Preview

Company Law

Powerful Essays
Open Document
Open Document
3323 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Company Law
The information revolution and the advances in technology during the past decades has brought to fore many challenges and issues to both governments and businesses, the age-old crime of espionage or the practice of spying to gather secret information is one the most potential issues facing information-based societies. Although, much has been documented as fact and fiction concerning the traditional foreign agents and spies, in today 's world of multi-national, multi-billion dollar corporations, and industrial espionage is a growing danger. Furthermore, this is aggravated by the fact that many large businesses are physically disseminated which has distributed management and administration, and more job specialization.
High technology offers the ability to collect and use information for competitive edge over others in meeting business and government objectives, it also makes modern information and technology-based nations and businesses vulnerable as information can be stolen from electronic storage media and transmitted in seconds without even physically removing the data.
The paper attempts to examine how investors or companies could protect themselves from corporate espionage. However, in doing so, it shall also look at the historical development of espionage and examines how the advances in technology in the recent years have facilitated the act of espionage, and also the measures that may prove useful in controlling Industrial Espionage. As a prelude to the research, it may be worthwhile to understand how industrial espionage is defined, its nature and implications.
The Federal Bureau of Investigation defines industrial espionage as “an individual or private business entity sponsorship or coordination of intelligence activity conducted for the purpose of enhancing their advantage in the marketplace.” While this definition may imply Industrial Espionage to be more or less the same as business or competitive intelligence, John F Quinn explains the essential



Bibliography: 1. Boni W. & Kovacich G.L. (2000) Netspionage: The Global Threat to Information MA: Butterworth- Heinemann 2 3. Denning, D. E. (1998) Information Warfare and Security MA: Addison-Wesley 4 5. Kelley, P.W. (1997) “The Economic Espionage Act of 1996” In Boni W. & Kovacich G.L. Netspionage: The Global Threat to Information MA: Butterworth- Heinemann p. 241-247 6 7. Vest, J. (1998) “Erosion of Individual Privacy - Echelon Subchapter” The Village Voice, August 11 Available at: http://www.mega.nu:8080/ampp/echelon.html Accessed 02/26/06 8 9. Toffler, A. (1980) The Third Wave NY: Bantam Book 10 [ 2 ]. Boni and Kovacich, 2000; p. 47 [ 3 ] [ 4 ]. Boni and Kovacich, 2000 [ 5 ] [ 6 ]. Toffler, 1980; Toffler & Heidi, 1994 [ 7 ] [ 10 ]. Naef, 2003 [ 11 ] [ 12 ]. Cited Naef, 2003 [ 13 ] [ 14 ]. Vest, 1998 [ 15 ] [ 16 ]. Naef, 2003 [ 17 ] [ 18 ]. Denning, 1998, p.382

You May Also Find These Documents Helpful

  • Better Essays

    Along with this new approach to spying, a new approach to the system of passing messages was introduced as well. The punishment for accused spies, especially spies with evidence, was unavoidable. Suspected spies were hung without question, spies with evidence were walking death traps. New measures needed to be taken in order to protect the spies. Advances in anything from coded messages and fake identities to invisible ink were now being utilized to insure the spy’s safety.…

    • 1287 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Espionage negatively effects national security and military operations. Doing so impacts the United States missions and jeopardizes many lives. The espionage act of 1917 was enacted to improve national security for the war effort of World War One. Sergeant First Class Clyde Lee Conrad conducted espionage against the United States and NATO allies. Within this paper you will learn how Conrad was able to go against the interests of the country he swore an oath to, and the under lying reasons. The Information leaked by Conrad was enormous and greatly impacted the security…

    • 1329 Words
    • 6 Pages
    Good Essays
  • Good Essays

    We live and conduct business in an active asymmetric threat environment. An individual, business or organization must adapt and protect its vital information assets and critical digital infrastructure. Failure to do so is reckless and may be considered as an obvious lack of due diligence for people who have fiduciary and custodial responsibilities.…

    • 532 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    In t fid en tia l ity The CIA Triad Co n y rit eg Availability NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Powerful Essays

    Spies usually have one of two objectives. The first objective is Espionage, espionage is the tactic that focuses on topics not available to the public, with most of the information gotten through this method is gotten through covert means. Espionage has dated all the way back to Ancient Indian times, during Chandra Gupta’s reign. In Chanakya’s Arthashastra, he describes how he used methods of assassination and espionage to gain and preserve Chandra Gupta’s reign. The U.S. itself has used espionage very heavily, especially during the Cold…

    • 1852 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Kaplan Unit 3 Paper

    • 1503 Words
    • 7 Pages

    (see, e.g., Glueck and Glueck, 1956; Goddard, 1921; Hooten, 1939; Jacobs et al., 1965; Lombroso, 1918; Sheldon, 1949)…

    • 1503 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Mccaskey Case Analysis

    • 670 Words
    • 3 Pages

    McCaskey, 29, a HBS graduate, worked in the Seleris’s Industry Analysis Division (IAD), a consulting firm in San Francisco branch. Her jobs were to analyst and report the competitive advantages of competitor companies to her clients. The employees of this company were separated into two groups, old and new guard. The members in old guard such as Rendall and Kaufmann often paid ex-employees of target companies to obtain highly sensitive information. IAD’s top manager, Tom Malone, knew the company situation and knew how to play the game.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Goldstein, N. E., Condie, L. O., Kalbeitzer, R., Osman, D. & Geier, J. L. (2003).…

    • 958 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Alien and Sedition Act 4

    • 1524 Words
    • 7 Pages

    With a general intolerance for opponents of the war the government began to repress groups advocating against the war, as did private organizations. One such organization created to suppress anti-war ideals was the Committee on Public Information (CPI). CPI was put in place to provide trustworthy information to the public, as well as stifle any misleading wartime rumors. However, the CPI ended up creating propaganda for the government to distort the views of the American people and worked to destroy and discredit…

    • 1524 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Jongenelis, K., Pot, A. M., Eisses A. M. H., Beekman, A. T. F., Kluiter, H., Ribbe, M. W.…

    • 2644 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Cyber Espionage

    • 3589 Words
    • 15 Pages

    Crime and espionage form a dark underworld of cyberspace. Whereas crime is usually the first to seek out new opportunities and methods, espionage usually follows in…

    • 3589 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    Cyber Threats

    • 641 Words
    • 3 Pages

    References: Cyber terrorism Testimony Before the Special Oversight Panel on Terrorism, Committee on Armed Services, U.S. House of Representatives by Dorothy E. Denning of Georgetown University - May 23, 2000 - http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html…

    • 641 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Iso 27005 2011 Ru V1

    • 23886 Words
    • 77 Pages

    Technologies de I'information — Techniques de securite — Gestion du risque en securite de I'information…

    • 23886 Words
    • 77 Pages
    Satisfactory Essays
  • Good Essays

    Today’s society is solely based and dependent on computer based systems. With the advent of computer technology, we have acquired many good things like online banking, online commerce, emails etc. Along with the advancements in technology comes the relentless pursuit to prevent criminal hacking. Criminal hacking affects big business as well as the individual. The modern ethical hacker is a person who attempts to penetrate a secured computer system in effort to learn how to further protect or repair weaknesses in a company’s already secure system. “According to the Sixth Annual Enterprise IT Security Survey released Monday, 67% of large companies with 5,000 or more employees reported one successful intrusion or more this year, as opposed to 41% in 2009.” (Messmer)…

    • 711 Words
    • 3 Pages
    Good Essays
  • Better Essays

    I'm not talking about sabotage here; I'll address that later. By "espionage," I mean attempts to gather information through underhanded means for reasons other than identity fraud and other directly, criminally profitable purposes.…

    • 961 Words
    • 4 Pages
    Better Essays