Economic and industrial espionage at the start of the 21st century – Status quaestionis
Keywords:Economic espionage, hacking, industrial espionage, literature review, signal intelligence
AbstractThis article is a literature review where the aim is to define a status quaestionisfor the field of economic and industrial espionage. History shows how those who engage in theseactivities often are the scientifically and industrially weaker party, the party that is learning ortrying to catch up. On a global scale economic and industrial espionage can be seen as a form ofinvoluntarily sharing that has a series of positive results for economic development. On thescale of the individual businesses attacked, and for tax authorities in those countries, it is atroublesome phenomenon that must be regulated and punished. Governments must preparesociety for systematic and frequent cyberattacks. Private companies are wise to move to strictersecurity controls, which must include encryption. A number of specific research projects aresuggested throughout the article. In the literature we have identified the following agentmotives: the employee who needs money, has split loyalties, leaves angry, the occasional thieveand the professional spy.
Andrijcic, E. & Horowitz, B. (2006). A macroeconomic
framework for evaluation of cyber
security risks related to protection of
intellectual property. Risk
analysis. Volume: 26, Issue: 4. Pages: 907-
Anonymous (2007). Lawyers warn of increased
risk of industrial espionage. Professional
engineering. Volume: 20, Issue: 12. Pages: 10.
Anonymous (2002). Industrial espionage attempt
thwarted by sting operation. Computers &
security. Volume: 21, Issue: 3. Pages: 202.
Bergier, J. (1975). Secret armies: The growth of
corporate and industrial espionage.
Bachman, D. (2014)
Chinese Industrial Espionage: Technology
Acquisition and Military Modernization.
China quarterly. Volume: 219, Pages: 874-
Barrachina, A., Tauman, Y.; Urbano, A. (2014).
Entry and espionage with noisy signals.
Games and economic
behavior Volume: 83 Pages: 127-146
Baum, J. A. C., Li. S. X., Usher, J.M. (2000).
Making the next move: how experiential and
vicarious learning shape the locations of
chains’ acquisitions. Administrative Science
Quarterly, 45(4), pp. 766-801.
Bapuji, H., Crossan, M. (2004). From questions to
answers: reviewing organizational learning
research. Management Learning, 35(4): 397-
Bergier, J. (1977). Vieux comme l’homme:
L’espionage industriel. Historia (368), pp. 84-
Cotte. M. (2005). De l’espionnage industriel à la
veille technologique. Belfort-Montbéliard:
Presses Universaires de France Comté.
Cipolla, M. (1993). Before the industrial
revolution: European Society and Economy
-1700. New York: Norton
Condon, R. (2007). We've been expecting you, Mr
Bond. Infosecurity, 4 (7), pp. 26-27.
Corera, G. (2015). Intercept – The secret history
of computers and spies. London: Weidenfeld &
Crane, A. (2005). In the company of spies: When
competitive intelligence gathering becomes
industrial espionage. Business Horizons, 48
(3), pp. 233-240.
De Camp, L. S. (1974). The ancient engineers.
Ferdinand, J. & Simm, D. (2007). Re-theorizing
external learning - Insights from economic
and industrial espionage. Conference: 1st
Interntional Conference on Organizational
Learning, Knowledge and
Capabilities Location: Warwick Univ,
Fialka, J. (1997). War by other means: economic
espionage in america. New York, N.Y.: W. W.
Gaidelys, V., Valodkiene, G. (2011). The methods
of selecting and assessing potential consumers
used of by competitive intelligence.
Engineering Economics, 22 (2), pp. 196-202.
Gillispie, C. C. (2006).
From industrial espionage to the old
technology. Technology and
culture, Volume: 47, Issue: 4. Pages:839-840.
Greve, H. (1998). Performance, aspirations, and
risky organizational change. Administrative
Science Quarterly, 43: pp. 58-86.
Hamon, V. (2015). Android botnets for multitargeted
attacks. Journal in computer virology
and hacking techniques, Volume: 11, Issue: 4.
Harrer, J., Wald, A. (2016). Levers of enterprise
security control: a study on the use,
measurement and value contribution. Journal
of Management Control, 27 (1), pp. 7-32.
Heickero, R. (2015). Industrial Espionage and
Theft of Information. Conference: 14th
European Conference on Cyber Warfare and
Security (ECCWS) Location: Univ
Hertfordshire, Hatfield, England.
Hvistendahl, M. (2016). Industrial espionage 3d
printers vulnerable to spying.
Science, Volume: 352, Issue: 6282. Pages: 132-
Jameson, D.A. (2011). The rhetoric of industrial
espionage: The case of Starwood V. Hilton.
Business Communication Quarterly, 74 (3),
Jerrard, M. (2015). The G & K O'Connor
lockout (1999) and its aftermath: A case study
of a union avoidance campaign in the
Australian meat processing industry. Labour
History, 109 (1), pp. 131-148.
Kraatz, M. S. (1998). Learning by association?
Interorganizational networks and adaptation
to environmental change. Academy of
Management Journal, 41(6), pp. 621-643.
Lee, C-M. (2015). Criminal profiling
and industrial security. Multimedia tools and
applications, 74, 5. 1689-1696.
Mendell, R. L. (2003). The quiet threat: fighting
industrial espionage in America. Springfield,
Ill.: Charles C. Thomas.
Mietzner, M., Schiereck, D., Schweizer, D. (2015).
The role of sovereign wealth funds as activist
or passive fund managers. Journal of Asset
Management, 16 (5), pp. 303-315.
Nasheri, H. (2005). Economic espionage and
industrial spying. Cambridge: Cambridge
Nickisch, C. (2016). Defend your
research industrial espionage is more effective
than r&d. Harvard Business Review,
Volume: 91, Issue: 11. Pages: 30-31
Nyhan, B., & Reifler, J. (2015). The effect of factchecking
on elites: A field experiment on U.S.
state legislators: the effect of fact-checking on
elites. American Journal of Political
Science, 59(3), pp. 628-640.
Polanyi, M. (1967). The tacit dimension. New
York: Anchor Books.
Reisch, M. (2011). Industrial espionage Former
Dow scientist admits to theft of trade secrets.
Chemical & engineering news, Volume: 89,
Issue: 39. Pages: 7-7
Reisman, A. (2006). A taxonomic view of illegal
transfer of technologies: A case study. Journal
of Engineering and Technology Management -
JET-M, 23 (4), pp. 292-312.
Schofield, J. (2016).
Chinese Industrial Espionage: Technology
Acquisition and Military Modernisation.
Canadian journal of political science-revue
canadienne de science
politique, Volume: 49, Issue: 1. Pages: 182-
Schultz, E. (2001). Security views. Journal of
computers and security, Vol. 21, Iss 1, pp. 201-
Shorrock, T. (2016). A New Spy Scandal Exposes
the Corruption of Privatized Intelligence. The
Nation. October 14. At
Silverman, C. (2012). A new age for
truth. Nieman Reports, 66(2), 4.
Sinha, S. (2012). Understanding industrial
espionage for greater technological and
economic security. IEEE Potentials, 31 (3), art.
no. 6193307, pp. 37-41.
Smith, A.D. (2007). Strategic aspects of electronic
document encryption. International Journal of
Services and Standards, 3 (2), pp. 203-221.
Solberg Søilen, K. (2016). A research agenda for
intelligence studies in business. Journal of
Intelligence Studies in Business, 6(1), pp. 21-
Solberg Søilen, K. (2005). Wirtschaftsspionage in
wirtschaftsethischer Perspektive - Eine
interdisziplinäre Analyse. Doctoral Thesis ,
Pages. Full text at http://www.divaportal.
Sivansan, G. (2011). The human factor in
espionage. Computer Fraud & Security, 2011
Stadler, W.A. (2012). The quiet threat:
Fighting industrial espionage in America.
Security journal, 25, 1, 90-93.
Thorleuchter, D. & Van den Poel, D. (2013).
Protecting research and technology
from espionage. Expert systems with
applications, Volume: 40, Issue: 9.
Vashisth, A., Kumar, A. (2013). Corporate
espionage: The insider threat. Business
Information Review, 30 (2), pp. 83-90.
West, N. (2015). Chinese industrial espionage:
Technology Acquisition and Military
Modernization. Asian Security Studies. Pacific
affairs, Volume: 88, Issue: 1. Pages: 178-180.
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).