Books and journals Case studies Expert Briefings Open Access
Advanced search

Search results

1 – 10 of 724
To view the access options for this content please click here
Article
Publication date: 1 February 2002

INDUSTRIAL ESPIONAGE: THE DARK SIDE OF THE “DIGITAL AGE”

Omid Nodoushani and Patricia A. Nodoushani

Amid all enthusiasm regarding the rise of the Digital Age, industrial espionage remains the dark side of the post‐industrial revolution. The Federal Industrial Espionage…

HTML
PDF (380 KB)

Abstract

Amid all enthusiasm regarding the rise of the Digital Age, industrial espionage remains the dark side of the post‐industrial revolution. The Federal Industrial Espionage Act of 1996 aimed at leveling the field regarding widespread cheating and stealing of intellectual properties by competitors in the marketplace. In this paper we aim at defining various forms of industrial espionage in the light of the ongoing information technology revolution.

Details

Competitiveness Review: An International Business Journal, vol. 12 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/eb046445
ISSN: 1059-5422

To view the access options for this content please click here
Article
Publication date: 9 October 2009

A canonical analysis of intentional information security breaches by insiders

Jordan Shropshire

The paper focuses on intentional information security breaches by insiders. The purpose is to assess the relationship between insiders' backgrounds and motivations and…

HTML
PDF (92 KB)

Abstract

Purpose

The paper focuses on intentional information security breaches by insiders. The purpose is to assess the relationship between insiders' backgrounds and motivations and their deviant behaviors. Two outcome variables, information technology (IT) espionage and IT sabotage, are correlated with four predictors, financial changes, relationship strains, substance abuse, and job changes.

Design/methodology/approach

Some 62 cases of intentional information security breaches by insiders are examined using canonical analysis.

Findings

The results indicate that a significant relationship exists between financial hardship, relationship strains, and the theft and sale of proprietary data by insiders; and recent firings, substance abuse, and relationship strains are related to information system sabotage.

Research limitations/implications

Because little or no research has been conducted on this topic, there is a lack of validated measures for variables associated with information security. Thus, the measures used in this paper are necessarily simplistic. Because few organizations report information security weaknesses, the sample is relatively small.

Practical implications

In the majority of cases included in this paper, it is found that the insider convey a number of warning signs before committing the security breach. After reading this paper, diligent managers should be able to identify potential security breaches.

Originality/value

This is one of the first studies to explore insider security breaches using canonical analysis.

Details

Information Management & Computer Security, vol. 17 no. 4
Type: Research Article
DOI: https://doi.org/10.1108/09685220910993962
ISSN: 0968-5227

Keywords

  • Data security
  • Behaviour
  • Motivation (psychology)

To view the access options for this content please click here
Article
Publication date: 1 August 2000

Shielding your company against information compromise

Marilyn M. Helms, Lawrence P. Ettkin and Daniel J. Morris

With the growth of information technologies and with more firms partnering, a major concern for organizations today is the protection of competitive information from…

HTML
PDF (168 KB)

Abstract

With the growth of information technologies and with more firms partnering, a major concern for organizations today is the protection of competitive information from thieving. Firms must develop an understanding of the multidimensional flavor of defensive intelligence and its challenges in a bureaucracy, examine companies’ vulnerabilities and implement some basic defensive intelligence measures in order to protect their organization’s knowledge. Organizations must address major areas of vulnerabilities, including employees, partners and public information. Firms can take specific actions to minimize successful acts of espionage such as protections preventing unauthorized use of information systems. Companies should develop a set of priorities and determine where and to what degree security procedures need to be implemented. Beyond security, employing proactive measures can provide a valuable weapon for the long‐term prosperity of your firm.

Details

Information Management & Computer Security, vol. 8 no. 3
Type: Research Article
DOI: https://doi.org/10.1108/09685220010339228
ISSN: 0968-5227

Keywords

  • Companies
  • Computer security
  • Intelligence
  • Information

To view the access options for this content please click here
Book part
Publication date: 29 February 2008

Academia, surveillance, and the FBI: A short history

Scott G. White

Whenever America has fought wars, civil liberties are compromised. Led by Hoover, whose career began in the Library of Congress, the FBI has historically conducted…

HTML
PDF (188 KB)

Abstract

Whenever America has fought wars, civil liberties are compromised. Led by Hoover, whose career began in the Library of Congress, the FBI has historically conducted questionable surveillance, often spying illegally on American citizens. There is a history of FBI surveillance in the Academy, including surveillance in libraries. Researchers, students, and librarians have been the subjects of FBI surveillance efforts. Today, the Patriot Act has reignited concerns about FBI surveillance in academic institutions. Librarians have often led the fight against limits imposed on accessing information. This is a short history of the conflict between the Academia and FBI surveillance.

Details

Surveillance and Governance: Crime Control and Beyond
Type: Book
DOI: https://doi.org/10.1016/S1521-6136(07)00207-2
ISBN: 978-0-7623-1416-4

To view the access options for this content please click here
Article
Publication date: 1 October 2000

Issues in the illegal transference of US information technologies

Daniel J. Morris, Lawrence P. Ettkin and Marilyn M. Helms

US intellectual property (IP) is a key target of numerous other countries and individuals. Of specific interest to outsiders are technological resources. Illegally…

HTML
PDF (143 KB)

Abstract

US intellectual property (IP) is a key target of numerous other countries and individuals. Of specific interest to outsiders are technological resources. Illegally transferring information can range from the extreme of the often‐glamorized international espionage to the more traditional and common gathering of competitive intelligence (CI). This paper will review the key issues in the illegal transference of information technologies from the USA, will outline the role of other countries involved, and will discuss the impact on key, targeted industries. In particular the illegal attempts to procure key intellectual properties from technology firms will be discussed. In addition, the paper will distinguish between corporate intelligence, espionage, and economic espionage.

Details

Information Management & Computer Security, vol. 8 no. 4
Type: Research Article
DOI: https://doi.org/10.1108/09685220010344916
ISSN: 0968-5227

Keywords

  • Competitor intelligence
  • Intellectual property
  • Theft
  • USA
  • New technology

To view the access options for this content please click here
Article
Publication date: 16 May 2008

Fighting economic espionage with state trade secret laws

Carl J. Pacini, Raymond Placid and Christine Wright‐Isak

The purpose of this paper is to provide an overview of trade secrets, reasonable steps to preserve secrecy, trade secret value, misappropriation methods used to acquire…

HTML
PDF (111 KB)

Abstract

Purpose

The purpose of this paper is to provide an overview of trade secrets, reasonable steps to preserve secrecy, trade secret value, misappropriation methods used to acquire trade secrets, various legal remedies, and internal controls to protect trade secrets.

Design/methodology/approach

A sample of types of civil trade secret cases is highlighted. The paper includes a statutory and legal case study analysis of the elements in a civil trade secrets lawsuit. Analysis of actual trade secret court cases illustrates the importance of private civil lawsuits in combating intellectual property fraud.

Findings

This paper shows the serious impact of trade secret espionage on the success and survival of businesses and the necessity of proving each element of a civil claim under state trade secret law. Also, practical steps necessary to protect an entity's trade secrets are discussed.

Practical implications

This paper raises the awareness of executives, managers, internal and external auditors, forensic accountants and other interested parties about the severity of trade secret espionage. Also, this paper highlights numerous steps to protect trade secrets.

Originality/value

This paper fills an identified need to inform those involved in the fight against economic crime about the importance of state trade secret laws and internal controls in the fight against intellectual property fraud.

Details

International Journal of Law and Management, vol. 50 no. 3
Type: Research Article
DOI: https://doi.org/10.1108/17542430810877454
ISSN: 1754-243X

Keywords

  • – Fraud
  • United States of America
  • Intellectual property
  • Espionage
  • Trade secrets
  • Law

To view the access options for this content please click here
Article
Publication date: 1 March 1999

Industrial espionage and competitive intelligence: one you do; one you do not

Phillip C. Wright and Géraldine Roy

This paper discusses the difference between industrial‐espionage and competitive intelligence so that practicing managers will be more able to formulate policy in this…

HTML
PDF (71 KB)

Abstract

This paper discusses the difference between industrial‐espionage and competitive intelligence so that practicing managers will be more able to formulate policy in this critical area. As well, procedures for securing information as part of a competitive intelligence process are outlined.

Details

Journal of Workplace Learning, vol. 11 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/13665629910260743
ISSN: 1366-5626

Keywords

  • Competitor intelligence
  • Espionage

To view the access options for this content please click here
Article
Publication date: 14 January 2019

Data flows and national security: a conceptual framework to assess restrictions on data flows under GATS security exception

Martina Francesca Ferracane

The paper aims to explore the national security implications of a potential for a World Trade Organization (WTO) dispute on data flow restrictions. It proposes a basic…

HTML
PDF (335 KB)

Abstract

Purpose

The paper aims to explore the national security implications of a potential for a World Trade Organization (WTO) dispute on data flow restrictions. It proposes a basic conceptual framework to assess data flows’ restrictions under General Agreement on Trade in Services (GATS) security exception.

Design/methodology/approach

If a case were to be brought before the WTO dispute settlement, the defender could support its case by invoking the security exception. This paper analyzes three main arguments that could be brought up: protection from cyber espionage, protection from cyberattacks on critical infrastructure and access to data needed to prevent terrorist threats. These three cases are analyzed both legally and technically to assess the relevance of restrictions on data flows under GATS security exception. This analysis can, more generally, inform the debate on the protection of national security in the digital era.

Findings

In the three cases, restrictions on data considered critical for national security might raise the cost of certain attacks. However, the risks would remain pervasive and national security would not be significantly enhanced both legally and technically. The implementation of good security standards and encryption techniques appears to be a more effective way to ensure a better response to cyber threats. All in all, it will be important to investigate on a case by case basis whether the scope of the measure (sectors and data covered) is considered proportionate and whether the measure in question in practice reduces the exposure of the country to cyber espionage, cyberattacks and terrorist threats.

Originality/value

This paper represents a contribution to the literature because it is the first paper to address systematically the issue of data flows and national security in the context of a GATS dispute and because it provides a unique perspective that looks both at legal and technical arguments.

Details

Digital Policy, Regulation and Governance, vol. 21 no. 1
Type: Research Article
DOI: https://doi.org/10.1108/DPRG-09-2018-0052
ISSN: 2398-5038

Keywords

  • WTO
  • Cybersecurity
  • GATS
  • National security
  • Data flows
  • Digital trade

To view the access options for this content please click here
Article
Publication date: 17 July 2009

Intellectual capital and economic espionage: new crimes and new protections

Herbert Snyder and Anthony Crescenzi

Intellectual capital's (IC's) rising value in the production of wealth has been mirrored by its increasing vulnerability to crime. Among these are the increasing frequency…

HTML
PDF (81 KB)

Abstract

Purpose

Intellectual capital's (IC's) rising value in the production of wealth has been mirrored by its increasing vulnerability to crime. Among these are the increasing frequency of cybercrime, the intangible nature of IC which facilitates theft and the lack of legal remedies for the theft of IC. Taken together, these factors have created a new environment in which IC is uniquely at risk from financial crime. The purpose of this paper is to attempt to examine the efficacy in current legal remedies and formulate suggestions for better protecting IC.

Design/methodology/approach

The analysis is conceptual, using frameworks drawn from legal scholarship and traditional views of law‐enforcement practice.

Findings

This paper explores the risks of crime inherent in IC and a distributed cyber environment in greater detail in order to demonstrate that traditional legal remedies are largely ineffective to protect IC property rights and that, given this policy environment and the nature of IC itself, prevention is the only reasonable means for protecting IC.

Research limitations/implications

Conceptual papers offer an intrinsically different form of evidence than empirical studies. Significant public debate prior to enacting legislation and subsequent empirical testing of the paper's propositions, if enacted into legislation, are strongly encouraged.

Practical implications

The paper includes implications for the development of legal protections based on guarding sensitive information at its source, rather than traditional reactive policing and legal actions after a theft has been committed.

Originality/value

This paper fulfils an identified need to propose useful and concrete legal solutions that deal with the increasing importance of IC and the concomitant frequency of crimes that involve its theft.

Details

Journal of Financial Crime, vol. 16 no. 3
Type: Research Article
DOI: https://doi.org/10.1108/13590790910973089
ISSN: 1359-0790

Keywords

  • Intellectual capital
  • Crime
  • Theft
  • Data security

To view the access options for this content please click here
Article
Publication date: 1 January 1998

Ethical business intelligence is NOT Mission Impossible

Bill Fiora

Business intelligence is one of the fastest growing disciplines in corporate America. To many, however, the words conjure up images of trench coats and meetings in back…

HTML
PDF (207 KB)

Abstract

Business intelligence is one of the fastest growing disciplines in corporate America. To many, however, the words conjure up images of trench coats and meetings in back alleys. Unfortunately, recent events only serve to reinforce these fears. Earlier this year, for example, Volkswagen agreed to pay $100 million to General Motors after the U.S. firm alleged that VW used documents pilfered by an ex‐GM executive to its competitive advantage. More recently, Johnson & Johnson and Boehringer Mannheim settled out of court after trading accusations of improper activities, including infiltrating company meetings and taking confidential documents. Even more unsettling to some may be the passage of the Economic Espionage Act in 1996.

Details

Strategy & Leadership, vol. 26 no. 1
Type: Research Article
DOI: https://doi.org/10.1108/eb054611
ISSN: 1087-8572

Access
Only content I have access to
Only Open Access
Year
  • Last week (4)
  • Last month (6)
  • Last 3 months (15)
  • Last 6 months (36)
  • Last 12 months (80)
  • All dates (724)
Content type
  • Article (484)
  • Book part (127)
  • Expert briefing (72)
  • Executive summary (27)
  • Earlycite article (11)
  • Case study (2)
  • Graphic analysis (1)
1 – 10 of 724
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2021 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window
Manage cookies

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here