Search results

11 – 20 of over 1000
Article
Publication date: 1 August 1980

Peter Heims

‘You may well argue that industrial espionage is not a threat to your particular company. If these are your thoughts, you are living with a false sense of security.’

Abstract

‘You may well argue that industrial espionage is not a threat to your particular company. If these are your thoughts, you are living with a false sense of security.’

Details

Industrial Management, vol. 80 no. 8
Type: Research Article
ISSN: 0007-6929

Article
Publication date: 9 February 2010

Maria Solitander and Nikodemus Solitander

The purpose of this paper is to analyze how the Intellectual Capital perspective can be altered in order to include ethically questionable practices of knowledge acquisition.

2618

Abstract

Purpose

The purpose of this paper is to analyze how the Intellectual Capital perspective can be altered in order to include ethically questionable practices of knowledge acquisition.

Design/methodology/approach

The paper explores the relationship between formal and illicit forms of intellectual capital acquisition through a case study of the Formula 1 industry. The paper is based on secondary data from public sources.

Findings

Ethically questionable practices are a part of the knowledge economy. In the case study, the view on what was ethical and accepted was changed due to uncovered practices of espionage.

Practical implications

Firms in knowledge‐intensive industries often employ unrecognized informal channels for intellectual capital acquisition. Managers should consider the boundary between right and wrong in their particular industry, and whether they have the tools for dealing with ethically questionable practices.

Originality/value

The paper suggests a complementary interpretation of the Formula 1 industry not only as a best‐practice case of how community and trust knowledge spillovers facilitate innovation, but also how ethically questionable practices of intellectual capital acquisition exist as an accepted part of the process.

Details

Management Decision, vol. 48 no. 1
Type: Research Article
ISSN: 0025-1747

Keywords

Article
Publication date: 17 July 2009

Herbert Snyder and Anthony Crescenzi

Intellectual capital's (IC's) rising value in the production of wealth has been mirrored by its increasing vulnerability to crime. Among these are the increasing frequency of…

1549

Abstract

Purpose

Intellectual capital's (IC's) rising value in the production of wealth has been mirrored by its increasing vulnerability to crime. Among these are the increasing frequency of cybercrime, the intangible nature of IC which facilitates theft and the lack of legal remedies for the theft of IC. Taken together, these factors have created a new environment in which IC is uniquely at risk from financial crime. The purpose of this paper is to attempt to examine the efficacy in current legal remedies and formulate suggestions for better protecting IC.

Design/methodology/approach

The analysis is conceptual, using frameworks drawn from legal scholarship and traditional views of law‐enforcement practice.

Findings

This paper explores the risks of crime inherent in IC and a distributed cyber environment in greater detail in order to demonstrate that traditional legal remedies are largely ineffective to protect IC property rights and that, given this policy environment and the nature of IC itself, prevention is the only reasonable means for protecting IC.

Research limitations/implications

Conceptual papers offer an intrinsically different form of evidence than empirical studies. Significant public debate prior to enacting legislation and subsequent empirical testing of the paper's propositions, if enacted into legislation, are strongly encouraged.

Practical implications

The paper includes implications for the development of legal protections based on guarding sensitive information at its source, rather than traditional reactive policing and legal actions after a theft has been committed.

Originality/value

This paper fulfils an identified need to propose useful and concrete legal solutions that deal with the increasing importance of IC and the concomitant frequency of crimes that involve its theft.

Details

Journal of Financial Crime, vol. 16 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Executive summary
Publication date: 30 January 2024

BRAZIL: Bolsonaro son targeted in espionage probe

Details

DOI: 10.1108/OXAN-ES284901

ISSN: 2633-304X

Keywords

Geographic
Topical
Executive summary
Publication date: 3 August 2023

RUSSIA: Cyber campaigns evolve but focus on espionage

Details

DOI: 10.1108/OXAN-ES281000

ISSN: 2633-304X

Keywords

Geographic
Topical
Executive summary
Publication date: 20 February 2023

INT: Chinese hackers use phishing for espionage

Details

DOI: 10.1108/OXAN-ES276154

ISSN: 2633-304X

Keywords

Geographic
Topical
Executive summary
Publication date: 15 June 2016

RUSSIA/US: Cyber espionage should be no surprise

Details

DOI: 10.1108/OXAN-ES211779

ISSN: 2633-304X

Keywords

Geographic
Topical
Article
Publication date: 14 March 2022

Samuel Foli

As emphasised by the theory of knowledge-based view, knowledge constitutes the basic element for a firm’s competitive advantage. Consequently, a firm’s knowledge at risk could…

Abstract

Purpose

As emphasised by the theory of knowledge-based view, knowledge constitutes the basic element for a firm’s competitive advantage. Consequently, a firm’s knowledge at risk could have an adverse effect on its performance. In this regard, this paper aims to investigate potential knowledge risks present in an (ICT)-supported collaborative project and establishes inter- and multi-relationships among these risks.

Design/methodology/approach

In this paper, an integrated approach using the total interpretive structural modelling (TISM) technique and MICMAC analysis is implemented to determine the hierarchical inter-relationships among knowledge risks and classify them according to their driving and dependence power.

Findings

The result reveals seven knowledge risks. The analysis establishes cybercrime and espionage as high drivers of knowledge risks in an ICT-supported collaborative project. Further, a comprehensive model is developed showing the hierarchical structure and multi- and inter-relationships among the analysed risks.

Practical implications

From a practical viewpoint, the proposed model in this study will be of great importance to practitioners because it highlights the most prominent knowledge risks in an ICT-supported collaborative project. Additionally, it will provide a clue for effective knowledge risk management in a systematic approach.

Originality/value

To the best of the author’s knowledge, this is one of the first studies to use both the TISM technique and MICMAC analysis to identify and classify knowledge risks in an ICT-supported collaborative project.

Details

VINE Journal of Information and Knowledge Management Systems, vol. 52 no. 3
Type: Research Article
ISSN: 2059-5891

Keywords

Article
Publication date: 1 September 1975

When the economy takes a nosedive, a more sinister type of business is likely to flourish — industrial espionage — reports ex‐Fraud Squad member, Vincent Carratu. The threat comes…

Abstract

When the economy takes a nosedive, a more sinister type of business is likely to flourish — industrial espionage — reports ex‐Fraud Squad member, Vincent Carratu. The threat comes from companies who are determined to outwit competitors in a contracting market and from aggrieved employees who fall prey to the cash incentives of selling secrets. Carratu, who now heads one of Europe's biggest investigation agencies, pinpoints some of the security loopholes which are all too easy for the industrial spy.

Details

Industrial Management, vol. 75 no. 9
Type: Research Article
ISSN: 0007-6929

Executive summary
Publication date: 24 September 2020

ARGENTINA: Espionage claims will fuel polarisation

Details

DOI: 10.1108/OXAN-ES256461

ISSN: 2633-304X

Keywords

Geographic
Topical
11 – 20 of over 1000