With the increase in influence of global economies companies have become increasingly knowledge based. As businesses continue to increase their online data storage the ability to keep vast amounts of data online has increased the risk of data leakage and theft. The crime of corporate espionage is a serious threat which has increased along with the integration of technology into business processes. This paper has been written with the objective of providing insight into the crime of corporate espionage including discussion of the problem, offenders and motive, and basic protection measures.
Corporate Espionage As global economies have gained influence “society has evolved from an agrarian to an industrial to an information-based culture” (Knapp & Boulton, 2006, p. 80). Companies have become increasingly knowledge based while businesses continue to increase their ability to store and access important business data through interconnected networks. The ability to keep vast amounts of data online with instant availability has allowed modern businesses to become extremely agile, but has also increased the risk of data leakage to unauthorized entities. The crime of industrial espionage is a threat that has increased as technology has evolved and increased its integration into business processes at all levels. This paper has been written with the objective of providing insight into the crime of corporate espionage including discussion of the problem, offenders and motive, and basic protection measures.
Problem Statement The integration of technology into business transactions has allowed many organizations to provide better service while using fewer resources, but has also allowed unscrupulous individuals and organizations with a potential method of accessing information illegitimately. The cyber-criminal is often perceived to be “a computer hacker, sitting alone in his room, spending hours attempting to identify passwords, breach firewalls, and
References: Akopyan, D. A., & Yelyakov, A. D. (2009). Cybercrimes in the information structure of society: A survey Aldhizer III, G. R. (2008). The insider threat. Internal Auditor, 65(2), 71-73. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=31639597&site =ehost-live. Accessed October 25, 2011. Bishop, M. (2005). Introduction to computer security. Boston, MA: Addison-Wesley Professional. Cole, E., Ring, S. (2005). In Melani M. (Ed.), Insider threat : Protecting enterprise from sabotage spying and theft Economic Espionage Act. (2000). Economic espionage act of 1996. Retrieved October, 30, 2011, from http://www.cybercrime.gov/EEAleghist.htm Edelman, W. J. (2011; 2011). The "benefit" of spying: Defining the boundaries of economic espionage under the economic espionage act of 1996 853266535?accountid=28180 . Accessed October 25, 2011. Goel, S. (2011). Cyberwarfare: Connecting the dots in cyber intelligence. Communications of the ACM, 54(8), 132-140 Herbig, K., L. (2008). Changes in espionage by americans: 1947-2007. No. 08-05). Monterey, CA: Defense Personnel Security Research Center Hopwood, W. S., Sinason, D., & Tucker, R. (2000). Security in a web-based environment. Managerial Finance, 26(11), 42-42-54. Retrieved from http://search.proquest.com.proxy1.ncu.edu/docview/212666786?accountid=28180 Accessed October 29, 2011. Kim, E. B. (2005). Information security awareness status of full time employees. The Business Review, Cambridge, 3(2), 219-219-226 Accessed October 26, 2011. Knapp, K. J., & Boulton, W. R. (2006). Cyber-warfare threatens corporations: Expansion into commercial environments Accessed October 28, 2011. Krekel, B., Bakos, G., Barnett, C. (2009). Capability of the People’s republic of china to conduct cyber warfare and computer network exploitation researchpapers/2009/NorthropGrumman_PRC_Cyber_Paper_FINAL_Approved%20Report_16Oct2009.pdf. Accessed October 29, 2011. Pacini, C. J., Placid, R., & Wright-Isak, C. (2008). Fighting economic espionage with state trade secret laws 196367950?accountid=28180. Accessed October 25, 2011. Schweizer, P. (1996). The growth of economic espionage: America is target number one. Swartz, N. (2007). Protecting information from insiders. Information Management Journal, 41(3), 20-24 buh&AN=25430765&site=ehost-live. Accessed October 25, 2011. Taylor, R., Fritsch, E., Liederbach, J., & Holt, T. (2011). Digital crime and digital terrorism.