Preview

Corporate Espionage

Best Essays
Open Document
Open Document
2258 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Corporate Espionage
Abstract
With the increase in influence of global economies companies have become increasingly knowledge based. As businesses continue to increase their online data storage the ability to keep vast amounts of data online has increased the risk of data leakage and theft. The crime of corporate espionage is a serious threat which has increased along with the integration of technology into business processes. This paper has been written with the objective of providing insight into the crime of corporate espionage including discussion of the problem, offenders and motive, and basic protection measures.

Corporate Espionage As global economies have gained influence “society has evolved from an agrarian to an industrial to an information-based culture” (Knapp & Boulton, 2006, p. 80). Companies have become increasingly knowledge based while businesses continue to increase their ability to store and access important business data through interconnected networks. The ability to keep vast amounts of data online with instant availability has allowed modern businesses to become extremely agile, but has also increased the risk of data leakage to unauthorized entities. The crime of industrial espionage is a threat that has increased as technology has evolved and increased its integration into business processes at all levels. This paper has been written with the objective of providing insight into the crime of corporate espionage including discussion of the problem, offenders and motive, and basic protection measures.
Problem Statement The integration of technology into business transactions has allowed many organizations to provide better service while using fewer resources, but has also allowed unscrupulous individuals and organizations with a potential method of accessing information illegitimately. The cyber-criminal is often perceived to be “a computer hacker, sitting alone in his room, spending hours attempting to identify passwords, breach firewalls, and



References: Akopyan, D. A., & Yelyakov, A. D. (2009). Cybercrimes in the information structure of society: A survey Aldhizer III, G. R. (2008). The insider threat. Internal Auditor, 65(2), 71-73. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=31639597&site =ehost-live. Accessed October 25, 2011. Bishop, M. (2005). Introduction to computer security. Boston, MA: Addison-Wesley Professional. Cole, E., Ring, S. (2005). In Melani M. (Ed.), Insider threat : Protecting enterprise from sabotage spying and theft Economic Espionage Act. (2000). Economic espionage act of 1996. Retrieved October, 30, 2011, from http://www.cybercrime.gov/EEAleghist.htm Edelman, W. J. (2011; 2011). The "benefit" of spying: Defining the boundaries of economic espionage under the economic espionage act of 1996 853266535?accountid=28180 . Accessed October 25, 2011. Goel, S. (2011). Cyberwarfare: Connecting the dots in cyber intelligence. Communications of the ACM, 54(8), 132-140 Herbig, K., L. (2008). Changes in espionage by americans: 1947-2007. No. 08-05). Monterey, CA: Defense Personnel Security Research Center Hopwood, W. S., Sinason, D., & Tucker, R. (2000). Security in a web-based environment. Managerial Finance, 26(11), 42-42-54. Retrieved from http://search.proquest.com.proxy1.ncu.edu/docview/212666786?accountid=28180 Accessed October 29, 2011. Kim, E. B. (2005). Information security awareness status of full time employees. The Business Review, Cambridge, 3(2), 219-219-226 Accessed October 26, 2011. Knapp, K. J., & Boulton, W. R. (2006). Cyber-warfare threatens corporations: Expansion into commercial environments Accessed October 28, 2011. Krekel, B., Bakos, G., Barnett, C. (2009). Capability of the People’s republic of china to conduct cyber warfare and computer network exploitation researchpapers/2009/NorthropGrumman_PRC_Cyber_Paper_FINAL_Approved%20Report_16Oct2009.pdf. Accessed October 29, 2011. Pacini, C. J., Placid, R., & Wright-Isak, C. (2008). Fighting economic espionage with state trade secret laws 196367950?accountid=28180. Accessed October 25, 2011. Schweizer, P. (1996). The growth of economic espionage: America is target number one. Swartz, N. (2007). Protecting information from insiders. Information Management Journal, 41(3), 20-24 buh&AN=25430765&site=ehost-live. Accessed October 25, 2011. Taylor, R., Fritsch, E., Liederbach, J., & Holt, T. (2011). Digital crime and digital terrorism.

You May Also Find These Documents Helpful

  • Good Essays

    Espionage negatively effects national security and military operations. Doing so impacts the United States missions and jeopardizes many lives. The espionage act of 1917 was enacted to improve national security for the war effort of World War One. Sergeant First Class Clyde Lee Conrad conducted espionage against the United States and NATO allies. Within this paper you will learn how Conrad was able to go against the interests of the country he swore an oath to, and the under lying reasons. The Information leaked by Conrad was enormous and greatly impacted the security…

    • 1329 Words
    • 6 Pages
    Good Essays
  • Good Essays

    4. NADH- reduces 2 pyruvate to 2 lactic acid in fermentation, reduces O2 during the respiratory chain (gets oxidized to NAD) *CANNOT pass through the mitochondrion*…

    • 1032 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    Physical crimes never cease to draw our attention. Victims, bloodiness, drama, motives, psychological issues and conflicts: they are at the heart of most physical crimes. Cyber crimes are not viewed as dramatic and pervasive by many, but its consequences can be even bloodier within seconds: hundreds of millions of victims and billions of dollars can be rapidly caused with two elements, a criminal mind and one computer. We are not safe from either bloody crimes or cyber crimes such as cyberstalking, cyberbullying, and financial theft. In fact, “cybercrime affects everyone-business, governments, and citizens.” (2). Wealth, a safe neighborhood, or bodyguards…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    High technology gives criminals the opportunity to obtain valuable information. They are considered a cyber-threat. Criminals usually get illegitimate or legitimate work-related access to a company’s computer resources to sell wanted information.…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Patriot Act

    • 14268 Words
    • 58 Pages

    Richard L. Cain, JD BS PO Box 91016, Santa Barbara, California 93190 Phone: 818-451-3660 cainrl@tjsl.edu…

    • 14268 Words
    • 58 Pages
    Powerful Essays
  • Powerful Essays

    Manufacturing Audit Risk

    • 1585 Words
    • 7 Pages

    This challenge is so potentially perverse because it combines social engineering with software-based tools to provide a complex attack profile. Companies are fined millions of dollars for violating Information security laws and increasing the risk of sabotage. An organization have several overlapping IT security regulations with different controls, it can cause chaos and ambiguity with respect to which regulations apply, how it impacts internal audit, behavioral risk, operational risk, evidence, policies, and procedures, culture, and integrity. (360factors,…

    • 1585 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    The rapidly evolving economy has led to companies being largely controlled by an IT infrastructure as it is an important part of business operations, and it bridges communication gaps well. Those corporations that pay no heed to the necessity of computer forensics in the modern age risk damage to digital resources and intellectual property. A singular breach into the system can lead to massive financial loss[1]; subsequently leading to bad publicity of the business and prolonged losses in the long run. The methods used by attackers to breach into networks are constantly advancing as a result of experts who are able to fend off attacks. This is a cause for concern for experts worldwide. It is important to bear in mind that threats can be both…

    • 217 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The main targets of this research were the current and former employees who had access to the information system, data or network with the degree of trust by the organization. Recent studies and surveys of cybercrime in both government and commercial sectors shows that current or former employees are the second greatest cyber crime threat. According to the 2007 e-Crime survey most insiders targeted proprietary information, include intellectual property, and customer and financial information. Many people argued that most threats can be easily prevented by “timely and effective action to address the anger, pain, anxiety, or psychological impairment of perpetrators who exhibit signs of vulnerability or risk well in advance of the crime of abuse.” This statement suggests that more research is needed on predictive indicators. But when it comes to predict who and when will commit an inside crime is still hard to predict. According to this research “currently, no single threat assessment technique gives a complete picture of the insider threat problem.” Many researcher suggests that a proactive approach must recognize possible precursors to insider threats behavior that are visible in employee behavior.…

    • 660 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Good Essays

    FINAL DRAFT CYBERCRIME CJ

    • 667 Words
    • 3 Pages

    This paper was prepared and submitted for CJ360 Cybercrime Fall 2014, taught by Professor Alecia Schmidt.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Robbery, rape, homicide, etc. are being joined by another threat. The increase in popularity of the Internet over the years has resulted in the creation of a new type of crime, cybercrime. With that, came along a new concern: the need for safety and surveillance on the Internet. This has created a certain type of Panoptic society and displays the way in which people are subject to behave when they know that a higher power such as the Federal Government and even local law enforcement agencies have the ability to access their information via computer systems. Cybercrime can be defined in many ways whether it’s money laundering, bullying, fraud, or stalking.…

    • 1033 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Cybercrime: Hacking

    • 1198 Words
    • 4 Pages

    With everything in society advancing rapidly, it should be of no surprise that technology is now used to commit crimes against other people. Those crimes include identity theft, stealing money, illegal gambling, and cyberstalking. This paper will review cybercrime and the differences there are from traditional crime and it will review the purpose of hackers. There will also be three cases reviewed to help bring light to what kind of cybercrimes are being committed around the world.…

    • 1198 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Organized Crime

    • 375 Words
    • 2 Pages

    One new trend in organized crime is cybercrime. The key to it is social engineering. Hackers can easily persuade someone now a days to do things on their computer that is not in their best interest and the internet is assisting them.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Crime Thoeries

    • 704 Words
    • 3 Pages

    Robert W. Taylor, Eric J. Frisch, John Liederbach, and Thomas J. Holt (2011). Digital Crime and…

    • 704 Words
    • 3 Pages
    Good Essays