Search results

1 – 10 of over 1000
Article
Publication date: 1 February 2002

Omid Nodoushani and Patricia A. Nodoushani

Amid all enthusiasm regarding the rise of the Digital Age, industrial espionage remains the dark side of the post‐industrial revolution. The Federal Industrial Espionage Act of…

Abstract

Amid all enthusiasm regarding the rise of the Digital Age, industrial espionage remains the dark side of the post‐industrial revolution. The Federal Industrial Espionage Act of 1996 aimed at leveling the field regarding widespread cheating and stealing of intellectual properties by competitors in the marketplace. In this paper we aim at defining various forms of industrial espionage in the light of the ongoing information technology revolution.

Details

Competitiveness Review: An International Business Journal, vol. 12 no. 2
Type: Research Article
ISSN: 1059-5422

Article
Publication date: 1 March 1980

Bernard A. Block

The reader who ventures vicariously or otherwise into the murky world of spies and spying will quickly discover a semantic confusion in which the terms “espionage” and…

Abstract

The reader who ventures vicariously or otherwise into the murky world of spies and spying will quickly discover a semantic confusion in which the terms “espionage” and “intelligence” are used with a bewildering profusion of meanings. Basically, however, “intelligence” refers to information; thus, intelligence agencies and agents are involved in the collection, evaluation and dissemination of information for a variety of purposes. “Espionage,” on the other hand, properly refers to the collecting of usually secret information by means of clandestine techniques and methods. Espionage is only a part of the larger function of intelligence activity but the terms have become thoroughly confused in much of the literature as well as in the public mind.

Details

Reference Services Review, vol. 8 no. 3
Type: Research Article
ISSN: 0090-7324

Article
Publication date: 1 March 1999

Phillip C. Wright and Géraldine Roy

This paper discusses the difference between industrial‐espionage and competitive intelligence so that practicing managers will be more able to formulate policy in this critical…

3737

Abstract

This paper discusses the difference between industrial‐espionage and competitive intelligence so that practicing managers will be more able to formulate policy in this critical area. As well, procedures for securing information as part of a competitive intelligence process are outlined.

Details

Journal of Workplace Learning, vol. 11 no. 2
Type: Research Article
ISSN: 1366-5626

Keywords

Article
Publication date: 9 October 2009

Jordan Shropshire

The paper focuses on intentional information security breaches by insiders. The purpose is to assess the relationship between insiders' backgrounds and motivations and their…

1766

Abstract

Purpose

The paper focuses on intentional information security breaches by insiders. The purpose is to assess the relationship between insiders' backgrounds and motivations and their deviant behaviors. Two outcome variables, information technology (IT) espionage and IT sabotage, are correlated with four predictors, financial changes, relationship strains, substance abuse, and job changes.

Design/methodology/approach

Some 62 cases of intentional information security breaches by insiders are examined using canonical analysis.

Findings

The results indicate that a significant relationship exists between financial hardship, relationship strains, and the theft and sale of proprietary data by insiders; and recent firings, substance abuse, and relationship strains are related to information system sabotage.

Research limitations/implications

Because little or no research has been conducted on this topic, there is a lack of validated measures for variables associated with information security. Thus, the measures used in this paper are necessarily simplistic. Because few organizations report information security weaknesses, the sample is relatively small.

Practical implications

In the majority of cases included in this paper, it is found that the insider convey a number of warning signs before committing the security breach. After reading this paper, diligent managers should be able to identify potential security breaches.

Originality/value

This is one of the first studies to explore insider security breaches using canonical analysis.

Details

Information Management & Computer Security, vol. 17 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 19 December 2018

Martina Francesca Ferracane

The paper aims to explore the national security implications of a potential for a World Trade Organization (WTO) dispute on data flow restrictions. It proposes a basic conceptual…

Abstract

Purpose

The paper aims to explore the national security implications of a potential for a World Trade Organization (WTO) dispute on data flow restrictions. It proposes a basic conceptual framework to assess data flows’ restrictions under General Agreement on Trade in Services (GATS) security exception.

Design/methodology/approach

If a case were to be brought before the WTO dispute settlement, the defender could support its case by invoking the security exception. This paper analyzes three main arguments that could be brought up: protection from cyber espionage, protection from cyberattacks on critical infrastructure and access to data needed to prevent terrorist threats. These three cases are analyzed both legally and technically to assess the relevance of restrictions on data flows under GATS security exception. This analysis can, more generally, inform the debate on the protection of national security in the digital era.

Findings

In the three cases, restrictions on data considered critical for national security might raise the cost of certain attacks. However, the risks would remain pervasive and national security would not be significantly enhanced both legally and technically. The implementation of good security standards and encryption techniques appears to be a more effective way to ensure a better response to cyber threats. All in all, it will be important to investigate on a case by case basis whether the scope of the measure (sectors and data covered) is considered proportionate and whether the measure in question in practice reduces the exposure of the country to cyber espionage, cyberattacks and terrorist threats.

Originality/value

This paper represents a contribution to the literature because it is the first paper to address systematically the issue of data flows and national security in the context of a GATS dispute and because it provides a unique perspective that looks both at legal and technical arguments.

Details

Digital Policy, Regulation and Governance, vol. 21 no. 1
Type: Research Article
ISSN: 2398-5038

Keywords

Book part
Publication date: 15 June 2015

Joni Salminen and William Y. Degbey

The changing communication environment transforms social media as a source for obtaining competitive intelligence on rival firms through “social espionage.” This conceptual…

Abstract

The changing communication environment transforms social media as a source for obtaining competitive intelligence on rival firms through “social espionage.” This conceptual chapter discusses how the competitive information in the Web, along with the trend of corporate transparency, has created both opportunity and risk for firms in social media. Among the opportunities, we discuss (1) tactical marketing campaigns, (2) encouraging switching behavior, (3) identifying and targeting competitors’ weak points, and (4) learning from their success and failure. On the other hand, we discuss how engaging in social media results in a loss of total control in the dialogue between a firm and its customers and, ultimately, leaves a firm vulnerable to the same opportunistic tactics it may leverage in order to draw benefit from a competitor’s social media presence. Finally, we provide some recommendations aimed at reacting to social espionage in the form of a strategic grid.

Details

New Technology-Based Firms in the New Millennium
Type: Book
ISBN: 978-1-78560-032-6

Article
Publication date: 1 July 1974

Raymond Palmer

BUSINESS ESPIONAGE is currently one of the most insidious threats facing successful British companies.

Abstract

BUSINESS ESPIONAGE is currently one of the most insidious threats facing successful British companies.

Details

Industrial Management, vol. 74 no. 7/8
Type: Research Article
ISSN: 0007-6929

Article
Publication date: 1 October 2000

Daniel J. Morris, Lawrence P. Ettkin and Marilyn M. Helms

US intellectual property (IP) is a key target of numerous other countries and individuals. Of specific interest to outsiders are technological resources. Illegally transferring…

1218

Abstract

US intellectual property (IP) is a key target of numerous other countries and individuals. Of specific interest to outsiders are technological resources. Illegally transferring information can range from the extreme of the often‐glamorized international espionage to the more traditional and common gathering of competitive intelligence (CI). This paper will review the key issues in the illegal transference of information technologies from the USA, will outline the role of other countries involved, and will discuss the impact on key, targeted industries. In particular the illegal attempts to procure key intellectual properties from technology firms will be discussed. In addition, the paper will distinguish between corporate intelligence, espionage, and economic espionage.

Details

Information Management & Computer Security, vol. 8 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 March 1999

Kirstie Best

The Security and Intelligence Services (known as MI5 and MI6) have statutory authority to act in respect of the economic well‐being of the UK. The Security Service Act 1989…

Abstract

The Security and Intelligence Services (known as MI5 and MI6) have statutory authority to act in respect of the economic well‐being of the UK. The Security Service Act 1989 defines MI5's role as being to safe‐guard economic well‐being, while the Intelligence Services Act 1994 empowers MI6 more specifically to obtain and provide information in relation to this interest. Both organisations are limited, in this context, to operating in respect of the actions or intentions of persons outside the British Isles. This concern with the protection of economic well‐being is not a recent development. As long ago as the 18th century, Parliament was sufficiently concerned by the suborning of skilled British workers by the French to pass legislation against industrial espionage. At the same time, Britain was sending intelligence agents into France to gather similar information. The state and private industry worked closely together to protect national interests from espionage, and to seek out intelligence on foreign industrial techniques. The nature of the intelligence sought covered purely commercial targets, such as wool manufacturing and clock making, as well as military technology, such as shipbuilding. This brief historical comparison high‐lights issues which are still pertinent. First, the shared interest that government and industry have in acquiring intelligence in this area. Secondly, that such espionage has a twofold objective of gathering information relating to both commercial and military‐industrial matters.

Details

Journal of Financial Crime, vol. 7 no. 1
Type: Research Article
ISSN: 1359-0790

Article
Publication date: 16 May 2008

Carl J. Pacini, Raymond Placid and Christine Wright‐Isak

The purpose of this paper is to provide an overview of trade secrets, reasonable steps to preserve secrecy, trade secret value, misappropriation methods used to acquire trade…

1730

Abstract

Purpose

The purpose of this paper is to provide an overview of trade secrets, reasonable steps to preserve secrecy, trade secret value, misappropriation methods used to acquire trade secrets, various legal remedies, and internal controls to protect trade secrets.

Design/methodology/approach

A sample of types of civil trade secret cases is highlighted. The paper includes a statutory and legal case study analysis of the elements in a civil trade secrets lawsuit. Analysis of actual trade secret court cases illustrates the importance of private civil lawsuits in combating intellectual property fraud.

Findings

This paper shows the serious impact of trade secret espionage on the success and survival of businesses and the necessity of proving each element of a civil claim under state trade secret law. Also, practical steps necessary to protect an entity's trade secrets are discussed.

Practical implications

This paper raises the awareness of executives, managers, internal and external auditors, forensic accountants and other interested parties about the severity of trade secret espionage. Also, this paper highlights numerous steps to protect trade secrets.

Originality/value

This paper fills an identified need to inform those involved in the fight against economic crime about the importance of state trade secret laws and internal controls in the fight against intellectual property fraud.

Details

International Journal of Law and Management, vol. 50 no. 3
Type: Research Article
ISSN: 1754-243X

Keywords

1 – 10 of over 1000