Computing Machinery.
Reinfelder, L., Landwirth, R. in Benenson, Z. (2019). Security managers are not the enemy either. V S. Brewster in G. Fitzpatrick (ur.), Proceedings of the 2019 CHI conference on human factors in computing systems (str. 1–7). Association for Computing Machinery.
Režek, D. (2002). Preprečevanje in odkrivanje pranja denarja. V D. Maver, B. Kečanović in P. Mrhar (ur.), Problematika odkrivanja in pregona gospodarske kriminalitete (str. 149-161). Ministrstvo za notranje zadeve RS.
Rintel, S. (2013). The Role of Human Intelligence in Counterterrorism. Intelligence and National Security, 28(2), 194-209.
Rockström, J., Steffen, W., Noone, K., Persson, A., Chapin III, F. S., Lambin, E. F., Lenton, T. M., Scheffer, M., Folke, C., Schellnhuber, H. J., Nykvist, B., de Wit, C. A., Hughes, T., van der Leeuw, S., Rodhe, H., Sorlin, S., Snyder, P. K., Costanza, R., Svedin, U. …Foley, J. A. (2009). A safe operating space for humanity. Nature, 461(7263), 472-475. https://doi.org/10.1038/461472a
Rogers M., Helmers C. in Greenhalgh C. (2007). An analysis of the characteristics of small and medium enterprises that use intellectual property. https://webarchive.nationalarchives.gov.uk/20140603115023/http://www.ipo.gov.uk/ipresearch-characteristics-200710.pdf
Rosenberg, N. (2010). Technology, Organizations, and the Economy. V B. H. Hall in N. Rosenberg (ur.), Handbook of Economic Sociology (str. 67-87). Princeton University Press.
Rouse, M. (2015). Technical Security. Techopedia. https://www.techopedia.com/definition/31429/technical-security-techsec
Rowley, J. (2000). Is higher education ready for e-learning? Education + Training, 42(4), 208-217.
Roy, A. (2022). Analysis of Business Continuity Plan in Banking Sector. iJRASET - International Journal For Research in Applied Science and Engineering Technology, 10(VIII), 982–987.
Rudolph, C. (2017). Open Data: A New Era for Government Transparency. Journal of Information Technology & Politics, 14(2), 120-134.
Rumelili, B. (2015). Identity and desecuritisation: the pitfalls of conflating ontological and physical security. Journal of international relations and development, 18, 52–74.
Sadiq, R., Al-Rashid, M. in Voulvoulis, N. (2023). Integrating Artificial Intelligence in Risk Assessment: A Comprehensive Review. Environmental Science & Policy, 132, 122-134.
Sapiński, A., Ciupka, S. in Tomanik, R. (2020). Emotional intelligence in the professional life of a security manager. Social development & security, 10(1), 79–83.
Sarin, KR. in Weber, M. (1993). Risk-value models. European journal of operational research, 70(2), 135–149.
Savski, S., Rozman, J., Velički, D., Polutnik, B. in Hartman, J. (2017). Varovanje ljudi in premoženja: učbenik za izobraževalni program tehnik varovanja. Zbornica za razvoj slovenskega zasebnega varovanja.
Schein, E. H. (1985). Organizational Culture and Leadership. Jossey-Bass Publishers
Scheps, S. (2008). Business Intelligence for Dummies. Wiley.
Schilling, M. A. (2020). Strategic Management of Technological Innovation (6th ed.). McGraw-Hill.
Schmit, T. J. in Roth, K. (1990). Cost Effectiveness of Risk Management Practices. The Journal of Risk and Insurance, 57(3), 455–470.
Selinšek, L. (2006). Gospodarsko kazensko pravo. GV Založba.
Shrivastava, P. (1993). Crisis theory/practice: Towards a sustainable future. Industrial & Environmental Crisis Quarterly, 7(1), 23-42.
Siboni, G., Friedman, S. in Cordova, A. (2016). Cybersecurity: Risks, Strategies, and Next Steps. Military and Strategic Affairs, 8(1), 75-88.
Sinclair, T. (ur.). (1997). Collins cobuild english dictionary. HarperCollins Publishers.
Slovar slovenskega knjižnega jezika. (SSKJ). (n. d.). Kriza. Fran. https://fran.si/iskanje?View=1&Query=kriza
Smith, A. (2023). Security Systems in Healthcare: Addressing Challenges and Innovations. Journal of Healthcare Protection Management, 39(2), 45-60.
Snedaker, S. in Rima, C. (2014). Business Continuity and Disaster Recovery Planning for IT Professionals. Syngress.
Snyder, J. (2019). National Security and the Future of Global Politics. International Security, 44(3), 5-31. https://doi.org/10.1162/ISEC_a_00356
Sotlar, A. (2010). Policisti in varnostniki v procesu izvajanja policijske dejavnosti-med tekmovanjem, konfliktom, sodelovanjem in partnerstvom. Varstvoslovje, 10(1), 129-155.
Sotlar, A. in Dvojmoč, M. (2021). Zasebno varovanje in korporativna varnost v času epidemije covida-19 v Sloveniji. Revija za kriminalistiko in kriminologijo, 72(1), 79–90.
Sotlar, A. in Meško, G. (2009). The relationship between the public and private security sectors in Slovenia: From coexistence towards partnership? Varstvoslovje, 11(2), 269–285.
Srdić, M., Miljović, Đ. in Marković, L. (1979). Pravna enciklopedija. Savremena administracija.
Stankovski, L. (2012). Role of the security manager in managing with risks, threats and emergencies in toplifikacija A.D Skopje. V C. Mojanski (ur.), International scientific conference: security and euroatlantic perspectives of the Balkans: police science and police profession (states and perspectives). (str. 217–224). University St. Kliment Ohridski – Bitola.
Steden, R. in Sarre, R. (2010). Private policin in the former Yugoslavia: A menace to society? Varstvoslovje, 12(4), 424-349
Steffen, W., Richardson, K., Rockstrom, J., Cornell, S. E., Fetzer, I., Bennett, E. M., Carpenter, S. R., de Vries, W., de Wit, C. A., Folke, C., Gerten, D., Heinke, J., Mace, G. M., Persson, L. M., Ramanathan, V., Reyers, B. in Sorlin, S. (2015). Planetary boundaries: Guiding human development on a changing planet. Science, 347(6223). https://doi.org/10.1126/science.1259855
Stevenson, R. (21. 07. 2022). 6 Types of risk assessment methodologies + How to choose. Drata. https://drata.com/blog/risk-assessment-methodologies
Stewart, G. L. in Brown, K. G. (2020). Human Resource Management Linking Strategy to Practice. Wiley. https://books.google.si/books?id=53eYDwAAQBAJ&printsec=frontcover&dq =stewart+brown+2020&hl=en&sa=X&ved=2ahUKEwjjkeen34_vAhWIK3cKH VxlBIsQ6AEwAnoECAMQAg#v=onepage&q=stewart%20brown%202020&f=f alse.
Sullivan, J. (2018). Public-Private Partnerships: Theory and Practice. Journal of Public Administration Research and Theory, 28(3), 529-547.
Sultana, A., Irum, S., Ahmed, K. in Mehmood, M. (2012). Impact of training on employee performance: A Study of telecommunication sector in Pakistan. Interdisciplinary Journal of Contemporary Research in Business, 4(6), 646- 661.
Supriadi, L. S. R. in Sui Pheng, L. (2017). Business continuity management (BCM). V L. S. R. Supriadi in L. Sui Pheng (ur.), Business continuity management in construction, (str. 41–73). Springer.
Svetličič, M. (1996). Svetovno podjetje. Znanstveno in publicistično središče.
Šaloven, B. (13. 06. 2006). Kaj je poslovna skrivnost. Dashofer.si. http://www.dashofer.si/?section=3&layer=1&content=5&cid=4831&PHPSESSID =f51898a0897b17f9b0abd61fb9a80824
Ševo, B., Janjić, D. in Tančič, D. (2010). Aktuelni problemi bezbednosti i terorizma početkom XXI veka. Kaligraf.
Šprajc, P. in Podbregar, I. (2020). krizni manager, priložnost mladih v digitalni dobi. V I. Podbregar (ur.), Zaposleni v digitalni dobi (str. 75–106). Maribor: Univerzitetna založba Univerze v Mariboru.
Štrakl, M. (2003). Varnostna politika informacijskega sistema. LMS. http://lms.uni-mb.si/vitel/14delavnica/
Švajger, J. (1972). Varnost pri delu: teorija in praksa. Zavod SR Slovenije za varstvo pri delu.
Tatalović S. in Bilandžić M. (2005). Osnove nacionalne sigurnosti. Policijska akademija.
Tavzes, M. (2002). Veliki slovar tujk. Cankarjeva založba.
Taylor, M. D. (1976). Precarious Security. Norton.
Team Asana. (2022). What is crisis management plan? (6 steps to create one). Asana. https://asana.com/resources/crisis-management-plan
Teece, D. J. (2018). Dynamic capabilities and entrepreneurial management in large organizations: Toward a theory of the (entrepreneurial) firm. European Economic Review, 109, 1–20.
Thomas, M. (2023). Integrated Approaches to National Security in the Digital Age. Global Security Review, 28(3), 45-61.
Tominc, B., Dvojmoč, M. in Sotlar, A. (2016). Zasebno varovanje kot nadzorovalec privatiziranih urbanih prostorov: študija primera nakupovalnega središča v Ljubljani. Varstvoslovje, 18(1), 49-64.
Transparency International Slovenia (2016). Slamnata podjetja. Transparency. http://www.transparency.si/slamnata-podjetja
Trivan, D. (2013). Vpliv korporativne varnosti na nacionalno varnost. V A. Osterman (ur.), Sodobni vojaški izzivi (str. 69-98). Generalštab Slovenske vojske.
Trivan, D. (2014). Detektivska delatnost. Dosije studio.
Trivan, D. (2017). Osnovi korporativne bezbednosti. Fakultet za poslovne studije i pravo Univerziteta "Union - Nikola Tesla".
Trontelj, M. (2010). Upravljanje tveganj in varnostni standardi. Univerza v Mariboru.
Trtnik, A. (2008). Pasti davčnega optimiranja. Davčno - finančna praksa, 9, 16.
Turban, E., Sharda, R. in Delen, D. (2011). Decision support and business intelligence systems. Pearson Higher Ed.
Tureac, C. E. (2005). The components of the organizational culture. Acta Universitatis Danubius. Œconomica Journal, 1, 77‒91.
Urad RS za intelektualno lastnino. (13. 06. 2019). Intelektualna lastnina. Spot. https://spot.gov.si/sl/teme/intelektualna-lastnina/
Urbach, N. in Ahlemann, F. (2019). Digitalization as a risk: security and business continuity management are central cross-divisional functions of the company. V N. Urbach in F. Ahlemann (ur.), IT management in the digital age: a roadmap for the IT department of the future (str. 85–92). Springer.
Uredba (EU) 2016/679 Evropskega parlamenta in sveta z dne 27. aprila 2016 o varstvu posameznikov pri obdelavi osebnih podatkov in o prostem pretoku takih podatkov ter o razveljavitvi Direktive 95/46/ES (Splošna uredba o varstvu podatkov) (Besedilo velja za EGP). (2016). Uradni list Evropske unije, (L 119/1).
Valentinčič, J. (1983). Sodobno izobraževanje odraslih (temelji, organizacija, metode). Dopisna delavska univerza Univerzum
Varnost Ljubljana. (2020). Varovanje. https://www.varnostljubljana.si/storitve/varovanje/
Vejnović, D. in Shikman, M. (2007). Defendologija: aspekti socijalnog osiguranja savremene države. Visoka škola internih poslova.
Vezjak, M. (2002). Skrb za zdravje in varno delo. Inštitut Prevent.
Vidic, J. (2008). Krizni management kot sestavni del managementa neprekinjenega poslovanja gospodarske družbe. V J. Šifrer (ur.), Javna in zasebna varnost: zbornik prispevkov / 9. slovenski dnevi varstvoslovja, Bled, 5. in 6. junij 2008, (str. 1–20). Fakulteta za varnostne vede.
Vong, J., Kuo, C. in Wu, Y. (2022). An Overview of Cybersecurity Threats and Countermeasures in Information Systems. Journal of Computer and System Sciences, 119, 172-186.
Vrečko, I. (2002). Projektni pristop k reševanju kriz v podjetjih. Projektna mreža Slovenije, 5(2), 4-16.
Vrečko, I. (2021). Projektno usmerjen strateški management - Predavanja. Maribor.
Vršec, M. (2010). Izzivi varnostnih managerjev. Inštitut za korporativne.
Vršec, M. (2011). Sodobna managerska orodja varovanja poslovnega informacijskega sistema gospodarske družbe s poudarkom na načrtovanju neprekinjenega poslovanja. V T. Pavšič Mrevlje (ur.), Smernice sodobnega varstvoslovja [Elektronski vir] : zbornik prispevkov / 11. slovenski dnevi varstvoslovja, Ljubljana, 3.-4. junij 2010. Fakulteta za varnostne vede. https://www.fvv.um.si/DV2010/zbornik/informacijska_varnost/Vrsec.pdf
Vršec, M. in Vršec, M. (2006). Vzpostavljanje celovitega varovanja kot preventivnega dejavnika v gospodarskih družbah. V A. Dvoršek in L. Selinšek (ur.), Kriminalni napadi na premoženje gospodarskih subjektov: (varnostni, pravni in zavarovalni vidiki) (str. 83–101). Pravna fakulteta in Fakulteta za policijsko-varnostne vede.
Vršec, M. in Vršec, M. (2015). Kaj sploh je korporativna varnost. Korporativna varnost, 15(9), 5–9.
Walby, K. in Lippert, R. K. (2014). Introduction: governing every person, place and thinking – critical studies of corporate security. V K. Walby in R. K. Lippert (ur.), Corporate Security in 21st Century (str. 1–13). Palgrave Macmillan.
Wang, Y., Zhao, H., Zhang, J. in Li, S. (2022). Comprehensive Security Systems for Smart Cities: A Survey. IEEE Access, 10, 35893-35905.
Weimann, G. (2016). Terrorism in Cyberspace: The Next Generation. The Washington Institute for Near East Policy.
Will, M. in Brauweiler, W. (2020). Business continuity management (BCM). V W. L. Filho, A. M. Azul, L. Brandli, P. Gökçin Özuyar in T. Wall (ur.), Sustainable cities and communities (str. 33‒44). Springer. https://doi.org/10.1007/978-3-319-95717-3_2
Will, M. in Piesik, M. (2020). Business Continuity Management in Crisis Situations: Lessons Learned from the COVID-19 Pandemic. Journal of Business and Security, 8(2), 145-160.
WIPO. (n. d.). Intellectual property and small and medium-sized enterprises. www.wipo.int/sme
Wong, W. N. Z. in Shi, J. (2015). Business continuity management system : A complete guide to implementing ISO 22301. Kogan Page.
Yasar, K. (2023). Risk Analysis. TectTarget. https://www.techtarget.com/searchsecurity/definition/risk-analysis
Zabel, B. (1970). Poslovna tajna. Institut za uporedno pravo.
Zabukovec, V. (1997). Usposabljanje za varno vedenje. Ujma, 11 (1), 279-283.
Zagorc, A. (2016). Interno izobraževanje. Revija za univerzalno odličnost, 5(3), 273 – 282.
Zajc, B. in Avbreht, A. (2004). Pravni vidiki komuniciranja. Časnik Finance d.o.o.
Zakon o kritični infrastrukturi (ZKI). (2017). Uradni list RS, (75/17).
Zakon o varstvu pred požarom (ZVPoz-UPB1). (2007). Uradni list RS, (03/07).
Zhang, J. in Qiu, X. (2022). Electromagnetic Attacks and Countermeasures on Information Systems: A Survey. IEEE Access, 10, 4567-4584.
Zimmerman, R. in Restrepo, C. E. (2021). Physical security: exterior application. V L. R. Shapiro in M. H. Maras (ur.), Encyclopedia of security and emergency management. (str. 737–747). Springer.
Zins, C. (2007). Conceptual Approaches for Defining Data, Information, and Knowledge. Journal of the American Society for Information Science and Technology, 58(4), 479-493. https://doi.org/10.1002/asi.20508
Zupan, M. (2007). Varstvo pred požarom-usposabljanje v praksi. Ujma, 2007(21), 239–245.
Zupan, M. (2009). Požarni red, požarni načrt, načrt evakuacije. Ujma, 2009(23), 176–181.
Žnidarič, B. (2004). Dileme in perspektive preventivnega delovanja slovenskih zavarovalnic. Teorija in praksa, revija za družbena vprašanja, 41(3/4), 535–547.
