메뉴 건너뛰기




Volumn 11, Issue 2, 1999, Pages 53-59

Industrial espionage and competitive intelligence: One you do; one you do not

Author keywords

Competitor intelligence; Espionage

Indexed keywords


EID: 84986155807     PISSN: 13665626     EISSN: None     Source Type: Journal    
DOI: 10.1108/13665629910260743     Document Type: Article
Times cited : (16)

References (20)
  • 1
    • 84986116238 scopus 로고
    • July
    • Annual Report to Congress on Foreign Economic Collection and Industrial Espionage(1995), http://www. loyola.edu/dept/polysci/html/hula/indust.tml, July.
    • (1995)
  • 2
    • 84986103790 scopus 로고
    • From goldfinger to butterfinger: the legal and policy issues surrounding proposals to use CIA for economic espionage
    • Winter
    • Augustini, J. (1995), “From goldfinger to butterfinger: the legal and policy issues surrounding proposals to use CIA for economic espionage”, Law & Policy in International Business, Vol. 26, Winter, pp. 459-95.
    • (1995) Law & Policy in International Business , vol.26 , pp. 459-495
    • Augustini, J.1
  • 3
    • 0042429501 scopus 로고    scopus 로고
    • Who is reading your e-mail
    • February
    • Behar, R., Kover, A. and Warner, A. (1997), “Who is reading your e-mail”, Fortune, http://pathfinder.com/ @uiQP8AcA8aLQO2Kf/fortune/1997/970203/eml. html 3 February.
    • (1997) Fortune
    • Behar, R.1    Kover, A.2    Warner, A.3
  • 4
    • 84986116395 scopus 로고    scopus 로고
    • What's your competitive intelligence quotient
    • unpublished Conference Report, September
    • Calof, L. (1996), “What's your competitive intelligence quotient”, unpublished Conference Report, September, p. 4.
    • (1996) , pp. 4
    • Calof, L.1
  • 5
    • 80053181037 scopus 로고    scopus 로고
    • CSIS/SCRS (1996), Economic Security, http://www. csis-scrs.gc.a/eng/backgrnd/back6e.html
    • (1996) Economic Security
  • 7
    • 84986075841 scopus 로고    scopus 로고
    • These guys aren't spooks. They're ‘competitive analysts’
    • October. See also: Kabay, M. 1995, No more excuses/protect the Net now, 28 September), CWK19950928S0027
    • Galen, M., Weber, J. and Anderson, S. (1997), “These guys aren't spooks. They're ‘competitive analysts’”, Business Week, October. See also: Kabay, M. (1995), “No more excuses/protect the Net now”, 28 September), http://www.techweb.com/se/ directlink.gi CWK19950928S0027
    • (1997) Business Week
    • Galen, M.1    Weber, J.2    Anderson, S.3
  • 8
    • 84986054949 scopus 로고
    • Computer advances create new data theft exposure
    • (n.d.), Information Warfare in Use, #vulnerable See also:, 14 June
    • Haeni, R. (n.d.), Information Warfare in Use, http://www.seas.gwu.du/student/reto/infowar/ in_use.htm#vulnerable See also: Jones, D.C. (1993), “Computer advances create new data theft exposure”, National Underwriter, Vol. 97, 14 June, p. 2.
    • (1993) National Underwriter , vol.97 , pp. 2
    • Haeni, R.1    Jones, D.C.2
  • 9
    • 84982723008 scopus 로고
    • Information security: an overview and resource guide for information managers
    • January
    • Hill, B. and Michael, P.J. (1995), “Information security: an overview and resource guide for information managers”, Records Management Quarterly, Vol. 29, January, pp. 14-26.
    • (1995) Records Management Quarterly , vol.29 , pp. 14-26
    • Hill, B.1    Michael, P.J.2
  • 10
    • 84986010294 scopus 로고
    • The target company
    • September
    • Littlejohn, R. (1994), “The target company”, Security Management, Vol. 38, September, pp. 134-41.
    • (1994) Security Management , vol.38 , pp. 134-141
    • Littlejohn, R.1
  • 11
    • 84931343527 scopus 로고
    • The spy who came in for gold
    • May
    • McCugan, I. (1995), “The spy who came in for gold”, Canadian Business, Vol. 68, May, p. 99.
    • (1995) Canadian Business , vol.68 , pp. 99
    • McCugan, I.1
  • 13
    • 84986166159 scopus 로고
    • The spy who loves you
    • April
    • Marino, C. (1990), “The spy who loves you”, Records Management Quarterly, Vol. 24, April, p. 24.
    • (1990) Records Management Quarterly , vol.24 , pp. 24
    • Marino, C.1
  • 14
    • 84986155189 scopus 로고
    • Convincing management to keep a secret
    • November
    • Pattakos, A.N. (1995), “Convincing management to keep a secret”, Security Management, Vol. 39, November, pp. 35-9.
    • (1995) Security Management , vol.39 , pp. 35-39
    • Pattakos, A.N.1
  • 15
    • 84986166152 scopus 로고
    • /227.62
    • Pery, S. (1995), Economic Espionage, http://emporium. turnpike.net/∼IntlInt.con.html/227.62
    • (1995) Economic Espionage
    • Pery, S.1
  • 16
    • 28844443010 scopus 로고
    • Study/much talk, little action on competitor intelligence
    • 28 August
    • Shermach, K. (1995),)“Study/much talk, little action on competitor intelligence”, Marketing News, Vol. 29, 28 August, p. 40.
    • (1995) Marketing News , vol.29 , pp. 40
    • Shermach, K.1
  • 17
    • 84986155206 scopus 로고
    • Cloak and dagger
    • March
    • Srodes, J. (1995), “Cloak and dagger”, Financial World, Vol. 164, March, pp. 16-18.
    • (1995) Financial World , vol.164 , pp. 16-18
    • Srodes, J.1
  • 18
    • 84930134735 scopus 로고
    • Industrial intelligence: implications for engineering managers
    • April
    • Tolliver, J.M. and Kenny, G.K. (1988), “Industrial intelligence: implications for engineering managers”, Journal of Management in Engineering, Vol. 4, April, pp. 139-47.
    • (1988) Journal of Management in Engineering , vol.4 , pp. 139-147
    • Tolliver, J.M.1    Kenny, G.K.2
  • 19
    • 84986012023 scopus 로고    scopus 로고
    • Competitor monitoring - a brief guide
    • Weiss, A. (1997), “Competitor monitoring - a brief guide”, http://dspace.dial.pipex.om/town/square/ae034/ comp.html
    • (1997)
    • Weiss, A.1
  • 20
    • 0028424293 scopus 로고
    • Fifty ways to secure dial-up connections
    • May
    • Wood, C.C. (1994), “Fifty ways to secure dial-up connections”, Computer & Security, Vol. 13, May, pp. 209-15.
    • (1994) Computer & Security , vol.13 , pp. 209-215
    • Wood, C.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.