Search results
1 – 10 of over 1000Omid Nodoushani and Patricia A. Nodoushani
Amid all enthusiasm regarding the rise of the Digital Age, industrial espionage remains the dark side of the post‐industrial revolution. The Federal Industrial Espionage Act of…
Abstract
Amid all enthusiasm regarding the rise of the Digital Age, industrial espionage remains the dark side of the post‐industrial revolution. The Federal Industrial Espionage Act of 1996 aimed at leveling the field regarding widespread cheating and stealing of intellectual properties by competitors in the marketplace. In this paper we aim at defining various forms of industrial espionage in the light of the ongoing information technology revolution.
The reader who ventures vicariously or otherwise into the murky world of spies and spying will quickly discover a semantic confusion in which the terms “espionage” and…
Abstract
The reader who ventures vicariously or otherwise into the murky world of spies and spying will quickly discover a semantic confusion in which the terms “espionage” and “intelligence” are used with a bewildering profusion of meanings. Basically, however, “intelligence” refers to information; thus, intelligence agencies and agents are involved in the collection, evaluation and dissemination of information for a variety of purposes. “Espionage,” on the other hand, properly refers to the collecting of usually secret information by means of clandestine techniques and methods. Espionage is only a part of the larger function of intelligence activity but the terms have become thoroughly confused in much of the literature as well as in the public mind.
Phillip C. Wright and Géraldine Roy
This paper discusses the difference between industrial‐espionage and competitive intelligence so that practicing managers will be more able to formulate policy in this critical…
Abstract
This paper discusses the difference between industrial‐espionage and competitive intelligence so that practicing managers will be more able to formulate policy in this critical area. As well, procedures for securing information as part of a competitive intelligence process are outlined.
Details
Keywords
The paper focuses on intentional information security breaches by insiders. The purpose is to assess the relationship between insiders' backgrounds and motivations and their…
Abstract
Purpose
The paper focuses on intentional information security breaches by insiders. The purpose is to assess the relationship between insiders' backgrounds and motivations and their deviant behaviors. Two outcome variables, information technology (IT) espionage and IT sabotage, are correlated with four predictors, financial changes, relationship strains, substance abuse, and job changes.
Design/methodology/approach
Some 62 cases of intentional information security breaches by insiders are examined using canonical analysis.
Findings
The results indicate that a significant relationship exists between financial hardship, relationship strains, and the theft and sale of proprietary data by insiders; and recent firings, substance abuse, and relationship strains are related to information system sabotage.
Research limitations/implications
Because little or no research has been conducted on this topic, there is a lack of validated measures for variables associated with information security. Thus, the measures used in this paper are necessarily simplistic. Because few organizations report information security weaknesses, the sample is relatively small.
Practical implications
In the majority of cases included in this paper, it is found that the insider convey a number of warning signs before committing the security breach. After reading this paper, diligent managers should be able to identify potential security breaches.
Originality/value
This is one of the first studies to explore insider security breaches using canonical analysis.
Details
Keywords
The paper aims to explore the national security implications of a potential for a World Trade Organization (WTO) dispute on data flow restrictions. It proposes a basic conceptual…
Abstract
Purpose
The paper aims to explore the national security implications of a potential for a World Trade Organization (WTO) dispute on data flow restrictions. It proposes a basic conceptual framework to assess data flows’ restrictions under General Agreement on Trade in Services (GATS) security exception.
Design/methodology/approach
If a case were to be brought before the WTO dispute settlement, the defender could support its case by invoking the security exception. This paper analyzes three main arguments that could be brought up: protection from cyber espionage, protection from cyberattacks on critical infrastructure and access to data needed to prevent terrorist threats. These three cases are analyzed both legally and technically to assess the relevance of restrictions on data flows under GATS security exception. This analysis can, more generally, inform the debate on the protection of national security in the digital era.
Findings
In the three cases, restrictions on data considered critical for national security might raise the cost of certain attacks. However, the risks would remain pervasive and national security would not be significantly enhanced both legally and technically. The implementation of good security standards and encryption techniques appears to be a more effective way to ensure a better response to cyber threats. All in all, it will be important to investigate on a case by case basis whether the scope of the measure (sectors and data covered) is considered proportionate and whether the measure in question in practice reduces the exposure of the country to cyber espionage, cyberattacks and terrorist threats.
Originality/value
This paper represents a contribution to the literature because it is the first paper to address systematically the issue of data flows and national security in the context of a GATS dispute and because it provides a unique perspective that looks both at legal and technical arguments.
Details
Keywords
Joni Salminen and William Y. Degbey
The changing communication environment transforms social media as a source for obtaining competitive intelligence on rival firms through “social espionage.” This conceptual…
Abstract
The changing communication environment transforms social media as a source for obtaining competitive intelligence on rival firms through “social espionage.” This conceptual chapter discusses how the competitive information in the Web, along with the trend of corporate transparency, has created both opportunity and risk for firms in social media. Among the opportunities, we discuss (1) tactical marketing campaigns, (2) encouraging switching behavior, (3) identifying and targeting competitors’ weak points, and (4) learning from their success and failure. On the other hand, we discuss how engaging in social media results in a loss of total control in the dialogue between a firm and its customers and, ultimately, leaves a firm vulnerable to the same opportunistic tactics it may leverage in order to draw benefit from a competitor’s social media presence. Finally, we provide some recommendations aimed at reacting to social espionage in the form of a strategic grid.
BUSINESS ESPIONAGE is currently one of the most insidious threats facing successful British companies.
Daniel J. Morris, Lawrence P. Ettkin and Marilyn M. Helms
US intellectual property (IP) is a key target of numerous other countries and individuals. Of specific interest to outsiders are technological resources. Illegally transferring…
Abstract
US intellectual property (IP) is a key target of numerous other countries and individuals. Of specific interest to outsiders are technological resources. Illegally transferring information can range from the extreme of the often‐glamorized international espionage to the more traditional and common gathering of competitive intelligence (CI). This paper will review the key issues in the illegal transference of information technologies from the USA, will outline the role of other countries involved, and will discuss the impact on key, targeted industries. In particular the illegal attempts to procure key intellectual properties from technology firms will be discussed. In addition, the paper will distinguish between corporate intelligence, espionage, and economic espionage.
Details
Keywords
The Security and Intelligence Services (known as MI5 and MI6) have statutory authority to act in respect of the economic well‐being of the UK. The Security Service Act 1989…
Abstract
The Security and Intelligence Services (known as MI5 and MI6) have statutory authority to act in respect of the economic well‐being of the UK. The Security Service Act 1989 defines MI5's role as being to safe‐guard economic well‐being, while the Intelligence Services Act 1994 empowers MI6 more specifically to obtain and provide information in relation to this interest. Both organisations are limited, in this context, to operating in respect of the actions or intentions of persons outside the British Isles. This concern with the protection of economic well‐being is not a recent development. As long ago as the 18th century, Parliament was sufficiently concerned by the suborning of skilled British workers by the French to pass legislation against industrial espionage. At the same time, Britain was sending intelligence agents into France to gather similar information. The state and private industry worked closely together to protect national interests from espionage, and to seek out intelligence on foreign industrial techniques. The nature of the intelligence sought covered purely commercial targets, such as wool manufacturing and clock making, as well as military technology, such as shipbuilding. This brief historical comparison high‐lights issues which are still pertinent. First, the shared interest that government and industry have in acquiring intelligence in this area. Secondly, that such espionage has a twofold objective of gathering information relating to both commercial and military‐industrial matters.
Carl J. Pacini, Raymond Placid and Christine Wright‐Isak
The purpose of this paper is to provide an overview of trade secrets, reasonable steps to preserve secrecy, trade secret value, misappropriation methods used to acquire trade…
Abstract
Purpose
The purpose of this paper is to provide an overview of trade secrets, reasonable steps to preserve secrecy, trade secret value, misappropriation methods used to acquire trade secrets, various legal remedies, and internal controls to protect trade secrets.
Design/methodology/approach
A sample of types of civil trade secret cases is highlighted. The paper includes a statutory and legal case study analysis of the elements in a civil trade secrets lawsuit. Analysis of actual trade secret court cases illustrates the importance of private civil lawsuits in combating intellectual property fraud.
Findings
This paper shows the serious impact of trade secret espionage on the success and survival of businesses and the necessity of proving each element of a civil claim under state trade secret law. Also, practical steps necessary to protect an entity's trade secrets are discussed.
Practical implications
This paper raises the awareness of executives, managers, internal and external auditors, forensic accountants and other interested parties about the severity of trade secret espionage. Also, this paper highlights numerous steps to protect trade secrets.
Originality/value
This paper fills an identified need to inform those involved in the fight against economic crime about the importance of state trade secret laws and internal controls in the fight against intellectual property fraud.
Details