848 results on '"Industrial Espionage"'
Search Results
2. Rekabet İstihbaratı ve Endüstriyel Casusluk: Ulusal Güvenlik Perspektifinden Bir Değerlendirme.
- Author
-
Gök, Ali and Akçacı, Taner
- Abstract
Copyright of Journal of Eurasian Inquiries / Avrasya Incelemeleri Dergisi is the property of Journal of Eurasian Inquiries / Avrasya Incelemeleri Dergisi and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
3. EWOLUCJA SZPIEGOSTWA BIZNESOWEGO: OD KONKURENCJI PRZEMYSŁOWEJ DO CYBERPRZESTRZENI.
- Author
-
KOZŁOWSKI, Kajetan
- Abstract
Copyright of Management & Quality / Zarządzanie i Jakość is the property of Scientific Society of Organization & Management / Towarzystwo Naukowe Organizacji i Kierownictwa and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
4. Digital Transformation and Cyber Threats for Small and Medium Sized Enterprises
- Author
-
Härting, Ralf-Christian, Schulz, Greg-Norman, Deffner, Demian, Karg, Christoph, Howlett, Robert J., Series Editor, Jain, Lakhmi C., Series Editor, Jezic, Gordan, editor, Chen-Burger, J., editor, Kusek, M., editor, Sperka, R., editor, and Howlett, R. J., editor
- Published
- 2023
- Full Text
- View/download PDF
5. Dynamic Pricing with Uncertain Capacities.
- Author
-
Garcia, Daniel, Janssen, Maarten C. W., and Shopova, Radostina
- Subjects
TIME-based pricing ,AIRLINE tickets ,REVENUE management ,PRICE increases ,PRICES ,MARKETING management ,HEALTH insurance exchanges - Abstract
In markets, such as those for airline tickets and hotel accommodations, firms sell time-dated products and have private information about unsold capacities. We show that competition under private information may explain observed phenomena, such as increased price dispersion and higher expected prices toward the deadline. We also show that private information severely limits the market power of firms and that information exchange about capacity increases firms' profits. Finally, we inquire into the incentives to unilaterally disclose information or to engage in espionage about rival's capacity and show that they increase firms' profits compared with the private information setting. This paper was accepted by Omar Besbes, revenue management and market analytics. Funding: This work was partially funded by the Austrian Science Foundation FWF under [Project FG 6]. Supplemental Material: The online appendix is available at https://doi.org/10.1287/mnsc.2022.4613. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
6. Technology Scouting
- Author
-
de Weck, Olivier L. and De Weck, Olivier L.
- Published
- 2022
- Full Text
- View/download PDF
7. An Enlightened Expert on the Movement and Globalization of Civil Engineering: Augustin Betancourt (1756–1824)
- Author
-
Gouzevitch, Irina, Borgato, Maria Teresa, editor, and Phili, Christine, editor
- Published
- 2022
- Full Text
- View/download PDF
8. The organisational structure of the economic security service of the enterprise and the main functions of its divisions
- Author
-
A. N. Shchapov
- Subjects
enterprise ,economic security service ,organisational structure ,functions of units ,industrial espionage ,intelligence units ,illegal intelligence methods ,counterintelligence units ,threats to economic security ,measures to counter threats ,Sociology (General) ,HM401-1281 ,Economics as a science ,HB71-74 - Abstract
In order to make science-based decisions related to business security by the owners and management of the enterprise, the following tasks are solved in the article: the organisational structure of the economic security service of the enterprise, as well as the main functions of its divisions, are developed. The relevance of solving these problems is primarily due to the low efficiency of law enforcement agencies in protecting property rights and economic interests of domestic entrepreneurs. The scientific novelty of the study lies in the development of a basic, universal organisational structure of the economic security service of a modern enterprise. Starting from the goal of creating an economic security service, using a systematic and risk-oriented approach, its tasks have been collected, defined and comprehensively analyzed. Taking into account the increased complexity and confidentiality of tasks, based on the structural and functional approach, the functions of the economic security service of the enterprise were formulated, which were structured and distributed to specific departments. Elements of scientific novelty are also the recognition of the existence of intelligence units of the economic security service of enterprises operating in violation of the law, as well as an analysis of their functions in order to develop the organisational structure of counterintelligence units.
- Published
- 2022
- Full Text
- View/download PDF
9. Facing cyberthreats in a crisis and post-crisis era: Rethinking security services response strategy
- Author
-
Matthieu J. Guitton and Julien Fréchette
- Subjects
Counterintelligence ,Cybercriminality ,Cybersecurity ,Industrial espionage ,Police forces ,Security forces ,Electronic computers. Computer science ,QA75.5-76.95 ,Psychology ,BF1-990 - Abstract
The recent years have witnessed two major events that have deeply impacted cybersecurity threats. First, the COVID-19 pandemic has drastically increased our dependence upon technology. From individuals to corporations and governments, the overwhelming majority of our activities moved online. As the proportion of human activities performed online is reaching new peaks, cybersecurity becomes a problem of national security. Second, the Russia-Ukraine war is giving us a glimpse of what cyberthreats may look like in future cyberconflicts. From data integrity to identity thievery, and from industrial espionage to hostile manoeuvres from foreign powers, cyberthreats have never been that numerous and diverse. Due to the increase of the magnitude, of the diversity, and of the complexity of cyberthreats, the current security strategies used to face cybercriminality won't be sufficient in the post-crisis era. Therefore, governments need to rethink globally their national security services response strategy. This paper analyses how this new context has impacted cybersecurity for individuals, corporations, and governments, and emphasis the need to reposition the economical identity of the individuals at the center of security response. We propose strategies to optimize law enforcement response from police to counterintelligence, notably through formation, prevention, and interaction with cybercriminality. We then discuss the possibilities to optimize the articulation of the different levels of security response and expertise, by emphasizing the need for coordination between security services, and by proposing strategies to include non-institutional players.
- Published
- 2023
- Full Text
- View/download PDF
10. An Intelligence Criminal Tracker for Industrial Espionage : Applying Digital Data Acquired Onsite to Target Criminals
- Author
-
Dokko, Jieun, Shin, Michael, Park, Soo Young, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin (Sherman), Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Goel, Sanjay, editor, Gladyshev, Pavel, editor, Johnson, Daryl, editor, Pourzandi, Makan, editor, and Majumdar, Suryadipta, editor
- Published
- 2021
- Full Text
- View/download PDF
11. Illegal Receipt of Information Containing Trade Secrets (Commercial Espionage) as a Threat to Fair Competition
- Author
-
Sevalnev, Viacheslav V., Trunzevskiy, Uriy V., Tsirin, Artem M., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Popkova, Elena G., editor, and Sergi, Bruno S., editor
- Published
- 2020
- Full Text
- View/download PDF
12. Corporate intelligence as a competitive fighting tool
- Author
-
M. M. Begichev, S. A. Potapov, and A. V. Vlasov
- Subjects
competitive intelligence ,industrial espionage ,competitive advantage ,competitors ,the internet ,Business ,HF5001-6182 - Abstract
All existing companies today want not only to remain in the service market, but also to gain a foothold in it, and methodically develop from year to year. And in the modern world, this is simply impossible to imagine without corporate intelligence. Those firms that did not realize this in time simply went bankrupt or their business does not develop, and economic indicators remain in one place from year to year. Today, there is a wide variety of ways of business intelligence in the world. All types of competitive intelligence can be divided into two large groups: direct and indirect business intelligence. Let’s look at each of them in more detail. A separate subspecies is business intelligence, which can relate to both indirect and direct intelligence, depending on the surrounding circumstances.
- Published
- 2021
- Full Text
- View/download PDF
13. The threat of industrial espionage for SME in the age of digitalization.
- Author
-
Härting, Ralf-Christian, Bühler, Lena, Winter, Katharina, and Gugel, Anna
- Subjects
BUSINESS intelligence ,OPTICAL disks ,DIGITAL technology ,INDUSTRIAL capacity ,TRADE secrets ,EMPLOYEE training ,CONCEPTUAL models - Abstract
The digital revolution has been gathering pace for years. Companies benefit significantly from digital data and the fast processing of high storage volumes. However, it is also necessary to consider the threats to companies that arise from digital espionage attempts. The aim of this study is to identify determinants with a significant impact on the threat potential of industrial espionage in SME. It is based on a qualitative approach and a content analysis according to Mayring. The study proves that employee training plays a major role in preventing industrial espionage. In addition, the degree of innovation and the nature of trade secrets also play a major role. It should also be contemplated whether companies are targeted victims or are more at risk from large-scale automated attacks. Based on the findings a revised conceptual model has been created. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
14. A Digital Forensic Investigation and Verification Model for Industrial Espionage
- Author
-
Dokko, Jieun, Shin, Michael, Akan, Ozgur, Series Editor, Bellavista, Paolo, Series Editor, Cao, Jiannong, Series Editor, Coulson, Geoffrey, Series Editor, Dressler, Falko, Series Editor, Ferrari, Domenico, Series Editor, Gerla, Mario, Series Editor, Kobayashi, Hisashi, Series Editor, Palazzo, Sergio, Series Editor, Sahni, Sartaj, Series Editor, Shen, Xuemin (Sherman), Series Editor, Stan, Mircea, Series Editor, Xiaohua, Jia, Series Editor, Zomaya, Albert Y., Series Editor, Breitinger, Frank, editor, and Baggili, Ibrahim, editor
- Published
- 2019
- Full Text
- View/download PDF
15. Cooperating with Moscow, Stealing in California: Poland’s Legal and Illicit Acquisition of Microelectronics Knowhow from 1960 to 1990
- Author
-
Sikora, Mirosław, Rannenberg, Kai, Editor-in-Chief, Goedicke, Michael, Editorial Board Member, Tatnall, Arthur, Editorial Board Member, Neuhold, Erich J., Editorial Board Member, Tröltzsch, Fredi, Editorial Board Member, Pries-Heje, Jan, Editorial Board Member, Kreps, David, Editorial Board Member, Reis, Ricardo, Editorial Board Member, Furnell, Steven, Editorial Board Member, Winckler, Marco, Editorial Board Member, Malaka, Rainer, Editorial Board Member, Pras, Aiko, Editorial Board Member, Sakarovitch, Jacques, Editorial Board Member, Furbach, Ulrich, Editorial Board Member, Leslie, Christopher, editor, and Schmitt, Martin, editor
- Published
- 2019
- Full Text
- View/download PDF
16. Industrial espionage revisited: Host country–foreign multinational corporation legal disputes and the postcolonial imagery.
- Author
-
Lyan, Irina and Frenkel, Michal
- Subjects
BUSINESS intelligence ,INTERNATIONAL business enterprises ,CRITICAL discourse analysis ,FOREIGN corporations ,EMBEDDEDNESS (Socioeconomic theory) - Abstract
In this article, we take a postcolonial management approach to exploring the lingering significance of postcolonial imagery in shaping legal disputes between host country and foreign multinational corporations. We apply a critical discourse analysis to the Korea versus Orbotech industrial espionage lawsuit, in which the Korean government accused a foreign multinational corporation of leaking its 'national core technology'. Through this analysis we demonstrate how industrial espionage discourse was used to fight Korea's negative reputation as a technological imitator, associate Korea with global technological leaders, and disassociate itself from other 'imitators'. In response, Orbotech's industrial espionage discourse has aimed to reproduce Korea's imitator stigma. Our findings highlight the continual role of the imagined North/South and West/rest symbolic boundaries in constructing global business hierarchies even when the marginalized party—Korea—has already moved to the elite economies club. While international management studies rarely address industrial espionage beyond its technical meaning, we underline the embeddedness of industrial espionage as a discourse in maintaining and disrupting the geopolitical business landscape. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
17. ECONOMIC INTELLIGENCE. IN SEARCH OF A CONCEPTUAL FRAMEWORK.
- Author
-
CHIRU, Irena and UNGUREANU, Gabriel-Traian
- Subjects
BUSINESS intelligence ,ECONOMIC security ,ECONOMIC systems ,OPERATIONAL definitions ,LEGITIMACY of governments - Abstract
In the last decade, we have witnessed a significant shift in the way local, regional, or global confrontations are performed with specific roles being attributed to the economic intelligence systems. By executing intelligence and counterintelligence operations, the economic intelligence systems are operating in confluence areas bringing together intelligence communities, governmental and diplomacy apparatus, and the business actors. Also, recently, revamped forms of warfare have illustrated how economic leverage is frequently used in combined and versatile hybrid interventions against democratic state stability and legitimacy. Despite this intense employment of economic advantage, economic intelligence represents one of the concepts that is still looking for conceptual clarity as it is frequently used in conjunction with other proxy terms (i.e., business intelligence, industrial espionage, competitive intelligence, economic security, and economic espionage), while its meaning ascribed in different contexts is rarely explicit. Starting from the premise that when lacking clarification, concepts become broad, ambiguous, and difficult to apply, the paper aims to bring forward conceptual clarifications by exploring and comparing various definitions existing in the literature while seeking to advance an operational definition for economic intelligence. [ABSTRACT FROM AUTHOR]
- Published
- 2021
18. RAZLIKE IZMEĐU LEGALNOG PRIKUPLJANJA INFORMACIJA OD KONKURENCIJE I INDUSTRIJSKE ŠPIJUNAŽE.
- Author
-
Gavrić, Tanja, Kapetan, Nataša, and Plavčić, Dario
- Abstract
Copyright of Transition: Journal of Economic & Politics of Transition / Tranzicija: Časopis za Ekonomiju i Politiku Tranzicije is the property of Ekonomski Institut Tuzla and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
19. Fighting industrial and economic espionage through criminal law: lessons to be learned from Austria and Switzerland.
- Author
-
Konopatsch, Cathrine
- Subjects
BUSINESS intelligence ,CRIMINAL law ,TRADE secrets ,PROTECTION of trade secrets ,INTERNATIONAL competition - Abstract
Empirical figures show that, especially in recent years, the frequency of industrial and economic espionage, and consequently its dangers and negative impact, has increased greatly worldwide. This has impacted not only the individual victims of the infringement of trade secrets, but also the national and global economies at large. This espionage cannot be tackled effectively through uncoordinated, stand-alone-actions of individual countries anymore. Instead, the global community must take a more holistic view and find universally acceptable strategies and standards, looking for best practices through the lens of comparative law. The paper compares and contrasts the legal approaches to the criminalisation of economic and industrial espionage in Switzerland and Austria. It aims to show the similarities and differences and to identify the strengths and weaknesses of each jurisdiction. The results are meant to enrich and to contribute to the discussions regarding efficient and commonly acceptable solutions to fighting economic and industrial espionage. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
20. Spies without borders? The phenomena of economic and industrial espionage and the deterrence strategies of Germany and other selected European countries.
- Author
-
Knickmeier, Susanne
- Subjects
BUSINESS intelligence ,TRADE secrets ,SPIES ,CRIMINAL procedure ,CRIME prevention - Abstract
Industrial and economic espionage are underestimated criminal offences. Although the phenomena are diffuse and ambiguous, they can result in enormous material and immaterial damage. Referring to results from the German research project WISKOS, the phenomenon of obtaining trade secrets (including the offenders, modi operandi, affected trade secrets, outflow of trade secrets and detection abilities) are described, as too are possible countermeasures and associated law enforcement difficulties. Considering the phenomenological results, potential preventive measures based on the situational crime prevention and deterrence strategies are listed. Legal regulations and sanctions in Austria, Bulgaria, Denmark, Germany, Switzerland and the United Kingdom are compared. Lastly, based on the outcomes of criminal proceedings, it is discussed whether the existing criminal law is an appropriate measure to deter potential offenders. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
21. A socio-technical perspective to counter cyber-enabled industrial espionage.
- Author
-
Sadok, Moufida, Welch, Christine, and Bednar, Peter
- Subjects
BUSINESS intelligence ,DIGITIZATION - Abstract
The ubiquitous digitization of information and the pervasive connectivity of work systems have inevitably facilitated cyber-enabled industrial espionage. Security failures explain most of cyber industrial espionage incidents, and insider threats represent a significant pattern in many case examples. Insiders can inadvertently or purposefully pose serious threats to organisations by facilitating access to or misuse of proprietary sensitive data. This paper argues that technical security solutions have rather limited scope to tackle this problem, and that a socio-technical approach has potential to provide a better means to address the challenge of preventing and responding to insider threats. Such an approach could bridge the gap between the design and implementation of security solutions and creation of an organisational culture that is security-aware. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
22. An exploration of the necessary competencies of professional police investigators for industrial espionage cases in South Korea.
- Author
-
Lee, Seoungyong, Lee, Julak, and Jung, Jeyong
- Subjects
BUSINESS intelligence ,PRIVATE police ,JOB analysis ,POLICE ,COMPUTER systems - Abstract
Most of the research on the role of police in the protection of industrial technology has recommended the expansion of police departments and the provision of education to strengthen the expertise of investigators. However, no research has sought to identify which specific expertise should be strengthened. This study analyzed which competencies are required by professional police investigators in industrial espionage cases to gain expertise. The study used the Developing A Curriculum (DACUM) technique, normally used to develop curriculum through job analysis. The study produced a series of competency items in three stages: (1) created a job model, (2) filtered out unnecessary competency items via expert reviews, and (3) verified the selected items via surveys and focus group interviews. Unnecessary items were filtered out throughout the study. The study found that "knowledge about laws related to industrial espionage," "case types and modus operandi," and "knowledge related to digital forensics and utilization of useful tools" are necessary competencies for the police investigating industrial espionage cases. Several non-essential but beneficial competencies were also found, such as "understanding of the latest technology trends," "knowledge of internal computer systems and relevant organizations," and "ability to use programs to design drawings or program source codes." [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
23. Espionaje y competitividad: la industria automotriz alemana en el juego comercial moderno de China.
- Author
-
Crespo-Pazmiño, Daniel F.
- Subjects
BUSINESS intelligence ,ECONOMIC security ,TECHNOLOGICAL innovations ,AUTOMOBILE industry ,INTERNATIONAL trade - Abstract
Copyright of URVIO - Revista Latinoamericana de Seguridad Ciudadana is the property of FLACSO - Ecuador (Facultad Latinoamericana de Ciencias Sociales) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
24. Computer Crimes
- Author
-
Kizza, Joseph Migga, Mackie, Ian, Series editor, and Kizza, Joseph Migga
- Published
- 2016
- Full Text
- View/download PDF
25. Interception of Computer Data
- Author
-
Androulidakis, Iosif, Kioupakis, Fragkiskos – Emmanouil, Androulidakis, Iosif, and Kioupakis, Fragkiskos – Emmanouil
- Published
- 2016
- Full Text
- View/download PDF
26. What Do Plants Want?
- Author
-
Farnell, Gary, Keetley, Dawn, editor, and Tenga, Angela, editor
- Published
- 2016
- Full Text
- View/download PDF
27. RAZLIKE IZMEĐU LEGALNOG PRIKUPLJANJA INFORMACIJA OD KONKURENCIJE I INDUSTRIJSKE ŠPIJUNAŽE.
- Author
-
Gavrić, Tanja, Kapetan, Nataša, and Plavčić, Dario
- Abstract
Copyright of Zbornik Radova / Proceedings SKEI (1986-5945) is the property of University Vitez, Bosnia & Herzegovina and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2019
28. Informational Support of Civilian Intelligence for Heavy Industry (Including Machine Industry) and the Energy Sector in the Polish People’s Republic in the Years 1970–1990
- Author
-
Mirosław Sikora
- Subjects
scientific-technical intelligence ,industrial espionage ,Poland ,Cold War ,Comecon ,Economic history and conditions ,HC10-1085 ,Finance ,HG1-9999 - Abstract
Throughout the existence of the Polish People’s Republic (PPR), its scientific and technical intelligence (S&TI) supported Polish mining, energy, metallurgy, and machine industries. Cooperation with companies and research and development centers intensified in the first half of the 1970s, as a natural consequence of the experience accumulated by the intelligence service in the previous fifteen years. The most crucial issues related to the improvement of secret methods of acquiring technologies for the Polish economy were defining the scope of the tasks, i.e. the types of technologies which can be acquired by intelligence or purchased in the black market, selecting objects, (i.e. institutions and organizations with the required knowledge), and recruiting personal sources of information in western facilities. Apart from acquiring specific solutions S&TI also developed analyses related to specific countries, as well as to specific technologies in the global aspect or to international corporations that possessed the technologies. Furthermore, S&TI was engaged by the Polish government to provide information to the Ministry of Foreign Affairs and the Ministry of International Trade during trade negotiations with foreign contractors. Author draws the history of Polish S&TI during the 70s and 80s, showcasing its operations, explaining its modus operandi and discussing the question about the efficiency of illicit transfer of know-how from OECD for the purposes technical progress in communist Poland. Article bases on recently declassified documents of Polish intelligence service from the pre-1990 period. There are moreover other archival records as well as secondary sources explored.
- Published
- 2019
- Full Text
- View/download PDF
29. Industrial Espionage
- Author
-
Ferdinand, Jason, Augier, Mie, editor, and Teece, David J., editor
- Published
- 2018
- Full Text
- View/download PDF
30. СРАВНИТЕЛЬНО-ПРАВОВОЙ АНАЛИЗ ПРАВА НА КОММЕРЧЕСКУЮ ТАЙНУ: ОТЕЧЕСТВЕННАЯ ПРАКТИКА И ЗАРУБЕЖНЫЙ ОПЫТ
- Subjects
information security ,trade secret ,способы защиты ,industrial espionage ,информационная безопасность ,коммерческая тайна ,промышленный шпионаж ,разглашение и распространение ,disclosure and dissemination ,закрытая информация ,объект прав интеллектуальной собственности ,classified information ,незаконное завладение ,intellectual property rights to trade secrets ,illegal acquisition ,methods of protection ,права интеллектуальной собственности на коммерческую тайну ,object of intellectual property rights - Abstract
В данной статье проводится анализ проблем защиты прав на коммерческую тайну в отечественной правоприменительной практике, а также исследуется международный опыт в сфере приведенной проблематики. Проведен правовой анализ норм действующего отечественного законодательства, которые направлены на защиту сведений, составляющих коммерческую тайну. Исследована судебная практика, а также практика соответствующих уполномоченных органов государственной власти Российской Федерации. Установлено, что страны с западными правовыми системами, в частности страны Европы, сегодня активно создают и принимают нормативно-правовые акты, направленные на защиту коммерческой тайны. Учитывая специфику исследуемого объекта прав интеллектуальной собственности и на основании анализа международного опыта выявлено, что национальные подходы к способам защиты прав интеллектуальной собственности на коммерческую тайну являются недостаточно эффективными, поскольку не предусматривают и не обеспечивают максимальной материальной сатисфакции для лица, права которого нарушены, и достаточно суровых последствий для лица-нарушителя. Предлагается дополнить действующее законодательство нормами, которые бы предусматривали такие способы защиты прав на коммерческую тайну, как запрет производства, предложения, размещение на рынке или использование контрафактных товаров или импорта, экспорта или хранение контрафактных товаров для достижения этих целей; отзыв контрафактной продукции с рынка; изменение контрафактных товаров для лишения их соответствующего качества; уничтожение контрафактных товаров или в соответствующих случаях их выведения с рынка при условии, что такое решение не нарушает соответствующей защиты коммерческой тайны., This article analyzes the problems of protecting the rights to trade secrets in domestic law enforcement practice, and also examines international experience in the field of the above issues. The legal analysis of the norms of the current domestic legislation, which are aimed at protecting information constituting a trade secret, is carried out. The judicial practice, as well as the practice of the relevant authorized state authorities of the Russian Federation, is investigated. It has been established that countries with Western legal systems, in particular European countries, are actively creating and adopting regulatory legal acts aimed at protecting trade secrets. Taking into account the specifics of the object of intellectual property rights under study and based on the analysis of international experience, it has been revealed that national approaches to ways of protecting intellectual property rights to trade secrets are insufficiently effective, since they do not provide and do not provide maximum material satisfaction for the person whose rights have been violated, and sufficiently severe consequences for the violator. It is proposed to supplement the current legislation with norms that would provide for such methods of protecting trade secret rights as prohibiting the production, supply, placement on the market or use of counterfeit goods or import, export or storage of counterfeit 23 ОБЩЕСТВО И ГОСУДАРСТВО goods to achieve these goals; recall of counterfeit products from the market; modification of counterfeit goods to deprive them of their appropriate quality; destruction of counterfeit goods or, in appropriate cases, their withdrawal from the market, provided that such a decision does not violate the relevant protection of trade secrets.
- Published
- 2023
- Full Text
- View/download PDF
31. Industrial espionagem : mapping meanings and assessing trends
- Author
-
Carmo, Ana Rita Almeida do, Mendonça, Sandro, and Damásio, Bruno
- Subjects
Espionagem industrial ,Espionagem comercial ,Bibliometria ,Bibliometrics ,Economic espionage ,Industrial espionage ,Espionagem económica ,Commercial espionage - Abstract
Mestrado Bolonha em Economia e Gestão de Ciência, Tecnologia e Inovação Ever since the term “industrial espionage” exists, authors have been struggling with its definition. It is a multi-sided method used mainly for the purpose of obtaining trade secrets from competitors in the market, however, its methods may be numerous. Based on the existing research produced by the scientific community on the subject, we produced a bibliometric review regarding the same. Bibliometrics has an important role in the analysis of research production. Indicators regarding publication output and impact constitute an evidence base that helps to reveal the rhythm and direction of scientific agendas, technical concerns, and socio-economic/political debates. In this dissertation, we focus on a key topic that lies at the intersection of innovation studies and security studies and, we present a qualitative and quantitative analysis of the existing research regarding industrial espionage. For this analysis, publications in the Scopus database were used, analyzing, and processing them using the R studio analysis tool. The number of publications on industrial espionage is still relatively low, but there has been a positive trend in recent years. Through this analysis it was possible to verify the most productive authors and journals in this area, as well as to identify subtopics within industrial espionage that have the potential to be deepened in the future, and which are no longer so relevant for the scientific community. Through the Network analysis it was also concluded that the topic of industrial espionage is very broad, and that it is present in several other backgrounds and areas of study. Desde que o termo "espionagem industrial" existe, autores têm-se debatido com a sua definição. É um método multifacetado utilizado principalmente com o objetivo de obter segredos de negócio dos seus concorrentes, no entanto, os seus métodos podem ser numerosos. Com base na investigação existente, produzida pela comunidade científica sobre o tema, produzimos uma revisão bibliométrica sobre o mesmo. A bibliometria tem um papel fundamental na análise da produção da investigação. Os indicadores relativos à produção e impacto da publicação constituem uma base de evidência que ajuda a revelar o ritmo e a direção das agendas científicas, preocupações técnicas, e debates socioeconómicos ou políticos. Nesta dissertação, concentramo-nos num tema chave que se situa na intersecção de estudos de inovação e estudos de segurança e, apresentamos uma análise qualitativa e quantitativa da pesquisa existente relativamente ao tema de espionagem industrial. Para esta análise, foram utilizadas publicações que se encontravam na base de dados Scopus, analisando e processando os mesmos através da ferramenta de análise R Studio. Verificou-se ainda um número relativamente baixo de publicações concerne espionagem industrial, no entanto há uma tendência positiva nos últimos anos. Através desta análise foi possível verificar os autores e revistas mais produtivos nesta área, bem como identificar subtópicos dentro de espionagem industrial que tem potencial e ser aprofundados no futuro, e quais já não são tão relevantes de análise para a comunidade científica. Através da análise de Network conclui-se também que o tópico de espionagem industrial é muito abrangente, sendo que o mesmo está presente em várias outras backgrounds e áreas de estudo. info:eu-repo/semantics/publishedVersion
- Published
- 2023
32. Wirtschafts- und Industriespionage. Das Elaboration-Likelihood-Model als Persuasionsinstrument zur Sensibilisierung im Bereich Informationssicherheit und Informationsschutz
- Author
-
Buchner, Mario
- Subjects
Elaboration-Likelihood-Model ,persuasion ,Sensibilisierung ,Persuasion ,industrial espionage ,economic espionage ,awareness ,Industriespionage ,Wirtschaftsspionage - Abstract
Für die Stabilität und Entwicklung eines Staates sowie der Gesellschaft braucht es eine funktionierende Wirtschaft. Diese Funktionalität ist abhängig vom Schutz der Geschäfts- und Betriebsgeheimnisse, welche zunehmend durch das facettenreiche Kriminalitätsfeld der Wirtschafts- und Industriespionage gefährdet werden. Die Studien der letzten Jahre zeigen, dass speziell klein- und mittelständische Unternehmen ihre volkswirtschaftliche Bedeutung unterschätzen. Durch die Dissonanz der subjektiven Risikoeinschätzung gegenüber den objektiv vorherrschenden Gefährdungen, fehlen ganzheitliche Abwehrstrategien, welche ein ungewolltes Abfließen von Informationen verhindern sollen. Dabei ist der Faktor Mensch eine bedeutsame Schlüsselrolle für das Sicherheitsbewusstsein innerhalb einer Organisation. Die Sensibilisierungsmaßnahmen der Vergangenheit zeigten zu wenig Wirkung, weshalb es neue Ansätze zur Bewusstseinsbildung im Bereich Wirtschafts- und Industriespionage braucht. Diese Problematik wird in der vorliegenden Arbeit durch den Einsatz der Modelllogik des Elaboration-Likelihood-Model von Petty und Cacioppo behandelt. Das in den 1980er Jahren entwickelte sozialpsychologische Modell wird als Gold-Standard in der Persuasionsforschung beschrieben und wurde bislang noch nicht zur Sensibilisierung von Wirtschafts- und Industriespionage berücksichtigt. Im Rahmen dieser Forschungsarbeit wurde aufgrund der durchgeführten Experteninterviews deutlich, dass die Rahmenbedingungen des Elaboration-Likelihood-Model in der Praxis anwendbar sind, jedoch die Routenlogik in der Kommunikationswirklichkeit nicht bestätigt werden konnte. Die Theorie, der überwiegend zentralen oder peripheren Informationsverarbeitung, spiegelte sich nicht in den berufsspezifischen Erfahrungen der Interviewpartner wider. Daraus ergibt sich, dass die determinierenden Kernprinzipien für die Sensibilisierung in Bezug auf Informationsschutz und Informationssicherheit anwendbar sind. Das Elaboration-Likelihood-Model ist damit in seinen Grundzügen ein mögliches Persuasionsinstrument für die Bewusstseinsbildung in Bezug auf Wirtschafts- und Industriespionage. A functioning economy is necessary for the stability and development of a state and society. This functionality depends on the protection of business and trade secrets, which are increasingly endangered by the multifaceted criminal field of economic and industrial espionage. Studies in recent years have shown that small and medium-sized companies in particular underestimate their economic importance. Due to the dissonance between subjective risk assessment and objective threats, there is a lack of holistic defense strategies to prevent unintentional information leakage. In this context, the human factor plays a key role in security awareness within an organization. Awareness raising efforts in the past have been ineffective and new approaches are needed to raise awareness in the field of economic and industrial espionage. This problem is addressed in this paper using the model logic of Petty and Cacioppo's Elaboration-Likelihood Model. This social psychological model, developed in the 1980s, is considered the gold standard in persuasion research and has not yet been considered in the field of economic and industrial espionage awareness. In the context of this research work, it became clear from the expert interviews conducted that the framework of the Elaboration-Likelihood-Model is applicable in practice, but that the route logic could not be confirmed in the reality of communication. The theory of predominantly central or peripheral information processing was not reflected in the job-specific experiences of the interviewees. The result is that the determinant core principles are applicable to information security awareness. Thus, the Elaboration-Likelihood-Model in its basic features is a possi- ble persuasive tool for awareness raising regarding economic and industrial espionage.
- Published
- 2023
33. Computer Crimes
- Author
-
Kizza, Joseph Migga, Gries, David, Series Editor, Schneider, Fred B., Series Editor, and Kizza, Joseph Migga
- Published
- 2010
- Full Text
- View/download PDF
34. Informational Support of Civilian Intelligence for Heavy Industry (Including Machine Industry) and the Energy Sector in the Polish People's Republic in the Years 1970–1990.
- Author
-
Sikora, Mirosław
- Abstract
Throughout the existence of the Polish People's Republic (PPR), its scientific and technical intelligence (S&TI) supported Polish mining, energy, metallurgy, and machine industries. Cooperation with companies and research and development centers intensified in the first half of the 1970s, as a natural consequence of the experience accumulated by the intelligence service in the previous fifteen years. The most crucial issues related to the improvement of secret methods of acquiring technologies for the Polish economy were defining the scope of the tasks, i.e. the types of technologies which can be acquired by intelligence or purchased in the black market, selecting objects, (i.e. institutions and organizations with the required knowledge), and recruiting personal sources of information in western facilities. Apart from acquiring specific solutions S&TI also developed analyses related to specific countries, as well as to specific technologies in the global aspect or to international corporations that possessed the technologies. Furthermore, S&TI was engaged by the Polish government to provide information to the Ministry of Foreign Affairs and the Ministry of International Trade during trade negotiations with foreign contractors. Author draws the history of Polish S&TI during the 70s and 80s, showcasing its operations, explaining its modus operandi and discussing the question about the efficiency of illicit transfer of know-how from OECD for the purposes technical progress in communist Poland. Article bases on recently declassified documents of Polish intelligence service from the pre-1990 period. There are moreover other archival records as well as secondary sources explored. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
35. ChinaTech
- Author
-
Mackinnon, Alex, Powell, Barnaby, Mackinnon, Alex, and Powell, Barnaby
- Published
- 2008
- Full Text
- View/download PDF
36. Computer Crimes
- Author
-
Gries, David, editor, Schneider, Fred B., editor, and Kizza, Joseph Migga
- Published
- 2007
- Full Text
- View/download PDF
37. Intellectual Property, Industrial Espionage, and Cyber Security
- Author
-
Farley, Robert M., author and Isaacs, Davida H., author
- Published
- 2020
- Full Text
- View/download PDF
38. RFID Privacy: Challenges and Progress
- Author
-
Kaliski, Burt, Paulus, Sachar, Pohlmann, Norbert, and Reimer, Helmut
- Published
- 2004
- Full Text
- View/download PDF
39. Computer Crimes
- Author
-
Gries, David, editor, Schneider, Fred B., editor, and Kizza, Joseph Migga, editor
- Published
- 2003
- Full Text
- View/download PDF
40. Hacked by Bits and Pieces: What Can We Learn from an Example of Corporate Espionage?
- Author
-
Marvin Karlins and Jack Schafer
- Subjects
Hierarchy ,Computer science ,business.industry ,Social engineering (security) ,media_common.quotation_subject ,Information security ,Computer security ,computer.software_genre ,Information sensitivity ,Software ,Industrial espionage ,Reading (process) ,business ,computer ,media_common ,Hacker - Abstract
Information security often involves the development and application of sophisticated software to protect sensitive information stored in corporate computers. Yet, in this example of corporate espionage, a clever person, a cellphone and some readily available software were all it took to crack through one company’s advanced security barriers. By reading this article it is hoped that employees at all levels of an organization’s hierarchy will become more aware of—and recognize—how: 1) bits and pieces of seemingly harmless and easy-to-acquire information can be used for sinister purposes; 2) building rapport and trust with a person can make them more likely to become unknowing co-conspirators in a devious undertaking; and 3) how one must be constantly alert not to give out information without carefully considering the authenticity and justification of the source requesting it.
- Published
- 2021
- Full Text
- View/download PDF
41. Protecting Trade Secrets: Legal Challenges and Liabilities for Organizations.
- Author
-
Fitzpatrick, William M. and Dilullo, Samuel A.
- Abstract
Trade secret misappropriation or theft has been estimated to cost U.S. business firms $300 billion annually. Current/former employees and value chain partners have been identified as the primary culprits in this industrial espionage activity. Many corporate security protocols have been suggested as methods for attenuating this theft and protecting organizational trade secrets. However, many of these methodologies can serve to create significant legal challenges and liabilities for organizations choosing to implement them. This paper seeks to both document these legal issues and assist corporations in better balancing corporate security with the requirements of privacy, contract, labor and trade secret laws. [ABSTRACT FROM AUTHOR]
- Published
- 2017
42. Mara Hvistendahl, The Scientist and the Spy: A True Story of China, the FBI, and Industrial Espionage
- Author
-
Jason Morgan
- Subjects
Cultural Studies ,International relations ,History ,Sociology and Political Science ,Industrial espionage ,Political science ,Political Science and International Relations ,Economic history ,American studies ,South east asia ,China ,Asian studies - Published
- 2021
- Full Text
- View/download PDF
43. Competition issues in the implementation of global brands and the system of industrial espionage
- Author
-
Р. С. Каналиева and M. Болатхан
- Subjects
industrial espionage ,international relations ,new technologies ,markets ,competition ,International relations ,JZ2-6530 ,Comparative law. International uniform law ,K520-5582 - Abstract
Industrial espionage and competition issues in the modern world are becoming more ambitious shapes, thereby affecting all spheres of human activity. Create all things, ideas and services subject to fierce competition, as far as the relationship of competition and economic policies can affect international relations. Competition – inherent in commodity production struggle between entrepreneurs in the market for more favorable conditions of production and marketing of products for getting the highest profit. Research competitiveness of goods and services – one of the main links of research in the market economy, which allows to identify the strengths and weaknesses of the products and services offered. In this regard, relevant today is the creation of a coherent system of economic intelligence on the markets, competitors, partners, contractors, new technologies, legislation, etc., and in addition – the knowledge used in the business of ways to search, access, use of information and also used type of deception and fraud. The fierce competition for markets and products, the scope of application of capital and the pursuit of maximum profits forced executives of major corporations to closely monitor the activities of their competitors. It may be used as economic intelligence and industrial espionage.
- Published
- 2016
44. A Study on the Investigative Technique of Suspect in Industrial Espionage Crime
- Author
-
Lee Seoung Yong and Ahn, Hwang Kwon
- Subjects
Reid technique ,History ,Industrial espionage ,Rehabilitation ,Physical Therapy, Sports Therapy and Rehabilitation ,General Medicine ,Criminology ,Suspect - Published
- 2020
- Full Text
- View/download PDF
45. The impact of personnel threats on the economic security of the organization
- Author
-
Irina N. Makhmudova
- Subjects
Service (business) ,ComputingMilieux_THECOMPUTINGPROFESSION ,Process (engineering) ,General Medicine ,Computer security ,computer.software_genre ,Variety (cybernetics) ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Work (electrical) ,Security service ,Industrial espionage ,Economic security ,Business ,computer ,Competence (human resources) - Abstract
The topic of company security is central to the work of the security service. This article describes the factors that pose a threat to the security of a modern organization. The author discloses possible directions of risks caused by the actions of the organization's personnel that create personnel threats. The article determines the role of personnel security and elimination of personnel threats in the organization's security system. The article reveals the concept of competitive (business) intelligence, identifies the functions of this service. The concept of industrial espionage is disclosed. In operational practice, it turns out that a large number of personnel threats are represented by a wide variety. In operational practice, it turns out that a large number of personnel threats are represented by a wide variety. At the same time, in order to neutralize personnel threats, the powers and competence of the organization's security personnel are clearly not enough. In this regard, within the framework of this study, a set of measures that make up an integral security system is considered. The central place in the study is devoted to the issue of eliminating personnel threats. Since personnel threats are created by the organization's own personnel, the necessity of interaction of all personnel services within the framework of a single system for ensuring personnel safety and security of the organization as a whole is substantiated. The powers of each of the participants in this process in their relationship and interaction are delimited. The author defined measures to counter personnel threats and neutralize the negative consequences of unauthorized actions in the organization.
- Published
- 2020
- Full Text
- View/download PDF
46. Are hotel managers taught to be aggressive in intelligence gathering?
- Author
-
Alan K. M. Au, Jimmy H. T. Chan, Matthew C. H. Yeung, and Patrick C. L. Chan
- Subjects
Psychiatry and Mental health ,Intelligence gathering ,Industrial espionage ,Orientation (mental) ,Similarity (psychology) ,Market orientation ,Marketing ,Psychology ,Exploratory factor analysis ,Hotel industry ,Quality of Life Research - Abstract
The study examines the ontological similarity between the concept of competitor orientation and questionable intelligence-gathering efforts. Respondents from the hotel industry were surveyed with self-administered questionnaires. Exploratory factor analysis was carried out to identify the structure underlying variables of market orientation and ethical judgment on questionable intelligence-gathering efforts. The results suggest that the surveyed hotel managers are unable to distinguish the legitimate tactics of competitor orientation from the questionable practice of industrial espionage.
- Published
- 2020
- Full Text
- View/download PDF
47. CORPORATE CYBERESPIONAGE: IDENTIFICATION AND PREVENTION PART 2
- Author
-
Brian Mitchell
- Subjects
Focus (computing) ,Computer Networks and Communications ,Computer science ,05 social sciences ,02 engineering and technology ,Data science ,Domain (software engineering) ,Identification (information) ,Industrial espionage ,Argument ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,0509 other social sciences ,050904 information & library sciences ,Safety Research ,Software - Abstract
The purpose of this paper is to present an argument for a methodology to detect and prevent cyber-based corporate espionage. The focus of this paper will be on the human domain and how it affects c...
- Published
- 2020
- Full Text
- View/download PDF
48. CORPORATE CYBERESPIONAGE: IDENTIFICATION AND PREVENTION PART 1
- Author
-
Brian Mitchell
- Subjects
Identification (information) ,Focus (computing) ,Computer Networks and Communications ,Industrial espionage ,Computer science ,Argument ,Safety Research ,Data science ,Software ,Domain (software engineering) - Abstract
The purpose of this paper is to present an argument for a methodology to detect and prevent cyber-based corporate espionage. The focus of this paper will be on the human domain and how it affects c...
- Published
- 2020
- Full Text
- View/download PDF
49. Industrial Security Crimes and Clap Theory
- Author
-
Chang-Moo Lee
- Subjects
Industrial security ,Industrial espionage ,Business ,Computer security ,computer.software_genre ,computer - Published
- 2020
- Full Text
- View/download PDF
50. Intellectual property right infringement, state involvement in industrial espionage, and North-South trade
- Author
-
Sang-Kee Kim
- Subjects
Trade war ,Economics and Econometrics ,Government ,business.industry ,Industrial espionage ,Economics ,Tariff ,Social Welfare ,International trade ,Intellectual property ,China ,business ,Technology gap - Abstract
s Despite the recent trade war triggered largely by Chinese firms’ intellectual property infringement, the literature on the role of state-sponsored industrial espionage in the trade war is limited. To explore this, we construct an endogenous choice game where a South government chooses whether to support a domestic firm’s industrial espionage while a North government chooses whether to retaliate with a tariff. The main finding shows that cooperation between countries (no infringement/no tariff) leads to a higher level of social welfare than under a trade war. In addition, cooperation is more stable when the South government has a stronger tendency to support its domestic firm’s intellectual property infringement. However, the cooperation becomes less stable as the technology gap between the countries narrows. Our findings help predict that the ongoing trade war between the United States and China will continue if China narrows the technology gap.
- Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.