Economic and industrial espionage at the start of the 21st century – Status quaestionis
DOI:
https://doi.org/10.37380/jisib.v6i3.196Keywords:
Economic espionage, hacking, industrial espionage, literature review, signal intelligenceAbstract
This article is a literature review where the aim is to define a status quaestionis for the field of economic and industrial espionage. History shows how those who engage in these activities often are the scientifically and industrially weaker party, the party that is learning or trying to catch up. On a global scale economic and industrial espionage can be seen as a form of involuntarily sharing that has a series of positive results for economic development. On the scale of the individual businesses attacked, and for tax authorities in those countries, it is a troublesome phenomenon that must be regulated and punished. Governments must prepare society for systematic and frequent cyberattacks. Private companies are wise to move to stricter security controls, which must include encryption. A number of specific research projects are suggested throughout the article. In the literature we have identified the following agent motives: the employee who needs money, has split loyalties, leaves angry, the occasional thieve and the professional spy.
References
Andrijcic, E. & Horowitz, B. (2006). A macroeconomic framework for evaluation of cyber security risks related to protection of intellectual property. Risk analysis. Volume: 26, Issue: 4. Pages: 907-923.
Anonymous (2007). Lawyers warn of increased risk of industrial espionage. Professional engineering. Volume: 20, Issue: 12. Pages: 10.
Anonymous (2002). Industrial espionage attempt thwarted by sting operation. Computers & security. Volume: 21, Issue: 3. Pages: 202.
Bergier, J. (1975). Secret armies: The growth of corporate and industrial espionage. Indianapolis: Bobbs-Merrill.
Bachman, D. (2014) Chinese Industrial Espionage: Technology Acquisition and Military Modernization. China quarterly. Volume: 219, Pages: 874-875.
Barrachina, A., Tauman, Y.; Urbano, A. (2014). Entry and espionage with noisy signals. Games and economic behavior Volume: 83 Pages: 127-146
Baum, J. A. C., Li. S. X., Usher, J.M. (2000). Making the next move: how experiential and vicarious learning shape the locations of chains’ acquisitions. Administrative Science Quarterly, 45(4), pp. 766-801.
Bapuji, H., Crossan, M. (2004). From questions to answers: reviewing organizational learning research. Management Learning, 35(4): 397-417.
Bergier, J. (1977). Vieux comme l’homme: L’espionage industriel. Historia (368), pp. 84-95.
Cotte. M. (2005). De l’espionnage industriel à la veille technologique. Belfort-Montbéliard: Presses Universaires de France Comté.
Cipolla, M. (1993). Before the industrial revolution: European Society and Economy 1000-1700. New York: Norton
Condon, R. (2007). We've been expecting you, Mr Bond. Infosecurity, 4 (7), pp. 26-27.
Corera, G. (2015). Intercept – The secret history of computers and spies. London: Weidenfeld & Nicolson.
Crane, A. (2005). In the company of spies: When competitive intelligence gathering becomes industrial espionage. Business Horizons, 48 (3), pp. 233-240.
De Camp, L. S. (1974). The ancient engineers. London: Ballantine.
Ferdinand, J. & Simm, D. (2007). Re-theorizing external learning - Insights from economic and industrial espionage. Conference: 1st Interntional Conference on Organizational Learning, Knowledge and Capabilities Location: Warwick Univ, Warwick, England.
Fialka, J. (1997). War by other means: economic espionage in america. New York, N.Y.: W. W. Norton.
Gaidelys, V., Valodkiene, G. (2011). The methods of selecting and assessing potential consumers used of by competitive intelligence. Engineering Economics, 22 (2), pp. 196-202.
Gillispie, C. C. (2006). From industrial espionage to the old technology. Technology and culture, Volume: 47, Issue: 4. Pages:839-840.
Greve, H. (1998). Performance, aspirations, and risky organizational change. Administrative Science Quarterly, 43: pp. 58-86.
Hamon, V. (2015). Android botnets for multitargeted attacks. Journal in computer virology and hacking techniques, Volume: 11, Issue: 4. Pages: 193-202.
Harrer, J., Wald, A. (2016). Levers of enterprise security control: a study on the use, measurement and value contribution. Journal of Management Control, 27 (1), pp. 7-32.
Heickero, R. (2015). Industrial Espionage and Theft of Information. Conference: 14th European Conference on Cyber Warfare and Security (ECCWS) Location: Univ Hertfordshire, Hatfield, England.
Hvistendahl, M. (2016). Industrial espionage 3d printers vulnerable to spying. Science, Volume: 352, Issue: 6282. Pages: 132-133.
Jameson, D.A. (2011). The rhetoric of industrial espionage: The case of Starwood V. Hilton. Business Communication Quarterly, 74 (3), pp. 289-297.
Jerrard, M. (2015). The G & K O'Connor lockout (1999) and its aftermath: A case study of a union avoidance campaign in the Australian meat processing industry. Labour History, 109 (1), pp. 131-148.
Kraatz, M. S. (1998). Learning by association? Interorganizational networks and adaptation to environmental change. Academy of Management Journal, 41(6), pp. 621-643.
Lee, C-M. (2015). Criminal profiling and industrial security. Multimedia tools and applications, 74, 5. 1689-1696.
Mendell, R. L. (2003). The quiet threat: fighting industrial espionage in America. Springfield, Ill.: Charles C. Thomas.
Mietzner, M., Schiereck, D., Schweizer, D. (2015). The role of sovereign wealth funds as activist or passive fund managers. Journal of Asset Management, 16 (5), pp. 303-315.
Nasheri, H. (2005). Economic espionage and industrial spying. Cambridge: Cambridge University Press.
Nickisch, C. (2016). Defend your research industrial espionage is more effective than r&d. Harvard Business Review, Volume: 91, Issue: 11. Pages: 30-31
Nyhan, B., & Reifler, J. (2015). The effect of factchecking on elites: A field experiment on U.S. state legislators: the effect of fact-checking on elites. American Journal of Political Science, 59(3), pp. 628-640.
Polanyi, M. (1967). The tacit dimension. New York: Anchor Books.
Reisch, M. (2011). Industrial espionage Former Dow scientist admits to theft of trade secrets. Chemical & engineering news, Volume: 89, Issue: 39. Pages: 7-7
Reisman, A. (2006). A taxonomic view of illegal transfer of technologies: A case study. Journal of Engineering and Technology Management -JET-M, 23 (4), pp. 292-312.
Schofield, J. (2016). Chinese Industrial Espionage: Technology Acquisition and Military Modernisation. Canadian journal of political science-revue canadienne de science politique, Volume: 49, Issue: 1. Pages: 182-183
Schultz, E. (2001). Security views. Journal of computers and security, Vol. 21, Iss 1, pp. 201-211.
Shorrock, T. (2016). A New Spy Scandal Exposes the Corruption of Privatized Intelligence. The Nation. October 14. At https://www.thenation.com/article/a-new-spyscandal-exposes-the-corruption-of-privatizedintelligence/
Silverman, C. (2012). A new age for truth. Nieman Reports, 66(2), 4.
Sinha, S. (2012). Understanding industrial espionage for greater technological and economic security. IEEE Potentials, 31 (3), art. no. 6193307, pp. 37-41.
Smith, A.D. (2007). Strategic aspects of electronic document encryption. International Journal of Services and Standards, 3 (2), pp. 203-221.
Solberg Søilen, K. (2016). A research agenda for intelligence studies in business. Journal of Intelligence Studies in Business, 6(1), pp. 21-36.
Solberg Søilen, K. (2005). Wirtschaftsspionage in Verhandlungen aus informationsökonomischer und wirtschaftsethischer Perspektive – Eine interdisziplinäre Analyse. Doctoral Thesis , 341 Pages. Full text at http://www.divaportal.org/smash/get/diva2:534515/FULLTEXT01.pdf
Sivansan, G. (2011). The human factor in espionage. Computer Fraud & Security, 2011 (2), 15-16.
Stadler, W.A. (2012). The quiet threat: Fighting industrial espionage in America. Security journal, 25, 1, 90-93.
Thorleuchter, D. & Van den Poel, D. (2013). Protecting research and technology from espionage. Expert systems with applications, Volume: 40, Issue: 9. Pages: 3432-3440.
Vashisth, A., Kumar, A. (2013). Corporate espionage: The insider threat. Business Information Review, 30 (2), pp. 83-90.
West, N. (2015). Chinese industrial espionage: Technology Acquisition and Military Modernization. Asian Security Studies. Pacific affairs, Volume: 88, Issue: 1. Pages: 178-180.
Downloads
Published
Issue
Section
License
Copyright (c) 2016 Journal of Intelligence Studies in Business
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).