基于云计算的企业竞争情报服务模式研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
云计算是新型网络运算模式,能够低成本高效率地向各种网络应用提供计算、存储、网络、软件的资源共享与服务,是分布式计算、并行计算和网格计算发展的新阶段,现已无可争议地成为计算机科学发展趋势之一。云计算的兴起及其具备的高扩展性、高可靠性、按需服务、价格低廉、使用简便的五大优势为组织竞争情报服务提供了最先进的技术手段和新的解决方案,为实现组织竞争情报服务的集成动态管理提供了可能。借助云计算,组织各类信息资源能够快速、可靠、安全地统一部署在云平台,形成信息基础设施(硬件、平台、软件)和相关服务的多种形式的虚拟化资源池,并以统一的界面动态智能地提供竞争情报服务;借助云计算,组织能够整合竞争情报人员、技术、组织环境、工作流程等为一体,促进组织信息交流与知识共享;借助云计算,组织能够构建个性化、主动化和一体化集成创新的竞争情报模式,更为有效地开展竞争情报工作,提高决策精准度,取得竞争优势。云计算时代,组织竞争情报服务将日益走向社会化、集约化和专业化,因此,构建一个基于云计算的企业竞争情报服务平台及其相应的组织环境和运行机制是知识经济时代竞争情报发展到一定阶段的必然趋势。
     本文的研究正是基于云计算的技术的兴起与蓬勃发展和竞争情报实践在企业进一步开展的时代背景,对国内外相关文献和学术前沿观点进行了系统地归纳、总结和梳理,在对企业竞争情报服务工作的现状及需求进行问卷调查和深度访谈等实证分析的基础上,通过原型实现与案例研究,旨在探索性地研究与构建一个基于云计算的企业竞争情报服务的理论模式。该项研究对于相关学科的理论体系是一次重要的补充与完善,为相关学科的理论研究与应用实践提供了重要基础与借鉴,对于把握未来企业竞争情报服务实践的发展方向与创新具有重要的指导作用,并为云计算在全社会各领域的实践与推广应用起到启发和推动作用,具有较强的创新性和较高的理论意义和实践价值。
     论文以云计算与竞争情报服务的结合为切入点,遵循从理论研究到实践应用的研究思路,即以系统的观点,通过跨学科的研究方法,借鉴计算机软件工程规范的研究与设计方法构建理论模式并应用计算机仿真模拟及在企业实际组织环境中的案例研究加以验证。第一,进行总体规划。对企业竞争情报的现状进行调查分析,在此基础上,展开可行性研究与需求分析,设计服务模式的总体框架,分析总体框架中的关键因素,然后对服务模式的各构成要素分别进行详细设计;第二,技术平台研究。应用计算机科学和云计算的理论和技术对服务模式中的技术平台进行研究与设计;第三,在所构建云计算平台之上研究与设计竞争情报服务模式;第四,应用管理科学的理论方法研究与构建云竞争情报服务平台所需的组织架构;最后,应用计算机仿真模拟方法设计实现了一个云竞争情报服务平台原型,并选取典型企业进行案例研究,对理论模式进行初步验证。
     本文共由八章组成,具体章节内容安排如下:
     第一章,绪论。本章主要介绍研究背景、研究目的与意义、研究内容与论文结构、研究方法与创新点等。着重指出开展基于云计算的企业竞争情报服务模式研究是云时代竞争情报研究与实践发展到一定阶段的必然结果。
     第二章,理论回顾与文献综述。本章回顾了云计算、竞争情报服务等理论,对国内外相关研究现状进行了梳理与综述,分析了现有研究的贡献与不足。
     第三章,基于云计算的企业竞争情报服务模式的框架设计。通过问卷调查与深度访谈对我国企业竞争情报服务的现状与需求进行调查与分析,提出本研究的必要性和可行性。在对云计算和企业竞争情报服务进行分析的基础上,应用跨学科研究方法,构建基于云计算的企业竞争情报服务模式的总体框架。
     第四章,云竞争情报服务平台的构建。应用计算机科学和云计算的理论和技术对云竞争情报服务平台进行研究与构建。对当前主流云计算体系架构和技术平台进行了全面梳理和比较分析,结合企业竞争情报服务的功能特点,对面向个性化服务的云竞争情报服务平台的架构进行设计。包括总体体系架构设计、网络架构设计、信息安全体系设计等。
     第五章,基于云计算的企业竞争情报服务模式的内容。分析了云竞争情报服务平台上企业竞争情报服务的特点与目标,提出构建云环境下面向个性化竞争情报服务的一站式集成服务模式,即:服务要“以用户为中心”,用户对资源和服务的定制和获取是无缝的和透明的,用户能够基于网络泛在、快速、动态、弹性、低价、按需计量地使用竞争情报云服务并获取所需的竞争情报资源与服务。本章在研究分析竞争情报服务传统模式的基础上,从交互的角度把云环境下竞争情报服务模式划分为三类:个性化竞争情报服务(自助服务)、协同数字参考咨询服务(一对多服务)、专家咨询(一对一服务)并分别进行了深入探讨。
     第六章,基于云计算的竞争情报服务模式的组织架构。竞争情报服务是在一定的组织结构和制度环境下开展的,本章对模式所需的组织环境与运行机制进行了研究。
     第七章,案例研究。采用主流云计算开源软件HADOOP、HDFS、MAPDUCE搭建云计算平台并部署竞争情报服务的应用,在企业实际环境中进案例研究以初步验证本文所提出的理论模式。
     第八章,研究结论与展望。本章归纳了主要研究结论,分析了研究存在的不足,并针对研究存在的局限性,提出了未来的研究方向。
     本文的创新之处在于:
     第一,借助云计算技术,构建了人员、技术、组织环境的有机整合和综合集成的基于云计算的企业竞争情报服务模式的理论架构。论文在云计算和竞争情报理论最新研究成果和实践基础上,研究与设计了一个通用的基于云计算的竞争情报服务模式的总体框架,并且分别对该模式的技术平台、组织环境、模式内容进行了研究与详细阐述。该模式能够实现人员、技术、组织环境各要素的合理组合和有机集成,为企业进行竞争情报服务提供了一个先进、廉价高效、可操作的完整框架,能够帮助企业最大限度地提高竞争情报工作效率,最终实现面向个性化服务的竞争情报服务模式。是对竞争情报服务的技术、方法、实践方面的全面创新,具有较高的理论意义和实践价值。
     第二,构建了云竞争情报服务平台。根据云计算环境下企业竞争情报服务的功能特点,结合云计算主流体系架构和商业平台,对云竞争情报服务平台进行研究和构建。
     第三,构建了基于云计算的企业竞争情报服务模式的内容。综合运用云计算、竞争情报和管理科学的相关理论,在对基于云计算的企业竞争情报服务模式的特点和目标进行分析的基础上,构建了基于云计算的竞争情报服务模式的具体内容。
     第四,构建了基于云计算的竞争情报服务模式的组织架构。基于云计算的竞争情报服务模式的顺利实现和有效运作需要相应的组织环境和配套运行机制,本文对其分别进行了深入研究与设计。
     第五,进行了案例研究。采用主流云计算开源软件构建了基于云计算的企业竞争情报服务模式的原型,部署竞争情报服务应用,选择典型企业ABC集团公司进行了案例研究。这种研究方法和构建技术是对竞争情报研究与实践的创新,也是云计算研究与实践的深化。另外,本文所提出设计方案和框架是通用架构,能够无缝移植到其他领域的云计算应用。
Cloud computing is a new network calculation mode. It is the furtherdevelopment of distributed computing, parallel computing and grid computing. Basedon the internet computing, it serves as a system that provides hardware services,infrastructure services, platform services, software services and storage services to avariety of Internet applications. This is beneficial for enterprises to set up competitiveinformation services, resources sharing and collaborative applications with lower costand higher efficiency, thus making it one of the tendencies of computer science. Therise of cloud computing and its five major advantages, namely, high scalability, highreliability, on-demand service, low cost and easy to use, provide enterprisescompetitive intelligence service with the most advanced technical means and newsolutions which have been adapted to competitive intelligence; therefore, it is possibleto achieve the competitive and dynamic management of the competitive intelligenceservice in different organizations.
     With the aid of cloud computing, organizations can carry out fast, reliable, safeand unified deployment on the cloud platform, so as to form a virtualized resourcepool, with regard to information infrastructure (hardware, platform, software) andrelated services in various forms, and to provide competitive intelligence servicesthrough the unified user interface dynamically and intelligently. With the aid of cloudcomputing, organizations can integrate personnel, technology, organizationalenvironment and the working process to promote information exchange andknowledge sharing. By virtue of cloud computing, organizations can build a newcompetitive intelligence mode, which is personalized, proactive, integrating,innovative and integrative. This is beneficial for competitive information work anddecision making. In the era of cloud computing, organizational competitiveintelligence services will develop towards socialization, intensification andspecialization; therefore, to build a cloud-based competitive intelligence serviceplatform as well as its organizational environment and operating mechanism is theinevitable tendency of the development of competitive intelligence in the epoch of knowledge-based economy.
     Based on the background that cloud computing technology has risen anddeveloped and that the competitive intelligence has been further practiced inenterprises these years, this study will explore the practice of cloud computingtechnology in the field of enterprise competitive intelligence. By virtue of thetechnical advantages of cloud computing, various research methods will be employedincluding literature analysis, comparative study, survey, computer simulation and casestudy, aiming to explore and establish a specific enterprise competitive intelligenceservice mode based on cloud computing. The study plays a key role in grasping thedirection of future enterprise competitive intelligence practice and promoting thepractice as well as application of cloud computing.
     The dissertation starts with the conjunction of cloud computing and competitiveintelligence service, following the pattern that processes from theoretical research topractice and application. It draws upon an interdisciplinary research methodology andwith the aid of research and design methods of standardized computer softwareengineering constructs a theoretical model and verifies it by employing computersimulation. Firstly, the overall planning. It deals with investigating and analyzing thestatus of enterprise competitive intelligence, and on this basis, carrying out the studyof feasibility and the analysis of demand, designing the overall framework of theservice mode, analyzing the key factors in the overall framework, and then designingrespectively various constituent elements of the service mode in detail. Secondly, theresearch on technology platform. With the aid of computer science and technology aswell as theory and technology of cloud computing, the dissertation studies thetechnology platform in service mode and designs an overall architecture. Thirdly, itstudies and designs an innovation model of competitive intelligence service upon thecloud computing platform. Fourthly, it studies and builds an organizationalframework in conjunction with a cloud competitive intelligence service platform byvirtue of the theory and method of management science. Lastly, it designs a prototypeof cloud competitive intelligence service platform by using the computer simulationtechnology and verifies the theoretical pattern by conducting case study on typicalenterprises.
     This dissertation consists of eight chapters. They are organized as follows:
     Chapter I is the Introduction. It deals with the background, significance, content,innovation, and methodology of the research as well as the dissertation framework,pointing out that conducting the studies on enterprise competitive intelligence servicemode based on cloud computing is the inevitable result of the development of studiesand practices on the competitive intelligence in cloud era.
     Chapter II is concerned with theory and literature review. It reviews the theoriesof cloud computing, competitive intelligence and service mode, synthesizes bothdomestic and foreign researches on this issue, and analyzes the contributions as wellas inadequacy of the existing researches.
     Chapter III is about the design of the framework of cloud-based enterprisecompetitive intelligence service mode. Through questionnaires and interviews on thestatus and needs of enterprise competitive intelligence in our country, necessity andfeasibility will be presented after some investigations and analyses. Based on theanalyses of cloud computing and enterprise competitive intelligence andinterdisciplinary research methods, this research will look into the constituentelements of the cloud-based enterprise competitive intelligence service mode, andthen construct the overall framework of the cloud-based enterprise competitiveintelligence service mode.
     Chapter IV is dedicated to the construction of the service platform ofcloud-based competitive intelligence. Research and design of technology platform inthe service mode will be carried out with the aid of theory and technology ofcomputer science and cloud computing. Firstly, comprehensive and comparativeanalysis will be carried out on the mainstream cloud computing architecture andplatform. Then, in conjunction with functions and features of the enterprisecompetitive intelligence service, the architecture of the technology platform forpersonalized service will be conducted, including the overall architecture design,network platform design and security architecture design.
     Chapter V deals with the content of cloud-based enterprise competitiveintelligence service mode. This chapter analyzes the characteristics and target ofenterprise competitive intelligence service in the cloud computing environment and proposes that the ideal enterprise competitive intelligence services in the cloudcomputing environment should be framed in a personalized, one-stop integratedservice mode. In other words, the services should be "user-centered". The user can notonly custom-tailor and obtain the resources and services seamlessly and pellucidlybut also use competitive intelligence cloud services in a fast, dynamic, flexible,low-cost and on-demand manner. This chapter examines various traditional models ofcompetitive intelligence services. From the perspective of interactive cloudenvironment, competitive intelligence service mode can be divided into threecategories: personalized competitive intelligence service (self-service), collaborativedigital reference consulting service (one-to-many service), and expert consultingservice (one-to-one service), each of which will be discussed in-depth.
     Chapter VI is concerned with the organizational framework of cloud-basedcompetitive intelligence service mode. Competitive intelligence service is carried outin certain organizational structure and institutional environment. This chapter studiesthe organizational environment and operating mechanism of enterprise competitiveintelligence service mode.
     Chapter VII focuses on case study. Softwares such as HADOOP, HDFS andMAPDUCE are used to construct a cloud computing platform and deploy theapplication of competitive intelligence service. Computer simulation and case studiesare conducted in the actual enterprise environment to verify the theoretical mode putforward in this dissertation.
     Chapter VIII is dedicated to conclusions and prospect, summarizing the mainconclusions, analyzing the inadequacy of the study, and putting forth the directionsfor future studies.
     The innovations of this dissertation lie in:
     Firstly, with the aid of cloud computing technology, the study constructs theorganic integration of people, technology, and organizational environment, and atheoretical framework of enterprise competitive intelligence service mode. On thebasis of the latest researches and practices of cloud computing and competitiveintelligence theory, the dissertation shapes an overall framework of a commoncompetitive intelligence service mode. This model provides enterprise competitive intelligence service with an advanced, low-cost, efficient, operational and completeframework and hence helps companies to maximize the efficiency of competitiveintelligence, and ultimately formulates an innovation model which providespersonalized competitive intelligence. In short, it is a comprehensive innovation ofcompetitive intelligence service with regard to technology, methodology and practiceand is therefore of theoretical significance and practice value.
     Secondly, the study constructs a platform of competitive intelligence service. Inaccordance with the functional features of enterprise competitive intelligence servicein the cloud computing environment and in conjunction with cloud computingmainstream architecture and commercial platform, the dissertation studies andconstructs cloud competitive intelligence service platform.
     Thirdly, it constructs the content of the cloud-based enterprise competitiveintelligence service mode. By using related theories of cloud computing, competitiveintelligence and management science, and on the basis of analyzing the characteristicsand objectives of cloud-based enterprise competitive intelligence service mode, thestudy constructs the specific content of the cloud-based competitive intelligenceservice mode.
     Fourthly, the study shapes the organizational framework based on thecompetitive intelligence service mode. The smooth realization and effective operationof cloud-based competitive intelligence service mode require appropriateorganizational environment and supporting operational mechanism, both of which arestudied in-depth.
     Fifthly, it conducts case study. It constructs the prototype of cloud-basedcompetitive intelligence service mode by employing the mainstream cloud computingsoftwares, deploys applications of competitive intelligence service, and conducts casestudy on a typical enterprise ABC company. This research method and technicalconstruction technology are not only an innovation of competitive intelligenceresearch and practice, but also a promotion of the research and practice of cloudcomputing. In addition, the plan and framework of the design put forward in thisdissertation is general and therefore can be transplanted seamlessly to the cloudcomputing of other areas.
引文
[1]IBM. Google and IBM announced university initiative to address internetscale computing challenges [EB/OL].http://www-03. ibm. com/press/us/en/pressrelease/22414.wss,2010-11-11.
    [2]Mell P, Grance T. Cloud computing definition [J/OL]. NIST. http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc,2012-01-11.
    [3]联邦云计算战略[EB/OL]. http://www.ccidthinktank.com/uploads/soft/110811/sdyc201115.pdf,2012-06-04
    [4]冯登国,张敏,张妍等.云计算安全研究[J].软件学报,2011,22(1)):71-83
    [1]陈芸芸.欧洲云计算的法律迷宫[J].信息化建设,2011,(05):1001-1004
    [2]郭凯婴.英国政府实施云战略的经验与教训[J].物联网技术,2012,(02):456-460
    [3]王敏.德国《云计算行动计划》解读[J].信息化建设,2011,(04):1034-1040
    [4]中华网.中华人民共和国国民经济和社会发展第十二个五年规划纲要[EB/OL].http://news.china.com/focus/2011lh/gdxw/11092182/20110317/16434500.htm,2012-06-04
    [5]赛迪顾问.云计算战略研究白皮书[EB/OL]. http://www.ccidconsulting.com/cn/index.htm,2012-06-04.
    [1]Buyya R, Yeo C S, Venugopal S. Market-Oriented Cloud Computing: Vision, Hype, and Reality for DeliveringIT Services as Computing Utilities[C]. IEEE. Proceedings of the10th IEEE International Conference on HighPerformance Computing and Communications, Dalian, China,2008. Los Alamitos, CA, USA: IEEE CS Press,2008:5-13.
    [2]雷葆华,饶少阳,江峰等.云计算解码:技术架构和产业运营[M].北京:电子工业出版社,2011.4:xii.
    [3]B. Rochwerger, D. Breitgand, E. Levy, A. Galis, K.Nagin, I.Llorente, et al.The Reservoir model and architecturefor open federated cloud computing [J]. IBM Journal of Research and Development,2009,53:1-11.
    [1]George Reese. Cloud Application Architectures.[M]. O'Reilly Media, Inc.USA.2009:45-67.
    [2]Borthakur D. The hadoop distributed file system: Architecture and design [EB/OL].http://hadoop.apache.org/common/docs/r0.18.3/hdfs_design.htm.l,2012-08-07.
    [3][4]Enomalism [EB/OL]. http://www.enomalism.com/,2012-08-07.Nurmi D, et.al.2009The eucalyptus open-source cloud-computing system[C]. In Proceedings of the9t''IEEE/ACM International Symposium on Cluster Computing and the Grid,124-131.
    [5]L Wang, J Tao, M Kunze. Scientific Cloud Computing: Early Definition andExperience. IEEE. Proceedings of
    10th IEEE International Conference on HighPerformance Computing and Communications, Dalian, China,2008:
    825-830.
    [6]张建勋,古志民,郑超等.云计算研究进展综述[J].计算机应用研究,2010,27(2):429-433.
    [1]梁峰.情报研究应主动适应知识经济发展[J].现代情报2007,(12):41-42,46
    [2]徐宏宇,张左之.中国企业竞争情报实施现状调查分析[J].图书情报工作,2010,(2):82-86.
    [3]周贵族.论知识经济时代的情报服务特征[J].湖南大学学报(社会科学版),1999,13(02):120-122.
    [4]董素音.基于专家知识库的竞争情报服务模式研究[J].情报科学,2009,(5):660-663.
    [5]陈飔.企业竞争情报的服务模式[J].软件工程师,2004,(6):60-61
    [1]任志安.企业知识共享网络理论及其治理研究[M].北京:中国社会科学出版社,2008:21
    [1]作者不详.2012年IT行业十大战略技术[J].电力信息化,2012,10(01):10-13
    [1]作者不详.2012年IT行业十大战略技术[J].电力信息化,2012.10(01):10-13.
    [1]Luis M. Vaquero, Luis Rodero-Merino, Juan Caceres, Maik Lindner. A break in the clouds: towards a clouddefinition [J]. SIGCOMM Computer Communication Review, December2008.Volume39Issue1
    [2]CSA.version3of Security Guidance for Critical Areas of Focus in Cloud Computing[EB/OL].https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf,2012-8-10
    [3]Peter Mell, Timothy Grance. The NIST Definition of Cloud Computing[J/OL].http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf,2012-8-10
    [4]IBM.云计算概述[EB/OL]..http://www-01.ibm.com/software/cn/tivoli/solution/cloudcomputing/,2012-8-10.
    [5]朱近之.智慧的云计算——物联网的平台(第2版)[M].北京:电子工业出版社,2011:53-64.
    [6]Michael Armbrust,Armando Fox,Rean Griffith,Anthony D. Joseph,etc. Above the Clouds: A Berkeley View ofCloud Computing[EB/OL]. http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf,2012-08-10.
    [1]Foster I, Zhao Y, Raicu I, et al. Cloud Computing and Grid Computing360-Degree Compared[C]//IEEE. GridComputing Environments Workshop. NJ USA, IEEE Computer Society,2008:1-10.
    [2]Wikipedia. Cloud Computing [EB/OL]. http://en.wikipedia.org/wiki/Cloud_computing,2011-09-12
    [3]刘鹏.云计算(第二版)[M].北京:电子工业出版社,2012:1
    [4]雷万云.云计算——企业信息化建设策略与实践[M].北京:清华大学出版社,2010:1-10.
    [1]张为民等.云计算深刻改变未来[M].北京:科学出版社,2009:29-45.
    [2]蔡永顺,雷葆华.云计算标准化现状概览[J].电信网技术,2012,(02):22-26
    [1]Mell P, Grance T. Cloud computing definition [J/OL].NIST.http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc,2012-01-11.
    [2]Mell P, Grance T. Cloud computing definition [J/OL].NIST.http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc,2012-01-11.
    [3]微软中国.你想拥有哪片云?[EB/OL].http://blog.sina.com.cn/s/blog_6b8988220100n3wz.html,2012-08-07
    [4]Mell P, Grance T. Cloud computing definition [J/OL].NIST.http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc,2012-01-11.
    [5]Mell P, Grance T. Cloud computing definition [J/OL].NIST.http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc,2012-01-11.
    [6]微软中国.你想拥有哪片云?[EB/OL].http://blog.sina.com.cn/s/blog_6b8988220100n3wz.html,2012-08-07
    [7]Mell P, Grance T. Cloud computing definition [J/OL].NIST.http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc,2012-01-11.
    [8]微软中国.你想拥有哪片云?[EB/OL].http://blog.sina.com.cn/s/blog_6b8988220100n3wz.html,2012-08-07
    [1]Mell P, Grance T. Cloud computing definition [J/OL].N IST.http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc,2012-01-11.
    [2]Fang Liu, Jin Tong, Jian Mao,etc. NIST Cloud Computing Reference Architecture[J/OL].http://www.nist.gov/customcf/get_pdf.cfm?pub_id=909505.pdf,2011-12-01.
    [1]李德毅.云计算技术发展报告[M].北京:科学出版社,2011:1-20.
    [2]JONESM T. Cloud computing with Linux cloud computing platforms and applications [EB/OL].(2008-09-10)
    [2010-12-15]. http://www. ibm. com/developerworks/library/l-cloud-computing/.
    [3]莫超.基于SAML和CAS框架的云门户SSO系统研究与实现[D].成都:电子科技大学,2011:11.
    [1]GU Yun-hong, GROSSMAN R L. Sector and sphere: the design and implementation ofa high performance datacloud[C]//Proc ofWorkshop on Cloud Computing and ItsApplications.2008:2429-2445.
    [1]IBM. IBM Smart Business Desktop Cloud.[EB/OL]. http://www.IBM.com/,2012-08-15.
    [2]张逢喆.公共云计算环境下用户数据的隐私性与安全性保护[D].上海:复旦大学,2010:1-20.
    [3]冯登国,张敏,张妍等.云计算安全研究[J].软件学报,2011,22(1)):71-83.
    [4]王惠莅,杨晨,杨建军.云计算安全和标准研究[J].信息技术与标准化,2012,(5):16-19,27.
    [1]Azza Abouzied,Kamil Bajda-Pawlikowski,Jiewen Huang,Daniel J. Abadi.HadoopDB in action: building realword applications[C].Proceedings of the2010international conference on Management of data.NewYork:ACM,2010.
    [1]Hung-chih Yang,Ali Dasdan,Ruey-Lung Hsiao,D.Stott Parke.Map-Reduce-Merge:Simplified Relational DataProcessing on Large Clusters,Proceedings of the17th ACM international conference on Multimedia.NewYork:ACM,2007,1029-1040.
    [2]孙兆玉,袁志平,黄宇光.面向数据密集型计算Hadoop及其应用研究[C].2008年全国高性能计算学术年会.无锡:中国计算机学会,中国软件行业协会,2008,441-443
    [3]王珊,王会举,覃雄派,周烜.架构大数据:挑战、现状与展望[J].计算机学报,2011,10:1741-1752.
    [4]赵春雷,乔治·纳汉.“大数据”时代的计算机信息处理技术[J].世界科学,2012,02:30-31.
    [5]董世晓.云计算开源先锋Hadoop——第四届Hadoop中国云计算大会纪实[J].程序员,2010,(10):36-37.
    [1]殷希红.近五年我国竞争情报论文统计分析[J].办公室业务.2012,(5):143-144.
    [2]贡金涛,贾玉文,李森森.1998~2007年中国大陆竞争情报研究现状的计量分析[J].情报杂志,2009,(12):
    107-109.
    [3]焦慧敏,唐惠燕,任延安.国内外竞争情报研究与应用综述[J].农业图书情报学刊,2009,(3):18-20.
    [4]徐芳.国外竞争情报研究进展:概念辨析、问题论域及发展趋势[J].情报资料工作,2011,(01):46-51
    [1]Liebowitz, J. Building Organisational Intelligence: A Knowledge Management Primer[M]. BocaRaton, CA: CRC Press.2000.
    [2]王知津,栗莉.信息、知识、情报再认识[J].情报科学.2001,19(6):673-676.
    [3]滕海涛.关于信息、知识、情报的概念探讨[J].渝西学院学报(自然科学版),2005,4(1):74-78.
    [1]张立,杨俊杰.钱学森情报学思想及对我国情报事业发展贡献[J].河南图书馆学刊,2011,05:136-137,139.
    [2]R.J.Thierauf, Effective Business Intelligence Systems[M]. West port: Quorum Books,2001:8-19
    [3]E.M.Awad and H.M.Ghaziri, Knowledge Management [M].New Jersey: Pearson Education,2004:24-78
    [4]Waltz, E.Knowledge management in the intelligence enterprise, Artech House Publishers,2003:45-65
    [5]利亚姆.费伊著,朱舟译.竞争者——以才智、谋略与绩效制胜[M].北京;中国人民大学出版社,2005:64
    [6]沈固朝.竞争情报的理论与实际[M].北京:科学出版社,2008:26
    [7]Efraim Turban, Ramesh Sharda, and Dursun Delen. Decision Support and Business Intelligence Systems (9thed.)[M]. Upper Saddle River, NJ, USA: Prentice Hall Press,2010.19
    [8]Efraim Turban, Ramesh Sharda, and Dursun Delen. Decision Support and Business Intelligence Systems (9thed.)[M]. Upper Saddle River, NJ, USA: Prentice Hall Press,2010.23
    [1]董素音,蔡莉静.图书馆竞争情报服务[M].北京;海洋出版社,2009:1-15.
    [2]张晓林.走向知识服务:寻找新世纪图书情报工作的生长点[J].中国图书馆学报,2000,(5):32-37.
    [3]杜也力.知识服务模式与创新[M].北京:北京图书馆出版社,2005
    [4]张丽静.1999-2003年我国图书馆知识服务研究述略[J].图书馆理论与实践,2005,(6):29-31
    [5]杨淑琼.从潜在性到创新性的现代信息机构的知识服务.情报杂志,2003,(09):68-70.
    [6]陈建龙,王建冬,胡磊.再论知识服务的概念内涵——与信息服务关系的再思考[J].图书情报知识,2010,(04):14-19.
    [7]伍慧春,周敏敏.论知识服务与情报服务.科技情报开发与经济[J],2006,(03):46-51.
    [1]陈则谦.我国科技信息事业发展的轨迹——从信息服务走向知识服务[J].现代情报,2007,27(12):11-15
    [1]彭俊玲.专门(专业)图书馆开展竞争情报服务的机理分析及展望[J].图书情报工作,2005,(4):44-47
    [2]邓胜利,况能富.竞争情报服务产业化发展研究[J].情报科学,2004,(04):407-410
    [3]包昌火,谢新洲.竞争战略与竞争优势[M].北京:华夏出版社,2001:191-208
    [4]王鹏,李军.国内外竞争情报研究概述[J].情报杂志,2009,S2:83-87,90
    [5]Vibert C. An Introduction to Online Competitive Intelligence Research[M]. United States: The BenjaminGroup,2004
    [5]百度文库.什么是服务?[EB/OL]. http://wenku.baidu.com/view/4e158e8fcc22bcd126ff0cfa.html,2012-8-6
    [7]庄丽娟.服务定义的研究线索和理论界定[J].中国流通经济,2004,(9):41-44
    [8]UnMiles.Knowledge intensive business serviees:ProsPects and Policies[J].Foresight,2005,7(6):39-60
    [9]Mike K. Innovation and competitiveness in South Africa: the case for competitive intelligence as an instrumentto make better use of information[J].South African Journal of Information Management,2005,7(1):1-2
    [1]吴伟.国外竞争情报软件研究[J].情报理论与实践,2004(7):103
    [2]Kong-rae Lee, séance Sang-wan Shim, Byung-seon Jeong, Jung-tae Hwang. Knowledge intensive activities(KISAs) in Korea's innovation system[R].2002:12-50.
    [3]李霞.知识服务平台构建的若干问题研究[D].东北大学,2008:13
    [4]Lan Miles. Knowledge intensive business services: prospects and policies [J]. Foresight,2005,7(6):39-63
    [5]Chris Styles, Paul G Patterson,Vinh Q La. Executive Insights: Exporting services to Southeast Asia: lessonsfrom Australian knowledge-based service exporters[JJ. Journal of International Marketing,2005,13(4):104-128
    [6]王哲,陈清华.企业竞争情报的特征及作用[J].情报杂志,2004,(01):35-37.
    [1]董素音,蔡莉静.图书馆竞争情报服务[M].北京:海洋出版社[M],2009:12-23.
    [2]王鹏,李军.国内外竞争情报研究概述[J].情报杂志,2009,S2:83-87,90
    [3]肖文旺.简论服务的一般特征[J].经济师,2004,(9):259-259,261.
    [4]李霞.知识服务平台构建的若干问题研究[D].东北大学,2008:29-30.
    [5]周贵族.论知识经济时代的情报服务特征[J].湖南大学学报(社会科学版),1999,13(02):120-122.
    [1]钟辉新,黄晓斌.基于软件即服务的企业竞争情报服务模式与应对策略[J].情报理论与实践,2012,(7):99-103.
    [1]Stanat R. Building a document-based competitive intelligence system[C]. DSS-86Transactions. SixthInternational DSS-86Conference on Decision Support Systems,1986:433-438.
    [2]Chen M.Application of a mathematical model of Information Retrieval (LSI) in competitive intelligencesystem[C].Proceedings of the2004International Conference on Management Science&Engineering,2004(1-2):437-440
    [1]曾忠禄.企业竞争情报系统再定义[J].图书情报工作,2007,11:10-13,24.
    [2]刘玉照,曹君祥.竞争情报计算辅助系统的开发[J].情报理论与实践,2000,(1):36-38
    [3]包昌火,谢新洲.企业竞争情报系统[M].北京:华夏出版社,2002:39
    [4]赖茂生,周键.企业竞争情报体系的建立和发展[J].全国竞争情报与企业发展研讨会会议录.北京,1995,34-37
    [5]谢新洲,包昌火,张燕.企业竞争情报系统的功能[J].图书情报工作,2002,(8):54-58
    [6]彭俊玲.专门(专业)图书馆开展竞争情报服务的机理分析及展望[J].图书情报工作,2005,(4):44-47
    [7]冯维扬.竞争情报计算机系统模型分析[J].情报学报,2001,(1):39-45
    [1]Maria Auxiliadora do Nascimento Me′lo,Denise Dumke de Medeiros. A model for analyzing the competitivestrategy of health plan insurers using a system of competitive intelligence. The TQM Magazine,2007,19(3):206-216
    [2]苗杰,倪波.面向集成竞争情报系统的数据挖掘应用研究[J].情报学报,2001,(4):443-450
    [3]Deng ZH, Zhu TF, Luo L. Construction of competitive intelligence systembased-on SOA[C]. Proceedings of2008InternationalConferenceonSystemManagement,2008:531-537.
    [4]吴晓伟等.竞争情报系统成功建设模型及其实证研究[J].情报学报,2005,(8):457
    [5]何绍华.面向知识管理的适应性竞争情报系统[J].图书情报工作,2007,(11):50
    [6]李东林,史振立.基于知识管理的组织竞争情报系统的构建[J].现代情报,2007,(10):12
    [1]Fahey L. The Future Direction of Competitive Intelligence: Some Reflections[J]. Competitive IntelligenceMagazine,2009,12(1):17-22
    [1]谭思明,王淑玲,王春玲.面向政府决策的竞争情报服务平台的构建[J].现代情报,2007,(11):6-10.
    [2]曹如中,王立新,曹桂红.企业竞争情报服务系统功能构建与实证研究[J].图书情报工作,2011,(04):49
    [1]钟辉新,黄晓斌.基于软件即服务的企业竞争情报服务模式与应对策略[J].情报理论与实践,2012,(7):99-103
    [2]Gibbons P T, Prescott J E. Parallel competitive intelligence processes in organizations[J]. International Journalof Technology Management,1996,11(1-2):162-178
    [3]Saayman A, Pienaar J, de Pelsmacker P, et al. Competitive intelligence: Construct exploration, validation andequivalence[C]. ASLIB Proceedings,2008,60(4):383-411
    [1]吴钧.基于知识管理的企业竞争情报管理工作模型研究[D].上海:复旦大学,2011:5-6.
    [2]胡景江.中小饲料企业竞争情报工作探讨[J].饲料广角,2010,(03):47-50
    [1]余玄霞.我国竞争情报服务技术创新分析[J].图书情报论坛,2006,(03):1878-1882,1888
    [1]Marteau P F, Krumeich C. Semantic analysis of text applied to competitive intelligence[C]. IDT95.12thConference Proceedings,1995:258-265
    [2]Llanes LM, Cartaya J C, Andrade R E. Some information analysis techniques for the competitive intelligenceprocess[J].FID Review,1999,1(45):64-71
    [3]Yan C, Jin P Q, Yue LH. Ontology-driven extraction of enterprise competitive intelligence in the Internet[C].2008Second International Conference on Future Generation Communication and Networking Symposia,2008:35-38
    [4]Pereira da Silva H. Competitive intelligence in the Internet: An intelligent agent based process [J]. Ciência daInformacǎo,2003,32(1):115-134
    [5]Hwee-Leng Ong, Ah-Hwee Tan, Jamie Ng, et al. FOCI: Flexible organizerforcompetitive intelligence[C].Proceedings ofthe2001ACMCIKM. Tenth International Conference on Information and Knowledge Management,2001:523-525
    [6]Gilmore J, Pagels M, PalkJ. ProjectX: Competitive intelligence data mining and analysis [C]. Data Mining andKnowledge Discovery: Theory, Tools and Technology III,2001:258-266
    [7]TarapanoffK, Gomes da Nobrega R, CormierPMJ. Competitive intelligence and scenarios: Amethodologicalproposal for a case study in Brazil[J]. FID Review,1999,1(4-5):31-41
    [8]ArmstrongHL, Davey J. Assembling competitive intelligence using classroomscenarios[J]. Security Educationand Critical Infrastructures,2003,125:159-167
    [9]Vaughan L, You J. Content assisted web co-link analysis for competitive intelligence[J].Scientometrics,2008,77(3):433-444
    [1]余玄霞.我国竞争情报服务技术创新分析[J].图书情报论坛,2006,(03):1878-1882,1888.
    [2]Vriens, D.&Philips, E.A. Business intelligence als informatievoorziening voor de strategievorming. In E.A.Philips&D. Vriens (Eds.), Business Intelligence. Deventer: Kluwer,1999:33
    [3]Lisabeth G. Dashman. The Value of In-House Competitive Intelligence Department: A Business Plan Approach.Competitive Intelligence Review, Vol.9(2),1998:16
    [4]Prescott, J.E.&Fleisher, C.S. SCIP: Who we are, what we do. Competitive Intelligence Review,1991,2(11):22
    [5]冯维扬.面向任务的动态竞争情报组织结构模型分析[J].情报学报,2002,21(4):486-490
    [6]谢新洲,包昌火,张燕.企业竞争情报系统的主要模式[J].图书情报工作,2002,(11):21-26
    [7]苗杰,倪波.竞争情报系统的业务模式分析研究[J].情报学报,2001,(1):32-38
    [8]陈颖.企业竞争情报部门设置模式研究[J].情报理论与实践.2004,(5):498
    [1]李瑾.基于知识管理的企业竞争情报工作组织结构创新[J].科技进步与对策.2008,(9):170
    [2]陈维军.基于企业组织结构的竞争情报团队设计研究[J],图书情报工作.2009,(10):56-60
    [3]李晓鸿,赵冰峰.竞争情报组织中的虚拟团队和动态联盟[J].情报杂志,2005,(10):36-37
    [4]冯维扬.面向任务的动态竞争情报组织结构模型分析[J].情报学报,2002,21(4):486-490
    [5]王玉.企业战略联盟的竞争情报研究[J].情报理论与实践,2005,28(3):300-314
    [6]周九常.网络组织竞争情报研究评述[J].情报科学,2007,25(2):306-310
    [7]言培文,克劳斯索尔伯格索伦著.市场情报:培养战略的视角[M].上海:上海远东出版社,2010.146
    [8]罗治国,孙少陵.云计算生态系统与大云开发者社区[J].电信技术,2011,(01):12-15
    [1]梁昌勇,马玲,陆文星.面向中小企业信息化的云服务选择[J].机械设计与制造,2012,(03):226-228.
    [1]Xi Cheng,Xuejun Liao. The Application of Cloud Computing in Military Intelligence Fusion [C]//2011International Conference of Information Technology, Computer Engineering and Management
    [S2]ciences.Nanjing,China,2011:231-234David Rader. How cloud computing maximizes growth opportunities for a firm challenging establishedrivals[J].Strategy&Leadership,2012,40(03):36-43
    [3]Casey G. Cegielski, L. Allison Jones-Farmer, Yun Wu, Benjamin T. Hazen.Adoption of cloud computingtechnologies in supply chains: An organizational information processing theory approach[J].International Journalof Logistics Management,2012,23(02):184-211
    [1]Jason Corsello.Maximizing talent management through the cloud: New technologies offer opportunities todevelop skills and careers. Human Resource Management International Digest,Volume:20,Issue:4, pp.27-30
    (2012)
    [2]Saul J. Berman, Lynn Kesterson-Townes, Anthony Marshall, Rohini Srivathsa.How cloud computing enablesprocess and business model innovation. Strategy&Leadership, Volume:40, Issue:4, pp.27-35(2012)
    [3]D. Bannister.Into the clouds (cloud computing and why the financial services sector has largely ignored it).Development and Learning in Organizations, Volume:25, Issue:2(2011)
    [4]Dennis A. Pitta. Cloud computing comes to marketing. Journal of Consumer Marketing, Volume:28, Issue:1
    (2011)
    [5]Kaisler, S. Money, W.H.,Cohen, S.J. A Decision Framework for Cloud Computing. System Science (HICSS),201245th Hawaii International Conference on, p1553-1562
    [1]Ouf, S.; Nasr, M. Business Intelligence in the Cloud. Communication Software and Networks (ICCSN),2011IEEE3rd International Conference on, p650-655
    [2]Zaheer Khan, David Ludlow, Richard McClatchey, Ashiq Anjum. An Architecture for Integrated Intelligence inUrban Management Using Cloud Computing[C]//2011Fourth IEEE International Conference on Utility and CloudComputing.Miami, Florida,2011:544-545
    [3]Stella Gatziu Grivas, Tripathi Uttam Kumar, Holger Wache. Cloud Broker: Bringing Intelligence into theCloud[C]//2010IEEE3rd International Conference on Cloud Computing,2010(07):544-545
    [4]Pang Jingxia. Development and Application of Cloud Computing in China Information Resource ManagementField[B]//Software Engineering and Knowledge Engineering: Theory and Practice.2012,729-735
    [5]Luyi Li, Yanlin Zheng, Fanglin Zheng, Shaochun Zhong. Cloud Computing Support for Personal KnowledgeManagement[C]//2009International Conference on Information Management, Innovation Management andIndustrial Engineering,2009(10):171-174
    [1]Lori M. Kaufman. Data Security in the World of Cloud Computing[J].IEEE Security and Privacy,2009(06):61-62
    [2]赵需要.云时代竞争情报的发展动向[J].情报理论与实践,2010,(06):23-27
    [1]许云峰,张妍,赵铁军.基于云计算的商业情报采集系统[J].河北科技大学学报,2012,(02):161-165.
    [2]董浩,赵需要.云时代竞争情报搜集策略变革[J].情报理论与实践,2010,(06):1211-1220.
    [3]张伟匡,刘敏榕,李治准.云时代企业竞争情报安全问题及对策研究[J].情报杂志,2011,(07):8-12.
    [1]黄晓斌,钟辉新.云环境下中小企业竞争情报系统构建[J].情报资料工作,2012,(02):39-33
    [1]张文杰.云计算在企业竞争情报中的应用研究[J].图书情报工作网刊,2011,(1):45-49.
    [2]吴绍忠.基于云计算架构的公安情报信息平台建设研究[J].中国人民公安大学学报(自然科学版),2010,(3):39-41.
    [3]钟辉新,黄晓斌.基于软件即服务的企业竞争情报服务模式与应对策略[J].情报理论与实践,2012,(7):99-103
    [1]附录A:基于云计算的企业竞争情报服务模式研究调查问卷
    [1]李大帅.试论我国企业竞争情报发展现状和改善策略[J].情报探索,2009,(1):53-55
    [1]蔺丰奇,刘益.信息过载问题研究述评[J].情报理论与实践,2007,(5):710.
    [2]刘宝杰,许勇.基于信息熵的企业信息孤岛分析[J].现代计算机,2007,(5):91.
    [3]刘玉照,杜言,刘建准.面向企业信息集成的竞争情报系统[J].情报科学,2005,(4):574.
    [2]附录A:基于云计算的企业竞争情报服务模式研究调查问卷.
    [3]附录B:基于云计算的企业竞争情报服务模式研究访谈提纲.
    [1]王延飞.竞争情报方法[M].北京:北京大学出版社,2007:177.
    [1]钟常青.网络时代高校图书馆竞争情报服务发展探析[J].高校图书馆工作,2005,(6):70-72.
    [1]高波,黄兰秋等.企业管理信息系统[M],北京:科学出版社,2011:79.
    [2]周洪波.云计算:技术、应用、标准和商业模式[M].北京:电子工业出版社,2011:23.
    [1]赵海峰.档案馆应用云计算技术的可行性分析[J].兰台世界,2012,20:23-24.
    [2]茶洪旺,胡江华.中国数字鸿沟与贫困问题研究[J].北京邮电大学学报(社会科学版),2012,01:74-80
    [3]李昭晖.论数字鸿沟的产生、发展及消亡[J].情报探索,2010,02:94-96.
    [4]薛伟贤,张飞燕.数字鸿沟的成因、测度、影响及弥合方法[J].软科学,2009,01:17-24.
    [1]王珊,王会举,覃雄派,周烜.架构大数据:挑战、现状与展望[J].计算机学报,2011,10:1741-1752.
    [2]赵春雷,乔治·纳汉.“大数据”时代的计算机信息处理技术[J].世界科学,2012,02:30-31.
    [1]HAMILTON, J. Cost of Power in Large-Scale Data Centers [EB/OL]. November2008. Available from:http://perspectives.mvdirona.com/2008/11/28/CostOfPowerInLargeScaleDataCenters.aspx,2012.04-01.
    [1]黄兰秋,吴礼龙.云时代基于信息生态视阈的竞争情报系统范式分析[J].情报科学,2012,30(10):1456-1460.
    [1]姚伟.基于知识治理的竞争情报协同模型[D].天津:南开大学,2011:141-149
    [2]钟丽萍,冷伏海.基于综合集成论的情报研究理论阐释[J].情报理论与实践,2012,(06):7-11.
    [3]杜湘瑜.基于综合集成的虚拟样机测试与评估理论和方法研究[D].长沙:国防科学技术大学,2005:10-11.
    [1]钱学森,于景元,戴汝为.一个科学新领域——开放的复杂巨系统及其方法论[J].自然杂志,1990,01:3-10,64
    [2]钱学森.一个科学新领域——开放的复杂巨系统及其方法论[J].上海理工大学学报,2011,06:526-532.
    [3]戴汝为,操龙兵.综合集成研讨厅的研制[J].管理科学学报,2002,03:10-16.
    [4]王慧斌,徐小群.综合集成研讨厅体系及应用研究[J].信息与控制,2001,06:516-521.
    [5]杜湘瑜.基于综合集成的虚拟样机测试与评估理论和方法研究[D].长沙:国防科学技术大学,2005:12-13.
    [6]吴晓伟,徐福缘,吴伟昶.基于“综合集成研讨厅”的企业竞争情报系统研究[J].情报学报,2004(6):746-752.
    [7]吴晓伟,徐福缘,宋文官.企业竞情报系统工程论[J].情报学报,2006,(4):407-418.
    [8]刘玉照,刘建准,范志雯.基于C/S与B/S集成模式的企业竞争情报系统构建研究[J].情报科学,2005,(3):
    410-413.
    [9]刘玉照,杜言,刘建准.面向企业信息集成的竞争情报系统[J].情报科学,2005,(4):573-577.
    [1]徐克奇,吴晓伟.基于UML的企业竞争情报系统设计[J].兵器自动化,2005,(2):64.
    [1]钱学森,于景元,戴汝为.一个科学的新领域——开放的复杂巨系统及其方法论[J].自然杂志,1990,13(1):3-10.
    [1]张平,苗杰,胡铮等.泛在网络研究综述[J].北京邮电大学学报,2010,(5):1-6.
    [2]宋新平,吴晓伟,刘竞.基于信息融合和综合集成研讨厅混合的企业竞争情报系统[J].图书情报工作,2009,22:76-79.
    [1]]罗治国,孙少陵.云计算生态系统与大云开发者社区[J].电信技术,2011,(01):12-15
    [2]Z Tornatzky L G. The process of technological innovation[M]. Lexington: Lexington Books,1990:149-160.
    [3]转引自:田野,宝贡敏.信息技术同化研究:回顾与展望[J].情报学报,2007,(5):648-652.
    [4]田野.企业资源计划(ERP)同化影响因素及其作用机制研究[D].浙江大学,2008:26-27.
    [1]黄兰秋,吴礼龙.云时代基于信息生态视阈的竞争情报系统范式分析[J].情报科学,2012,30(10):1456-1460.
    [1]包昌火.加强竞争情报工作,提高我国企业竞争能力[J].中国信息导报,1998,(11):33-36.
    [2]刘春艳,陆铭.面向电子商务的企业竞争情报研究[J].经济研究导刊,2010,26:24-25.
    [3]杨永芳,王道平,李成章.企业竞争情报工作的构建研究[J].情报杂志,2008,27(7):138-141.
    [4]胡星光,包昌火,谢新洲,李娜.北京:国家自然科学基金项目“企业竞争情报系统的模式和运行机制研究”课题的总报告,2000:1-20
    [5]曹如中,王立新,曹桂红.企业竞争情报服务系统功能构建与实证研究[J].图书情报工作,2011,(04):49.
    [4]韩海霞.企业竞争情报价值链的相关构建研究[J].情报杂志,2008,10:83-86.
    [2]曹如中,王立新,曹桂红.企业竞争情报服务系统功能构建与实证研究[J].图书情报工作,2011,(04):49.
    [1]包昌火,谢新洲.企业竞争情报系统[M].北京:华夏出版社,2002:42.
    [2]徐宏宇,张左之.博客监测在企业竞争情报中的应用[J].情报杂志,2007,(05):46-48.
    [1]黎美洋,葛大琦.标杆学习在企业学习中的应用[J].技术与市场,2006,05:47-49.
    [1]尹科强,谢新洲.竞争情报软件的分析与评价[J].情报学报,2004,23(6):736-745.
    [2]包昌火,黄英,赵刚.发展中的竞争情报系统[J].现代图书情报技术,2004,01:76-80.
    [3]王曰芬,巫玲.国外竞争情报软件研发的现状与趋势[J].现代图书情报技术,2004,(1):81-83.
    [4]Bouthillier,France.;Shearer, Kathleen. Medford. Assessing Competitive Intelligence Software: A Guide toEvaluating CI Technology. N.J.Information Today,2003.
    [5]刘鹏.云计算[M].北京:电子工业出版社,2010:23.
    [1][美]Venkata Joysula M alcolm Orr Greg Page.云计算与数据中心自动化[M].张猛译.北京:人民邮电出版社,2012,(07):134.
    [1]刘鹏.云计算(第二版)[M].北京:电子工业出版社,2012(1):332-343.
    [1]王珊,王会举,覃雄派,周烜.架构大数据:挑战、现状与展望[J].计算机学报,2011,10:1741-1752.
    [2]赵春雷,乔治·纳汉.“大数据”时代的计算机信息处理技术[J].世界科学,2012,02:30-31.
    [2]许桂芳.浅谈网络机房设计[J].中国科技信息,2007,18:140-142.
    [1]刘艺.应急云环境下任务导向的应急组织敏捷协作机制研究[D].广州:暨南大学,2012:20-21.
    [2]刘艺.应急云环境下任务导向的应急组织敏捷协作机制研究[D].广州:暨南大学,2012:20.
    [1]刘艺.应急云环境下任务导向的应急组织敏捷协作机制研究[D].广州:暨南大学,2012:21.
    [2]刘艺.应急云环境下任务导向的应急组织敏捷协作机制研究[D].广州:暨南大学,2012:21.
    [1]张逢喆.公共云计算环境下用户数据的隐私性与安全性保护[D].上海:复旦大学,2010:1.
    [2]叶建伟.云计算平台中作业安全技术研究[D].哈尔滨:哈尔滨工业大学,2011:I-II.
    [3]朱智强.混合云服务安全若干理论与关键技术研究[D].武汉:武汉大学,2011:I-II.
    [4]王惠莅,杨晨,杨建军.云计算安全和标准研究[J].信息技术与标准化,2012,(05):16-19.
    [1]张伟匡,刘敏榕,李治准.云时代企业竞争情报安全问题及对策研究[J].情报杂志,2011,30(7):8-12.
    [1]寇舒敏.企业信息系统危机管理[J].福建质量管理,2009,09:54-56.
    [1]Tim M, Subra K, Shahed L.Cloud security and privacy.USA: O'Reilly&Associates,2009.
    [1]张云勇,陈清金,潘松柏,魏进武.云计算安全关键技术分析[J].电信科学,2010,09:64-69.
    [1]曹毅,贺卫红. CDN网络关键技术研究[J].现代计算机(专业版),2004,(10):39-43
    [2]Linux文库.Linux教程[EB/OL].http://doc.linuxpk.com/28840.html,2012-10-07.
    [3]黄兰秋,杨宁宇.基于CDN的数字图书馆网络平台研究与设计[J].情报科学.2012,30(11):1715-1719.
    [4]NIJ, DANNYH. Large scale cooperative caching and application level multicast in multimedia content deliverynetworks [J]. IEEE Comm,2005,43(5):98-105
    [2]顾桂兰.电子商务中的CDN技术的应用[J].科技管理研究,2009,(08):279.
    [3]陈仁章,孟小华.基于CDN技术实现教育网网站的跨网络快速访问[J].计算机工程与设计,2010,(09):1911.
    [1]孔楠.基于云计算平台的商业服务模式研究[D],上海:上海外国语大学,2010:10.
    [1]孔楠.基于云计算平台的商业服务模式研究[D],上海:上海外国语大学,2010:44-50.
    [1]孔楠.基于云计算平台的商业服务模式研究[D].上海:上海外国语大学,2010:44-50.
    [2]于晓燕.基于网格的数字图书馆模式构建研究[D].天津:南开大学,2010:110.
    [1]于晓燕.基于网格的数字图书馆模式构建研究[D].天津:南开大学,2010:110
    [1]钟辉新,黄晓斌.基于软件即服务的企业竞争情报服务模式与应对策略[J].情报理论与实践,2012,(7):99-103.
    [2]钟辉新,黄晓斌.基于软件即服务的企业竞争情报服务模式与应对策略[J].情报理论与实践,2012,(7):99-103.
    [1]钟辉新,黄晓斌.基于软件即服务的企业竞争情报服务模式与应对策略[J].情报理论与实践,2012,(7):99-103.
    [2]陈婧,黄兰秋,吴礼龙等.竞争情报个性化服务框架研究[J].情报杂志,2008,(8):112-115.
    [1]蔡敏.网络个性化信息服务系统设计与实现[D].武汉:武汉大学,2004:5
    [2]陈婧,黄兰秋,吴礼龙等.竞争情报个性化服务框架研究[J].情报杂志,2008,(8):112-115.
    [1]王珊,王会举,覃雄派,周烜.架构大数据:挑战、现状与展望[J].计算机学报,2011,10:1741-1752.
    [2]赵春雷,乔治·纳汉.“大数据”时代的计算机信息处理技术[J].世界科学,2012,02:30-31.
    [1]陈婧,黄兰秋,吴礼龙等.竞争情报个性化服务框架研究[J].情报杂志,2008,(8):112-115.
    [2]陈婧,黄兰秋,吴礼龙等.竞争情报个性化服务框架研究[J].情报杂志,2008,(8):112-115.
    [1]陈婧,黄兰秋,吴礼龙等.竞争情报个性化服务框架研究[J].情报杂志,2008,(8):112-115.
    [2]陈婧,黄兰秋,吴礼龙等.竞争情报个性化服务框架研究[J].情报杂志,2008,(8):112-115.
    [3]姜志英.基于数据挖掘的数字图书馆个性化推荐算法研究[D].燕山大学,2007.
    [1]陈婧,黄兰秋,吴礼龙等.竞争情报个性化服务框架研究[J].情报杂志,2008,(8):112-115.
    [2]陈婧,黄兰秋,吴礼龙等.竞争情报个性化服务框架研究[J].情报杂志,2008,(8):112-115.
    [1]于晓燕.基于网格的数字图书馆模式构建研究[D].天津:南开大学,2010:136
    [1]于晓燕.基于网格的数字图书馆模式构建研究[D].天津:南开大学,2010:134
    [1]于晓燕.基于网格的数字图书馆模式构建研究[D].天津:南开大学,2010:134-135.
    [2]于晓燕.基于网格的数字图书馆模式构建研究[D].天津:南开大学,2010:135-136
    [1]于晓燕.基于网格的数字图书馆模式构建研究[D].天津:南开大学,2010:136
    [2]陈婧,黄兰秋,吴礼龙等.竞争情报个性化服务框架研究[J].情报杂志,2008,(8):112-115.
    [3] zdemir, S. E-learning's effect on knowledge: Can you download tacit knowledge?[J]. British Journal ofEducational Technology,2008,39:552–554.
    [1]Ido Guy, David Carmel. Introduction to Social Recommendation[J], in Social recommender systems,Proceedings of the20th international conference companion on World wide web, March28-April01,2011,Hyderabad, India:1355-1356.
    [2]陈婧,黄兰秋,吴礼龙等.竞争情报个性化服务框架研究[J].情报杂志,2008,(8):112-115.
    [1]陈婧,黄兰秋,吴礼龙等.竞争情报个性化服务框架研究[J].情报杂志,2008,(8):112-115.
    [1]胡昌平.创新型国家的知识信息服务体系研究[M].北京:经济科学出版社,2011:281.
    [1]胡昌平.创新型国家的知识信息服务体系研究[M].北京:经济科学出版社,2011:281-282.
    [1]王俭敏,默秀红.国内外合作虚拟参考咨询服务系统及其服务模式研究[J].情报科学,2007,25(7):1030-1034,1038
    [1]叶超飞,彭英,黄兰秋.基于顾客满意的江西高职院校招生的营销策略研究[J].中国经贸导刊2010,(6):101.
    [1]注册咨询工程师(投资)考试教材编写委员会.工程项目组织与管理[M].北京:中国计划出版社,2004.
    [2]李霞.知识服务平台构建的若干问题研究[D].东北大学,2008:66.
    [2]喻昕,王敬一.基于云计算技术的数字图书馆云服务平台架构研究[J].情报科学,2011,(7):1049-1053.
    [1]李霞.知识服务平台构建的若干问题研究[D].东北大学,2008:66.
    [2]姚伟,黄兰秋.企业文化竞争力研究[J].图书与情报,2009,(3):14-17.
    [3]李东才.基于知识管理的企业文化建设[J].管理科学文摘,2006,(l):63-65.
    [4]李霞.知识服务平台构建的若干问题研究[D].东北大学,2008:67-68.
    [1]李霞.知识服务平台构建的若干问题研究[D].东北大学,2008:69.
    [1]洪江涛,陈俊芳.企业价值链管理中的知识分析法[J].中国人力资源开发,2008,04:36-39.
    [1]李霞.知识服务平台构建的若干问题研究[D].东北大学,2008:68-69.
    [2]黄健柏,伍如昕,杨涛等.基于心理契约的虚拟团队成员激励研究[J].科技管理研究,2008,28(9):211-213.
    [1]李霞.知识服务平台构建的若干问题研究[D].东北大学,2008:67.
    [2]李霞.知识服务平台构建的若干问题研究[D].东北大学,2008:69.
    [1]李霞.知识服务平台构建的若干问题研究[D].东北大学,2008:67.
    [2]郑有.中小企业情报服务模式的探讨[J].情报杂志,2009,S1:203,179.
    [1]Jaeger PT. Cloud Computing and Information Policy: Computing in a Policy Cloud?[J/OL]. Journal ofInformation Technology and Politics,2008,5(3):269-283.[2012-03-09].http://www.umiacsumd.edu/~jimmylin/publications/Jaeger_etal_2008.Pdf.
    [2]张亚勤.应当建立开放性云计算上层标准[EB/OL]. http://it. sohu. com/20090522/n264114458.Shtml,2012-03-11.
    [3]Prescott E J, Herko R. The Competitive Intelligence Professional's Competency Framework[J]. CompetitiveIntelligence Magazine,2009,12(1):23-26.
    [4]Fernando C. People: A Critical Success Factor in the Brazilian CI Process[J]. Competitive IntelligenceMagazine,2009,12(3):13-19.
    [3]王侯.中国纸媒数字化困境及出路初探[D].上海:复旦大学,2009:51-55.
    [2]黄兰秋,张素芳,陈婧等.企业竞争情报战略联盟构建研究[J].情报理论与实践,2010,33(3):75-78.
    [1]黄兰秋,张素芳,陈婧,等.企业竞争情报战略联盟构建研究[J].情报理论与实践,2010,(3):75-78.
    [1]刘剑波,马春光.云计算及其技术进步对于组织结构的影响[J].现代管理科学,2012,(2):22
    [2]刘剑波,马春光.云计算及其技术进步对于组织结构的影响[J].现代管理科学,2012,(2):23
    [5]喻昕,王敬一.基于云计算技术的数字图书馆云服务平台架构研究[J].情报科学,2011,(7):1049-1053.
    [6]Fleisher C S, Blenkhorn D L. Controversies in competitive intelligence: the enduring issues[M]. Westport, CT:Praeger,2003:55-60.
    [2]张千帆,李晋.网络型组织的协调机制[J].企业改革与管理,2004,10:18-19.
    [1]徐二明,张欣.战略联盟中的机会主义行为抑制因素研究[J].兰州学刊,2008,(04):53-55,61
    [2]于茂荐,许学国,孙元欣.知识联盟中的信任:一个多层次的分析框架[J].科技进步与对策,2010,(09):119-123.
    [3]向长江,陈平.信任问题研究文献综述[J].广州大学学报(社会科学版),2003,(05):39-4296.
    [1]高波,黄兰秋,奉国和等.企业管理信息系统[M].北京:科学出版社,2011:161.
    [2]高波,黄兰秋,奉国和等.企业管理信息系统[M].北京:科学出版社,2011:162.
    [1]司莹莹.基于SOA的流程平台的设计与开发[D].北京:北京交通大学,2007:47.
    [2]司莹莹.基于SOA的流程平台的设计与开发[D].北京:北京交通大学,2007:47-48.
    [1]Michael Armbrust,Armando Fox,Rean Griffith,Anthony D. Joseph,etc. Above the Clouds: A Berkeley View ofCloud Computing[EB/OL], http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf,2012-08-10
    [1]Qian L, Luo Z G, et al. Cloud Computing: An Overview[J]. Lecture Notes in Computer Notes,2009(5931):
    626-631.
    [2]缪翀莺,周丽莎.客户视角下的云计算服务特征分析[J].广东通信技术,2011,12:9-12,32.
    [3]熊筱熙,赵欣艳.商业视角的云计算服务研究综述[A].中国通信学会通信管理委员会.宽带中国战略与创新学术研讨会(30)论文集[C].中国通信学会通信管理委员会:,2012:8.
    [1]王珊,王会举,覃雄派,周烜.架构大数据:挑战、现状与展望[J].计算机学报,2011,10:1741-1752.
    [2]赵春雷,乔治·纳汉.“大数据”时代的计算机信息处理技术[J].世界科学,2012,02:30-31.
    [1]秦铁辉,罗超.基于信息安全的企业反竞争情报体系构建[J].情报科学,2006,24(10):1441-1450.
    [2]王知津,陈维军.电子商务环境下企业竞争情报与反竞争情报的整合机制[J].图书馆工作与研究,2008,(9):10-14.
    [3]王知津,孙立立.竞争情报战争游戏法研究[J].情报科学,2006,24(3):342-346.
    [4]王知津,严贝妮等.企业竞争情报战争游戏的概念框架设计[J].情报科学,2008,26(10):1441-1446.
    [5]沙克尔,吉姆比克依.王知津等译.竞争情报作战室[M].人民邮电出版社.2005:41.
    [6]柯平.知识管理学[M].北京:科学出版社,2007.
    [1]李纲.基于供应链管理的信息服务模式探讨[J].中国图书馆学报.2002,(12):33-39.
    [2]朱庆华. Web2.0环境下用户生成内容(UGC)激励机制与评价机制的设计及协同研究[C].2009年教育部人文社会科学规划项目,09YJA870014.
    [2]刘玉照,曹君祥.竞争情报和战略管理[J].情报学报,1998,17(4):301-305.
    [4]朱庆华.互联网用户群体协作行为模式的理论与应用研究[C].2010年国家社科基金重点项目,
    10ATQ004.
    1包昌火.企业竞争情报系统[M].北京:华夏出版社,2002:23
    [1]冯登国,张敏,张妍等.云计算安全研究[J].软件学报,2011,22(1)):71-83.
    [2][美]彼得·圣吉.第五项修炼--学习型组织的艺术与实务[M].上海:上海三联书店出版社,2001.
    [3]陈芸芸.欧洲云计算的法律迷宫[J].信息化建设,2011,(5):26-28.
    [4]郭凯婴.英国政府实施云战略的经验与教训[J].物联网技术,2012,(2):7-8.
    [5]王敏.德国《云计算行动计划》解读[J].信息化建设,2011,(4)):49-51.
    [6]赛迪顾问.云计算战略研究白皮书[EB/OL].http://www.ccidconsulting.com/cn/index.htm,2012-06-04.
    [7]史双青.中日企业竞争情报收集、利用与保护工作浅探[J].图书情报工作,2011,(9):61-65.
    [8]徐宏宇,张左之.中国企业竞争情报实施现状调查分析[J].图书情报工作,2010,(2):82-86.
    [9]黄晓梅.我国企业竞争情报的现状和对策[J].农业图书情报学刊,2008,20(2):102-105.
    [10]李大帅.试论我国企业竞争情报发展现状和改善策略[J].情报探索,2009,(1):53-55.
    [11]黄兰秋,吴礼龙.云时代基于信息生态视阈的竞争情报系统范式分析[J].情报科学,2012,30(10):1456-1460.
    [12]冷吕华.当前企业情报信息工作中存在的问题及对策分析[J].现代情报,2005,(1):204-206,208.
    [13]蔺丰奇,刘益.信息过载问题研究述评[J].情报理论与实践,2007,(5):710-714.
    [14]张收棉,刘建准.基于动态竞争环境的企业竞争情报问题诊断与分析[J],情报资料工作,2009,(1):106-108.
    [15] Dale Neef.知识经济[M].珠海:珠海出版社,1998.
    [16]董素音.基于专家知识库的竞争情报服务模式研究[J].情报科学,2009,(5):660-663.
    [17]陈飔.企业竞争情报的服务模式[J].软件工程师,2004,(6):60-61.
    [18]梁峰.情报研究应主动适应知识经济发展[J].现代情报2007,(12):41-42,46.
    [19]李德毅.云计算技术发展报告[M].北京:科学出版社,2011.05.
    [20]钱健,刘晓冀.国内企业竞争情报现状与发展对策分析[J].商业时代,2011,(17):77-79.
    [21]周云峰,罗志会.我国竞争情报发展现状分析[J].图书情报工作,2010,(12):87-90.
    [22]王雪媛.基于云计算的知识管理[J].信息系统工程,2011,(1):62-63.
    [23]胡群策.知识经济时代知识管理与竞争情报[J].情报资料工作,2005,(2):9-12,16.
    [24]张建勋,古志民,郑超.云计算研究进展综述[J].计算机应用研究,2010,(02):429-433.
    [25] IBM.云计算概述[EB/OL].http://www-01.ibm.com/software/cn/tivoli/solution/cloudcomputing/,2012-8-10.
    [26]虞慧群,范贵生.云计算技术的应用及发展趋势综述[J].微型电脑应用,2011,(10):1-3+8,68.
    [27]雷万云.云计算——企业信息化建设策略与实践[M].北京:清华大学出版社,2010.
    [28]朱近之.智慧的云计算——物联网的平台(第二版)[M].北京:电子工业出版社,2011.
    [29]张为民等.云计算深刻改变未来[M].北京:科学出版社,2009.
    [30][美] Venkata Joysula Malcolm Orr Greg Page,云计算与数据中心自动化[M].张猛译.北京:人民邮电出版社,2012.
    [31]赵需要.云时代竞争情报的发展动向[J].情报理论与实践,2010,(6):18,23-26.
    [32]许云峰,张妍,赵铁军.基于云计算的商业情报采集系统[J].河北科技大学学报,2012,(2):161-165.
    [33]董浩,赵需要.云时代竞争情报搜集策略变革[J].情报理论与实践,2010,(6):27-28,32.
    [34]张伟匡,刘敏榕,李治准.云时代企业竞争情报安全问题及对策研究[J].情报杂志,2011,(7):8-12.
    [35]黄晓斌,钟辉新.云环境下中小企业竞争情报系统构建[J].情报资料工作,2012,(2):39-43.
    [36]张文杰.云计算在企业竞争情报中的应用研究[J].图书情报工作网刊,2011,(1):45-49.
    [37]吴绍忠.基于云计算架构的公安情报信息平台建设研究[J].中国人民公安大学学报(自然科学版),2010,(3):39-41.
    [38]殷希红.近五年我国竞争情报论文统计分析[J].办公室业务,2012,(5):143-144.
    [39]贡金涛,贾玉文,李森森.1998~2007年中国大陆竞争情报研究现状的计量分析[J].情报杂志.2009,(12):106-109.
    [40]焦慧敏,唐惠燕,任延安.国内外竞争情报研究与应用综述[J].农业图书情报学刊.2009,(3):17-20,32.
    [41]王知津,栗莉.信息、知识、情报再认识[J].情报科学,2001,19(6):673-676
    [42]姚伟.基于知识治理的竞争情报协同模型[D].天津:南开大学,2011.
    [43]王知津.竞争情报[M].北京:科学技术文献出版社,2009.
    [44]陶飞,张霖,郭华等.云制造特征及云服务组合关键问题研究[J].计算机集成制造系统,2011,17(03):477-486.
    [45]高波,黄兰秋,奉国和等.企业管理信息系统[M].北京:科学出版社,2011.
    [46]曹毅,贺卫红. CDN网络关键技术研究[J].现代计算机(专业版),2004,(10):39-43.
    [47]刘玉照,曹君祥.竞争情报和战略管理[J].情报学报,1998,17(4):61-65.
    [48]艾尔·巴比(Earl Babbie)著,社会研究方法[M].邱泽奇译.北京:华夏出版社,2006.
    [49]利亚姆.费伊著,朱舟译.竞争者-以才智、谋略与绩效制胜[M].北京:中国人民大学出版社,2005.
    [50]沈固朝.竞争情报的理论与实践[M].北京:科学出版社,2008.
    [51]董素音,蔡莉静.图书馆竞争情报服务[M].北京;海洋出版社,2009.
    [52]杜也力.知识服务模式与创新[M].北京:北京图书馆出版社,2005.
    [53]张丽静.1999-2003年我国图书馆知识服务研究述略[J].图书馆理论与实践,2005,(6):61-65.
    [54]陈则谦.我国科技信息事业发展的轨迹——从信息服务走向知识服务[J].现代情报,2007,27(12):11-15.
    [55]彭俊玲.专门(专业)图书馆开展竞争情报服务的机理分析及展望[J].图书情报工作,2005,(4):44-47.
    [56]包昌火,谢新洲.竞争战略与竞争优势[M].北京:华夏出版社,2001.
    [57]庄丽娟.服务定义的研究线索和理论界定[J].中国流通经济,2004,(9):42-45.
    [58]吴伟.国外竞争情报软件研究[J],情报理论与实践,2004,(7):103-106.
    [59]王哲,陈清华.企业竞争情报的特征及作用[J].情报杂志,2004,(1):35-37.
    [60]肖文旺.简论服务的一般特征[J].经济师,2004,(9):259-261.
    [61]李霞.知识服务平台构建的若干问题研究[D].东北大学,2008.
    [62]周贵族.论知识经济时代的情报服务特征[J].湖南大学学报(社会科学版),1999,(2):120-120,122.
    [63]钟辉新,黄晓斌.基于软件即服务的企业竞争情报服务模式与应对策略[J].情报理论与实践,2012,(7):99-103.
    [64]冯维扬.竞争情报系统建设方法研究[J].情报理论与实践,2002,(5):119-122.
    [65]刘玉照,曹君祥.竞争情报计算辅助系统的开发[J].情报理论与实践,2000,(1):36-38.
    [66]包昌火,谢新洲.企业竞争情报系统[M].北京:华夏出版社,2002.
    [67]赖茂生,周键.企业竞争情报体系的建立和发展[C].全国竞争情报与企业发展研讨会会议录,1995,(3).
    [68]胡昌平.创新型国家的知识信息服务体系研究[M].经济科学出版社,2011.
    [69]谢新洲,包昌火,张燕.企业竞争情报系统的功能[J].图书情报工作,2002,(8):54-58.
    [70]冯维扬.竞争情报计算机系统模型分析[J].情报学报,2001,(1):39-45.
    [71]苗杰,倪波.面向集成竞争情报系统的数据挖掘应用研究[J].情报学报,2001,(4):443-450.
    [72]吴晓伟等.竞争情报系统成功建设模型及其实证研究[J].情报学报,2005,(8):6-8,11.
    [73]何绍华.面向知识管理的适应性竞争情报系统[J].图书情报工作.2007,(11):54-57.
    [74]李东林,史振立.基于知识管理的组织竞争情报系统的构建[J].现代情报.2007,(10):166-169.
    [75]司有和著.竞争情报理论与方法[M].北京:清华大学出版社,2009.
    [76]谭思明,王淑玲,王春玲.面向政府决策的竞争情报服务平台的构建[J].现代情报,2007,(11):6-9.
    [77]曹如中.王立新.曹桂红,企业竞争情报服务系统功能构建与实证研究[J].图书情报工作,2011,(4):48-52.
    [78]谢新洲,包昌火,张燕.企业竞争情报系统的主要模式[J].图书情报工作,2002,(11):21-26.
    [79]苗杰,倪波.竞争情报系统的业务模式分析研究[J].情报学报,2001,(1):32-38.
    [80]陈颖.企业竞争情报部门设置模式研究[J].情报理论与实践.2004,(5):497-499.
    [81]李瑾.基于知识管理的企业竞争情报工作组织结构创[J].科技进步与对策.2008,(9):167-170.
    [82]冯维扬.面向任务的动态竞争情报组织结构模型分析[J].情报学报,2002,21(4):486-490.
    [83]陈维军.基于企业组织结构的竞争情报团队设计研究[J].图书情报工作.2009,(10):28-32.
    [84]李晓鸿,赵冰峰.竞争情报组织中的虚拟团队和动态联盟[J].情报杂志,2005,(10):36-37.
    [85]莫超.基于SAML和CAS框架的云门户SSO系统研究与实现[D].成都:电子科技大学,2011.
    [86]王玉.企业战略联盟的竞争情报研究[J].情报理论与实践,2005,28(3):300-302,314.
    [87]周九常.网络组织竞争情报研究评述[J].情报科学,2007,25(2):306-310.
    [88]张泽华.云计算联盟建模及实现的关键技术研究[D].昆明:云南大学,2010.
    [89]孙兆玉,袁志平,黄宇光.面向数据密集型计算Hadoop及其应用研究[C].2008年全国高性能计算学术年会.无锡:中国计算机学会,中国软件行业协会,2008.
    [90]董世晓.云计算开源先锋Hadoop——第四届Hadoop中国云计算大会纪实[J].程序员,2010,(10):36-37.
    [91]周倩.云计算——中小企业的助推器[D].上海:华东师范大学,2010.
    [92]刘宝杰,许勇.基于信息熵的企业信息孤岛分析[J].现代计算机,2007,(5):91-92.
    [93]刘玉照,杜言,刘建准.面向企业信息集成的竞争情报系统[J].情报科学,2005,(4):573-576.
    [94][美]Karl E.Wiegers著.软件需求(第二版)[M].刘伟琴,刘洪涛译.北京:清华大学出版社,2004.11.
    [95]王延飞.竞争情报方法[M].北京:北京大学出版社,2007.
    [96]钟常青.网络时代高校图书馆竞争情报服务发展探析[J].高校图书馆工作,2005,(6):70-72.
    [97]李国秋,吕斌著.企业竞争情报概论[M].上海:华东师范大学出版社,2006.4..
    [98]柯克W M泰森著.竞争情报完全指南[M].王玉,郑逢波,张佳浩等译.北京:中国人民大学出版社,2005.
    [99]周洪波.云计算:技术、应用、标准和商业模式[M].北京:电子工业出版社出版,2011.
    [100]包昌火.加强竞争情报工作,提高我国企业竞争能力[J].中国信息导报,1998,(11):30-33.
    [101]包昌火,谢新洲,李艳.竞争对手分析论纲[J].情报学报,200,3(1):103-114.
    [102]杨永芳,王道平,李成章.企业竞争情报工作的构建研究[J].情报杂志,2008,27(7):138-141.
    [103]钟丽萍.基于综合集成论的情报研究理论阐释[J].情报理论与实践,2012,(6):7-11.
    [104]吴晓伟,徐福缘,吴伟昶.基于“综合集成研讨厅”的企业竞争情报系统研究[J].情报学报,2004,(6):746-754.
    [105]吴晓伟,徐福缘,宋文官.企业竞争情报系统工程论[J].情报学报,2006,(4):407-419.
    [106]刘玉照,刘建准,范志雯.基于C/S与B/S集成模式的企业竞争情报系统构建研究[J].情报科学,2005(3):410-413.
    [107]徐克奇,吴晓伟.基于UML的企业竞争情报系统设计[J].兵器自动化,2005,(2):62-63,88.
    [108]钱学森,于景元,戴汝为.一个科学的新领域——开放的复杂巨系统及其方法论[J].自然杂志,1990,13(1):3,10,64.
    [109]王寿云,于景元,戴汝为等.开放的复杂巨系统[M].杭州:浙江科学技术出版社,1995.
    [110]张平,苗杰,胡铮,田辉.泛在网络研究综述[J].北京邮电大学学报,2010,(5):1-6.
    [111]田野,宝贡敏.信息技术同化研究:回顾与展望[J].情报学报,2007,(5):648-652.
    [112]尹科强,谢新洲.竞争情报软件的分析与评价[J].情报学报,2004,23(6):736-745.
    [113]王曰芬,巫玲.国外竞争情报软件研发的现状与趋势[J].现代图书情报技术,2004,(1):81-83.
    [114]李武.面向现代服务业的大规模分布式文件存储系统设计和实现[D].杭州:浙江大学,2008.
    [115]蔡永顺,雷葆华.云计算标准化现状概览[J].电信网技术,2012,(2):22-26.
    [116]张逢喆.公共云计算环境下用户数据的隐私性与安全性保护[D].上海:复旦大学,2010.
    [117]叶建伟.云计算平台中作业安全技术研究[D].哈尔滨:哈尔滨工业大学,2011.
    [118]朱智强.混合云服务安全若干理论与关键技术研究[D].武汉:武汉大学,2011.
    [119]王惠莅,杨晨,杨建军.云计算安全和标准研究[J].信息技术与标准化,2012,(5):16,19,27.
    [120]秦铁辉,罗超.基于信息安全的企业反竞争情报体系构建[J].情报科学.2006,24(10):1441-1445,1450.
    [121]王知津,陈维军.电子商务环境下企业竞争情报与反竞争情报的整合机制[J].图书馆工作与研究,2008,(9):10-14.
    [122]王知津,孙立立.竞争情报战争游戏法研究[J].情报科学,2006,24(3):342-346.
    [123]王知津,严贝妮等.企业竞争情报战争游戏的概念框架设计[J].情报科学,2008,26(10):1441-1446.
    [124]柯平.知识管理学[M].北京:科学出版社,2007.
    [125]李纲.基于供应链管理的信息服务模式探讨[J].中国图书馆学报.2002,(12):32-34.
    [126]王鹏.走近云计算[M].北京:人民邮电出版社,2009.
    [127]李晓辉.云计算技术研究与应用综述[J].电子测量技术.2011,(7):1-4.
    [128]陆嘉恒. Hadoop实战[M].北京:机械工业出版社,2011.
    [129]邓自立.云计算中的网络拓扑设计和Hadoop平台研究[D].北京:中国科学技术大学,2010.
    [130]唐箭.云存储系统的分析与应用研究[J].电脑知识与技术.2009,5(20):5337-5338,5340
    [131]鲁松.计算机虚拟化技术及应用[M].北京:机械工业出版社,2008.
    [132]程桦.云计算应用架构译注[M].北京:电子工业出版社,2010.
    [133]王鹏.云计算的关键技术与应用实例[M].北京:人民邮电出版社,2010.01.
    [134]刘鹏.云计算[M].北京:电子工业出版社,2010;刘鹏.云计算(第二版)[M].北京:电子工业出版社,2012
    [135][美] David S. Linthicum著.云计算与SOA[M].马国耀译.北京:人民邮电出版社,2011.
    [136]杨正洪,郑齐心,吴寒.企业云计算架构与实施指南[M].北京:清华大学出版社,2010.
    [137][美]John Rhoton著.云计算:企业实施手册[M].朱丽,姜怡华译.北京:机械工业出版社,2011.
    [138]冯建平,吴丽华.“云计算”技术和“云计算”服务模式—全球信息化发展的未来[J].信息系统工程,2009,(11):78-80.
    [139]沈舒.云计算与网格计算的比较[J].软件导刊,2009,(12):10-11.
    [140]陈锋敏.基于云端的Web数据挖掘预取技术研究[J].统计与决策,2010,(22):161-162.
    [141]陈海波.云计算平台可信性增强技术的研究[D].上海:复旦大学,2008.
    [142]徐迪威.云计算关键技术探究[J].现代计算机(专业版),2010,(7):41-43.
    [143]孙兆玉,袁志平,黄宇光.面向数据密集型计算Hadoop及其应用研究[C].2008年全国高性能计算学术年会.无锡:中国计算机学会,中国软件行业协会,2008.
    [144]郭亨亨.海量RDF数据的分布式存储研究[D].西安:西安建筑科技大学,2010.
    [145]匡胜徽,李勃.云计算体系结构及应用实例分析[J].计算机与数字工程,2010,38(3):60-63,91.
    [146]李学博,张振伦,蒋建平.电信之“云”搭建需从基础入手业务拓展紧跟市场需求[J].通信世界,2009,(13):42-43.
    [147]饶少阳.电信的云计算之路[J].信息网络,2008,(9):16-20.
    [148]孙明俊.云计算发展的国内外对比分析[J].电信网技术,2010,(9):12-15.
    [149]沙伦奥斯特著.现代竞争分析[M].张志奇,李强,陈海威译.北京:中国人民大学出版社,2004.
    [150][美]斯蒂芬P罗宾斯,玛丽库尔特.管理学(第7版)[M].孙健敏等译.北京:人民大学出版社,2004.
    [151]罗应婷,杨钰娟. SPSS统计分析从基础到实践[M].北京:电子工业出版社,2010.
    [152]朱庆华.信息分析基础、方法及应用[M].北京:科学出版社,2004.
    [153][美]弗雷德戴维.战略管理(第八版)[M].北京:经济科学出版社,2001.
    [154][美]劳埃德拜厄斯,莱斯利鲁著,人力资源管理[M].李业昆等译.北京:人民邮电出版社,2003.
    [155][美]斯蒂芬·P·罗宾斯.组织行为学精要[M].郑晓明译.北京:电子工业出版社,2002.
    [156]谢新洲,吴淑燕.竞争情报分析方法——定标比超[J].北京大学学报,2003,40(2):137-151.
    [157]张翠英.竞争情报分析[M].北京:科学出版社,2008.4.
    [158]贾晓斌.竞争情报理论与实践研究[M].西安:西安交通大学出版社,2006.
    [159]查先进.情报学研究进展[M].武汉:武汉大学出版社,2007.
    [160]吴礼龙.基于信息生态的竞争情报系统构建研究[D].天津:南开大学,2010.
    [161]徐芳.国外竞争情报研究进展:概念辨析、问题论域及发展趋势[J].情报资料工作,2011,(01):46-51.
    [162]伍慧春,周敏敏.论知识服务与情报服务.科技情报开发与经济[J],2006,(03):46-51.
    [163]曾忠禄.企业竞争情报系统再定义[J].图书情报工作,2007,(11):10-13,24.
    [164]胡景江.中小饲料企业竞争情报工作探讨[J].饲料广角,2010,(03):47-50.
    [165]余玄霞.我国竞争情报服务技术创新分析[J].图书情报论坛,2006,(03):1878-1882,1888.
    [166]孔楠.基于云计算平台的商业服务模式研究[D].上海:上海外国语大学,2010.
    [167]于晓燕.基于网格的数字图书馆模式构建研究[D].天津:南开大学,2010.
    [168]陈婧,黄兰秋,吴礼龙等.竞争情报个性化服务框架研究[J].情报杂志,2008,(8):112-115.
    [169]黄乾,侯昭华.学习型企业文化特色及营造[J].现代经济(现代物业下半月刊),2007,08:85-86,92.
    [170]陶飞,张霖,郭华,罗永亮,任磊.云制造特征及云服务组合关键问题研究[J].计算机集成制造系统,2011,03:477-486.
    [171]刘艺.应急云环境下任务导向的应急组织敏捷协作机制研究[D].广州:暨南大学,2012
    [172]王静一.基于云计算技术的数字图书馆云服务平台架构研究[D].长春:吉林大学,2011
    [173]周芝萍,张发亮.高校图书馆数字参考咨询云服务研究[J].图书馆建设,2012,01:53-56.
    [174]倪萍.基于云计算的数字参考咨询服务模式初探[J].现代情报,2012,04:66-68.
    [175]张喜年.合作数字参考咨询服务模式比较分析[J].情报杂志,2006,04:134-136,139
    [176]张峰.合作数字参考咨询服务系统及其服务模式[J].现代情报,2007,02:138-140,143
    [177]张永军.北京铁路信号工厂ERP实施研究[D].北京:清华大学,2004.
    [178]刘剑波,马春光.云计算及其技术进步对于组织结构的影响[J].现代管理科学,2012,02:22-23.
    [179]互动百科.虚拟组织[EB/OL].http://www.hudong.com/wiki/%e8%99%9a%e6%8b%9f%e7%bb%84%e7%bb%87,2012-08-07.
    [180]董雅文.基于虚拟企业运作模式的企业技术创新项目运作研究[D].西安:西安理工大学,2006.
    [181]吴洋,刘嘉.虚拟企业.网络经济中规模经济的新形式[J].现代管理科学,2003,02:45-46.
    [182]管理百科.虚拟组织论[EB/OL].http://baike.themanage.cn/baike/%e8%99%9a%e6%8b%9f%e7%bb%84%e7%bb%87%e8%ae%ba,2012-08-07.
    [183]黄乾,侯昭华.学习型企业文化特色及营造[J].现代经济(现代物业下半月刊),2007,08:85-86,92.
    [184]刘晓茜.云计算数据中心结构及其调度机制研究[D].合肥:中国科学技术大学,2011
    [185]张昕光.组织知识共享的实现途径及其风险控制研究[D].沈阳:东北大学,2005
    [186]廖宝华.基于Bind及Squid服务的内容分发网络的设计与实现[D].北京邮电大学,2011.
    [187]李娜.企业内网个性化信息服务的研究与实现[D].上海交通大学,2009.
    [1] Wikipedia. John McCarthy(computer scientist)[EB/OL]. http://en.wikipedia.org/wiki/John_McCarthy_(computer_scientist),2008-11-09.
    [2] IBM. Google and IBM announced university initiative to address internetscale computingchallenges [EB/OL]. http://www-03. ibm. com/press/us/en/pressrelease/22414.wss,2010-11-11.
    [3] Wikipedia. Cloud Computing [EB/OL]. http://en.wikipedia.org/wiki/Cloud_computing,2011-09-12.
    [4] Mell P, Grance T. Cloud computing definition [J/OL].N IST.http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc,2012-01-11.
    [5] Buyya R, Yeo C S, Venugopal S. Market-Oriented Cloud Computing: Vision, Hype, andReality for Delivering IT Services as Computing Utilities[C]//IEEE. Proceedings of the10thIEEE International Conference on High Performance Computing and Communications,Dalian, China,2008. Los Alamitos, CA, USA: IEEE CS Press,2008.
    [6] George Reese. Cloud Application Architectures.[M] O'Reilly Media, Inc.USA.2009.
    [7] Borthakur D. The hadoop distributed file system: Architecture and design
    [EB/OL]. http://hadoop.apache.org/common/docs/r0.18.3/hdfs_design.html,2011-03-20.
    [8] Enomalism [EB/OL]. http://www.enomalism.com/,2011-03-20.
    [9] Nurmi D, et.al.2009. The eucalyptus open-source cloud-computing system
    [C]. In Proceedings of the9t'' IEEE/ACM International Symposium on ClusterComputing and the Grid,124-131. IEEE Washington, DC, USA.
    [10] Tanev Stoyan, Bailetti Tony. Competitive Intelligence Information and Innovation in SmallCanadian Firms[J]. European Journal of Marketing,2008,(42):786-803.
    [11] Rolim CO. A Cloud Computing Solution for Patient's Data Collection in Health CareInstitutions[J]. SECOND INTERNATIONAL CONFERENCE ON EHEALTH,TELEMEDICINE, AND SOCIAL MEDICINE: ETELEMED2010, PROCEEDINGS,2010:95-99.
    [12] Massiomo Gaggero,Simone Leo,Simone Manca. Parallelizing bioinformatics applicationswith MapReduce[J/OL].http://www.cca08.org/papers/Poster-Simone-Leo.pdf,2011-03-20.
    [13] Tanev Stoyan, Bailetti Tony. Competitive Intelligence Information and Innovation in SmallCanadian Firms[J].European Journal of Marketing,2008(42):786-803.
    [14] Luis M. Vaquero, Luis Rodero-Merino, Juan Caceres, Maik Lindner. A break in the clouds:towards a cloud definition [J]. SIGCOMM Computer Communication Review, December2008.Volume39Issue1.
    [15] version3of Security Guidance for Critical Areas of Focus in Cloud Computing[EB/OL],https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf,2012-8-10.
    [16] Peter Mell, Timothy Grance. The NIST Definition of Cloud Computing[J/OL], September2011. http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf,2012-8-10.
    [17] Michael Armbrust,Armando Fox,Rean Griffith,Anthony D. Joseph,etc. Above the Clouds: ABerkeley View of Cloud Computing[EB/OL],http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf,2012-08-10.
    [18] Foster I, Zhao Y, Raicu I, et al. Cloud Computing and Grid Computing360-DegreeCompared[C]//IEEE. Grid Computing Environments Workshop. NJ USA, IEEE ComputerSociety,2008:1-10.
    [19] Liebowitz, J. Building Organisational Intelligence: A Knowledge Management Primer. BocaRaton, CA: CRC Press.2000.
    [20] MillerMiehael.CloudComputing[M].US:PearsonEdueation,2008.
    [21] Ahmad Badr, Ahmad; Madden, Emma; Wright, Sheila.The Contribution of CI to theStrategic Decision Making Process: Empirical Study of the European PharmaceuticalIndustry[J].Journal of Competitive Intelligence and Management, Vol.03No.04,:p15-35
    [22] Andreeva, T. and I. Ikhilchik, Applicability of the SECI Model of knowledge creation inRussian cultural context: Theoretical analysis. Knowledge and process management,2011.18(1): p.56-66.
    [23] Bouthillier F, Shearer K. Assessing Competitive Intelligence Software: A Guide toEvaluating CI Technology[M]. Medford: Information Today,2003:187.
    [24] Priporas,Constantinos-Vasilios., Gatsoris,Lampros.,Zacharis,Vassilis.Competitiveintelligence activity: evidence from Greece[J].Marketing Intelligence&Planning,2005,23(7):659-669.
    [25] Drucker P F. Knowledge-worker productivity: The biggest challenge[M]. CaliforniaManagement Review,1999,41(2):79-94.
    [26] Grant R M. Toward a knowledge-based theory of the firm[M]. Strategic Management Journal,1996,17(2):109-122.
    [27] Hedlund G. A model of knowledge management in the N-form corporation[J]. StrategicManagement Journal,1994,15(S2):73-91.
    [28] Nonaka I. A dynamic theory of organizational knowledge creation[M]. Orga nization Science,1994,5(1):14-37.
    [29] Fuld L M. The Secret Language of Competitive Intelligence[M]. New York: Crown Business,2006.
    [30] Bose R.Competitive intelligence process and tools for intelligence analysis[J].IndustrialManagement&Data Systems,2008,108(4):510-528.
    [31] Spender J C. Making knowledge the basis of a dynamic theory of the firm[M]. StrategicManagement Journal,1996,17(10):45–62.
    [32] Bloodgood J M, Salisbury W D. Understanding the influence of organizational changestrategies on information technology and knowledge management strategies[J]. DecisionSupport Systems,2001,31(1):55-69.
    [33] Grant R M. The knowledge-based view of the firm. In Faulkner D. and Campbell A.(eds.),Strategy: a strategy overview and competitive strategy[M]. Oxford: University Press,2006:203-227.
    [34] Gray P H. Meister D B. Knowledge sourcing methods[J]. Information&Management,2006,43(2):142-156.
    [35] Sher J P, Lee C V. Information technology as a facilitator for enhancing dynamic capabilitiesthrough knowledge managements[J]. Information and Management,2004,41(8):933-945.
    [36] Drucker P F. Post-Capitalist Society[M].Oxford: Butterworth-Heinemann,1993.
    [37] Orlikowski W J. Knowing in Practice: Enacting a Collective Capability in DistributedOrganizing[J]. Organization Science,2002,13(3):249-273.
    [38] Andrikopoulos, A., Accounting for intellectual capital: On the elusive path from theory topractice. Knowledge and process management,2010,17(4): p.180-187.
    [39] Anne-Mette, L. and H. Ebba Holme, Knowledge-sharing enablers and barriers inpharmaceutical research and development. Journal of Knowledge Management,2011,15(1):p.53-70.
    [40] Fan W, Gordon M D, Pathak P. An integrated two-stage model for intelligent informationrouting[J]. Decision Support Systems,2006,42(1):362-374.
    [41] Fan W, Wallace L, Rich S, Zhang Z. Tapping the power of text mining[J].Communications ofthe ACM,2006,49(9):77-82.
    [42] George S D, Paul J H S. Peripheral Vision: Detecting the Weak Signals That Will Make orBreak Your Company[M]. Watertown: Harvard Business School Press,2006.
    [43] Maria Jakubik. Becoming to know. Shifting the knowledge creation paradigm[J]. Journal ofKnowledge Management,2011,15(3).
    [44] Holden N.Cross-Cultural Management: A Knowledge Management Perspective [M].Harlow:Financial Times/Prentice-Hall,2002.
    [45] Cohen D, Prusak L. In Good Company: How Social Capital Makes Organizations Work[M].Cambridge,MA:Harvard Business School Press,2001.
    [46] Anne-Mette, L. and H. Ebba Holme, Knowledge-sharing enablers and barriers inpharmaceutical research and development. Journal of Knowledge Management,2011,15(1):p.53-70.
    [47] Armbrust M,FOX A,GRIFFITH R,et al.2009.Above the Clouds:A Berkeley View of Cloud
    [48] NIJ, DANNYH. Large scale cooperative caching and application level multicast inmultimedia content delivery networks [J]. IEEE Comm,2005,43(5):98-105.
    [49] Foster I,ZHAO Yong,RAICU I,et al.2008.Cloud Computing and Grid Computing360-degreCompared[C]//Proceedings of the IEEE Grid Computing Environments Workshop(GCE’08
    [50] Tom White, Hadoop: The Definitive Guide[M], O’REILLY,2009,12~13.
    [51] Apache, Welcome to Apache Pig![Z], http://Pig.apache.org/,2012-03-20.
    [52] Antia, Kersi; Hesford, James W. Process-Oriented View of CompetitiveIntelligence[J].Journal of Competitive Intelligence and Management,V4/1, January2007:3-31.
    [53] Awazu, Yukika.Informal roles and intelligence activities: some managementpropositions[J].Journal of Competitive Intelligence and Management,V2N1,2004:16-24,
    [54] Barnea, Avner.Introducing Ci in Israeli firms[J]. Competitive IntelligenceMagazine,Sept/October2004,(7)/5:23-26.
    [55] Barnea, Avner.Israel study on competitive intelligence[J]. Competitive Intelligence Magazine,2006,9/3:43-43.
    [56] Belkine, Michael.Competitive intelligence in Israel[J].Journal of Competitive Intelligenceand Management,V2N2,2004:38-52
    [57] Blenkhorn, David; Fleisher, Craig.Performance assessment in competitive intelligence: anexploration, synthesis, and research agenda[J].Journal of Competitive Intelligence andManagement,2007,4(2):4-22.
    [58] Bourthillier, Frances; Jin, Tao.Competitive intelligence professionals and their interactionswith CI technology: a research agenda[J].Journal of Competitive Intelligence andManagement,V3N1Spring2005:41-53
    [59] Bouthiller, Frances; Jin, Tao.Competitive intelligence and webometrics: an exploratory studyon the status of CI in five countries[J].Journal of Competitive Intelligence andManagement,V3N3, Winter2005:19-39
    [60] Brody, Roberta.Issues in Defining Competitive Intelligence: An Exploration[J].Journal ofCompetitive Intelligence and Management,V4N3, March2008:3-16.
    [61] Buchda, Sascha.Rulers for Business Intelligence and Competitive Intelligence: An Overviewand Evaluation of Measurement Approaches[J].Journal of Competitive Intelligence andManagement, V4/2, November2007:23-54
    [62] Burkhardt, Kim.Before and after competitive intelligence:research analysts succeed in avariety of settings[J]. Competitive Intelligence Magazine,2007,10/5:46-47.
    [63] Calof, Jonathan; Brouard, Francois.Competitive intelligence in Canada[J].Journal ofCompetitive Intelligence and Management, V2N2,2004:1-21
    [64] Capece, G. and D. Campisi, Technological change and innovation behaviour in high leveleducation: An international comparison between Italian and Portuguese samples. Knowledgeand process management,2011,18(1): p.67-74.
    [65] Charles, Andy.Over reliance on the web for competitive intelligence information[J].Competitive Intelligence Magazine,2007,10/3:23-6.
    [66] Cheryl Marie, C.-N. and H. Suliman, Leveraging socio-culturally situated tacit knowledge.Journal of Knowledge Management,2011,15(1): p.88-103.
    [67] Cheryl Marie, C.-N. and H. Suliman, Leveraging socio-culturally situated tacit knowledge.Journal of Knowledge Management,2011,15(1): p.88-103.
    [68] Cobb, Pamela.Competitive intelligence through data mining[J].Journal of CompetitiveIntelligence and Management, V1N3,2003:80-89
    [69] Comai, Alessandro.Global code of ethics and competitive intelligence purposes: an ethicalperspective on competitors[J].Journal of Competitive Intelligence and Management, V2N1,2004:25-44
    [70] Douglas Bernhardt. Best Practices in Competitive Intelligence [J]. Competitive IntelligenceMagazine,2010,13(2):19-22.
    [71] Dr. Alan, T.B., A. Dr. William, and D. Dr. Pratim, A QUALITATIVE EXPLORATION OFENTREPRENEURIAL KNOWLEDGE TRANSFER. Journal of Knowledge Management,2011,15(2): p.6-6.
    [72] Dr. Priscilla, A.A. and W.S.C. Dr. Mark, FACILITATING NEW KNOWLEDGE CREATIONAND OBTAINING KM MATURITY. Journal of Knowledge Management,2011,15(2): p.4-4.
    [73] Dr. Raid Moh'd, A.-a. and S.A.-A. Mr. Muawad, Organizational Culture Impact onKnowledge Exchange: Saudi Telecom Context. Journal of Knowledge Management,2011,15(2): p.3-3.
    [74] Dr. Yajiong, X., B. Dr. John, and L. Dr. Huigang, Team climate, empowering leadership, andknowledge sharing. Journal of Knowledge Management,2011,15(2): p.7-7.
    [75] Duncan, Steve.Social networking systems as competitive intelligence tools[J]. CompetitiveIntelligence Magazine,2006,9/4:16-19.
    [76] Egan, Erin.The role of cultural politics in CI[J]. Competitive IntelligenceMagazine,March/April2004,7/2:p60-2.
    [77] Elizondo, Noe.Managing a multinational competitive intelligence project:a case study[J].Competitive Intelligence Magazine,2006,9/3:48-50
    [78] Elizondo,Noe.Cross border competitive intelligence.[J]. Competitive IntelligenceMagazine,2002,5/5:31-33.
    [79] Erickson, Scott; Rothberg, Helen.Expanding intelligence capabilities, downstreamknowledge targets[J].Journal of Competitive Intelligence and Management,V3N2, Fall2005:8-15
    [80] Erik Glitman, Fletcher CSI. Tracking Adjacent Markets for Competitive Threats[J].Competitive Intelligence Magazine,2010,13(4):40-43.
    [81] Fehringer, Dale.Conducting proactive competitive intelligence through competitor activitytracking[J].Competitive Intelligence Magazine,2007,10/3:-.11-14.
    [82] Ferreyra, Jose Carlos Pharmaceutical CI planning:a seven matrix methodology[J].Competitive Intelligence Magazine,Sept/October2004,7/5: p40-43.
    [83] Foss N J, Husted K, Michailova S, Pedersen T. Governing knowledge processes: theoreticalfoundations and research opportunities[R].CKG Working Paper, Center for KnowledgeGovernance, Copenhagen Business School,2003,(1).
    [84] Frates, Janice; Sharp, Seena.Using business intelligence to discover new marketopportunities[J].Journal of Competitive Intelligence and Management,V3N2, Fall2005:16-28
    [85] Ganesh U, Miree C E and Prescott J.Competitive intelligence field research:moving the fieldforward by setting a research agenda[M].Journal of Competitive Intelligence andManagement,2006,1(1):1-12.
    [86] Ganesh, Usha; Miree, Cynthia; Prescott, John.Competitive intelligence field research,moving the field forward by setting a research agenda[J].Journal of Competitive Intelligenceand Management, V1N1,2003:p1-12
    [87] Cheryl Marie Cordeiro-Nilsson, Suliman Hawamdeh.Leveraging socio-culturally situatedtacit knowledge [J].Journal of Knowledge Management,2011,15(1):88-103.
    [88] Hohhof, Bonnie.Outsourcing and competitive intelligence [J]. Competitive IntelligenceMagazine,2007,10/2: p5.
    [89] Hohhof, Bonnie.Starting a competitive intelligence Function[J]. Competitive IntelligenceMagazine,2009,12(1):1-7.
    [90] Holtzman, Jody.Competitive intelligence blindspots and other barriers to adding strategicvalue..20058/4:15-19
    [91] Hughes, Stephanie.Competitive intelligence as competitive advantage: the theoretical linkbetween competitive intelligence, strategy and firm performance[J].Journal of CompetitiveIntelligence and Management,V3N3, Winter2005.:3-18
    [92] Ignatov, Alexander.Competitive intelligence in Russia[J].Journal of Competitive Intelligenceand Management,V2N3,Fall2004:26-44,
    [93] James, T.C.T. and S. Seokwoo, An exploratory examination of knowledge-sharing behaviors:solicited and voluntary. Journal of Knowledge Management,2011,15(1): p.104-117.
    [94] James, T.C.T. and S. Seokwoo, An exploratory examination of knowledge-sharing behaviors:solicited and voluntary. Journal of Knowledge Management,2011,15(1): p.104-117.
    [95] Johnson, Derek.NPV analysis and applications for competitive intelligence[J]. CompetitiveIntelligence Magazine,2003,6/3: p45-46.
    [96] Johnson, Sam.CI as a critical growth market puzzle piece[J]. Competitive IntelligenceMagazine,March/April2004,7/2:p68-9.
    [97] Kakavelakis, K., A relational approach to understanding knowing in communities of practice.Knowledge and process management,2010,17(4): p.168-179.
    [98] Kim, Kwangsoo; Kim, Seungjin.Competitive intelligence in Korea[J].Journal of CompetitiveIntelligence and Management, V2N3, Fall2004:10-25
    [99] Kindler, Tim.The competitive intelligence foundation[J]. Competitive IntelligenceMagazine,2005,8/3:3.
    [100] Kumar, J.A. and L.S. Ganesh, Balancing knowledge strategy: codification andpersonalization during product development. Journal of Knowledge Management,2011,15(1): p.118-135.
    [101] Kumar, J.A. and L.S. Ganesh, Balancing knowledge strategy: codification andpersonalization during product development. Journal of Knowledge Management,2011,15(1): p.118-135.
    [102] Lang, Annemarie Impact business decisions with competitive intelligence[J]. CompetitiveIntelligence Magazine,2007, v10n6:31-34.
    [103] Gangcheol Yun, Do Hyoung Shin, Hansoo Kim, Sangyoub Lee. Knowledge mappingmodel for construction project organizations[J]. Journal of Knowledge Management,2011,15(3).
    [104] McGonagle, John CI technology readings[J]. Competitive Intelligence Magazine[J].Competitive Intelligence Magazine,2003,6/2: p50.
    [105] McGonagle, John Collecting competitive intelligence[J]. Competitive IntelligenceMagazine,2005,8/4,52:55.
    [106] McGonagle, John J..An Examination of the "Classic" CI Model[J].Journal of CompetitiveIntelligence and Management,V4/2, November2007:71-86
    [107] McKenney, Peter CI in action:key steps to building an internal CI function[J]. CompetitiveIntelligence Magazine,2005,8/6:10-13.
    [108] Naylor, Ellen.Capturing competitive intelligence from your sales force[J]. CompetitiveIntelligence Magazine,2000,3/1, p24-28.
    [109] Neugarten, Michael.Seeing and noticing: an optical perspective on competitiveintelligence[J].Journal of Competitive Intelligence and Management,V1N1,2003:93-104
    [110] Dedrick N. A Strategic Approach to Competitive Intelligence: Applications for thePharmaceutical Sector [J]. Competitive Intelligence Magazine,2010,13(4):29-38.
    [111] Nickerson J A, Zenger T R. A knowledge-based theory of the firm: the problem-solvingperspective[J]. Organization Science,2004,15(6):617–632.
    [112] O'Gorman, David.Memes, CI, and marketing: a preliminary framework[J].Journal ofCompetitive Intelligence and Management, V3N2, Fall2005:29-43
    [113] Olander, H., et al., The dynamics of relational and contractual governance mechanisms inknowledge sharing of collaborative R&D projects. Knowledge and process management,2010.17(4): p.188-204.p53-54:59.
    [114] Phillips C E, Ting T C, Demurjian S A. Information Sharing and Security inDynamicCoalitions[C]//ACM. Processings of7th ACM Symposium on AccessControl Models andTechnologies. Monterey, CA, USA.2000. NY, USA: ACMPress,2002:87-96
    [115] Joshi J B D, Bhatti R, Bertino E, et al. Access-control Language forMultidomainEnvironments[J]. IEEE Internet Computing,2004,8(6):40-50[146] Han R F, Wang H X, XiaoQ, et al. A United Access Control Model for Systemsin Collaborative Commerce[J]. Journalof Network,2009,4(4):279-289
    [116] Zhang X W, Li Y J, Nalla D. An Attribute-based Access MatrixModel[C]//ACM.Proceedings of the20th Annual ACM Symposium on AppliedComputing, Santa Fe, NM,USA,2005. NY USA: ACM,2005:359-363
    [117] Thomas R K, Sandhu R S. Towards a Task-based Paradigm for Flexible andAdaptableAccess Control in Distributed Applications[C]. Proceedings of1992-1993workshop on NewSecurity Paradigms, New York, NY, USA,1993:139-142
    [118] Thomas R K, Sandhu R S. Task-based Authentication Controls(TBAC): AFamily of Modelsfor Active and Enterprise-oriented AuthenticationManagement[C]. Proceedings of IFIPWG11.3workshop on Database Security,1997:166-181
    [119] Peltoniemi, Mirva; Vuori, Elisa.Competitive Intelligence as a Driver of Co-Evolutionwithin an Organization Population[J].Journal of Competitive Intelligence and Management,V4N3March2008:50-62
    [120] Pirttimaki, Virpi.Comparative Study and Analysis of the Intelligence Activities of LargeFinnish Companies[J].Journal of Competitive Intelligence and Management,V4/1, January2007:132-155
    [121] Sawka, Ken.The competitive intelligence analyst resume[J]. Competitive IntelligenceMagazine,July/August2004,7/4:p42-43
    [122] Sawka, Kenneth.Your company's new foray into competitive intelligence:factors forsuccess[J]. Competitive Intelligence Magazine,2009,12(1):8-10.
    [123] Serenko, A., N. Bontis, and E. Hull, Practical relevance of knowledge management andintellectual capital scholarly research: Books as knowledge translation agents. Knowledgeand process management,2011,18(1): p.1-9.
    [124] Smith, Jamie; Kossou, Leila.The Emergence and Uniqueness of Competitive Intelligencein France[J].Journal of Competitive Intelligence and Management, V4/3March2008:63-85.
    [125] Stankeviciute, Jolanta.Competitive intelligence in Lithuania[J].Journal of CompetitiveIntelligence and Management[J].Journal of Competitive Intelligence and Management, V2N4, Winter2004:32-41
    [126] Tian, Robert.Cross cultural strategies for competitive intelligence[J]. CompetitiveIntelligence Magazine,Sept/October2004,7/5: p.17-22[J]. Competitive IntelligenceMagazine,
    [127] Vivers, Wilma; Miller, Marie-Luce.The evolution of competitive intelligence in SouthAfrica: early980s-2003[J].Journal of Competitive Intelligence and Management,V2N2,Summer2004:53-67
    [128] Wright, Sheila.The CI marketing interface[J].Journal of Competitive Intelligence andManagement,V3N2, Fall2005:3-7
    [129] Wright, Sheila; Badr, Ahmad; Weiss, Arthur; Pickton, David.Competitive intelligencethrough UK eyes[J].Journal of Competitive Intelligence and Management, V2N2, Summer2004:68-87
    [130] Mário Franco, André Magrinho, Joaquim Ramos Silva.Competitive intelligence: A researchmodel tested on Portuguese firms[J].Business Process Management Journal,2011,17(2):
    [131] Bloodgood J M, Salisbury W D. Understanding the influence of organizational changestrategies on information technology and knowledge management strategies[J].DecisionSupport Systems,2001,31(1):55-69.
    [132] Franco Mário, Magrinho André, Silva R J. Competitive intelligence: A research modeltested on Portuguese firms[J]. Business Process Management Journal,2011,17(2)
    [133] Wikipedia. JohnMcCarthy(computer scientist)[EB/OL].(2008-10-07)[2008-12-10]. http://en.wikipedia. org/wiki/John_McCarthy_(computer_scientist).
    [134] IBM. Google and IBM announced university initiative to address internetscale computingchallenges [EB/OL].(2007-10-08)[2008-10-15]. http://www-03. ibm.com/press/us/en/pressrelease/22414.wss.
    [135] Buyya R, Yeo C S, Venugopal S. Market-Oriented Cloud Computing: Vision, Hype, andReality for Delivering IT Services as Computing Utilities[C]. IEEE. Proceedings of the10thIEEE International Conference on High Performance Computing and Communications,Dalian, China,2008. Los Alamitos, CA, USA: IEEE CS Press,2008:5-13
    [136] George Reese. Cloud Application Architectures.[M]. O'Reilly Media, Inc.USA.2009
    [137] Borthakur D. The hadoop distributed file system: Architecture and design
    [EB/OL]. http://hadoop.apache.org/common/docs/r0.18.3/hdfs_design.htm.l,2012-08-07.
    [138] Enomalism [EB/OL]. http://www.enomalism.com/,2012-08-07.
    [139] Nurmi D, et.al.2009. The eucalyptus open-source cloud-computing system
    [C]. In Proceedings of the9t'' IEEE/ACM International Symposium on ClusterComputing and the Grid,124-131
    [140] Peter Mell, Timothy Grance. The NIST Definition of Cloud Computing,, September2011.http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf,2012-8-10.
    [141] JONESM T. Cloud computing with Linux cloud computing platforms and applications
    [EB/OL].(2008-09-10)[2008-10-15]. http://www. ibm. com/developerworks/library/l-cloud-computing/.
    [142] Liebowitz, J. Building Organisational Intelligence: A Knowledge Management Primer.Boca Raton, CA: CRC Press.2000.
    [143] AchalakulT, Taylor5.AdistributedsPectral一screening PC Talgorithm[J].JoumalofParalleland Distributed ComPuting,2003,63(3):373一384.
    [144] AndersonTE, CullerDE,PattersonDA.Acasefor NOWetworksofworkstations)[J].IEEEmicro,1995,15(l):54-64.
    [145] APache.Welcome to A Pache HadooP!.httP://hadooP.apache.org/[EB/OL].2010.
    [146] AttlyaH,WelchJ.Distributed comPuting: fundamentals, simulations, andadvanced to Pics
    [M]: Wiley-Interscience,2004.
    [147] E.M.Awad and H.M.Ghaziri, Knowledge Management[M].New Jersey: Pearson Education,2004.
    [148] Efraim Turban, Ramesh Sharda, and Dursun Delen. Decision Support and BusinessIntelligence Systems (9th ed.)[M]. Upper Saddle River, NJ, USA: Prentice Hall Press,2010.23.
    [149] Vibert C. An Introduction to Online Competitive Intelligence Research[M]. United States:The Benjamin Group,2004.9.
    [150] Mike K. Innovation and competitiveness in South Africa: the case for competitiveintelligence as an instrument to make better use of information[J].South African Journal ofInformation Management,2005,7(1):1-2.
    [151] Lan Miles. Knowledge intensive business services: prospects and policies [J]. Foresight,2005,7(6):39-63.
    [152] Chris Styles, Paul G Patterson,Vinh Q La. Executive Insights: Exporting services toSoutheast Asia: lessons from Australian knowledge-based service exporters[J]. Journal ofInternational Marketing,2005,13(4):104-128.
    [153] Kong-rae Lee, séance Sang-wan Shim, Byung-seon Jeong, Jung-tae Hwang. Knowledgeintensive activities (KISAs) in Korea's innovation system[R].2002.
    [154] Stanat R. Building a document-based competitive intelligence system[C]. DSS-86Transactions. Sixth International DSS-86Conference on Decision Support Systems,1986:433-438.
    [155] Chen M.Application of a mathematical model of Information Retrieval (LSI) in competitiveintelligence system[C].Proceedings of the2004International Conference on ManagementScience&Engineering,2004,(1-2):437-440.
    [156] Gilad, B.&Gilad, T. The Business Intelligence System. New York: Amacon,1988
    [157] Deng ZH, Zhu TF, Luo L. Construction of competitive intelligence systembased-onSOA[C]. Proceedings of2008InternationalConferenceonSystemManagement,2008:531-537.
    [158] Maria Auxiliadora do Nascimento Melo, Denise Dumke de. A model for analyzing thecompetitive strategy of health plan insurers using a system of competitive intelligence. TheTQM Magazine,2007,19(3):206–216
    [159] Vouk M A. Cloud Computing-Issues, Research and Implementations [J]. Journal ofComputing and Information Technology,2008,16(4):235–246.
    [160] European Network and Information Security Agency. Cloud Computing: Benefits, Risksand Recommendations for Information Security[R/OL].(2009-11-01)[2010-03-12].http://www.enisa.europa.eu/act/rm/files/deliverables/cloudcomputing-risk-assessment/at_download/fullReport.
    [161] Buyya R, Yeo C S, Venugopal S. Market-Oriented Cloud Computing: Vision,Hype, andReality for Delivering IT Services as Computing Utilities[C]//IEEE.Proceedings of the10thIEEE International Conference on High PerformanceComputing and Communications,Dalian, China,2008. Los Alamitos, CA, USA:IEEE CS Press,2008:5-13
    [162] IDC. IT Cloud Services User Survey, pt.2: Top Benefits&Challenges[R/OL].(2008-10-2)[2009-01-21]. http://blogs.idc.com/ie/?p=210.
    [163] Brock J. Secure Cloud Computing? Depends on where the Cloudis[R/OL].(2008-09-18)[2008-11-28].http://www.bomgar.com/blog/remote_support/secure-cloud-computing.
    [164] Vaquero L M, Rodero-Merino L, Caceres J, et al. A Break in the Clouds:Towards a CloudDefinition[J]. ACM SIGCOMM Computer CommunicationReview,2008,39(1):50-55
    [165] Geelan J. Twenty One Experts Define Cloud Computing[R/OL].(2009-01-04)[2009-02-17].http://virtualization.sys-con.com/node/612375.
    [166] Foster I, Zhao Y, Raicu I, et al. Cloud Computing and Grid Computing360-DegreeCompared[C]//IEEE. Grid Computing Environments Workshop. NJUSA, IEEE ComputerSociety,2008:1-10
    [167] L Wang, J Tao, M Kunze. Scientific Cloud Computing: Early Definition andExperience.IEEE. Proceedings of10th IEEE International Conference on HighPerformance Computingand Communications, Dalian, China,2008:825-830
    [168] Chapin Information Services. Google Chrome Receives Lowest Password SecurityScore[R/OL].(2008-12-12)[2009-02-17]. http://www.info-svc.com/news/2008/12-12/.
    [169] Maria Auxiliadora do Nascimento Me′lo,Denise Dumke de Medeiros. A model foranalyzing the competitive strategy of health plan insurers using a system of competitiveintelligence. The TQM Magazine,Vol.19No.3,2007,pp.206
    [170] Yan C, Jin P Q, Yue LH. Ontology-driven extraction of enterprise competitive intelligencein the Internet[C].2008Second International Conference on Future GenerationCommunication and Networking Symposia,2008:35-38.
    [171] Pereira da Silva H. Competitive intelligence in the Internet: An intelligent agent basedprocess [J]. Ciência da Informacǎo,2003,32(1):115-134.
    [172] Hwee-Leng Ong, Ah-Hwee Tan, Jamie Ng, et al. FOCI: Flexible organizerforcompetitiveintelligence[C]. Proceedings ofthe2001ACMCIKM. Tenth International Conference onInformation and Knowledge Management,2001:523-525.
    [173] Fahey L. The Future Direction of Competitive Intelligence: Some Reflections[J].Competitive Intelligence Magazine,2009,12(1):17-22.
    [174] Gibbons P T, Prescott J E. Parallel competitive intelligence processes in organizations[J].International Journal of Technology Management,1996,11(1-2):162-178.
    [175] Saayman A, Pienaar J, de Pelsmacker P, et al. Competitive intelligence: Constructexploration, validation and equivalence[C]. ASLIB Proceedings,2008,60(4):383-411.
    [176] Marteau P F, Krumeich C. Semantic analysis of text applied to competitive intelligence[C].IDT95.12th Conference Proceedings,1995:258-265.
    [177] Llanes LM, Cartaya J C, Andrade R E. Some information analysis techniques for thecompetitive intelligence process[J].FID Review,1999,1(4-5):64-71.
    [178] Gilmore J, Pagels M, PalkJ. ProjectX: Competitive intelligence data mining and analysis
    [C]. Data Mining and Knowledge Discovery: Theory, Tools and Technology III,2001:258-266.
    [179] TarapanoffK, Gomes da Nobrega R, CormierPMJ. Competitive intelligence and scenarios:Amethodological proposal for a case study in Brazil[J]. FID Review,1999,1(4-5):31-41.
    [180] ArmstrongHL, Davey J. Assembling competitive intelligence using classroom scenarios[J].Security Education and Critical Infrastructures,2003,125:159-167.
    [181] Vriens, D.&Philips, E.A. Business intelligence als informatievoorziening voor destrategievorming. In E.A. Philips&D. Vriens (Eds.), Business Intelligence. Deventer:Kluwer,1999:33
    [182] Prescott, J.E.&Fleisher, C.S. SCIP: Who we are, what we do. Competitive IntelligenceReview,1991,2(11):22
    [183] Lisabeth G. Dashman. The Value of In-House Competitive Intelligence Department: ABusiness Plan Approach. Competitive Intelligence Review, Vol.9(2),1998:16
    [184] Larry Carvalho, Your Position in the Cloud Ecosystem,7thCloud Computing Conference&Expo,2010.11
    [185] Tom White, Hadoop: The Definitive Guide[M], O’REILLY,2009:12-13.
    [186] Peter Mika.Distributed Indexing for Semantic Search[C]. Proceedings of the3rdInternational Semantic Search Workshop.New York:ACM,2010.
    [187] Ricardo Baeza-Yates,Raghu Ramakrishnan.Data Challenges at Yahoo![C]. Proceedings ofthe11th international conference on Extending database technology: Advances in databasetechnology.New York:ACM,2008,652-655.
    [188] Azza Abouzied,Kamil Bajda-Pawlikowski,Jiewen Huang,Daniel J. Abadi. HadoopDB inaction: building real word applications[C]. Proceedings of the2010international conferenceon Management of data.New York:ACM,2010.
    [189] Malcolm Slaney,Edward Y. Chang.Processing Web-Scale Multimedia Data[C]Proceedingsof the international conference on Multimedia.New York:ACM,2010,1771-1772.
    [190] Moira Burke,Cameron Marlow,Thomas Lento.Feed Me: Motivating NewcomerContribution in Social Network Sites[C].Proceedings of the27th international conference onHuman factors in computing systems. New York:ACM,2009,945-954.
    [191] HAMILTON, J. Cost of Power in Large-Scale Data Centers [online]. November2008.Available from:http://perspectives.mvdirona.com/2008/11/28/CostOfPowerInLargeScaleDataCenters.aspx.
    [192] FeIfemig, A., Friedrich, G.,&Jannach, D.. Conceptual modeling for configuration ofmass customizable products. Artificial Intelligence in Engineering,2001,15(2):165-176.
    [193] Bouthillier,France.;Shearer, Kathleen. Medford. Assessing Competitive IntelligenceSoftware: A Guide to Evaluating CI Technology. N.J.Information Today,2003.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700