<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1d1 20130915//EN" "JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">SDQ</journal-id><journal-title-group><journal-title>Security &amp; Defence Quarterly</journal-title><abbrev-journal-title>SDQ</abbrev-journal-title></journal-title-group><issn pub-type="epub">2544-994X</issn><issn pub-type="ppub">2300-8741</issn><publisher><publisher-name>Akademia Sztuki Wojennej</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">SDQ-48-00367</article-id><article-id pub-id-type="doi">10.35467/sdq/192342</article-id><article-categories><subj-group subj-group-type="heading"><subject>RESEARCH PAPER</subject></subj-group></article-categories><title-group><article-title>Leveraging competitive intelligence in offensive cyber counterintelligence: An operational approach for the shipping industry</article-title></title-group><contrib-group content-type="authors"><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0009-0001-1875-9264</contrib-id><name><surname>Kanellopoulos</surname><given-names>Anastasios-Nikolaos</given-names></name><email>ankanell@aueb.gr</email></contrib><contrib contrib-type="author"><name><surname>Ioannidis</surname><given-names>Antonios</given-names></name></contrib><aff id="aff1">Department of Business Administration, Athens University of Economics and Business, Patision 76, 112 57, Athens, Greece</aff></contrib-group><pub-date pub-type="epub"><day>25</day><month>10</month><year>2024</year></pub-date><volume>48</volume><issue>1</issue><fpage>1</fpage><lpage>20</lpage><history><date date-type="received"><day>26</day><month>04</month><year>2024</year></date><date date-type="rev-recd"><day>12</day><month>07</month><year>2024</year></date><date date-type="accepted"><day>14</day><month>08</month><year>2024</year></date></history><permissions><copyright-statement>© 2024 A-N. Kanellopoulos, A. Ioannidis published by War Studies University, Poland.</copyright-statement><copyright-year>2024</copyright-year><license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0"><license-p>This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (<ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/">http://creativecommons.org/licenses/by/4.0/</ext-link>).</license-p></license></permissions><abstract><p>In the contemporary landscape of rapid digitalisation, the shipping industry is increasingly confronted with unparalleled cybersecurity threats, necessitating a transition towards proactive strategies to address these evolving risks. Traditional methodologies have proven inadequate, thereby necessitating the integration of competitive intelligence (CI) within offensive cyber counterintelligence (OCCI) frameworks. This paper investigates the interdependent relationship between CI and OCCI, underscoring their combined potential to safeguard organisational interests and enhance cybersecurity resilience. The primary objectives of this study are to elucidate the foundational principles and significance of CI within business contexts, to explore the theoretical underpinnings of OCCI, and to propose a structured framework for the integration of CI into OCCI operations specifically tailored to the shipping sector. Theoretical constructs highlight the critical importance of proactive measures in mitigating cyber threats and sustaining a competitive advantage in the digital era. Through a comprehensive analysis of the literature, this interdisciplinary approach provides practitioners with the opportunity to evaluate and implement the proposed framework. The insights garnered from this study hold significant implications for both academic research and industry practice, promoting ongoing collaboration in the development of robust frameworks for integrating CI within OCCI operations.</p></abstract><kwd-group><kwd>strategic management</kwd><kwd>competitive intelligence</kwd><kwd>offensive counterintelligence</kwd><kwd>shipping industry</kwd><kwd>organisational resilience</kwd></kwd-group></article-meta></front><body><sec id="S1"><title>Introduction</title><p>In the contemporary era characterised by rapid digitalisation, the shipping industry faces an unprecedented spectrum of cybersecurity threats. Traditional approaches to cyber counterintelligence have proven inadequate, necessitating a proactive stance from stakeholders to counteract the evolving strategies of cyber adversaries. As cyberattacks become increasingly sophisticated, targeting critical infrastructure and sensitive data, organisations within the shipping industry are increasingly vulnerable to disruptions and financial losses. Recognising the imperative to strengthen defences against such threats, industry participants are adopting innovative strategies that leverage competitive intelligence (CI) to enhance their cyber counterintelligence capabilities. CI emerges as an essential tool in this context, facilitating the anticipation, mitigation, and neutralisation of cyber threats. This paper aims to elucidate the role of CI in augmenting offensive cyber counterintelligence (OCCI) strategies within the shipping industry. By providing a comprehensive review of the literature on CI and OCCI, it presents businesses with a strategic, tactical, and operational framework to more effectively address complex cyber threats. Through an analysis of conceptual frameworks and theoretical foundations, the paper clarifies the fundamental principles and contemporary significance of CI in business contexts. Finally, it proposes that the integration of these insights can enhance the strategic capabilities of businesses in the shipping industry.</p></sec><sec id="S2"><title>Competitive intelligence</title><sec id="S2_1"><title>Competitive intelligence definitions</title><p>Competitive intelligence stands as a linchpin in contemporary business strategy, intricately interwoven with the dynamic and multifaceted macro business environment. Its roots can be traced back to military intelligence practices, where it initially served as a strategic tool for gaining advantage (<xref ref-type="bibr" rid="ref38">Franco et al., 2011</xref>, pp. 1–3; <xref ref-type="bibr" rid="ref48">Greene, 1966</xref>, pp. 1–25). Over time, CI has evolved into a legal framework extensively utilised by businesses to gather, process, and analyse qualitative data pertaining to specific industries and their competitive dynamics (<xref ref-type="bibr" rid="ref19">Carvalho, 2021</xref>). This systematic approach enables organisations to glean profound insights into competitor behaviours, customer preferences, and broader market trends, facilitating astute decision-making processes crucial for sustaining competitiveness and achieving strategic goals (<xref ref-type="bibr" rid="ref25">Dabrowski, 2018</xref>, pp. 1–8).</p><p>Initially, scholarly discourse surrounding CI has produced a plethora of definitions, reflecting its multifaceted nature and strategic significance within organisational contexts. <xref ref-type="bibr" rid="ref84">Sawka (1996)</xref> defines CI as the acquisition of knowledge and foresight regarding the external operational environment, underscoring its pivotal role in shaping decision-making processes and furnishing a comprehensive understanding of the business landscape. <xref ref-type="bibr" rid="ref18">Calof (1997)</xref> elaborates on this, characterising CI as the timely dissemination of fact-based data pivotal for decision-making and strategy development. This encompasses a multifaceted approach encompassing industry analysis, competitive assessment, and benchmarking practices. <xref ref-type="bibr" rid="ref78">Prescott (1999)</xref> extends this conceptualisation, portraying CI as an iterative process geared towards developing actionable insights into competitive dynamics and non-market forces, aiming to confer sustainable competitive advantages to organisations.</p><p>Moreover, <xref ref-type="bibr" rid="ref62">Leibowitz (2006)</xref> underscores CI as a meticulously structured programme designed to capture, manage, and analyse intelligence, thereby enhancing the efficacy of strategic decision-making processes. <xref ref-type="bibr" rid="ref65">McGonagle and Vella (2002)</xref> adopt a data-centric perspective, positing CI as the strategic utilisation of publicly sourced data to glean insights into competitor behaviours and prevailing market conditions. <xref ref-type="bibr" rid="ref28">Dishman and Pearson (2003)</xref> accentuate CI as a proactive endeavour aimed at amassing information and intelligence to pre-empt competitors in the cut-throat business environment. <xref ref-type="bibr" rid="ref15">Bose (2008)</xref> portrays CI as an ongoing process of vigilantly monitoring the competitive landscape to inform strategic and operational manoeuvres effectively. In addition, within this academic tapestry, <xref ref-type="bibr" rid="ref93">Strauss and Du Toit (2010)</xref> frame CI as an evolutionary assessment of business environment opportunities and developments, each carrying strategic implications for corporate decision-making endeavours. <xref ref-type="bibr" rid="ref72">Pellissier and Nenzhelele (2013)</xref> contribute by conceptualising CI as a holistic process that synthesises actionable intelligence through meticulous data collection, processing, and analysis, both internally and externally. <xref ref-type="bibr" rid="ref16">Bouthillier and Jin (2005)</xref> accentuate the value-added proposition of CI, emphasising its role in collecting, analysing, and disseminating intelligence within a legal framework conducive to strategic advantage.</p><p>Subsequently, the absence of a universally recognised definition of CI persists; its profound impact on organisational resilience and strategic acumen remains unequivocal, in both academic discourse and practical application. Additionally, contributions from various scholars, such as <xref ref-type="bibr" rid="ref14">Boncella (2003)</xref>, <xref ref-type="bibr" rid="ref18">Calof (1997)</xref>, and <xref ref-type="bibr" rid="ref35">Ettore (1995)</xref>, underscore the ethical and legal dimensions of CI, highlighting its role as a legitimate means of acquiring and leveraging CI for strategic decision-making purposes. This amalgamation of perspectives underscores the multifaceted nature of CI, illuminating its pivotal role in navigating the complexities of the contemporary business landscape and achieving sustainable competitive advantage (<xref ref-type="bibr" rid="ref64">Markovich et al., 2022</xref>, pp. 8–14; <xref ref-type="bibr" rid="ref93">Strauss and Du Toit, 2010</xref>, pp. 4–8).</p></sec><sec id="S2_2"><title>Competitive intelligence process</title><p>Competitive intelligence operates as a multifaceted framework designed to equip decision-makers with actionable insights essential for navigating the complexities of contemporary business environments (<xref ref-type="bibr" rid="ref78">Prescott, 1999</xref>, pp. 1–14). CI projects serve as invaluable assets in preserving organisational leadership amidst evolving landscapes by proactively identifying and managing emerging challenges and uncertainties through informed intelligence acquisition (<xref ref-type="bibr" rid="ref4">Aguilar, 1967</xref>, pp. 18–35; <xref ref-type="bibr" rid="ref12">Barnea, 2021</xref>, pp. 1–10; <xref ref-type="bibr" rid="ref22">Cloutier, 2013</xref>, pp. 1–16; <xref ref-type="bibr" rid="ref30">Du Toit, 2015</xref>, pp. 1–6; <xref ref-type="bibr" rid="ref66">Miller, 2001</xref>, pp. 1–14; <xref ref-type="bibr" rid="ref91">Stack, 1998</xref>, pp. 1–10; <xref ref-type="bibr" rid="ref100">Zha and Chen, 2009</xref>, pp. 1–5;). This process of disseminating intelligence and knowledge to executive stakeholders underscores the pivotal role of CI in shaping strategic business outcomes (<xref ref-type="bibr" rid="ref17">Boyd and Fulk, 1996</xref>, pp. 12–17; <xref ref-type="bibr" rid="ref23">Cottrill, 1998</xref>, pp. 2–5; <xref ref-type="bibr" rid="ref41">García-Madurga and Esteban-Navarro, 2020</xref>, pp. 2–16; <xref ref-type="bibr" rid="ref77">Pranjic, 2011</xref>, pp. 2–15; <xref ref-type="bibr" rid="ref95">Tahmasebifard, 2018</xref>, pp. 2–12). However, the integration of CI into organisational decision-making processes is often challenged by the reluctance of decision-makers to acknowledge the value of CI products, relying instead on personal knowledge and experiences (<xref ref-type="bibr" rid="ref25">Dabrowski, 2018</xref>, pp. 1–8; <xref ref-type="bibr" rid="ref40">Gaidelys and Meidute, 2012</xref>, pp. 1–6). Addressing the demand for CI expertise within corporations necessitates a collaborative approach, wherein CI practitioners and decision-makers actively engage in a bidirectional exchange of intelligence (<xref ref-type="bibr" rid="ref66">Miller, 2001</xref>, pp. 1–14). This symbiotic relationship hinges on management’s willingness to gain insights into the business environment and CI practitioners’ capacity to operate within a standardised framework (<xref ref-type="bibr" rid="ref45">Ghoshal and Westney, 1991</xref>, pp. 1–15; <xref ref-type="bibr" rid="ref87">Sewdass, 2012</xref>, pp. 1–12; <xref ref-type="bibr" rid="ref95">Tahmasebifard, 2018</xref>, pp. 2–12). Thus, CI should be conceptualised not merely as a discrete department but also as a strategic management tool integrated across organisational functions (<xref ref-type="bibr" rid="ref81">Ruhli and Sachs, 1997</xref>, pp. 1–9; <xref ref-type="bibr" rid="ref96">Viviers et al., 2005</xref>, pp. 2–11).</p><p>Furthermore, CI collected from a broad spectrum of the business’ external environment encompasses a range of scanning activities tailored to uncover specific market characteristics and trends (<xref ref-type="bibr" rid="ref1">Abraham, 2012</xref>, pp. 57–85; <xref ref-type="bibr" rid="ref9">Babbar and Rai, 1993</xref>, pp. 1–10; <xref ref-type="bibr" rid="ref22">Cloutier, 2013</xref>, pp. 1–16; <xref ref-type="bibr" rid="ref51">Hedin, 2004</xref>, pp. 1–9). <xref ref-type="bibr" rid="ref43">Gelb and Zinkhan (1985)</xref> characterise CI as a blend of defensive and offensive intelligence aimed at deciphering competitors’ plans, strategies, weaknesses, and opportunities. At the heart of the CI process lie raw data and information collected for the organisation (<xref ref-type="bibr" rid="ref74">Pirttimäki, 2007</xref>, pp. 15–23; <xref ref-type="bibr" rid="ref99">Wright, 2010</xref>, pp. 3–6), which are transformed into actionable insights through rigorous analysis and utilisation of CI analysts’ expertise (<xref ref-type="bibr" rid="ref17">Boyd and Fulk, 1996</xref>, pp. 12–17; <xref ref-type="bibr" rid="ref23">Cottrill, 1998</xref>, pp. 2–5; <xref ref-type="bibr" rid="ref61">Kump et al., 2018</xref>, pp. 2–16; <xref ref-type="bibr" rid="ref90">Sliton, 1998</xref>, p. 17; <xref ref-type="bibr" rid="ref95">Tahmasebifard, 2018</xref>, pp. 2–12).</p><p>Moreover, CI is not solely about data collection but also about enhancing organisational value through proactive intelligence analysis that informs strategic decision-making (<xref ref-type="bibr" rid="ref8">Auster and Choo, 1994</xref>, pp. 1–12; <xref ref-type="bibr" rid="ref27">David, 2013</xref>, pp. 19–22; <xref ref-type="bibr" rid="ref54">Johns and Van Doren, 2010</xref>, pp. 3–6; <xref ref-type="bibr" rid="ref55">Johnson et al., 2009</xref>, pp. 131–162; <xref ref-type="bibr" rid="ref79">Prescott, 2001</xref>, pp. 2–14). This dynamic process involves generating intelligence products ranging from real-time alerts to strategic insights, thereby empowering organisations to anticipate market shifts and formulate informed strategies (<xref ref-type="bibr" rid="ref41">García-Madurga and Esteban-Navarro, 2020</xref>, pp. 2–16; <xref ref-type="bibr" rid="ref75">Porter, 1991</xref>, pp. 1–21; <xref ref-type="bibr" rid="ref86">Seng Yap et al., 2013</xref>, pp. 3–9). Additionally, the effectiveness of CI hinges not solely on resource allocation but also on the cultivation of a culture of intelligence analysis within the organisation, fostering knowledge-sharing and continuity irrespective of resource availability (<xref ref-type="bibr" rid="ref9">Babbar and Rai, 1993</xref>, pp. 1–10; <xref ref-type="bibr" rid="ref39">Frates and Sharp, 2005</xref>, pp. 2–10; <xref ref-type="bibr" rid="ref42">Gaspareniene et al., 2013</xref>, pp. 1–5; <xref ref-type="bibr" rid="ref67">Miller, 2005</xref>, pp. 1–3; <xref ref-type="bibr" rid="ref71">Peddie, 1992</xref>, pp. 1–4; <xref ref-type="bibr" rid="ref77">Pranjic, 2011</xref>, pp. 2–15; Tej<xref ref-type="bibr" rid="ref3">Adidam et al., 2009</xref>, pp. 3–15; <xref ref-type="bibr" rid="ref96">Viviers et al., 2005</xref>, pp. 2–11).</p><p>Ultimately, the success of CI processes relies on decision-makers’ recognition of its value proposition and their commitment to integrating intelligence into strategic decision-making processes (<xref ref-type="bibr" rid="ref66">Miller, 2001</xref>, pp. 1–14). By leveraging CI insights, organisations gain a competitive edge in swiftly adapting to market dynamics and making informed decisions that drive sustainable growth (<xref ref-type="bibr" rid="ref23">Cottrill, 1998</xref>, pp. 2–5; <xref ref-type="bibr" rid="ref29">Du Plessis and Gulwa, 2016</xref>, pp. 1–6; <xref ref-type="bibr" rid="ref60">Kars-Unluoglu and Kevill, 2021</xref>, pp. 2–5; <xref ref-type="bibr" rid="ref95">Tahmasebifard, 2018</xref>, pp. 2–12). The ongoing refinement of the CI process ensures that decision-makers are equipped with timely and relevant intelligence, enabling them to navigate the complexities of the business landscape with confidence and foresight (<xref ref-type="bibr" rid="ref36">Fahey and Herring, 2007</xref>, pp. 2–8; <xref ref-type="bibr" rid="ref52">Heppes and Du Toit, 2009</xref>, pp. 3–10; <xref ref-type="bibr" rid="ref83">Sapkauskiene and Leitoniene, 2010</xref>, pp. 1–8). In essence, CI serves as a strategic imperative for organisations seeking to sustain a competitive advantage in an increasingly dynamic and uncertain business environment.</p></sec></sec><sec id="S3"><title>Understanding offensive cyber counterintelligence</title><sec id="S3_1"><title>Conceptual foundations</title><p>Counterintelligence operates on dual fronts, encompassing both defensive and offensive dimensions, with the overarching goal of safeguarding sensitive information and thwarting hostile activities perpetrated by adversaries (<xref ref-type="bibr" rid="ref11">Barnea, 2017</xref>, pp. 715–726; <xref ref-type="bibr" rid="ref57">Kanellopoulos, 2022</xref>, pp. 2–6; <xref ref-type="bibr" rid="ref80">Prunckun, 2019</xref>, pp. 163–206; <xref ref-type="bibr" rid="ref98">Wettering, 2000</xref>, pp. 265–300). In the realm of cybersecurity, counterintelligence assumes heightened importance, particularly due to the asymmetric nature of cyber warfare (<xref ref-type="bibr" rid="ref33">Duvenage and Solms, 2014</xref>, pp. 5–6). On the defensive front, counterintelligence entails the implementation of robust security measures to fortify organisational defences against cyber threats (<xref ref-type="bibr" rid="ref59">Kanellopoulos, 2023</xref>, pp. 1–6). This includes measures such as access controls, encryption protocols, and network monitoring systems aimed at detecting and mitigating potential intrusions. By proactively identifying vulnerabilities and deploying defensive countermeasures, organisations can mitigate the risk of data breaches, espionage, and other malicious activities aimed at compromising their assets (<xref ref-type="bibr" rid="ref32">Duvenage et al., 2017</xref>, pp. 6–8).</p><p>However, defensive measures alone are insufficient to contend with the evolving threat landscape of cyber warfare. As adversaries employ increasingly sophisticated tactics to exploit vulnerabilities and infiltrate networks, a proactive approach is imperative (<xref ref-type="bibr" rid="ref82">Sangher et al., 2023</xref>, pp. 1–6; <xref ref-type="bibr" rid="ref89">Sigholm and Bang, 2013</xref>, pp. 1–6). This is where the offensive dimension of counterintelligence comes into play. Offensive counterintelligence involves pre-emptive actions aimed at disrupting adversaries’ operations, gathering intelligence on their activities, and neutralising their capabilities. This may include the infiltration of adversary networks, disinformation campaigns, and offensive cyber operations designed to degrade their infrastructure and disrupt their strategic objectives (<xref ref-type="bibr" rid="ref31">Duvenage et al., 2018</xref>, pp. 2–14).</p><p>In the context of cyber operations, offensive counterintelligence serves as a force multiplier, enabling organisations to turn the tables on adversaries and proactively defend their interests. By gathering intelligence on potential threats and adversaries’ tactics, techniques, and procedures (TTPs), organisations can anticipate and pre-emptively counter malicious activities before they escalate into full-blown cyberattacks (<xref ref-type="bibr" rid="ref33">Duvenage and Solms, 2014</xref>, pp. 7–15; <xref ref-type="bibr" rid="ref31">Duvenage et al., 2018</xref>, pp. 2–14; <xref ref-type="bibr" rid="ref94">Svilicic et al., 2019</xref>, pp. 2–12). Moreover, offensive counterintelligence allows organisations to disrupt adversaries’ command and control structures, degrade their capabilities, and undermine their ability to execute coordinated cyber operations effectively (<xref ref-type="bibr" rid="ref89">Sigholm and Bang, 2013</xref>, pp. 1–6).</p><p>For instance, real-world examples highlight the significance of OCCI in thwarting cyber threats. The Stuxnet malware, discovered in 2010, represents a paradigmatic case of offensive cyber operations deployed for counterintelligence purposes (<xref ref-type="bibr" rid="ref56">Kaminska et al., 2021</xref>, pp. 1–14). Jointly orchestrated by American and Israeli intelligence agencies, Stuxnet targeted Iran’s nuclear enrichment facilities, sabotaging centrifuge equipment through sophisticated cyberattacks, showcasing how offensive cyber capabilities can disrupt adversaries’ critical infrastructure (<xref ref-type="bibr" rid="ref76">Pöyhönen and Lehto, 2022</xref>, pp. 1–9).</p><p>Moreover, OCCI incorporates elements of psychological warfare and strategic deception. Disseminating carefully crafted disinformation can sow confusion and mistrust among potential threat actors, disrupting their operations. For example, a financial institution might strategically leak false information about advanced security protocols to deter cybercriminals from targeting their systems, creating a perceived risk-reward imbalance (<xref ref-type="bibr" rid="ref24">Cybersecurity and Infrastructure Security Agency (CISA), 2021</xref>, pp. 3–14; <xref ref-type="bibr" rid="ref56">Kaminska et al., 2021</xref>, pp. 1–14).</p><p>Additionally, the asymmetric nature of cyber warfare further underscores the importance of offensive counterintelligence. Unlike traditional warfare, where adversaries may possess comparable military capabilities, cyber warfare often pits technologically advanced actors against less equipped opponents (<xref ref-type="bibr" rid="ref53">Jaquire and Solms, 2017</xref>, pp. 1–9). In such scenarios, offensive counterintelligence becomes a critical tool for levelling the playing field and deterring adversaries from targeting vulnerable assets (<xref ref-type="bibr" rid="ref31">Duvenage et al., 2018</xref>, pp. 2–14).</p></sec><sec id="S3_2"><title>Discussion on therelationship between CI and OCCI</title><p>The interplay between OCCI and CI signifies a critical nexus within the realm of cybersecurity strategy, offering organisations a potent amalgamation to fortify their cyber resilience. CI serves as a foundational element, providing organisations with a comprehensive understanding of their competitive landscape, encompassing the strategies, capabilities, and vulnerabilities of rival entities (<xref ref-type="bibr" rid="ref64">Markovich et al., 2022</xref>, pp. 8–14; <xref ref-type="bibr" rid="ref93">Strauss and Du Toit, 2010</xref>, pp. 4–8). Fundamentally, the CI process entails the meticulous gathering of information and intelligence concerning the business environment, thereby forming the informational bedrock for OCCI endeavours. By leveraging insights gleaned from CI, OCCI operations can be intricately tailored to anticipate and counter emergent cyber threats effectively (<xref ref-type="bibr" rid="ref31">Duvenage et al., 2018</xref>, pp. 2–14).</p><p>To illustrate, consider a scenario where a leading technology firm invests substantially in CI efforts to ascertain the market strategies and technological advancements of its industry peers. Through its CI initiatives, the firm uncovers indications that a competitor is clandestinely engaging in cyber espionage activities, aiming to pilfer proprietary research and development data. Armed with this intelligence, the firm’s OCCI team springs into action, implementing proactive measures to fortify its digital infrastructure and actively monitor for potential intrusions. Consequently, when the adversary launches a cyberattack targeting the firm’s intellectual property, the OCCI defences swiftly thwart the incursion, preserving the integrity of the organisation’s sensitive assets.</p><p>Moreover, the symbiotic relationship between CI and OCCI extends beyond mere defensive measures, fostering strategic advantages within competitive landscapes. By integrating CI insights into OCCI frameworks, organisations can gain a nuanced understanding of adversary tactics and methodologies, thereby pre-emptively adapting their business strategies to mitigate risks and capitalise on emerging opportunities. For instance, consider a global pharmaceutical company confronted with escalating cyber-espionage campaigns aimed at stealing proprietary drug formulas. Utilising CI, the company identifies specific threats posed by these cyberattacks and assesses their potential impact on ongoing research and product development initiatives. Armed with this intelligence, the company strategically adjusts its product development timelines, accelerating critical projects while reinforcing cybersecurity measures to safeguard its research pipeline. In response to these identified threats, the pharmaceutical company implements proactive measures, including enhanced monitoring of digital communications, robust encryption protocols, and advanced threat detection technologies. These efforts not only bolster the company’s defensive capabilities against cyber threats but also enable proactive engagement with regulatory bodies to ensure compliance with data protection regulations. Subsequently, the integration of CI into OCCI frameworks allows the pharmaceutical company to more effectively anticipate competitive moves in the market. By understanding the tactics and methodologies employed by adversaries attempting to compromise their intellectual property, the company can pre-emptively adjust its market strategies. For example, insights gained from OCCI may inform decisions to expand partnerships with secure research facilities or to prioritise patent filings for new drug discoveries ahead of schedule.</p><p>Furthermore, OCCI operations can reciprocate by bolstering CI endeavours, providing valuable insights into the modus operandi of adversaries and elucidating emerging trends within the competitive landscape (<xref ref-type="bibr" rid="ref41">García-Madurga and Esteban-Navarro, 2020</xref>, pp. 2–16; <xref ref-type="bibr" rid="ref75">Porter, 1991</xref>, pp. 1–21; <xref ref-type="bibr" rid="ref86">Seng Yap et al., 2013</xref>, pp. 3–9). For example, a financial institution integrates OCCI findings into its CI analyses, uncovering indications of a coordinated cyberattack campaign orchestrated by a rival bank seeking to undermine customer confidence. Armed with this intelligence, the institution proactively fortifies its cybersecurity defences and enhances its customer outreach initiatives, thereby pre-empting reputational damage and consolidating its market position.</p></sec></sec><sec id="S4"><title>Shipping industry cyber threats</title><p>The contemporary shipping Industry exhibits an escalating reliance on interconnected digital infrastructures, rendering it inherently vulnerable to a diverse array of targeted cyber threats. These threats, ranging from ransomware attacks to phishing schemes and supply chain breaches, pose substantial risks to both shipping operations and the broader spectrum of global trade activities. The pervasive digitalisation and automation within maritime operations have rendered vessels, ports, and logistical networks particularly susceptible to exploitation by malicious entities seeking to exploit systemic vulnerabilities (<xref ref-type="bibr" rid="ref46">Grammenos, 2010</xref>, pp. 709–743). Consequently, cyber threats targeting the shipping sector can precipitate a spectrum of adverse outcomes, including the compromise of sensitive data and intellectual property as well as the disruption of critical supply chains and maritime logistics networks. Furthermore, the interconnected nature of contemporary global trade magnifies the potential ramifications of cyber incidents, as disruptions within the shipping domain have the propensity to cascade across multiple industries and economies worldwide (<xref ref-type="bibr" rid="ref73">Petersson et al., 2019</xref>, pp. 1–5). Hence, safeguarding the cybersecurity posture of the shipping industry emerges as an imperative mandate, indispensable for ensuring the resilience and continuity of international trade networks amidst the digital paradigm.</p><sec id="S4_1"><title>Cyber intrusions: The cases of the Automatic Identification System (AIS) manipulation and ethernet-based cyberattacks</title><p>Cyber intrusions in maritime systems, particularly the manipulation of AIS, pose significant threats to global shipping and navigation. AIS, a system designed to enhance maritime situational awareness by transmitting vessel location and identification information, is increasingly targeted by cybercriminals (<xref ref-type="bibr" rid="ref7">Androjna et al., 2021</xref>). AIS manipulation, also known as spoofing, involves transmitting false positional data to disguise a vessel’s true location. This tactic is frequently employed for illicit activities, such as sanctions evasion and smuggling. The case of the Malaysian-flagged tanker Shanaye Queen exemplifies the dangers of AIS spoofing. In July 2023, the vessel appeared to make an impossible rapid diversion, only to later be revealed as part of a sophisticated deception to mask its loading of the US-sanctioned cargo from Iran. Such incidents expose the vulnerabilities in maritime cybersecurity, as traditional AIS systems are easily tampered with, leading to erroneous navigational data (<xref ref-type="bibr" rid="ref63">Lloyd’s List Intelligence, 2023</xref>).</p><p>Furthermore, ethernet-based cyberattacks present an additional layer of risk to shipping operations. Modern ships are equipped with numerous interconnected systems that rely on ethernet networks for communication and control, including navigation, engine management, and cargo-handling systems. These networks, if inadequately secured, provide an entry point for cybercriminals to launch attacks that can disrupt critical operations. For instance, malware introduced into a ship’s ethernet network can corrupt navigational data, disable crucial systems, or even hijack control of the vessel, posing severe risks to safety and security (<xref ref-type="bibr" rid="ref88">Shinde and Mehta, 2023</xref>).</p></sec><sec id="S4_2"><title>Ransomware attacks: disrupting maritime operations</title><p>Ransomware attacks represent an enduring and formidable menace to the shipping industry, precipitating disruptive operational upheavals and profound financial repercussions. These pernicious cyber assaults entail the encryption of critical systems and data by malevolent actors, who subsequently extort ransom payments in exchange for restoring access (<xref ref-type="bibr" rid="ref85">Schwarz et al., 2021</xref>, pp. 1–8). Notable among these incidents is the infamous 2017 NotPetya ransomware attack, which targeted Maersk, a preeminent entity within the global shipping landscape (<xref ref-type="bibr" rid="ref47">Greenberg, 2018</xref>). This assault inflicted devastating blows upon Maersk’s IT infrastructure, resulting in widespread operational disruptions across its extensive network of ports and supply chains. The reverberations of this attack extended far beyond Maersk’s internal operations, reverberating across its ecosystem of partners, customers, and stakeholders reliant on its services (<xref ref-type="bibr" rid="ref34">Estay, 2020</xref>, pp. 29–42). Port terminals grappled with protracted delays in cargo handling, vessels encountered scheduling disruptions, and supply chains grappled with acute logistical bottlenecks. Moreover, the financial toll exacted by the attack was staggering, with Maersk reporting colossal losses totalling hundreds of millions of dollars. This seminal event served as a poignant reminder of the susceptibility of maritime organisations to ransomware incursions and galvanised the industry to fortify its cybersecurity defences (CISA, 2021, pp. 3–14).</p></sec><sec id="S4_3"><title>Data breaches: compromising confidentiality and integrity</title><p>The escalation of data breaches within the maritime sector presents a profound and pressing cybersecurity challenge, imperilling the confidentiality and integrity of mission-critical information essential for the industry’s functioning (<xref ref-type="bibr" rid="ref10">Ball, 2021</xref>, pp. 10–18). Of particular concern are the deleterious effects stemming from the compromise of sensitive data, encompassing cargo manifests and vessel schedules, pivotal for the seamless and secure facilitation of goods’ movement (<xref ref-type="bibr" rid="ref46">Grammenos, 2010</xref>, pp. 659–679). A notable exemplar accentuating the gravity of this threat is the 2015 breach of the US Office of Personnel Management (OPM), attributed to hackers purportedly affiliated with China (<xref ref-type="bibr" rid="ref37">Finklea et al., 2015</xref>, pp. 1–10). While the primary target of this breach was not the shipping industry <italic>per se</italic>, its repercussions resonated across sectors, elucidating the pervasive menace of cyber espionage and data exfiltration. The breach laid bare millions of confidential records, including background investigation files of government personnel, precipitating apprehensions regarding the susceptibility of digital infrastructures to sophisticated cyber penetrations. Although the motivations driving the OPM breach may diverge from those underpinning attacks on maritime infrastructure, such as espionage or geopolitical stratagem, the fundamental cybersecurity susceptibilities underscore the interconnectedness of cyber threats spanning heterogeneous domains. Consequently, the incident serves as a poignant reminder of the imperative for maritime entities to bolster their cybersecurity resilience vis-à-vis evolving cyber adversaries.</p></sec><sec id="S4_4"><title>Supply chain disruptions: impeding global trade</title><p>The interconnectedness inherent in global supply chains renders the shipping industry profoundly susceptible to supply chain disruptions orchestrated through cyber means (<xref ref-type="bibr" rid="ref6">Alcaide and Llave, 2020</xref>, pp. 1–7). The 2017 NotPetya ransomware attack, in addition to its direct impact on Maersk, stands as a stark exemplar of the extensive repercussions of such disruptions (<xref ref-type="bibr" rid="ref34">Estay, 2020</xref>, pp. 29–42). This incident vividly illustrated the ripple effect that cyberattacks can induce across the broader supply chain ecosystem, precipitating cascading disruptions and substantial financial losses. In the aftermath of the NotPetya attack, myriad companies reliant on Maersk’s logistic services encountered severe disruptions to their operations. From manufacturing plants grappling with procuring essential components to retailers contending with delays in merchandise receipt, the reverberations resonated throughout the global economy.</p><p>Moreover, the maritime industry’s dependence on interconnected networks for communication, navigation, and cargo tracking amplifies the potential impact of supply chain disruptions (<xref ref-type="bibr" rid="ref5">Akpan et al., 2022</xref>, pp. 1–10). Any disruption to these pivotal systems can precipitate cascading effects, resulting in vessel schedule delays, port congestion, and disruptions to cargo movements.</p></sec><sec id="S4_5"><title>Insider threats: exploiting human vulnerabilities</title><p>Within the multifaceted and intricate realm of the shipping industry, insider threats present a formidable challenge, exploiting human vulnerabilities to compromise cybersecurity (<xref ref-type="bibr" rid="ref20">Catrantzos, 2023</xref>, pp. 32–40). Employees across various roles, from seafarers responsible for vessel operations to administrative personnel overseeing logistics and security protocols, play pivotal roles in maritime operations but can inadvertently or intentionally compromise security (<xref ref-type="bibr" rid="ref21">Cho and Lee, 2016</xref>, pp. 1–8). The unique nature of the maritime environment, characterised by remote locations, complex supply chains, and diverse workforce dynamics, magnifies the risk posed by insider threats (<xref ref-type="bibr" rid="ref58">Kanellopoulos, 2024</xref>, pp. 3–9).</p><p>Social engineering tactics, such as phishing scams and pretexting, exploit human trust to gain unauthorised access to sensitive systems and information (<xref ref-type="bibr" rid="ref44">Gelles, 2021</xref>, pp. 669–680). These tactics prey on individuals’ innate desire to be helpful or their lack of awareness regarding cybersecurity’s best practices (<xref ref-type="bibr" rid="ref92">Stouder and Gallagher, 2013</xref>, pp. 2–10). For instance, a malicious actor posing as an IT technician may contact an unsuspecting employee and request their login credentials under the guise of performing urgent system maintenance or troubleshooting. In their attempt to be cooperative and helpful, the employee may unwittingly divulge sensitive information, such as login credentials or access codes, which the attacker can then exploit to gain unauthorised access to critical systems and data. Consequently, this could lead to data breaches, unauthorised access, or other security incidents, potentially compromising the integrity and confidentiality of sensitive information (<xref ref-type="bibr" rid="ref57">Kanellopoulos, 2022</xref>, 2024, pp. 3–9).</p><p>Furthermore, infiltration by malicious insiders poses a significant risk to maritime cybersecurity (<xref ref-type="bibr" rid="ref50">Guitton and Fréchette, 2023</xref>, pp. 2–10). In some cases, individuals may be deliberately placed within organisations by external threat actors, acting as moles to facilitate cyberattacks or espionage. Alternatively, disgruntled employees with insider knowledge and access to a shipping company’s network may act independently to sabotage operations or steal sensitive data for personal gain or vendetta. These insiders may exploit their privileged access to critical systems or information to carry out malicious activities, such as stealing sensitive data, sabotaging operations, or assisting external adversaries in compromising cybersecurity defences (<xref ref-type="bibr" rid="ref58">Kanellopoulos, 2024</xref>, pp. 3–9). For instance, a disgruntled employee with access to a shipping company’s network may intentionally leak sensitive information to competitors, compromising the company’s competitive advantage and reputation. Similarly, they may plant malware within the organisation’s systems to disrupt operations, causing financial losses and reputational damage.</p></sec></sec><sec id="S5"><title>Discussion: Leveraging CI for OCCI in the shipping industry</title><p>In response to the mounting cyber threats facing the shipping industry, the development of a holistic strategy amalgamating CI and OCCI frameworks becomes imperative (<xref ref-type="bibr" rid="ref31">Duvenage et al., 2018</xref>, pp. 2–14). This strategic blueprint entails a methodical approach at both tactical and operational levels, aimed at reinforcing cybersecurity resilience and protecting critical assets and operations within the maritime sphere (<xref ref-type="bibr" rid="ref68">Morrow, 2021</xref>, pp. 2–10). Emphasising the pivotal role of CI, organisations delve into this domain to glean profound insights into adversaries’ tactics, intentions, and capabilities (<xref ref-type="bibr" rid="ref26">D’agostini et al., 2019</xref>, pp. 1–7). Such insights serve as the cornerstone for proactive defence strategies, enabling organisations to anticipate and thwart emerging cyber threats effectively. In the following sections, we provide tactical and operational level examples of how CI could have assisted the OCCI capabilities of Maersk in response to the notorious attack against it. Within the dynamic maritime landscape, CI serves as the bedrock upon which robust offensive measures are constructed, empowering organisations to navigate the complexities of cyber warfare with precision and efficacy (<xref ref-type="bibr" rid="ref31">Duvenage et al., 2018</xref>, pp. 2–14).</p><sec id="S5_1"><title>Integrating threat intelligence for offensive operations</title><p>At the heart of an effective OCCI strategy lies the integration of comprehensive threat intelligence. Derived from diverse CI channels, threat intelligence provides critical insights into the TTPs employed by adversaries. This intelligence transcends the mere monitoring of an organisation’s network, extending to a broader cyber sphere that includes adversarial forums, communication channels, and clandestine operations (<xref ref-type="bibr" rid="ref33">Duvenage and Solms, 2014</xref>, pp. 7–15). Through meticulous analysis of this intelligence, organisations can uncover the underlying motives and strategies of adversaries, facilitating informed decision-making and proactive offensive measures.</p><p>In the context of the 2017 NotPetya ransomware attack on Maersk, the company could have significantly benefitted from integrating threat intelligence into its offensive operations. For instance, Maersk could have employed advanced systems, such as Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), to monitor and analyse incoming traffic for signs of ransomware activity. These systems, by detecting and preventing unauthorised access, also gather valuable intelligence on adversaries’ behaviours and capabilities (<xref ref-type="bibr" rid="ref13">BIMCO et al., 2021</xref>, pp. 3–22). Additionally, deploying honey-client applications could have enabled Maersk to actively engage with the cyber threat landscape, luring adversaries into interacting with decoy systems, thereby revealing their tactics and tools. This proactive engagement would have allowed Maersk to identify and isolate threats more swiftly, mitigating the impact of attacks such as NotPetya.</p></sec><sec id="S5_2"><title>Offensive configurations and deception strategies</title><p>One of the core components of OCCI is the strategic configuration of systems and networks to deceive and exploit adversaries. This involves setting up honeynets and other deceptive infrastructures that present false information to adversarial reconnaissance tools. For Maersk, deploying a honeynet could have diverted ransomware actors away from critical systems, channelling them into controlled environments where their actions could be monitored and analysed (<xref ref-type="bibr" rid="ref70">Pawelski, 2023</xref>, pp. 1–7). By feeding adversaries misleading data, Maersk could manipulate their understanding of the network, causing them to make strategic errors that could be exploited.</p><p>Moreover, Maersk could have utilised honey-client applications to engage actively with adversarial tools and scripts. For example, if Maersk had deployed honey-clients that mimicked vulnerable systems, they could have attracted ransomware actors to reveal their methods and tools. This intelligence would have been invaluable for crafting targeted countermeasures against the specific tools and techniques used by the attackers, thereby enhancing Maersk’s ability to pre-empt and neutralise threats.</p></sec><sec id="S5_3"><title>Recruitment and utilisation of virtual agents</title><p>A sophisticated OCCI strategy often involves the recruitment and handling of virtual agents within underground forums and adversarial networks. These agents operate under true or false flags, collecting intelligence and engaging in activities that further the organisation’s objectives. For Maersk, deploying virtual agents could have involved infiltrating cybercriminal forums to gather real-time insights into adversarial plans and operations (<xref ref-type="bibr" rid="ref69">Mraković and Vojinović, 2019</xref>, pp. 2–7). These agents could have also spread disinformation to confuse and mislead adversaries, thereby disrupting their operational effectiveness.</p><p>For instance, virtual agents could have posed as insiders within forums used by North Korean cyber actors, gathering intelligence about planned attacks and techniques. By obtaining such insights, Maersk could have pre-emptively bolstered its defences against specific threats. Additionally, these virtual agents could have influenced discussions to sow mistrust among adversaries, undermining their cohesion and operational planning. This approach has been effective in various contexts, such as countering North Korean cyber operations by proactively disrupting their communication and planning.</p></sec><sec id="S5_4"><title>Cyber espionage and strategic exploitation</title><p>Cyber espionage is a critical element of OCCI, characterised by its focus on actively targeting and exploiting adversarial networks. Unlike defensive measures that protect an organisation’s own systems, cyber espionage involves penetrating and gathering intelligence from adversaries’ networks. For Maersk, employing cyber espionage tactics could have included monitoring North Korean cyber actors to uncover their strategic plans and operational capabilities (BIMCO et al., 2021, pp. 23–25). This proactive approach would have enabled Maersk to develop targeted operations to disrupt and neutralise adversarial activities.</p><p>Effective cyber espionage requires a deep understanding of the adversarial landscape, achieved through continuous monitoring and analysis of CI. For example, Maersk could have employed advanced data mining techniques to extract valuable insights from adversarial communications, identifying patterns and correlations that reveal their intents and capabilities. This intelligence-driven approach ensures that offensive operations are precise and impactful, maximising their effectiveness in neutralising threats.</p></sec><sec id="S5_5"><title>Crew management and recruitment</title><p>In the domain of crew management and recruitment within the shipping industry, utilising CI for OCCI objectives is crucial to uphold operational efficacy and safeguard security measures. Crew management is a pivotal facet of maritime endeavours, where adept personnel play a fundamental role in ensuring the seamless functioning and safety of vessels (<xref ref-type="bibr" rid="ref49">Griffioen et al., 2021</xref>, pp. 1–6). However, the recruitment process is vulnerable to cyber threats, such as those posed by Russian intelligence agencies, such as the Federal Security Service (FSB) and Sluzhba Vneshney Razvedki or Foreign Intelligence Service (SVR), which may exploit sensitive personnel data or weaknesses within recruitment platforms to infiltrate organisational networks (<xref ref-type="bibr" rid="ref58">Kanellopoulos, 2024</xref>, pp. 3–9).</p><p>Through CI integration, Maersk could proactively address these challenges and fortify its operational resilience. For instance, by analysing competitor job postings and recruitment strategies, Maersk could identify potential vulnerabilities in their processes that adversaries might exploit. Additionally, continuous surveillance of industry trends and threat intelligence feeds would enable Maersk to anticipate and counteract cyber threats targeting crew management systems and recruitment platforms. In the event of a cyberattack on a competitor’s recruitment platform, Maersk could use the insights gained to implement pre-emptive measures, mitigating the risk of similar exploitation within their systems.</p><p>Moreover, Maersk could utilise CI to counter industrial espionage by Russian state actors in the shipping industry. By monitoring and analysing the recruitment practices of competitors, Maersk could identify attempts by adversarial intelligence agencies to place operatives within the company. Implementing thorough background checks and leveraging CI to detect anomalous behaviours or affiliations would enhance Maersk’s ability to safeguard against such threats.</p></sec><sec id="S5_6"><title>Technology and infrastructure enhancement</title><p>The utilisation of CI guides organisations in making informed decisions regarding technology investments and infrastructure improvements. By leveraging nuanced insights derived from CI, organisations gain a comprehensive understanding of emerging cyber threats and technological advancements within the maritime sector (<xref ref-type="bibr" rid="ref68">Morrow, 2021</xref>, pp. 2–10). This knowledge empowers them to strategically employ offensive counterintelligence tactics, such as disrupting competitors’ technology infrastructure or exploiting vulnerabilities in their digital systems.</p><p>For Maersk, this could have meant investing in advanced cybersecurity technologies and improving digital resilience based on CI insights. For example, understanding the specific techniques used by ransomware groups, Maersk could have enhanced its endpoint security and incident response capabilities. This strategic alignment underscores the company’s proficiency in navigating the dynamic landscape of cyber threats while showcasing its commitment to maintaining a competitive edge in the industry (<xref ref-type="bibr" rid="ref2">ABS Group, 2021</xref>, pp. 2–9).</p></sec><sec id="S5_7"><title>Legal and ethical considerations</title><p>As organisations venture into the domain of OCCI strategies, they encounter a plethora of ethical and regulatory complexities that necessitate careful deliberation and adherence (<xref ref-type="bibr" rid="ref97">VristRonn, 2016</xref>, pp. 2–22). Fundamental among these complexities is the obligation to uphold privacy rights and maintain rigorous data protection standards. Given that offensive cyber operations often entail the gathering and analysis of sensitive information, organisations are obligated to abide by ethical guidelines and legal frameworks to prevent unwarranted intrusions into individuals’ privacy (<xref ref-type="bibr" rid="ref33">Duvenage and Solms, 2014</xref>, pp. 14–15).</p><p>Transparency emerges as a crucial component in fostering trust and ensuring accountability. Stakeholders must be informed about the nature and extent of offensive cyber activities undertaken by organisations. This openness not only builds trust but also ensures that actions taken are scrutinised and held accountable. Additionally, organisations face the challenge of navigating regulatory constraints imposed by different jurisdictions, each governed by distinct laws governing cybersecurity practices and offensive operations. Compliance with these regulations demands a meticulous approach to ensure that offensive cyber activities remain within legal and ethical boundaries (<xref ref-type="bibr" rid="ref80">Prunckun, 2019</xref>, pp. 207–218).</p><p>In grappling with these ethical considerations and regulatory hurdles, organisations must strike a delicate balance between fulfilling their cybersecurity objectives and respecting core rights and principles. Neglecting to address these considerations adequately not only exposes organisations to legal consequences but also poses risks to their reputation and undermines stakeholder’s trust. Therefore, a proactive approach that integrates ethical considerations into offensive cyber strategies is imperative to mitigate risks and uphold ethical standards in the pursuit of cybersecurity goals.</p><p>This entails implementing robust mechanisms for ethical review and oversight to ensure that offensive cyber activities are conducted with due regard for ethical principles and legal requirements. Such mechanisms might include independent ethics committees, regular audits, and comprehensive reporting procedures. Moreover, organisations must prioritise ongoing education and training programmes to cultivate a culture of ethical awareness and responsibility among personnel involved in offensive cyber operations. This includes training on legal frameworks, ethical decision-making, and the potential consequences of cyber activities.</p><p>By embracing ethical considerations as integral components of offensive cyber strategies, organisations can navigate the intricate landscape of cybersecurity with integrity and accountability. This approach not only protects the organisation from legal and reputational risks but also promotes a sustainable and responsible practice of offensive cyber operations, aligning cybersecurity efforts with broader ethical standards and societal expectations.</p></sec></sec><sec id="S6"><title>Conclusions</title><p>This paper integrates two critical areas of literature: CI and OCCI. Through the examination of the Maersk attack case example, it initiates a broader discussion on how CI can enhance OCCI operations in the shipping industry. By analysing this specific incident, we highlight the practical application and impact of CI in real-world scenarios, illustrating how strategic intelligence gathering and analysis can significantly improve an organisation’s defensive and offensive cyber capabilities.</p><p>The integration of CI within OCCI strategies is pivotal for bolstering cybersecurity resilience. Ethical principles and actionable insights from CI enable organisations to navigate the complex cyber threat landscape effectively. This study demonstrates the symbiotic relationship between CI and OCCI, highlighting their potential to safeguard organisational interests and maintain a competitive edge. The proactive use of CI allows organisations to anticipate and counter cyber threats before they materialise, thereby reducing vulnerabilities and enhancing their overall security posture.</p><p>Future research should delve deeper into the integration of CI and OCCI, exploring various cyber threat scenarios and assessing the effectiveness of different OCCI tactics. It is crucial to investigate how different industries, especially those with critical infrastructure such as shipping, can tailor these strategies to their unique threat environments. Moreover, understanding the limitations and potential risks associated with integrating CI into OCCI operations would be essential for refining these approaches.</p><p>Collaboration between academia, industry, and policymakers is essential to develop comprehensive strategies and ensure the ethical deployment of cyber counterintelligence measures. Such collaboration can facilitate the sharing of knowledge, best practices, and innovations, contributing to a more robust and resilient cybersecurity framework. Policymakers play a vital role in establishing guidelines and regulations that support ethical practices while enabling organisations to defend against increasingly sophisticated cyber threats effectively.</p></sec></body><back><sec id="S7" sec-type="financial-disclosure"><title>Funding</title><p>This research received no external funding.</p></sec><sec id="S8"><title>Author Contributions</title><p>Conceptualisation, A.-N.K.; formal analysis, A.-N.K.; project administration, A.N.-K.; and supervision, A.I.</p></sec><sec id="S9"><title>Data Availability Statement</title><p>Data available on request from the authors.</p></sec><sec id="S10" sec-type="COI-statement"><title>Disclosure Statement</title><p>No potential conflict of interest was reported by the authors. The authors read and agreed to the published version of the manuscript.</p></sec><ref-list><ref id="ref1"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Abraham</surname>, <given-names>S.C</given-names></string-name></person-group>. (<year>2012</year>) <chapter-title><italic>Strategic planning: A practical guide for competitive success</italic></chapter-title>. <publisher-loc>Leeds</publisher-loc>: <publisher-name>Emerald Group Publishing</publisher-name>.</mixed-citation></ref><ref id="ref2"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>ABS Group</collab></person-group>. (<year>2021</year>) <article-title><italic>Safety, risk and compiance management – A primer in IMO cyber risk management guidlines</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.american-club.com/files/files/A_Primer_on_IMO_Cyber_Risk_Management_Guidelines.pdf">https://www.american-club.com/files/files/A_Primer_on_IMO_Cyber_Risk_Management_Guidelines.pdf</ext-link> (Accessed: 27 March 2024).</mixed-citation></ref><ref id="ref3"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Adidam</surname>, <given-names>P.T</given-names></string-name>., <string-name><surname>Gajre</surname>, <given-names>S</given-names></string-name>. and <string-name><surname>Kejriwal</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2009</year>) <article-title>‘Cross-cultural competitive intelligence strategies’</article-title>, <source>Marketing Intelligence &amp; Planning</source>, <volume>27</volume>(<issue>5</issue>), pp. <fpage>666</fpage>–<lpage>680</lpage>. doi: <pub-id pub-id-type="doi">10.1108/02634500910977881</pub-id>.</mixed-citation></ref><ref id="ref4"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Aguilar</surname>, <given-names>F</given-names></string-name></person-group>. (<year>1967</year>) <chapter-title><italic>Scanning the Business Environment</italic></chapter-title>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>MacMillan</publisher-name>.</mixed-citation></ref><ref id="ref5"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Akpan</surname>, <given-names>F</given-names></string-name>., <string-name><surname>Bendiab</surname>, <given-names>G</given-names></string-name>., <string-name><surname>Shiaeles</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Karamperidis</surname>, <given-names>S</given-names></string-name>. and <string-name><surname>Michaloliakos</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2022</year>) <article-title>‘Cybersecurity challenges in the maritime sector’</article-title>, <source>Network</source>, <volume>2</volume>(<issue>1</issue>), pp. <fpage>123</fpage>–<lpage>138</lpage>. doi: <pub-id pub-id-type="doi">10.3390/network2010009</pub-id>.</mixed-citation></ref><ref id="ref6"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Alcaide</surname>, <given-names>J.I</given-names></string-name>. and <string-name><surname>Llave</surname>, <given-names>R.G</given-names></string-name></person-group>. (<year>2020</year>) <article-title>‘Critical infrastructures cybersecurity and the maritime sector’</article-title>, <source>Transportation Research Procedia</source>, <volume>45</volume>, pp. <fpage>547</fpage>–<lpage>554</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.trpro.2020.03.058</pub-id>.</mixed-citation></ref><ref id="ref7"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Androjna</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Perkovič</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Pavic</surname>, <given-names>I</given-names></string-name>. and <string-name><surname>Mišković</surname>, <given-names>J</given-names></string-name></person-group>. (<year>2021</year>) <article-title>‘AIS data vulnerability indicated by a spoofing case-study’</article-title>. <source>Applied Sciences</source>, <volume>11</volume>(<issue>11</issue>), <fpage>5015</fpage>. doi: <pub-id pub-id-type="doi">10.3390/app11115015</pub-id>.</mixed-citation></ref><ref id="ref8"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Auster</surname>, <given-names>E</given-names></string-name>. and <string-name><surname>Choo</surname>, <given-names>C.W</given-names></string-name></person-group>. (<year>1994</year>) <article-title>‘How senior managers acquire and use information in environmental scanning’</article-title>, <source>Information Processing &amp; Management</source>, <volume>30</volume>(<issue>5</issue>), pp. <fpage>607</fpage>–<lpage>618</lpage>. doi: <pub-id pub-id-type="doi">10.1016/0306-4573(94)90073-6</pub-id>.</mixed-citation></ref><ref id="ref9"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Babbar</surname>, <given-names>S</given-names></string-name>. and <string-name><surname>Rai</surname>, <given-names>A</given-names></string-name></person-group>. (<year>1993</year>) <article-title>‘Competitive intelligence for international business’</article-title>, <source>Long Range Planning</source>, <volume>26</volume>(<issue>3</issue>), pp. <fpage>103</fpage>–<lpage>113</lpage>. doi: <pub-id pub-id-type="doi">10.1016/0024-6301(93)90012-5</pub-id>.</mixed-citation></ref><ref id="ref10"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Ball</surname>, <given-names>K</given-names></string-name></person-group>. (<year>2021</year>) <article-title>‘Electronic monitoring and surveillance in the workplace’</article-title>, <source>Joint Research Center – European Commission</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://publications.jrc.ec.europa.eu/repository/handle/JRC125716">https://publications.jrc.ec.europa.eu/repository/handle/JRC125716</ext-link> (Accessed: 27 March 2024).</mixed-citation></ref><ref id="ref11"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Barnea</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2017</year>) <article-title>‘Counterintelligence: Stepson of the intelligence discipline’</article-title>, <source>Israel Affairs</source>, <volume>23</volume>(<issue>4</issue>), pp. <fpage>715</fpage>–<lpage>726</lpage>. doi: <pub-id pub-id-type="doi">10.1080/13537121.2017.1333725</pub-id>.</mixed-citation></ref><ref id="ref12"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Barnea</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2021</year>) <article-title>‘Big data can boost the value of competitive intelligence’</article-title>, <source>Competitive Intelligence Magazine</source>, <volume>26</volume>(<issue>1</issue>). Available at: <ext-link ext-link-type="uri" xlink:href="https://www.scip.org/page/Big-Data-Boost-Competitive-Intelligence">https://www.scip.org/page/Big-Data-Boost-Competitive-Intelligence</ext-link> (Accessed: 27 March 2024).</mixed-citation></ref><ref id="ref13"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>BIMCO, Chamber of Shipping of America, Digital Containership Association, International Association of Dry Cargo Shipowners (INTERCARGO), InterManager, International Association of Independent Tanker Owners (INTERTANKO), International Chamber of Shipping (ICS), International Union of Marine Insurance (IUMI), Oil Companies International Marine Forum (OCIMF), Superyacht Builders Association (Sybass) and World Shipping Council (WSC)</collab></person-group>. (<year>2021</year>) <article-title><italic>The guidelines on cyber security onboard ships</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.ics-shipping.org/wp-content/uploads/2021/02/2021-Cyber-Security-Guidelines.pdf">https://www.ics-shipping.org/wp-content/uploads/2021/02/2021-Cyber-Security-Guidelines.pdf</ext-link> (Accessed: 27 March 2024).</mixed-citation></ref><ref id="ref14"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Boncella</surname>, <given-names>R.J</given-names></string-name></person-group>. (<year>2003</year>) <article-title>‘Competitive intelligence and the web’</article-title>, <source>Communications of the Association for Information Systems (CAIS)</source>, <volume>12</volume>(<issue>1</issue>), pp. <fpage>326</fpage>–<lpage>341</lpage>. doi: <pub-id pub-id-type="doi">10.17705/1CAIS.01221</pub-id>.</mixed-citation></ref><ref id="ref15"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bose</surname>, <given-names>R</given-names></string-name></person-group>. (<year>2008</year>) <article-title>‘Competitive intelligence process and tools for intelligence analysis’</article-title>, <source>Industrial Management &amp; Data Systems</source>, <volume>108</volume>(<issue>4</issue>), pp. <fpage>510</fpage>–<lpage>528</lpage>. doi: <pub-id pub-id-type="doi">10.1108/02635570810868362</pub-id>.</mixed-citation></ref><ref id="ref16"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bouthillier</surname>, <given-names>F</given-names></string-name>. and <string-name><surname>Jin</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2005</year>) <article-title>‘Competitive intelligence professionals and their interactions with CI technology: A reseach agenda’</article-title>, <source>Journal of Competitive Intelligence and Management (Special SCIP04 Conference Issue)</source>, <volume>3</volume>(<issue>1</issue>), pp. <fpage>41</fpage>–<lpage>53</lpage>.</mixed-citation></ref><ref id="ref17"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Boyd</surname>, <given-names>B.K</given-names></string-name>. and <string-name><surname>Fulk</surname>, <given-names>J</given-names></string-name></person-group>. (<year>1996</year>) <article-title>‘Executive scanning and perceived uncertainty: A multidimensional model’</article-title>, <source>Journal of Management</source>, <volume>22</volume>(<issue>1</issue>), pp. <fpage>1</fpage>–<lpage>21</lpage>. doi: <pub-id pub-id-type="doi">10.1177/014920639602200101</pub-id>.</mixed-citation></ref><ref id="ref18"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Calof</surname>, <given-names>J</given-names></string-name></person-group>. (<year>1997</year>) <article-title>‘For king and country and company’</article-title>, <source>Business Quarterly</source>, <volume>61</volume>(<issue>1</issue>), pp. <fpage>32</fpage>–<lpage>39</lpage>.</mixed-citation></ref><ref id="ref19"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>de Carvalho</surname>, <given-names>P.S</given-names></string-name></person-group>. (<year>2021</year>) <article-title>‘Fundamentals of competitive intelligence (CI)’</article-title>. <source><italic>IF Insight &amp; Foresight</italic></source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://paulosoeirodecarvalho.medium.com/fundamentals-of-competitive-intelligence-ci-1-ebf07520746e">https://paulosoeirodecarvalho.medium.com/fundamentals-of-competitive-intelligence-ci-1-ebf07520746e</ext-link> (Accessed: 27 March 2024).</mixed-citation></ref><ref id="ref20"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Catrantzos</surname>, <given-names>N</given-names></string-name></person-group>. (<year>2023</year>) <chapter-title><italic>Managing the insider threat no dark corners and the rising tide menace</italic></chapter-title>. <publisher-loc>Boca Raton, FL</publisher-loc>: <publisher-name>CRC Press</publisher-name>.</mixed-citation></ref><ref id="ref21"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Cho</surname>, <given-names>I</given-names></string-name>. and <string-name><given-names>K</given-names>. <surname>Lee</surname></string-name></person-group> (<year>2016</year>) <article-title>‘Advanced risk measurement approach to insider threats in Cyberspace’</article-title>, <source>Intelligent Automation &amp; Soft Computing</source>, <volume>22</volume>(<issue>3</issue>), pp. <fpage>405</fpage>–<lpage>413</lpage>. doi: <pub-id pub-id-type="doi">10.1080/10798587.2015.1121617</pub-id>.</mixed-citation></ref><ref id="ref22"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Cloutier</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2013</year>) ‘<article-title>Competitive intelligence process integrative model based on a scoping review of the literature’</article-title>, <source>International Journal of Strategic Management</source>, <volume>13</volume>(<issue>1</issue>), pp. <fpage>57</fpage>–<lpage>72</lpage>. doi: <pub-id pub-id-type="doi">10.18374/ijsm-13-1.7</pub-id>.</mixed-citation></ref><ref id="ref23"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Cottrill</surname>, <given-names>K</given-names></string-name></person-group>. (<year>1998</year>) <article-title>‘Turning competitive intelligence into business knowledge’</article-title>, <source>Journal of Business Strategy</source>, <volume>19</volume>(<issue>4</issue>), pp. <fpage>27</fpage>–<lpage>30</lpage>. doi: <pub-id pub-id-type="doi">10.1108/eb039948</pub-id>.</mixed-citation></ref><ref id="ref24"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Cybersecurity and Infrastructure Security Agency (CISA)</collab></person-group>. (<year>2021</year>) <article-title><italic>Defending against software supply chain attacks</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.cisa.gov/sites/default/files/publications/defending_against_software_supply_chain_attacks_508_1.pdf">https://www.cisa.gov/sites/default/files/publications/defending_against_software_supply_chain_attacks_508_1.pdf</ext-link> (Accessed: 27 March 2024).</mixed-citation></ref><ref id="ref25"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dabrowski</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2018</year>) <article-title>‘Sources of market information, its quality and new product financial performance’</article-title>, <source>Engineering Economics</source>, <volume>29</volume>(<issue>1</issue>), pp. <fpage>115</fpage>–<lpage>122</lpage>. doi: <pub-id pub-id-type="doi">10.5755/j01.ee.29.1.13405</pub-id>.</mixed-citation></ref><ref id="ref26"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>D’agostini</surname>, <given-names>E</given-names></string-name>., <string-name><surname>Nam</surname>, <given-names>H.-S</given-names></string-name>. and <string-name><surname>Kang</surname>, <given-names>S.-H</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘Gaining competitive advantage at sea: An overview of shipping lines’ strategic decisions’</article-title>, <source>International Journal of Transportation Engineering and Technology</source>, <volume>5</volume>(<issue>4</issue>), p. <fpage>74</fpage>. doi: <pub-id pub-id-type="doi">10.11648/j.ijtet.20190504.12</pub-id>.</mixed-citation></ref><ref id="ref27"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>David</surname>, <given-names>F.R</given-names></string-name></person-group>. (<year>2013</year>) <chapter-title><italic>Strategic management concepts and cases: A competitive advantage approach</italic></chapter-title>. <publisher-loc>London</publisher-loc>: <publisher-name>Pearson</publisher-name>.</mixed-citation></ref><ref id="ref28"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dishman</surname>, <given-names>P</given-names></string-name>. and <string-name><surname>Pearson</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2003</year>) <article-title>‘Assessing intelligence as learning within an industrial marketing group: A pilot study’</article-title>, <source>Industrial Marketing Management</source>, <volume>32</volume>(<issue>7</issue>), pp. <fpage>615</fpage>–<lpage>620</lpage>. doi: <pub-id pub-id-type="doi">10.1016/s0019-8501(03)00030-0</pub-id>.</mixed-citation></ref><ref id="ref29"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Du Plessis</surname>, <given-names>T</given-names></string-name>. and <string-name><surname>Gulwa</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2016</year>) <article-title>‘Developing a competitive intelligence strategy framework supporting the competitive intelligence needs of a financial institution’s decision makers’</article-title>, <source>SA Journal of Information Management</source>, <volume>18</volume>(<issue>2</issue>), pp. <fpage>2</fpage>–<lpage>8</lpage>. doi: <pub-id pub-id-type="doi">10.4102/sajim.v18i2.726</pub-id>.</mixed-citation></ref><ref id="ref30"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Du Toit</surname>, <given-names>A.S.A</given-names></string-name></person-group>. (<year>2015</year>) <article-title>‘Competitive intelligence research: An investigation of trends in the literature’</article-title>, <source>Journal of Intelligence Studies in Business</source>, <volume>5</volume>(<issue>2</issue>), pp. <fpage>14</fpage>–<lpage>21</lpage>. doi: <pub-id pub-id-type="doi">10.37380/jisib.v5i2.127</pub-id>.</mixed-citation></ref><ref id="ref31"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Duvenage</surname>, <given-names>P</given-names></string-name>., <string-name><surname>Jaquire</surname>, <given-names>V</given-names></string-name>. and <string-name><surname>Solms</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2018</year>) <article-title>‘Towards a literature review on cyber counterintelligence’</article-title>, <source>Journal of Information Warfare</source>, <volume>17</volume>(<issue>4</issue>), pp. <fpage>284</fpage>–<lpage>297</lpage>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.jstor.org/stable/26783824">https://www.jstor.org/stable/26783824</ext-link> (Accessed: 27 March 2024).</mixed-citation></ref><ref id="ref32"><mixed-citation publication-type="paper"><person-group person-group-type="author"><string-name><surname>Duvenage</surname>, <given-names>P</given-names></string-name>., <string-name><surname>Sithole</surname>, <given-names>T</given-names></string-name>. and <string-name><surname>Solms</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2017</year>) <article-title>‘A conceptual framework for cyber counterintelligence – Theory that really matters’</article-title>, in <source><italic>16th European conference in cyber warfare and security</italic></source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.cybersecurity.org.za/docs/ECCWS_2017_DSV_Prof_MS.pdf">https://www.cybersecurity.org.za/docs/ECCWS_2017_DSV_Prof_MS.pdf</ext-link> (Accessed: 27 March 2024).</mixed-citation></ref><ref id="ref33"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Duvenage</surname>, <given-names>P</given-names></string-name>. and <string-name><surname>Solms</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2014</year>) <chapter-title>‘Putting counterintelligence in cyber counterintelligence’</chapter-title>, in <person-group person-group-type="editor"><string-name><surname>Adrew</surname>, <given-names>Liaropoulos</given-names></string-name> and <string-name><surname>George</surname>, <given-names>Tsihrintzis</given-names></string-name></person-group> (Eds.) <source><italic>13th European conference on cyber warfare and security</italic></source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.researchgate.net/publication/328732134_Putting_Counterintelligence_in_Cyber_Counterintelligence">https://www.researchgate.net/publication/328732134_Putting_Counterintelligence_in_Cyber_Counterintelligence</ext-link> (Accessed: 27 March 2024).</mixed-citation></ref><ref id="ref34"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Estay</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2020</year>) <article-title>‘Cyber resilience for the shipping industry’</article-title>, <source>CyberShip Project</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.dendanskemaritimefond.dk/wp-content/uploads/2017/03/Cybership_Report_WP_5.pdf">https://www.dendanskemaritimefond.dk/wp-content/uploads/2017/03/Cybership_Report_WP_5.pdf</ext-link> (Accessed: 27 March 2024).</mixed-citation></ref><ref id="ref35"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ettore</surname>, <given-names>B</given-names></string-name></person-group>. (<year>1995</year>) <article-title>‘Managing competitive intelligence’</article-title>, <source>Management Review</source>, <volume>10</volume>, pp. <fpage>15</fpage>–<lpage>19</lpage>. Available at: <ext-link ext-link-type="uri" xlink:href="https://go.gale.com/ps/i.do?id=GALE%7CA17551795&amp;sid=googleScholar&amp;v=2.1&amp;it=r&amp;linkaccess=abs&amp;issn=00251895&amp;p=AONE&amp;sw=w&amp;userGroupName=anon%7E68ba059b&amp;aty=open-web-entry">https://go.gale.com/ps/i.do?id=GALE%7CA17551795&amp;sid=googleScholar&amp;v=2.1&amp;it=r&amp;linkaccess=abs&amp;issn=00251895&amp;p=AONE&amp;sw=w&amp;userGroupName=anon%7E68ba059b&amp;aty=open-web-entry</ext-link> (Accessed: 27 March 2024).</mixed-citation></ref><ref id="ref36"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Fahey</surname>, <given-names>L</given-names></string-name>. and <string-name><surname>Herring</surname>, <given-names>J</given-names></string-name></person-group>. (<year>2007</year>) <article-title>‘Intelligence teams’</article-title>, <source>Strategy &amp; Leadership</source>, <volume>35</volume>(<issue>1</issue>), pp. <fpage>13</fpage>–<lpage>20</lpage>. doi: <pub-id pub-id-type="doi">10.1108/10878570710717245</pub-id>.</mixed-citation></ref><ref id="ref37"><mixed-citation publication-type="paper"><person-group person-group-type="author"><string-name><surname>Finklea</surname>, <given-names>K</given-names></string-name>., <string-name><surname>Christensen</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Fischer</surname>, <given-names>E</given-names></string-name>., <string-name><surname>Lawrence</surname>, <given-names>S</given-names></string-name>. and <string-name><surname>Catherine</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2015</year>) <article-title>‘Cyber intrusion into U.S. office of personnel management: In brief’</article-title>, <source>Congressional Research Service</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://sgp.fas.org/crs/natsec/R44111.pdf">https://sgp.fas.org/crs/natsec/R44111.pdf</ext-link> (Accessed: 27 March <conf-date>2024</conf-date>).</mixed-citation></ref><ref id="ref38"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Franco</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Magrinho</surname>, <given-names>A</given-names></string-name>. and <string-name><surname>Ramos Silva</surname>, <given-names>J</given-names></string-name></person-group>. (<year>2011</year>) <article-title>‘Competitive intelligence: A research model tested on Portuguese firms’</article-title>, <source>Business Process Management Journal</source>, <volume>17</volume>(<issue>2</issue>), pp. <fpage>332</fpage>–<lpage>356</lpage>. doi: <pub-id pub-id-type="doi">10.1108/14637151111122374</pub-id>.</mixed-citation></ref><ref id="ref39"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Frates</surname>, <given-names>J</given-names></string-name>. and <string-name><surname>Sharp</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2005</year>) <article-title>‘Using business intelligence to discover new market opportunities’</article-title>, <source>Journal of Competitive Intelligence and Management</source>, <volume>3</volume>(<issue>3</issue>), pp. <fpage>16</fpage>–<lpage>28</lpage>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.sharpmarket.com/wp-content/pdfs/article-new-market-opps.pdf">https://www.sharpmarket.com/wp-content/pdfs/article-new-market-opps.pdf</ext-link> (Accessed: 27 March 2024).</mixed-citation></ref><ref id="ref40"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gaidelys</surname>, <given-names>V</given-names></string-name>. and <string-name><surname>Meidute</surname>, <given-names>I</given-names></string-name></person-group>. (<year>2012</year>) <article-title>‘Instruments and methods of competitive intelligence’</article-title>, <source>Economics and Management</source>, <volume>17</volume>(<issue>3</issue>), pp. <fpage>971</fpage>–<lpage>977</lpage>. doi: <pub-id pub-id-type="doi">10.5755/j01.em.17.3.2122</pub-id>.</mixed-citation></ref><ref id="ref41"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>García-Madurga</surname>, <given-names>M</given-names></string-name>. and <string-name><surname>Esteban-Navarro</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2020</year>) <article-title>‘A project management approach to competitive intelligence’</article-title>, <source>Journal of Intelligence Studies in Business</source>, <volume>10</volume>(<issue>3</issue>), pp. <fpage>9</fpage>–<lpage>23</lpage>. doi: <pub-id pub-id-type="doi">10.37380/jisib.v10i3.636</pub-id>.</mixed-citation></ref><ref id="ref42"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gaspareniene</surname>, <given-names>L</given-names></string-name>., <string-name><surname>Remeikiene</surname>, <given-names>R</given-names></string-name>. and <string-name><surname>Gaidelys</surname>, <given-names>V</given-names></string-name></person-group>. (<year>2013</year>) <article-title>‘The opportunities of the use of competitive intelligence in business: Literature review’</article-title>, <source>Journal of Small Business and Entrepreneurship Development</source>, <volume>1</volume>(<issue>2</issue>), pp. <fpage>9</fpage>–<lpage>16</lpage>.</mixed-citation></ref><ref id="ref43"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gelb</surname>, <given-names>B</given-names></string-name>. and <string-name><surname>Zinkhan</surname>, <given-names>G</given-names></string-name></person-group>. (<year>1985</year>) <article-title>‘Competitive intelligence practices of industrial marketers’</article-title>, <source>Industrial Marketing Management</source>, <volume>14</volume>, pp. <fpage>269</fpage>–<lpage>275</lpage>. doi: <pub-id pub-id-type="doi">10.1016/0019-8501(85)90019-7</pub-id>.</mixed-citation></ref><ref id="ref44"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Gelles</surname>, <given-names>M.G</given-names></string-name></person-group>. (<year>2021</year>) <chapter-title>‘Insider threat prevention, detection, and mitigation: Building an insider threat program’</chapter-title>, in <person-group person-group-type="editor"><string-name><given-names>J</given-names>. <surname>Reid Meloy</surname></string-name>, <string-name><given-names>Jens</given-names><surname>Hoffmann</surname></string-name></person-group> (Eds.) <source><italic>International handbook of threat assessment</italic></source>, <edition>2 edn</edition>, <publisher-loc>New York</publisher-loc>: <publisher-name>Oxford Academic</publisher-name>, pp. <fpage>669</fpage>–<lpage>679</lpage>. doi: <pub-id pub-id-type="doi">10.1093/med-psych/9780190940164.003.0037</pub-id>.</mixed-citation></ref><ref id="ref45"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ghoshal</surname>, <given-names>S</given-names></string-name>. and <string-name><surname>Westney</surname>, <given-names>D.E</given-names></string-name></person-group>. (<year>1991</year>) <article-title>‘Organizing competitor analysis systems’</article-title>, <source>Strategic Management Journal</source>, <volume>12</volume>(<issue>1</issue>), pp. <fpage>17</fpage>–<lpage>31</lpage>. doi: <pub-id pub-id-type="doi">10.1002/smj.4250120103</pub-id>.</mixed-citation></ref><ref id="ref46"><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Grammenos</surname>, <given-names>Th. C</given-names></string-name></person-group>. (<year>2010</year>) <article-title><italic>The Handbook of maritime economics and business</italic></article-title>. <source>Lloyd’s list. London Informa Law PLC</source>.</mixed-citation></ref><ref id="ref47"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Greenberg</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2018</year>, August 22) <article-title><italic>The untold story of notpetya, the most devastating cyberattack in history</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://cyber-peace.org/wp-content/uploads/2018/10/The-Untold-Story-of-NotPetya-the-Most-Devastating-Cyberattack-in-History--WIRED.pdf">https://cyber-peace.org/wp-content/uploads/2018/10/The-Untold-Story-of-NotPetya-the-Most-Devastating-Cyberattack-in-History--WIRED.pdf</ext-link> (Accessed: 27 March 2024).</mixed-citation></ref><ref id="ref48"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Greene</surname>, <given-names>R</given-names></string-name></person-group>. (<year>1966</year>) <chapter-title><italic>Business intelligence and espionage</italic></chapter-title>. <publisher-loc>Homewood, IL</publisher-loc>: <publisher-name>Dow Jones-Irwin</publisher-name>.</mixed-citation></ref><ref id="ref49"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Griffioen</surname>, <given-names>J</given-names></string-name>., <string-name><surname>van der Drift</surname>, <given-names>M</given-names></string-name>. and <string-name><surname>van den Broek</surname>, <given-names>H</given-names></string-name></person-group>. (<year>2021</year>) <article-title>‘Enhancing maritime crew resource management training by applying resilience engineering: A case study of the bachelor maritime officer training programme in Rotterdam’</article-title>, <source>Education Sciences</source>, <volume>11</volume>(<issue>8</issue>), p. <fpage>378</fpage>–<lpage>389</lpage>. doi: <pub-id pub-id-type="doi">10.3390/educsci11080378</pub-id>.</mixed-citation></ref><ref id="ref50"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Guitton</surname>, <given-names>M.J</given-names></string-name>. and <string-name><given-names>J</given-names>. <surname>Fréchette</surname></string-name></person-group> (<year>2023</year>) <article-title>‘Facing cyberthreats in a crisis and post-crisis ERA: Rethinking security services response strategy’</article-title>, <source>Computers in Human Behavior Reports</source>, <volume>10</volume>, p. <fpage>100282</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.chbr.2023.100282</pub-id>.</mixed-citation></ref><ref id="ref51"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Hedin</surname>, <given-names>H</given-names></string-name></person-group>. (<year>2004</year>) <article-title>‘Introduction to competitive intelligence (1/2004)’</article-title>, <source><italic>GIA white paper</italic></source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.academia.edu/33107462/INTRODUCTION_TO_COMPETITIVE_INTELLIGENCE">https://www.academia.edu/33107462/INTRODUCTION_TO_COMPETITIVE_INTELLIGENCE</ext-link> (Accessed: 27 March 2024).</mixed-citation></ref><ref id="ref52"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Heppes</surname>, <given-names>D</given-names></string-name>. and <string-name><surname>Du Toit</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2009</year>) <article-title>‘Level of maturity of the competitive intelligence function’</article-title>, <source>Aslib Proceedings</source>, <volume>61</volume>(<issue>1</issue>), pp. <fpage>48</fpage>–<lpage>66</lpage>. doi: <pub-id pub-id-type="doi">10.1108/00012530910932285</pub-id>.</mixed-citation></ref><ref id="ref53"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Jaquire</surname>, <given-names>V</given-names></string-name>. and <string-name><surname>von Solms</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2017</year>) <chapter-title>‘Towards a cyber counterintelligence maturity model’</chapter-title>, in <person-group person-group-type="editor"><string-name><surname>Juan R</surname>. <given-names>Lopez</given-names></string-name>, <string-name><surname>Adam</surname><given-names>R. Bryant</given-names></string-name>, <string-name><surname>Robert</surname><given-names>F. Mills</given-names></string-name></person-group> (Eds.) <source><italic>Proceedings of the 12th international conference on cyber warfare and security</italic></source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://adam.uj.ac.za/csi/docs/Jaquire%20&amp;%20von%20Solms%20-%20Towards%20a%20Cyber%20Counterintelligence%20Maturity%20Model.pdf">https://adam.uj.ac.za/csi/docs/Jaquire%20&amp;%20von%20Solms%20-%20Towards%20a%20Cyber%20Counterintelligence%20Maturity%20Model.pdf</ext-link> (Accessed: 27 March 2024).</mixed-citation></ref><ref id="ref54"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Johns</surname>, <given-names>P</given-names></string-name>. and <string-name><surname>Van Doren</surname>, <given-names>D.C</given-names></string-name></person-group>. (<year>2010</year>) <article-title>‘Competitive intelligence in service marketing’</article-title>, <source>Marketing Intelligence &amp; Planning</source>, <volume>28</volume>(<issue>5</issue>), pp. <fpage>551</fpage>–<lpage>570</lpage>. doi: <pub-id pub-id-type="doi">10.1108/02634501011066492</pub-id>.</mixed-citation></ref><ref id="ref55"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Johnson</surname>, <given-names>G</given-names></string-name>., <string-name><surname>Scholes</surname>, <given-names>K</given-names></string-name>. and <string-name><surname>Whittington</surname>, <given-names>R</given-names></string-name></person-group>. (<year>2009</year>) <chapter-title><italic>Exploring corporate strategy</italic></chapter-title>. <publisher-loc>Essex</publisher-loc>: <publisher-name>Pearson Education</publisher-name>.</mixed-citation></ref><ref id="ref56"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Kaminska</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Broeders</surname>, <given-names>D</given-names></string-name>. and <string-name><surname>Cristiano</surname>, <given-names>F</given-names></string-name></person-group>. (<year>2021</year>) <article-title>‘Limiting viral spread: Automated cyber operations and the principles of distinction and discrimination in the grey zone’</article-title>, in <source><italic>13th International conference on cyber conflict</italic></source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://ieeexplore.ieee.org/document/9468290">https://ieeexplore.ieee.org/document/9468290</ext-link> (Accessed: 27 March 2024).</mixed-citation></ref><ref id="ref57"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Kanellopoulos</surname>, <given-names>A.N</given-names></string-name></person-group>. (<year>2022</year>) <article-title>‘The importance of counterintelligence culture in state security’</article-title>, <source><italic>Global Security and Intelligence</italic></source>. <volume>Note 5</volume>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.buckingham.ac.uk/wp-content/uploads/2022/07/GSIN_5a.pdf">https://www.buckingham.ac.uk/wp-content/uploads/2022/07/GSIN_5a.pdf</ext-link> (Accessed: 27 March 2024).</mixed-citation></ref><ref id="ref58"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kanellopoulos</surname>, <given-names>A.N</given-names></string-name></person-group>. (<year>2024</year>) <article-title>‘Insider threat mitigation through human intelligence and counterintelligence: A case study in the shipping industry’</article-title>, <source>Defense and Security Studies</source>, <volume>5</volume>(<issue>1</issue>), pp. <fpage>10</fpage>–<lpage>19</lpage>. doi: <pub-id pub-id-type="doi">10.37868/dss.v5.id261</pub-id>.</mixed-citation></ref><ref id="ref59"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kanellopoulos</surname>, <given-names>A.N</given-names></string-name>. and <string-name><surname>Ioannidis</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2023</year>) <article-title>‘The dimensions of counterintelligence and their role in national security’</article-title>, <source>Journal of European and American Intelligence Studies</source>, <volume>6</volume>(<issue>2</issue>), pp. <fpage>85</fpage>–<lpage>104</lpage>.</mixed-citation></ref><ref id="ref60"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kars-Unluoglu</surname>, <given-names>S</given-names></string-name>. and <string-name><surname>Kevill</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2021</year>) <article-title>‘Emotional foundations of capability development: An exploration in the SME context’</article-title>, <source>Journal of Management &amp; Organization</source>, <volume>27</volume>(<issue>4</issue>), pp. <fpage>1</fpage>–<lpage>20</lpage>. doi: <pub-id pub-id-type="doi">10.1017/jmo.2020.38</pub-id>.</mixed-citation></ref><ref id="ref61"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kump</surname>, <given-names>B</given-names></string-name>., <string-name><surname>Engelmann</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Kessler</surname>, <given-names>A</given-names></string-name>. and <string-name><surname>Schweiger</surname>, <given-names>C</given-names></string-name></person-group>. (<year>2018</year>) <article-title>‘Toward a dynamic capabilities scale: Measuring organizational sensing, seizing, and transforming capacities’</article-title>, <source>Industrial and Corporate Change</source>. <volume>28</volume>(<issue>5</issue>), pp. <fpage>1149</fpage>–<lpage>1172</lpage>. doi: <pub-id pub-id-type="doi">10.1093/icc/dty054</pub-id>.</mixed-citation></ref><ref id="ref62"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Leibowitz</surname>, <given-names>J</given-names></string-name></person-group>. (<year>2006</year>) <chapter-title><italic>Strategic intelligence: Business intelligence, competitive intelligence, and knowledge management</italic></chapter-title>. <publisher-loc>Boca Raton, FL</publisher-loc>: <publisher-name>Auerbach Publications</publisher-name>.</mixed-citation></ref><ref id="ref63"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Lloyd’s List Intelligence</collab></person-group>. (<year>2023</year>) <article-title><italic>The case of the Shanaye queen</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.lloydslistintelligence.com/knowledge-hub/risk-and-compliance/the-case-of-the-shanaye-queen">https://www.lloydslistintelligence.com/knowledge-hub/risk-and-compliance/the-case-of-the-shanaye-queen</ext-link> (Accessed: 9 July 2024).</mixed-citation></ref><ref id="ref64"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Markovich</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Raban</surname>, <given-names>D.R</given-names></string-name>. and <string-name><surname>Efrat</surname>, <given-names>K</given-names></string-name></person-group>. (<year>2022</year>) <article-title>‘Tailoring competitive information sources to the sequence of dynamic capabilities’</article-title>, <source>Journal of Management &amp; Organization</source>, <volume>28</volume>(<issue>3</issue>), pp. <fpage>480</fpage>–<lpage>501</lpage>. doi: <pub-id pub-id-type="doi">10.1017/jmo.2022.35</pub-id>.</mixed-citation></ref><ref id="ref65"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>McGonagle</surname>, <given-names>J.J</given-names></string-name>. and <string-name><surname>Vella</surname>, <given-names>C.M</given-names></string-name></person-group>. (<year>2002</year>) <chapter-title><italic>Bottom line competitive intelligence</italic></chapter-title>. <publisher-loc>Westport, CT</publisher-loc>: <publisher-name>Quorum Books</publisher-name>.</mixed-citation></ref><ref id="ref66"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Miller</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2001</year>) <article-title>‘Competitive intelligence–An overview’</article-title>, <source>Society of Competitive Intelligence Professionals</source>. pp. <fpage>1</fpage>–<lpage>14</lpage>.</mixed-citation></ref><ref id="ref67"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Miller</surname>, <given-names>J.P</given-names></string-name></person-group>. (<year>2005</year>) <article-title>‘Information science and competitive intelligence: Possible collaborators?’</article-title>, <source>Bulletin of the American Society for Information Science and Technology</source>, <volume>23</volume>(<issue>1</issue>), pp. <fpage>11</fpage>–<lpage>13</lpage>. doi: <pub-id pub-id-type="doi">10.1002/bult.33</pub-id>.</mixed-citation></ref><ref id="ref68"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Morrow</surname>, <given-names>A.B</given-names></string-name></person-group>. (<year>2021</year>) <chapter-title>‘Information security and cyber threats and vulnerabilities’</chapter-title>, in <person-group person-group-type="editor"><string-name><surname>Gordon</surname><given-names>G.A</given-names></string-name>, and <string-name><surname>Young</surname><given-names>R.Y</given-names></string-name></person-group>. (Eds.) <source><italic>Intermodal Maritime Security: Supply Chain Risk Mitigation</italic></source>, <publisher-loc>Amsterdam</publisher-loc>: <publisher-name>The Netherlands</publisher-name>, pp. <fpage>169</fpage>–<lpage>193</lpage>. doi: <pub-id pub-id-type="doi">10.1016/b978-0-12-819945-9.00010-1</pub-id>.</mixed-citation></ref><ref id="ref69"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mraković</surname>, <given-names>I</given-names></string-name>. and <string-name><surname>Vojinović</surname>, <given-names>R</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘Maritime cyber security analysis–How to reduce threats?’</article-title>, <source>Transactions on Maritime Science</source>, <volume>8</volume>(<issue>1</issue>), pp. <fpage>132</fpage>–<lpage>139</lpage>. doi: <pub-id pub-id-type="doi">10.7225/toms.v08.n01.013</pub-id>.</mixed-citation></ref><ref id="ref70"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Pawelski</surname>, <given-names>J</given-names></string-name></person-group>. (<year>2023</year>) <article-title>‘Cyber threats for present and future commercial shipping’</article-title>, <source>TransNav, the International Journal on Marine Navigation and Safety of Sea Transportation</source>, <volume>17</volume>(<issue>2</issue>), pp. <fpage>261</fpage>–<lpage>267</lpage>. doi: <pub-id pub-id-type="doi">10.12716/1001.17.02.01</pub-id>.</mixed-citation></ref><ref id="ref71"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Peddie</surname>, <given-names>J</given-names></string-name></person-group>. (<year>1992</year>) <article-title>‘The corporate culture and use of competitive intelligence’</article-title>, <source>Competitive Intelligence Review</source>, <volume>3</volume>(<issue>1</issue>), pp. <fpage>7</fpage>–<lpage>10</lpage>. doi: <pub-id pub-id-type="doi">10.1002/cir.3880030104</pub-id>.</mixed-citation></ref><ref id="ref72"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Pellissier</surname>, <given-names>R</given-names></string-name>. and <string-name><surname>Nenzhelele</surname>, <given-names>T.E</given-names></string-name></person-group>. (<year>2013</year>) <article-title>‘Towards a universal definition of competitive intelligence’</article-title>, <source>SA Journal of Information Management</source>, <volume>15</volume>(<issue>2</issue>), pp. <fpage>559</fpage>–<lpage>566</lpage>. doi: <pub-id pub-id-type="doi">10.4102/sajim.v15i2.559</pub-id>.</mixed-citation></ref><ref id="ref73"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Petersson</surname>, <given-names>N.P</given-names></string-name>., <string-name><surname>Tenold</surname>, <given-names>S</given-names></string-name>. and <string-name><surname>White</surname>, <given-names>N.J</given-names></string-name></person-group>. (<year>2019</year>) <chapter-title><italic>Shipping and globalization in the post-war era</italic></chapter-title>. <source>Palgrave Studies in Maritime Economics</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Springer</publisher-name>.</mixed-citation></ref><ref id="ref74"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Pirttimäki</surname>, <given-names>V</given-names></string-name></person-group>. (<year>2007</year>) <article-title><italic>Business intelligence as a managerial tool in large Finnish companies</italic></article-title>. <source>Doctoral thesis</source>. <publisher-loc>Tampere</publisher-loc>: <publisher-name>Tampere University of Technology (TUT)</publisher-name>. Available at: <ext-link ext-link-type="uri" xlink:href="https://trepo.tuni.fi/handle/10024/114315">https://trepo.tuni.fi/handle/10024/114315</ext-link> (Accessed: 27 March 2024).</mixed-citation></ref><ref id="ref75"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Porter</surname>, <given-names>M</given-names></string-name></person-group>. (<year>1991</year>) <article-title>‘Towards a dynamic theory of strategy’</article-title>, <source>Strategic Management Journal</source>, <volume>12</volume>(<issue>S2</issue>), pp. <fpage>95</fpage>–<lpage>117</lpage>. doi: <pub-id pub-id-type="doi">10.1002/smj.4250121008</pub-id>.</mixed-citation></ref><ref id="ref76"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Pöyhönen</surname>, <given-names>J</given-names></string-name>. and <string-name><surname>Lehto</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2022</year>) <article-title>‘Assessment of cybersecurity risks: Maritime automated piloting process’</article-title>, <source>International Conference on Cyber Warfare and Security</source>, <volume>17</volume>(<issue>1</issue>), pp. <fpage>262</fpage>–<lpage>271</lpage>. doi: <pub-id pub-id-type="doi">10.34190/iccws.17.1.18</pub-id>.</mixed-citation></ref><ref id="ref77"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Pranjic</surname>, <given-names>G</given-names></string-name></person-group>. (<year>2011</year>) <article-title>‘Influence of business and competitive intelligence on making right business decisions’</article-title>, <source>Ekonomska Misao Praksa</source>, <volume>20</volume>(<issue>1</issue>), pp. <fpage>271</fpage>–<lpage>288</lpage>. Available at: <ext-link ext-link-type="uri" xlink:href="https://hrcak.srce.hr/69721">https://hrcak.srce.hr/69721</ext-link> (Accessed: 27 March 2024).</mixed-citation></ref><ref id="ref78"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Prescott</surname>, <given-names>J</given-names></string-name></person-group>. (<year>1999</year>) <article-title>‘The evolution of competitive intelligence: Designing a process for action’</article-title>, <source>APMP Professional Journal</source>, pp. <fpage>37</fpage>–<lpage>52</lpage>.</mixed-citation></ref><ref id="ref79"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Prescott</surname>, <given-names>J.E</given-names></string-name></person-group>. (<year>2001</year>) <article-title>‘Competitive intelligence: Lessons from the trenches’</article-title>, <source>Competitive Intelligence Review</source>, <volume>12</volume>(<issue>2</issue>), pp. <fpage>5</fpage>–<lpage>19</lpage>. doi: <pub-id pub-id-type="doi">10.1002/cir.1013</pub-id>.</mixed-citation></ref><ref id="ref80"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Prunckun</surname>, <given-names>H</given-names></string-name></person-group>. (<year>2019</year>) <chapter-title><italic>Counterintelligence theory and practise</italic></chapter-title>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Rowman &amp; Littlefield</publisher-name>.</mixed-citation></ref><ref id="ref81"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ruhli</surname>, <given-names>E</given-names></string-name>. and <string-name><surname>Sachs</surname>, <given-names>S</given-names></string-name></person-group>. (<year>1997</year>) <article-title>‘Challenges for strategic competitive intelligence at the corporate level’</article-title>, <source>Competitive Intelligence Review</source>, <volume>8</volume>(<issue>4</issue>), pp. <fpage>54</fpage>–<lpage>64</lpage>. doi: <pub-id pub-id-type="doi">10.1002/(sici)1520-6386(199724)8:4&lt;54::aid-cir9&gt;3.0.co;2-s</pub-id>.</mixed-citation></ref><ref id="ref82"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sangher</surname>, <given-names>K.S</given-names></string-name>., <string-name><surname>Singh</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Pandey</surname>, <given-names>H.M</given-names></string-name>. and <string-name><surname>Kumar</surname>, <given-names>V</given-names></string-name></person-group>. (<year>2023</year>) <article-title>‘Towards safe cyber practices: Developing a proactive cyber-threat intelligence system for dark web forum content by identifying cybercrimes’</article-title>, <source>Information</source>, <volume>14</volume>(<issue>6</issue>), p. <fpage>349</fpage>. doi: <pub-id pub-id-type="doi">10.3390/info14060349</pub-id>.</mixed-citation></ref><ref id="ref83"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sapkauskiene</surname>, <given-names>A</given-names></string-name>. and <string-name><surname>Leitoniene</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2010</year>) <article-title>‘The concept of time-based competition in the context of management theory’</article-title>, <source>Inzinerine Ekonomika (Engineering Economics)</source>, <volume>21</volume>(<issue>2</issue>), pp. <fpage>205</fpage>–<lpage>2013</lpage>. Available at: <ext-link ext-link-type="uri" xlink:href="https://epubl.ktu.edu/object/elaba:3041519/">https://epubl.ktu.edu/object/elaba:3041519/</ext-link> (Accessed: 27 March 2024).</mixed-citation></ref><ref id="ref84"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sawka</surname>, <given-names>K</given-names></string-name></person-group>. (<year>1996</year>) <article-title>‘Demystifying competitive intelligence’</article-title>, <source>Management Review</source>, <volume>85</volume>(<issue>10</issue>), pp. <fpage>47</fpage>–<lpage>51</lpage>. Available at: <ext-link ext-link-type="uri" xlink:href="https://go.gale.com/ps/i.do?id=GALE%7CA18730946&amp;sid=googleScholar&amp;v=2.1&amp;it=r&amp;linkaccess=abs&amp;issn=00251895&amp;p=AONE&amp;sw=w&amp;userGroupName=anon%7Efe57ae9&amp;aty=open-web-entry">https://go.gale.com/ps/i.do?id=GALE%7CA18730946&amp;sid=googleScholar&amp;v=2.1&amp;it=r&amp;linkaccess=abs&amp;issn=00251895&amp;p=AONE&amp;sw=w&amp;userGroupName=anon%7Efe57ae9&amp;aty=open-web-entry</ext-link> (Accessed: 27 March 2024).</mixed-citation></ref><ref id="ref85"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Schwarz</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Marx</surname>, <given-names>M</given-names></string-name>. and <string-name><surname>Federrath</surname>, <given-names>H</given-names></string-name></person-group>. (<year>2021</year>) <article-title>‘A structured analysis of information security incidents in the maritime sector’</article-title>, <source><italic>Cornell University archives</italic></source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://arxiv.org/pdf/2112.06545.pdf">https://arxiv.org/pdf/2112.06545.pdf</ext-link> (Accessed: 27 March 2024).</mixed-citation></ref><ref id="ref86"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Seng Yap</surname>, <given-names>C</given-names></string-name>., <string-name><surname>Zabid Abdul Rashid</surname>, <given-names>M</given-names></string-name>. and <string-name><surname>Amat Sapuan</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2013</year>) <article-title>‘Perceived environmental uncertainty and competitive intelligence practices’</article-title>, <source>VINE</source>, <volume>43</volume>(<issue>4</issue>), pp. <fpage>462</fpage>–<lpage>481</lpage>. doi: <pub-id pub-id-type="doi">10.1108/vine-11-2011-0058</pub-id>.</mixed-citation></ref><ref id="ref87"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sewdass</surname>, <given-names>N</given-names></string-name></person-group>. (<year>2012</year>) <article-title>‘Proposing a competitive intelligence (CI) framework for public service departments to enhance service delivery’</article-title>, <source>SA Journal of Information Management</source>, <volume>14</volume>(<issue>1</issue>), pp. <fpage>1</fpage>–<lpage>13</lpage>. doi: <pub-id pub-id-type="doi">10.4102/sajim.v14i1.491</pub-id>.</mixed-citation></ref><ref id="ref88"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Shinde</surname>, <given-names>S</given-names></string-name>. and <string-name><surname>Mehta</surname>, <given-names>H</given-names></string-name></person-group>. (<year>2023</year>) <article-title>‘Defending marine ships against ethernet based cyberattacks’</article-title>, in <source><italic>2023 Fifth international conference on electrical, computer and communication technologies (ICECCT)</italic></source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>IEEE</publisher-name>. doi: <pub-id pub-id-type="doi">10.1109/icecct56650.2023.10179830</pub-id>.</mixed-citation></ref><ref id="ref89"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sigholm</surname>, <given-names>J</given-names></string-name>. and <string-name><surname>Bang</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2013</year>) <article-title>‘Towards offensive cyber counterintelligence’</article-title>, in <source><italic>2013 European intelligence and security informatics conference</italic></source>, pp. <fpage>166</fpage>–<lpage>171</lpage>. doi: <pub-id pub-id-type="doi">10.1109/EISIC.2013.37</pub-id>.</mixed-citation></ref><ref id="ref90"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sliton</surname>, <given-names>P</given-names></string-name></person-group>. (<year>1998</year>) <article-title>‘Society of competitive intelligence professionals, various proceedings and publications’</article-title>, <source>Competitive Review</source>, <volume>9</volume>(<issue>2</issue>), pp. <fpage>4</fpage>–<lpage>9</lpage>.</mixed-citation></ref><ref id="ref91"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Stack</surname>, <given-names>K.P</given-names></string-name></person-group>. (<year>1998</year>) <article-title>‘Competitive intelligence’</article-title>, <source>Intelligence and National Security</source>, <volume>13</volume>(<issue>4</issue>), pp. <fpage>194</fpage>–<lpage>202</lpage>. doi: <pub-id pub-id-type="doi">10.1080/02684529808432511</pub-id>.</mixed-citation></ref><ref id="ref92"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Stouder</surname>, <given-names>M.D</given-names></string-name>. and <string-name><surname>Gallagher</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2013</year>) <article-title>‘Crafting operational counterintelligence strategy: A guide for managers’</article-title>, <source>International Journal of Intelligence and Counterintelligence</source>, <volume>26</volume>(<issue>3</issue>), pp. <fpage>583</fpage>–<lpage>596</lpage>. doi: <pub-id pub-id-type="doi">10.1080/08850607.2013.780560</pub-id>.</mixed-citation></ref><ref id="ref93"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Strauss</surname>, <given-names>A</given-names></string-name>. and <string-name><surname>Du Toit</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2010</year>) <article-title>‘Skills shortages and competitiveness in South Africa: The need for competitive intelligence skills’</article-title>, <source>Journal of Contemporary Management</source>, <volume>7</volume>, pp. <fpage>307</fpage>–<lpage>324</lpage>.</mixed-citation></ref><ref id="ref94"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Svilicic</surname>, <given-names>B</given-names></string-name>., <string-name><surname>Kamahara</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Rooks</surname>, <given-names>M</given-names></string-name>. and <string-name><surname>Yano</surname>, <given-names>Y</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘Maritime cyber risk management: An experimental ship assessment’</article-title>, <source>Journal of Navigation</source>, <volume>72</volume>(<issue>5</issue>), pp. <fpage>1108</fpage>–<lpage>1120</lpage>. doi: <pub-id pub-id-type="doi">10.1017/s0373463318001157</pub-id>.</mixed-citation></ref><ref id="ref95"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Tahmasebifard</surname>, <given-names>H</given-names></string-name></person-group>. (<year>2018</year>) <article-title>‘The role of competitive intelligence and its sub-types on achieving market performance’</article-title>, <source>Cogent Business &amp; Management</source>, <volume>5</volume>(<issue>1</issue>), p. <fpage>1540073</fpage>. doi: <pub-id pub-id-type="doi">10.1080/23311975.2018.1540073</pub-id>.</mixed-citation></ref><ref id="ref96"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Viviers</surname>, <given-names>W</given-names></string-name>., <string-name><surname>Saayman</surname>, <given-names>A</given-names></string-name>. and <string-name><surname>Muller</surname>, <given-names>M.L</given-names></string-name></person-group>. (<year>2005</year>) <article-title>‘Enhancing a competitive intelligence culture in South Africa’</article-title>, <source>International Journal of Social Economics</source>, <volume>32</volume>(<issue>7</issue>), pp. <fpage>576</fpage>–<lpage>589</lpage>. doi: <pub-id pub-id-type="doi">10.1108/03068290510601117</pub-id>.</mixed-citation></ref><ref id="ref97"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>VristRonn</surname>, <given-names>K</given-names></string-name></person-group>. (<year>2016</year>) <article-title>‘Intelligence ethics: A critical review and future perspectives’</article-title>, <source>International Journal of Intelligence and Counterintelligence</source>, <volume>29</volume>(<issue>4</issue>), pp. <fpage>760</fpage>–<lpage>784</lpage>. doi: <pub-id pub-id-type="doi">10.1080/08850607.2016.1177399</pub-id>.</mixed-citation></ref><ref id="ref98"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wettering</surname>, <given-names>F</given-names></string-name></person-group>. (<year>2000</year>) <article-title>‘Counterintelligence: The broken triad’</article-title>, <source>International Journal of Intelligence and Counterintelligence</source>, <volume>13</volume>(<issue>3</issue>), pp. <fpage>265</fpage>–<lpage>300</lpage>. doi: <pub-id pub-id-type="doi">10.1080/08850600050140607</pub-id>.</mixed-citation></ref><ref id="ref99"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wright</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2010</year>) <article-title>‘Capitalising on intelligence: Converting input to output to insight and competitive advantage’</article-title>, <source>Journal of Strategic Marketing</source>, <volume>18</volume>(<issue>7</issue>), pp. <fpage>517</fpage>–<lpage>521</lpage>. doi: <pub-id pub-id-type="doi">10.1080/0965254x.2010.529159</pub-id>.</mixed-citation></ref><ref id="ref100"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zha</surname>, <given-names>X</given-names></string-name>. and <string-name><surname>Chen</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2009</year>) <article-title>‘Competitive intelligence monitoring in the risk prevention of SMES’</article-title>, <source>Journal of Service Science and Management</source>, <volume>02</volume>(<issue>03</issue>), pp. <fpage>230</fpage>–<lpage>235</lpage>. doi: <pub-id pub-id-type="doi">10.4236/jssm.2009.23028</pub-id>.</mixed-citation></ref></ref-list></back></article>
