Korporativna obveščevalna dejavnost: Praktikum
Ključne besede:
korporativna obveščevalna dejavnost, varnost, organizacije, podatek, konkurenčna obveščevalna dejavnostKratka vsebina
Korporativno obveščanje bi lahko predstavljalo orodje povečanega ozaveščanja sodobnih organizacij, ki želijo poslovati varno, predvsem z vidika globalnega poslovanja, ob upoštevanju tveganj na trgu, pa tudi priložnosti lastnega konkurenčnega razvoja. Kot orodje za obvladovanje izzivov in nadgradnjo poslovanja z vidika konkurenčnosti in varnosti na trgu predstavlja samo zavedanje o nujnosti korporativne varnosti v sodobnem globalnem poslovanju neizogiben korak h konkurenčnemu in varnemu globalnemu poslovanju, z zavedanjem zunanjih tveganj, izkoriščanjem lastnih prednosti in poznavanjem značilnosti trga. Na splošno korporativna obveščevalna dejavnost izboljšuje delovanje organizacij, pridobiva konkurenčno prednost, obvladuje tveganja, ščiti celotno organizacijo, omogoča hitrejše in bolj celovite odločitve ter zagotavlja trajnostni razvoj organizacije.
Prenosi
Literatura
Ahdil, I. (2024). Economic Intelligence tools at the service of strategic efficiency. International Journal of Applied Management and Economics, 2(08), 275–283. https://doi.org/10.5281/zenodo.12528428
Ajayi, V. O. (2023). A review on primary sources of data and secondary sources of data. SSRN electronic journal, 2(3).
AJP – 2 Skupna zavezniška obveščevalna, protiobveščevalna in varnostna doktrina. (2003). NATO Standardisation Agency.
Andrew, C. (2018). The secret world: A history of intelligence. Yale University Press.
Anžič, M. (2010). Konkurenčna obveščevalna dejavnost gospodarskih družb [Magistrsko delo]. Fakulteta za družbene vede.
Bartes, F. (2011). Intelligence analysis – the royal discipline of competitive intelligence. Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis, 59(7), 39–56.
Bernhardt, R. (2003). Competitive intelligence: How to acquire and use corporate intelligence and counter-intelligence. FT Prentice Hall.
Bižal, S. (2014). Obveščevalna dejavnost javnih virov – OSINT [Diplomsko delo]. Fakulteta za varnostne vede.
Breeden, J. (2019). Open source intelligence isn't just for spies. https://www.nextgov.com/emerging-tech/2019/11/how-agencies-can-use-opensource-intelligence-close-cybersecurity-loopholes/161580/
Britovšek, J. (2017). Zasebna obveščevalna dejavnost v Republiki Sloveniji ‒ teoretični, pravni in praktični vidiki. V T. Pavšič Mravlje idr. (ur.), Zbornik povzetkov. 18. slovenski dnevi varstvoslovja, Maribor, 7. in 8. junij 2017 (str. 101). Univerzitetna založba Univerze v Mariboru.
Britovšek, J. (2025). Definicija obveščevalne dejavnosti. Sodobni vojaški izzivi, 26(4), 185–198.
Brock, E. (2019). What is OSINT and Why Is It Important To A Private Investigator? https://rootinvestigations.com/what-is-osint-and-why-are-public-records-iimportant-to-a-private-investigator/https://rootinvestigations.com/what-is-osint-and-why-are-publicrecords-iimportant-to-a-private-investigator/
Burke, C. (5. 1. 2007). Freeing Knowledge, telling secrets: Open source intelligence and development. Bond University. https://pure.bond.edu.au/ws/portalfiles/portal/28737919/Freeing_knowledge_telling_secrets.pdfhttp://epublications.bond.edu.au/cgi/viewcontent.cgi?article=1010&co ntext=cewces_papers
Bush, T. (2016). PESTLE Analysis: Economic Factors Affecting Business. https://pestleanalysis.com/economic-factors-affecting-business/
Calof, J. L., in Wright, S. (2008). Competitive intelligence: A practitioner, academic and inter-disciplinary perspective. European Journal of Marketing, 42(7/8), 717–730.
Cekuls, A. (2023). Business intelligence factors for decision making. Journal of Intelligence Studies in Business, 12(2), 4–5.
Choudhry, R. M., Fang, D. in Mohamed, S. (2007). The nature of safety culture: A survey of the state-of-the-art. Safety science, 45(10), 993–1012. https://doi.org/10.1016/j.ssci.2006.09.003
Colquhoun, C. (2016). A Brief History of Open Source Intelligence. https://www.bellingcat.com/resources/articles/2016/07/14/a-brief-history-of-open-source-intelligence/https://www.bellingcat.com/resources/articles/2016/07/14/a-brief-history-ofopen-source-intelligence/
Čaleta, K. in Čaleta, D. (2012). Vpliv kadrovskega menedžmenta na krepitev varnostne kulture v korporativnovarnostnem okolju. Sodobni vojaški izzivi, 14 (4), 101-122.
Črnčec, D. (2008). Obveščevalna dejavnost v javnem in zasebnem sektorju (gospodarska vs. konkurenčna obveščevalna dejavnost). [Doktorska disertacija]. Fakulteta za družbene vede.
Davenport, T. H. in Prusak, L. (1998). Working knowledge: How organizations manage what they know. Ubiquity, 1–15.
Diyaolu, A. M. (2019). The role of competitive intelligence in provision of quality information services. Library Philosophy and Practice, 1–9.
Duh, M. (2015). Upravljanje podjetja in strateški management. GV Založba.
Dvojmoč, M. (2017). Integralna korporativna varnost. Varstvoslovje, 19(3), 252–272.
Dvojmoč, M. (2019). Corporate intelligence as the new reality: the necessity of corporate security in modern global business. Varstvoslovje, 21(2), 205–223.
Dvojmoč, M. (2021). Politika varovanja informacij. Skupina Infocenter – MD svetovanje.
Dvornik, F. (1974). Origins of Intelligence Services: The Ancient Near East, Persia, Greece, Rome, Byzantium, the Arab Muslim Empires, the Mongol Empire, China, and Japan. Rutgers University Press.
Dvoršak, A. (2003). Zbiranje relevantnih podatkov o proizvodnji, konkurenci in poslovanju/Industrial Intelligence & Competitive Intelligence & Business Intelligence/. V M. Pagon (ur.), Dnevi varstvoslovja (str. 1 – 8). Visoka policijsko-varnostna šola.
Egan, J. (2001). Competitive intelligence. The Electricity Journal, 14(2), 84–85. https://doi.org/10.1016/S1040-6190(01)00171-3
Ezendu, E. (2010). Competitive intelligence. https://www.slideshare.net/ezendu/competitive-intelligence-2814940
Fleisher, C. S. in Bensoussan, B. (2003). Strategic and competitive analysis: methods and techniques for analyzing business competition. Prentice Hall, Upper Saddle River.
Fleisher, C. S. in Bensoussan, B. (2007). Business and competitive analysis: effective application of new and classic methods. Revista Inteligencia competitiva, 2(2), 1–5.
Fuld, L. M. (1995). The new competitor intelligence: the complete resource for finding, analyzing, and using information about your competitors. J. Wiley.
Furgison, L. (2020). SWOT Analysis Step 4: How to Identify Threats. Bp plans.
Galindo, J. P., Nespoli, P., Marmol, F. G. in Pérez, G. M. (2019). OSINT is the next Internet goldmine: Spain as an unexplored territory. V Actas de las V Jornadas Nacionales de Ciberseguridad Junio 5-7, Cáceres (str. 102‒109). Servicio de Publicaciones.
Gomezelj Omerzel, D. (2010). The impact of knowledge management on SME growth and profitability: A structural equation modelling study. African journal of business management, 4(16), 3417–3432.
Grozde, J. in Henigman, Ž. (2008). Uporaba javnih virov pri obveščevalnem vrednotenju geografskega prostora. V J. Šifrer (ur.), Javna in zasebna varnost: 9. slovenski dnevi varstvoslovja, Bled, 5. in 6. junij 2008. Fakulteta za varnostne vede. http://www.fvv.uni-mb.si/dv2008/zbornik/index.html
Hao, M., Dayal, U. in Hsu M. (2000). Visual data mining for business intelligence applications. Web-Age Information Management (konferenca), 3–14. https://doi.org/10.1007/3-540-45151-X_1
Harbulot, C. in Baumard, P. (1996). Intelligence économique et stratégie des entreprises : une nouvelle donne stratégique. Economica.
Hassan, N. A. in Hijazi, R. (2018). Open source intelligence methods and tools. Apress Berkeley.
Havenga, J. in Botha, D. (2003). Developing Competitive intelligence in the knowledgebased organisation. Academia. https://www.academia.edu/737439/Developing_competitive_intelligence_in_the_knowledge_based_organization
Hayes, A. (2023). Code of Ethics: Understading Its Types, Uses Through Examples. V Investopedia. https://www.investopedia.com/terms/c/code-of-ethics.asp
Henschke, A. (2024). Moral risk, moral injury, and institutional responsibility: ethical issues in HUMINT. International journal of intelligence and counterintelligence, 38, 1231–1248.
Heywood, A. (1997). Politics (4th ed.). Palgrave Macmillan. https://doi.org/10.1007/978-1-349-25543-6
Hrastelj, T. (1995). Podjetniški izzivi mednarodnega poslovanja. Gospodarski vestnik.
Hromozdova, L., Dubrovyl-Rokhova, A. in Pravorskyi, R. (2021). Economic intelligence in the system of international economic relations: characteristics of the current situation and problems of development. Technology audit and production reserves, 4(4(60), 29–33.
Hughes, D. E., Le Bon, J. in Rapp, A. (2013). Gaining and leveraging customer-based competitive intelligence: the pivotal role of social capital and salesperson adaptive selling skills. Original Empirical Research, 41, 91 – 110.
Hughes, S. (2005). Competitive intelligence as competitive advantage: The theoretical link between competitive intelligence, strategy and firm performance. Journal of Competitive Intelligence and Management, 3(2), 3–18.
Infocenter. (2023). Zakaj je zaščita podatkov tako zelo pomembna. https://infocenter.si/zakaj-je-zascita-podatkov-tako-zelo-pomembna/
Isson, J. P. in Harriott, J. (ur.). (2013). The competitive intelligence mandate. V Win with Advanced Business Analytics: Creating Business Value from Your Data (str. 271–284). John Wiley & Sons. https://doi.org/10.1002/9781119205371.ch13
Ivanov, S. in Webster, C. (2017). The robot as a consumer: a research agenda [predstavitev prispevka]. Konferenca “Marketing: experience and perspectives”, 29-30. junij 2017, Ekonomska univerza - Varna, Bolgarija.
Johnson, L. K. (2024). National security intelligence: Secret operations in defense of the democracies (3rd ed.). Cambridge: Polity Press.
Johnson, L. K. (Ed.). (2007). Handbook of Intelligence Studies. Routledge.
Joia, L. A. (2000). W3E – a web-based instruction system for leveraging corporate intelligence. Journal of Workplace Learning, 12(1), 5–13. https://doi.org/10.1108/13665620010309747
Kahaner, L. (1997). Competitive intelligence: How to gather, analyze, and use information to move your business to the top. Simon and Schuster.
Kaptein, M. in Schwartz, M. S. (2007). The effectiveness of business codes: A critical examination of existing studies and the development of an integrated research model. Journal of business ethics, 77(2), 111–127.
Kendrick, T. (2007). The winning mindset. Business Information Review, 24(4), 228–235. https://doi.org/10.1177/0266382107084890
Kent, S. (1966). Strategic intelligence for American world policy. Princeton University Press.
Kenton, W. (2023). SWOT Analysis: How To With Table and Example. V Investopedia. https://www.investopedia.com/terms/s/swot.asp
Koren, B. (2018). Osnove Obveščevalne dejavnosti [Povzetek predavanj]. Ljubljana.
Lobnikar, B in Dvojmoč, M. (2017). Korporativna obveščevalna dejavnost [Povzetek predavanj]. Fakulteta za varnostne vede.
Lönnqvist, A. in Pirttimäki, V. (2006). The measurement of business intelligence. Information systems management, 23(1), 32–40.
Lowenthal, M. M. (2019). Intelligence: From secrets to policy (8th ed.). CQ Press.
Madureira, L., Popovič, A. in Castelli, M. (2021). Competitive intelligence: A unified view and modular definition. Technological Forecasting & Social Change, 173, 1–17. https://doi.org/10.1016/j.techfore.2021.121086
Makos, J. (7. 2. 2024). Economic factors affecting business in PESTLE analysis (examples). PESTLE analysis. https://pestleanalysis.com/economic-factors-affecting-business/
Martre, P. (1994). Rapport au Premier Ministre: La politique de sécurité économique et industrielle. La Documentation Française.
Maune, A. (2014). Competitive intelligence and firm competitiveness: An overview. Journal of Governance and Regulation, 3(3), 91–103.
Mihelič K. K. in Culiberg B. (2014). Turning a blind eye: a study of peer reporting in a business school setting. Ethics & Behavior 24(5), 364-381.
Mohd Asri, M., in Abdul Mohsin, A. (2020). Competitive intelligence practices and organizational performance linkage: A review. International Journal of Business and Society, 21(2), 555–569.
Mwakibete, A. A. (2019). The corporate security: critical issues on enforcement of internal corporate security. University of Tanzania.
Noe, J. (2011). Range operations group, operations security (OPSEC) guide. https://apps.dtic.mil/dtic/tr/fulltext/u2/1038572.pdf
Null byte. (2019). Find Passwords in Exposed Log Files with Google Dorks. https://null-byte.wonderhowto.com/how-to/find-passwords-exposed-log-fileswith-google-dorks-0198557/
Olszak, C. M., & Ziemba, E. (2007). Approach to building and implementing business intelligence systems. Interdisciplinary Journal of Information, Knowledge, and Management, 2, 135–148. https://doi.org/10.28945/105 Gill, P. in Phythian, M. (2018). Intelligence in an insecure world (3rd ed.). Cambridge: Polity Press
Panda mediacenter. (2014). How do cookies work? https://www.panda security.com/mediacenter/security/cookies/
Parsons, N. (20251). What is a SWOT Analysis and How to Do It Right (With Examples). LivePlan. https://www.liveplan.com/blog/what-is-a-swot-analysis-and-how-to-do-it-right-with-examples/
Pellissier, R. in Nenzhelele, T. E. (2013). Towards a universal competitive intelligence process model. SA Journal of information management, 15(2). https://doi.org/10.4102/sajim.v15i2.567
Phillips, P. J. in Pohl, G. (2024). Industrial espionage: window of opportunity. Information security journal: a global perspective, 34, 143–155.
Podbregar, I. (2008). Nekateri elementi obveščevalne dejavnosti. V I. Podbregar in T. Ivanuša (ur.), Vohunska dejavnost in gospodarstvo (str. 21‒73). Fakulteta za varnostne vede.
Podbregar, I. (ur.). (2008). Vohunska dejavnost in gospodarstvo. Fakulteta za varnostne vede.
Podbregar, I. in Ivanuša, T. (2010). Javni viri in analitika v obveščevalni dejavnosti. Revija za kriminalistiko in kriminologijo, 61/2, 191‒198.
Podbregar, I., Mulej, M., Pečan, S., Podbregar, N. in Ivanuša, T. (2010). Informacije kot "bojna" podpora kriznemu odločanju, krizni komunikaciji in delovanju. Zavod za varnostne strategije pri Univerzi Maribor.
Popovici, V. (2014). Economic intelligence – Theoretical and practical aspects. Annals – economy series, 6, 286–288.
Porter, M. (1980). Competitive advantage: Creating and Sustaining Superior Performance; and Competitive Strategy: Techniques for Analyzing Industries and Competitors. Free Press.
Potparič, D. in Dvoršek A. (2012). Oblikovanje osnovne terminologije na področju kriminalistično obveščevalne dejavnosti. Revija za kriminalistiko in kriminologijo, 63(1), 39‒49.
Priročnik za delo z izpisi klicev. (2010). Ministrstvo za notranje zadeve.
Prislan, K. in Bernik, I. (2013). Kompromisi pri zagotavljanju informacijske varnosti v organizacijah. V 14. Dnevi varstvoslovja. Fakulteta za varnostne vede. https://www.fvv.uni-mb.si/DV2013/zbornik/informacijska_varnost/Prislan_Bernik.pdf
Prislan, K. in Bernik, I. (2013). Socialno-psihološke implikacije kibernetskega terorizma. Varstvoslovje, 15(3), 357–369.
Prislan, K. in Bernik, I. (2016). Dejavniki sprejemanja odločitev pri urejanju učinkovite informacijske varnosti v organizacijah. Varstvoslovje, 16(1), 50–67.
Purg, A. (2002). Primerjalni obveščevalni sistemi. Visoka policijsko-varnostna šola.
Raščan, S. (2005). Spremembe varnostne politike ZDA po 11. septembru 2001. Fakulteta za družbene vede.
Rouach, D. in Santi, P. (2001). Competitive intelligence adds value. European Management Journal, 19(5), 552–559. https://doi.org/10.1016/S0263-2373(01)00069-X
Schermerhorn, J. R. (2002). Management. Wiley.
SPOT. (2023). Analiza poslovnega okolja in konkurence. http://evem.gov.si/info/razmisljam/analiza-poslovnega-okolja-in-konkurence/
Šaponja, V. (1999). Taktika dela obveščevalnovarnostnih služb. Visoka policijsko-varnostna šola.
Thinkcurity. (2022). How to Perform a SWOT Analysis on Your Security Firm. https://www.thinkcurity.com/articles/how-to-perform-a-swot-analysis-on-your-security-firm
Todorović, G. (29. 11. 2023). Primerjalna analiza (benchmarking). Kabi. https://www.kabi.info/Novice/primerjalna-analiza-benchmarking/
Trim, P. R. J. (2002). Counteracting industrial espionage through counterintelligence: the case for a corporate intelligence unit and collaboration with government agencies. Security Journal, 15(4), 7–24.
Ulcej, D., Britovšek, J. in Sotlar, A. (2011). Obveščevalna dejavnost v gospodarstvu: pojmovne opredelitve. V T. Pavšič Mrevlje (ur.), Smernice sodobnega varstvoslovja: 11. Slovenski dnevi varstvoslovja, Ljubljana, 3.‒4. junij 2010. Fakulteta za varnostne vede. http://www.fvv.uni-mb.si/DV2010/zbornik/nacionalna_varnost/britovsek_ulcej_sotlar.pdf
Uredba (EU) 2016/679 Evropskega parlamenta in sveta z dne 27. aprila 2016 o varstvu posameznikov pri obdelavi osebnih podatkov in o prostem pretoku takih podatkov ter o razveljavitvi Direktive 95/46/ES (Splošna uredba o varstvu podatkov) . (2016). Uradni list Evropske unije, (L 119).
Vedder, R. G. in Guynes, S. (2001). A study of competitive intelligence practices in organizations. Journal of computer information systems, 41(2), 36–39.
Vršec, M. (2003). Uvajanje sodobnih varnostnih mehanizmov v poslovne procese gospodarske družbe in gospodarske javne službe. V M. Pagon, Dnevi varstvoslovja: 4. slovenski dnevi varstvoslovja, Bled, 5. do 7. junij 2003 (str. 150‒151). Visoka policijsko-varnostna šola.
Warner, M. (2002). Wanted: A definition of “intelligence”. Studies in Intelligence, 46(3), 15–22.
Warner, M. (2014). The Rise and Fall of Intelligence: An International Security History. Georgetown University Press.
Wheelen, T. L., in Hunger, J. D. (2012). Concepts in Strategic Management and Business Policy. Pearson Education, Inc.
Whitman, M. in Smith, C. A. (2005). The Culture of Safety: No One Gets Hurt Today. The Police Chief, 72(11), 20‒24, 26, 27.
Zack, M. H. (1999). Development a knowledge strategy. California management review, 41(3), 125–144.
Zakon o delovnih razmerjih (ZDR-1). (2013). Uradni list RS, (27/13, 78/13).
Zakon o detektivski dejavnosti (ZDD-2). (2024). Uradni list RS, (95/24).
Zakon o dostopu do informacij javnega značaja (ZDIJZ). (2006). Uradni list RS, (51/06, 117/06).
Zakon o informacijski varnosti (ZInfV). (2018, 2021, 2022). Uradni list RS, (30/18, 95/21, 130/22).
Zakon o poslovni skrivnosti (ZPosS). (2019). Uradni list RS, (22/19).
Zakon o preprečevanju omejevanja konkurence (ZPOmK-2). (2022). Uradni list RS, (130/22).
Zakon o tajnih podatkih (ZTP). (2006). Uradni list RS, (50/06).
Zakon o varstvu osebnih podatkov (ZVOP-2). (2022). Uradni list RS, (163/22).
Zakon o varstvu osebnih podatkov na področju obravnavanja kaznivih dejanj (ZVOPOKD). (2020). Uradni list RS, (177/20).
Zakon o zasebnem varovanju (ZZasV-1). (2011). Uradni list RS, (17/11).
Zakon o zaščiti prijaviteljev (ZZPri). (2023). Uradni list RS, (16/23).
Zhang, E. (2018). What is Operational Security? https://digitalguardian.com/blog/what-operational-security-five-step-processbest-practices-and-more
Prenosi
Izdano
Kategorije
Licenca

To delo je licencirano pod Creative Commons Priznanje avtorstva-Nekomercialno-Brez predelav 4.0 mednarodno licenco.





