{"id":"https://openalex.org/W1998062155","doi":"https://doi.org/10.1177/016555150002600302","title":"Strategic intelligence and networked business","display_name":"Strategic intelligence and networked business","publication_year":2000,"publication_date":"2000-06-01","ids":{"openalex":"https://openalex.org/W1998062155","doi":"https://doi.org/10.1177/016555150002600302","mag":"1998062155"},"language":"en","primary_location":{"id":"doi:10.1177/016555150002600302","is_oa":false,"landing_page_url":"https://doi.org/10.1177/016555150002600302","pdf_url":null,"source":{"id":"https://openalex.org/S68913162","display_name":"Journal of Information Science","issn_l":"0165-5515","issn":["0165-5515","1741-6485"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320017","host_organization_name":"SAGE Publishing","host_organization_lineage":["https://openalex.org/P4310320017"],"host_organization_lineage_names":["SAGE Publishing"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Information Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111831104","display_name":"Blaise Cronin","orcid":null},"institutions":[{"id":"https://openalex.org/I592451","display_name":"Indiana University","ror":"https://ror.org/01kg8sb98","country_code":"US","type":"education","lineage":["https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Blaise Cronin","raw_affiliation_strings":["Indiana University, USA,","Indiana University , USA"],"affiliations":[{"raw_affiliation_string":"Indiana University, USA,","institution_ids":["https://openalex.org/I592451"]},{"raw_affiliation_string":"Indiana University , USA","institution_ids":["https://openalex.org/I592451"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5111831104"],"corresponding_institution_ids":["https://openalex.org/I592451"],"apc_list":null,"apc_paid":null,"fwci":6.9699,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.96803653,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"26","issue":"3","first_page":"133","last_page":"138"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12572","display_name":"Intelligence, Security, War Strategy","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12572","display_name":"Intelligence, Security, War Strategy","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9718000292778015,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12888","display_name":"Military Strategy and Technology","score":0.9563000202178955,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/surprise","display_name":"Surprise","score":0.657616138458252},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.618550717830658},{"id":"https://openalex.org/keywords/business-intelligence","display_name":"Business intelligence","score":0.5562745928764343},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5355019569396973},{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.5081462860107422},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4805501103401184},{"id":"https://openalex.org/keywords/information-system","display_name":"Information system","score":0.4737359285354614},{"id":"https://openalex.org/keywords/information-technology","display_name":"Information technology","score":0.4553166329860687},{"id":"https://openalex.org/keywords/business-continuity","display_name":"Business continuity","score":0.4489263892173767},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.44740748405456543},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.42913615703582764},{"id":"https://openalex.org/keywords/strategic-planning","display_name":"Strategic planning","score":0.42526257038116455},{"id":"https://openalex.org/keywords/terrorism","display_name":"Terrorism","score":0.4186725616455078},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.36929088830947876},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3603529632091522},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.195431649684906},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.19396552443504333},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.13975012302398682},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13913708925247192}],"concepts":[{"id":"https://openalex.org/C2780343955","wikidata":"https://www.wikidata.org/wiki/Q333173","display_name":"Surprise","level":2,"score":0.657616138458252},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.618550717830658},{"id":"https://openalex.org/C2767350","wikidata":"https://www.wikidata.org/wiki/Q6662173","display_name":"Business intelligence","level":2,"score":0.5562745928764343},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5355019569396973},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.5081462860107422},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4805501103401184},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.4737359285354614},{"id":"https://openalex.org/C121017731","wikidata":"https://www.wikidata.org/wiki/Q11661","display_name":"Information technology","level":2,"score":0.4553166329860687},{"id":"https://openalex.org/C2778143579","wikidata":"https://www.wikidata.org/wiki/Q831801","display_name":"Business continuity","level":2,"score":0.4489263892173767},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.44740748405456543},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.42913615703582764},{"id":"https://openalex.org/C48243021","wikidata":"https://www.wikidata.org/wiki/Q932522","display_name":"Strategic planning","level":2,"score":0.42526257038116455},{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.4186725616455078},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.36929088830947876},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3603529632091522},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.195431649684906},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.19396552443504333},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.13975012302398682},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13913708925247192},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1177/016555150002600302","is_oa":false,"landing_page_url":"https://doi.org/10.1177/016555150002600302","pdf_url":null,"source":{"id":"https://openalex.org/S68913162","display_name":"Journal of Information Science","issn_l":"0165-5515","issn":["0165-5515","1741-6485"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320017","host_organization_name":"SAGE Publishing","host_organization_lineage":["https://openalex.org/P4310320017"],"host_organization_lineage_names":["SAGE Publishing"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Information Science","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1483636822","https://openalex.org/W1491508387","https://openalex.org/W1686066606","https://openalex.org/W1855283887","https://openalex.org/W1988091596","https://openalex.org/W2014664509","https://openalex.org/W2023278664","https://openalex.org/W2088541859","https://openalex.org/W2096263684","https://openalex.org/W2105982203","https://openalex.org/W2171339950","https://openalex.org/W2305705608","https://openalex.org/W3124175488"],"related_works":["https://openalex.org/W4236382845","https://openalex.org/W4388712630","https://openalex.org/W2481168998","https://openalex.org/W2476994687","https://openalex.org/W642988558","https://openalex.org/W2324507472","https://openalex.org/W1999899047","https://openalex.org/W2173353921","https://openalex.org/W4389092243","https://openalex.org/W4387197352"],"abstract_inverted_index":{"The":[0,34],"chances":[1],"of":[2,16,27,58],"firms":[3],"achieving,":[4],"or":[5],"being":[6],"subjected":[7],"to,":[8],"strategic":[9,80],"surprise":[10],"have":[11],"escalated":[12],"with":[13],"the":[14,20,43],"growth":[15],"internetworking":[17],"technologies":[18],"and":[19,31,78,82],"opportunities":[21],"these":[22],"afford":[23],"for":[24],"various":[25],"forms":[26],"information":[28,41,68,74],"warfare":[29],"(IW)":[30],"net":[32],"terrorism.":[33],"more":[35],"a":[36,55],"business":[37],"depends":[38],"on":[39],"sophisticated":[40],"systems,":[42],"greater":[44],"its":[45],"vulnerability":[46],"to":[47],"stealth":[48],"attack.":[49],"Defensive":[50],"IW":[51],"will":[52],"soon":[53],"become":[54],"necessary":[56],"cost":[57],"doing":[59],"business.":[60],"In":[61],"practical":[62],"terms,":[63],"this":[64],"means":[65],"identifying":[66],"mission-critical":[67],"assets,":[69],"conducting":[70],"threat":[71],"assessments,":[72],"implementing":[73],"systems":[75],"security":[76],"procedures":[77],"developing":[79],"intelligence":[81],"counter-intelligence":[83],"capability.":[84]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
