1 习近平: 坚持总体国家安全观, 走中国特色国家安全道路[EB/OL]. (2014-04-16) [2021-10-29]. http://cpc.people.com.cn/n/2014/0416/c64094-24900492.html. 2 Smiljanic D. Development of the Croatian national security strategy in the hybrid threats context[J]. Croatian International Relations Review, 2017, 23(80): 97-129. 3 严鼎程. 李德哈特间接路线战略思想研究[D]. 北京: 中共中央党校, 2018. 4 杨毅. 国家安全战略理论[M]. 北京: 时事出版社, 2008. 5 黄大富. 国防发展战略: 中国军事百科全书[M]. 北京: 中国大百科全书出版社, 2008. 6 刘跃进. 中国官方非传统安全观的历史演进与逻辑构成[J]. 国际安全研究, 2014, 32(2): 117-129, 159. 7 Bailes A J K. Strategy papers on the Arctic or High North: a comparative study and analysis[M]. Islandiae: Sigillum Universitatis, 2012. 8 Finnemore M, Sikkink K. International norm dynamics and political change[J]. International Organization, 1998, 52(4): 887-917. 9 Balcazar Villareal M I. Modernization of the strategic intelligence system for national security in Mexico[J]. Revista de Estudios en Seguridad Internacional-Resi, 2019, 5(1): 71-81. 10 Xiao X. China's national security: strategic challenges and choices[J]. China: An International Journal, 2016, 14(1): 171-181. 11 毛欣娟. 国家安全学科体系构建的内在逻辑与基本面向[J]. 情报杂志, 2021, 40(1): 99-103, 200. 12 Cederberg A, Eronen P. How can societies be defended against hybrid threats?[R]. Strategic Security Analysis, 2015(9): 1-10. 13 Loch K D, Carr H H, Warkentin M E. Threats to information systems: today's reality, yesterday's understanding[J]. MIS Quarterly, 1992, 16(2): 173-186. 14 Janczewski L J, Caelli W. Cyber conflicts and small states[M]. New York: Routledge, 2016. 15 AlGhamdi S, Win K T, Vlahu-Gjorgievska E. Information security governance challenges and critical success factors: systematic review[J]. Computers & Security, 2020, 99: 102030. 16 Betts R K. Enemies of intelligence: knowledge and power in American national security[M]. New York: Columbia University Press, 2007: 67. 17 陈明, 汤文峤. 网络空间安全战略情报保障能力的影响因素及对策研究[J]. 情报杂志, 2021, 40(2): 111-115, 82. 18 王延飞, 赵柯然, 陈美华, 等. 情报感知的研究解析[J]. 情报理论与实践, 2018, 41(8): 1-4. 19 吕宏玉, 杨建林. 基于模板的国家战略情报需求识别研究[J]. 情报理论与实践, 2019, 42(11): 8-14. 20 巴志超, 李纲, 安璐, 等. 国家安全大数据综合信息集成: 应用架构与实现路径[J]. 中国软科学, 2018(7): 9-20. 21 朱宇倩, 王秉. 安全情报感知与分析模型研究[J]. 情报理论与实践, 2021, 44(6): 69-75. 22 雷帅, 李晓松, 陈敬一. 基于WSR-RDJF国防科技战略情报研究的方法框架[J]. 情报理论与实践, 2020, 43(10): 25-30. 23 Sauerwein C, Pekaric I, Felderer M, et al. An analysis and classification of public information security data sources used in research and practice[J]. Computers & Security, 2019, 82: 140-155. 24 IEC I. Information technology-security techniques-Information security management systems-overview and vocabulary[S]. The Spanish Association for Standardization and Certification, 2014. 25 余志伟. 面向业务过程的信息系统安全需求识别方法及其关键技术研究[D]. 杭州: 浙江大学, 2006. 26 Russell N, ter Hofstede A H M, Edmond D, et al. Workflow data patterns: identification, representation and tool support[C]//Proceedings of the International Conference on Conceptual Modeling. Heidelberg: Springer, 2005: 353-368. 27 张尧学, 窦郁宏, 陈松乔, 等. 程序挖掘的用户需求获取与分解[J]. 计算机工程与科学, 2003, 25(1): 1-5. 28 Clark R M. Intelligence analysis: estimation & prediction paperback[M]. Baltimore: Amer Literary Press, 1996: 332. 29 Mursu á, Luukkonen I, Toivanen M, et al. Activity Theory in information systems research and practice: theoretical underpinnings for an information systems development model[J]. Information Research, 2007, 12(3): paper 311. 30 Lim K. Big data and strategic intelligence[J]. Intelligence and National Security, 2016, 31(4): 619-635. 31 王延飞, 陈美华, 赵柯然, 等. 国家科技情报治理的研究解析[J]. 情报学报, 2018, 37(8): 753-759. 32 马晓娟, 陈烨, 闻杰, 等. 战略情报预测模型的作用机理与价值述评[J]. 情报杂志, 2020, 39(8): 6-15. 33 沙勇忠, 徐瑞霞. 基于AT的应急信息需求分析: 框架及实证研究[J]. 信息资源管理学报, 2011, 1(2): 32-48. 34 高金虎. 论战略情报与战略决策的关系——基于美国情报界的历史考察[J]. 情报杂志, 2021, 40(1): 1-11, 18. 35 Herring J P. Building a business intelligence system[J]. Journal of Business Strategy, 1988, 9(3): 4-9. 36 卢英佳. 《爱尔兰国家网络安全战略》简析[J]. 中国信息安全, 2020(9): 64-66. 37 不减反增! 华为再发力, 爱尔兰利润不受5G影响![EB/OL]. (2019-12-12) [2021-01-07]. https://baijiahao.baidu.com/s?id=1652715608662768413&wfr=spider&for=pc.