Economic and industrial espionage at the start of the 21st century – Status quaestionis

Klaus Solberg Søilen

Abstract


This article is a literature review where the aim is to define a status quaestionis
for the field of economic and industrial espionage. History shows how those who engage in these
activities often are the scientifically and industrially weaker party, the party that is learning or
trying to catch up. On a global scale economic and industrial espionage can be seen as a form of
involuntarily sharing that has a series of positive results for economic development. On the
scale of the individual businesses attacked, and for tax authorities in those countries, it is a
troublesome phenomenon that must be regulated and punished. Governments must prepare
society for systematic and frequent cyberattacks. Private companies are wise to move to stricter
security controls, which must include encryption. A number of specific research projects are
suggested throughout the article. In the literature we have identified the following agent
motives: the employee who needs money, has split loyalties, leaves angry, the occasional thieve
and the professional spy.


Keywords


Economic espionage, hacking, industrial espionage, literature review, signal intelligence

Full Text:

PDF

References


Andrijcic, E. & Horowitz, B. (2006). A macroeconomic

framework for evaluation of cyber

security risks related to protection of

intellectual property. Risk

analysis. Volume: 26, Issue: 4. Pages: 907-

Anonymous (2007). Lawyers warn of increased

risk of industrial espionage. Professional

engineering. Volume: 20, Issue: 12. Pages: 10.

Anonymous (2002). Industrial espionage attempt

thwarted by sting operation. Computers &

security. Volume: 21, Issue: 3. Pages: 202.

Bergier, J. (1975). Secret armies: The growth of

corporate and industrial espionage.

Indianapolis: Bobbs-Merrill.

Bachman, D. (2014)

Chinese Industrial Espionage: Technology

Acquisition and Military Modernization.

China quarterly. Volume: 219, Pages: 874-

Barrachina, A., Tauman, Y.; Urbano, A. (2014).

Entry and espionage with noisy signals.

Games and economic

behavior Volume: 83 Pages: 127-146

Baum, J. A. C., Li. S. X., Usher, J.M. (2000).

Making the next move: how experiential and

vicarious learning shape the locations of

chains’ acquisitions. Administrative Science

Quarterly, 45(4), pp. 766-801.

Bapuji, H., Crossan, M. (2004). From questions to

answers: reviewing organizational learning

research. Management Learning, 35(4): 397-

Bergier, J. (1977). Vieux comme l’homme:

L’espionage industriel. Historia (368), pp. 84-

Cotte. M. (2005). De l’espionnage industriel à la

veille technologique. Belfort-Montbéliard:

Presses Universaires de France Comté.

Cipolla, M. (1993). Before the industrial

revolution: European Society and Economy

-1700. New York: Norton

Condon, R. (2007). We've been expecting you, Mr

Bond. Infosecurity, 4 (7), pp. 26-27.

Corera, G. (2015). Intercept – The secret history

of computers and spies. London: Weidenfeld &

Nicolson.

Crane, A. (2005). In the company of spies: When

competitive intelligence gathering becomes

industrial espionage. Business Horizons, 48

(3), pp. 233-240.

De Camp, L. S. (1974). The ancient engineers.

London: Ballantine.

Ferdinand, J. & Simm, D. (2007). Re-theorizing

external learning - Insights from economic

and industrial espionage. Conference: 1st

Interntional Conference on Organizational

Learning, Knowledge and

Capabilities Location: Warwick Univ,

Warwick, England.

Fialka, J. (1997). War by other means: economic

espionage in america. New York, N.Y.: W. W.

Norton.

Gaidelys, V., Valodkiene, G. (2011). The methods

of selecting and assessing potential consumers

used of by competitive intelligence.

Engineering Economics, 22 (2), pp. 196-202.

Gillispie, C. C. (2006).

From industrial espionage to the old

technology. Technology and

culture, Volume: 47, Issue: 4. Pages:839-840.

Greve, H. (1998). Performance, aspirations, and

risky organizational change. Administrative

Science Quarterly, 43: pp. 58-86.

Hamon, V. (2015). Android botnets for multitargeted

attacks. Journal in computer virology

and hacking techniques, Volume: 11, Issue: 4.

Pages: 193-202.

Harrer, J., Wald, A. (2016). Levers of enterprise

security control: a study on the use,

measurement and value contribution. Journal

of Management Control, 27 (1), pp. 7-32.

Heickero, R. (2015). Industrial Espionage and

Theft of Information. Conference: 14th

European Conference on Cyber Warfare and

Security (ECCWS) Location: Univ

Hertfordshire, Hatfield, England.

Hvistendahl, M. (2016). Industrial espionage 3d

printers vulnerable to spying.

Science, Volume: 352, Issue: 6282. Pages: 132-

Jameson, D.A. (2011). The rhetoric of industrial

espionage: The case of Starwood V. Hilton.

Business Communication Quarterly, 74 (3),

pp. 289-297.

Jerrard, M. (2015). The G & K O'Connor

lockout (1999) and its aftermath: A case study

of a union avoidance campaign in the

Australian meat processing industry. Labour

History, 109 (1), pp. 131-148.

Kraatz, M. S. (1998). Learning by association?

Interorganizational networks and adaptation

to environmental change. Academy of

Management Journal, 41(6), pp. 621-643.

Lee, C-M. (2015). Criminal profiling

and industrial security. Multimedia tools and

applications, 74, 5. 1689-1696.

Mendell, R. L. (2003). The quiet threat: fighting

industrial espionage in America. Springfield,

Ill.: Charles C. Thomas.

Mietzner, M., Schiereck, D., Schweizer, D. (2015).

The role of sovereign wealth funds as activist

or passive fund managers. Journal of Asset

Management, 16 (5), pp. 303-315.

Nasheri, H. (2005). Economic espionage and

industrial spying. Cambridge: Cambridge

University Press.

Nickisch, C. (2016). Defend your

research industrial espionage is more effective

than r&d. Harvard Business Review,

Volume: 91, Issue: 11. Pages: 30-31

Nyhan, B., & Reifler, J. (2015). The effect of factchecking

on elites: A field experiment on U.S.

state legislators: the effect of fact-checking on

elites. American Journal of Political

Science, 59(3), pp. 628-640.

Polanyi, M. (1967). The tacit dimension. New

York: Anchor Books.

Reisch, M. (2011). Industrial espionage Former

Dow scientist admits to theft of trade secrets.

Chemical & engineering news, Volume: 89,

Issue: 39. Pages: 7-7

Reisman, A. (2006). A taxonomic view of illegal

transfer of technologies: A case study. Journal

of Engineering and Technology Management -

JET-M, 23 (4), pp. 292-312.

Schofield, J. (2016).

Chinese Industrial Espionage: Technology

Acquisition and Military Modernisation.

Canadian journal of political science-revue

canadienne de science

politique, Volume: 49, Issue: 1. Pages: 182-

Schultz, E. (2001). Security views. Journal of

computers and security, Vol. 21, Iss 1, pp. 201-

Shorrock, T. (2016). A New Spy Scandal Exposes

the Corruption of Privatized Intelligence. The

Nation. October 14. At

https://www.thenation.com/article/a-new-spyscandal-

exposes-the-corruption-of-privatizedintelligence/

Silverman, C. (2012). A new age for

truth. Nieman Reports, 66(2), 4.

Sinha, S. (2012). Understanding industrial

espionage for greater technological and

economic security. IEEE Potentials, 31 (3), art.

no. 6193307, pp. 37-41.

Smith, A.D. (2007). Strategic aspects of electronic

document encryption. International Journal of

Services and Standards, 3 (2), pp. 203-221.

Solberg Søilen, K. (2016). A research agenda for

intelligence studies in business. Journal of

Intelligence Studies in Business, 6(1), pp. 21-

Solberg Søilen, K. (2005). Wirtschaftsspionage in

Verhandlungen aus

informationsökonomischer und

wirtschaftsethischer Perspektive - Eine

interdisziplinäre Analyse. Doctoral Thesis ,

Pages. Full text at http://www.divaportal.

org/smash/get/diva2:534515/FULLTEX

T01.pdf

Sivansan, G. (2011). The human factor in

espionage. Computer Fraud & Security, 2011

(2), 15-16.

Stadler, W.A. (2012). The quiet threat:

Fighting industrial espionage in America.

Security journal, 25, 1, 90-93.

Thorleuchter, D. & Van den Poel, D. (2013).

Protecting research and technology

from espionage. Expert systems with

applications, Volume: 40, Issue: 9.

Pages: 3432-3440.

Vashisth, A., Kumar, A. (2013). Corporate

espionage: The insider threat. Business

Information Review, 30 (2), pp. 83-90.

West, N. (2015). Chinese industrial espionage:

Technology Acquisition and Military

Modernization. Asian Security Studies. Pacific

affairs, Volume: 88, Issue: 1. Pages: 178-180.


Refbacks

  • There are currently no refbacks.

Comments on this article

View all comments


JISIB is indexed by ESCI, SCOPUS, EBSCO, DOAJ, Google Scholar, EconBib and SCImago, and is ranked as a Level 1 publication by the Norwegian Social Science Data Services. JISIB has applied for admittance to Web of Science.