US intellectual property (IP) is a key target of numerous other countries and individuals. Of specific interest to outsiders are technological resources. Illegally transferring information can range from the extreme of the often‐glamorized international espionage to the more traditional and common gathering of competitive intelligence (CI). This paper will review the key issues in the illegal transference of information technologies from the USA, will outline the role of other countries involved, and will discuss the impact on key, targeted industries. In particular the illegal attempts to procure key intellectual properties from technology firms will be discussed. In addition, the paper will distinguish between corporate intelligence, espionage, and economic espionage.
Article navigation
1 October 2000
This article was originally published in
Information Management & Computer Security
Viewpoint|
October 01 2000
Issues in the illegal transference of US information technologies Available to Purchase
Daniel J. Morris;
Daniel J. Morris
Director of Marketing, Gale Corporation, Northern Highlands, California, USA
Search for other works by this author on:
Lawrence P. Ettkin;
Lawrence P. Ettkin
Head, Management Department, College of Business Administration, University of Tennessee at Chattanooga, Chattanooga, Tennessee, USA
Search for other works by this author on:
Marilyn M. Helms
Marilyn M. Helms
Susquicentennial Endowed Professor of Business and Technology, Dalton State College, Dalton, Georgia, USA
Search for other works by this author on:
Publisher: Emerald Publishing
Online ISSN: 1758-5805
Print ISSN: 0968-5227
© MCB UP Limited
2000
Information Management & Computer Security (2000) 8 (4): 164–173.
Citation
Morris DJ, Ettkin LP, Helms MM (2000), "Issues in the illegal transference of US information technologies". Information Management & Computer Security, Vol. 8 No. 4 pp. 164–173, doi: https://doi.org/10.1108/09685220010344916
Download citation file:
189
Views
Suggested Reading
Competitive Knowledge Management
Leadership & Organization Development Journal (September,2002)
Floating or drowning in a sea of piracy: How do you take on the hacker?
Strategic Direction (December,2008)
Copyright theft
Industrial and Commercial Training (December,2006)
Tales from the front line of corporate espionage: The fight to safeguard intellectual property is fiercer than ever
Strategic Direction (August,2012)
Planning the acquisition of intellectual and property rights in the United States
Managerial Law (December,1998)
Related Chapters
The Theft of the Jaguar’s Fire is not Property in Indigenous Central Brazil
Anthropological Enquiries into Policy, Debt, Business, and Capitalism
Still “Staying Loose in a Tightening World”? Revisiting Gerald Mars’ Cheats at Work
Rethinking Misbehavior and Resistance in Organizations
Crime During COVID-19: The Impact on Retail
Crime and Social Control in Pandemic Times
Recommended for you
These recommendations are informed by your reading behaviors and indicated interests.
