-
1
-
-
84986116238
-
-
July
-
Annual Report to Congress on Foreign Economic Collection and Industrial Espionage(1995), http://www. loyola.edu/dept/polysci/html/hula/indust.tml, July.
-
(1995)
-
-
-
2
-
-
84986103790
-
From goldfinger to butterfinger: the legal and policy issues surrounding proposals to use CIA for economic espionage
-
Winter
-
Augustini, J. (1995), “From goldfinger to butterfinger: the legal and policy issues surrounding proposals to use CIA for economic espionage”, Law & Policy in International Business, Vol. 26, Winter, pp. 459-95.
-
(1995)
Law & Policy in International Business
, vol.26
, pp. 459-495
-
-
Augustini, J.1
-
3
-
-
0042429501
-
Who is reading your e-mail
-
February
-
Behar, R., Kover, A. and Warner, A. (1997), “Who is reading your e-mail”, Fortune, http://pathfinder.com/ @uiQP8AcA8aLQO2Kf/fortune/1997/970203/eml. html 3 February.
-
(1997)
Fortune
-
-
Behar, R.1
Kover, A.2
Warner, A.3
-
4
-
-
84986116395
-
What's your competitive intelligence quotient
-
unpublished Conference Report, September
-
Calof, L. (1996), “What's your competitive intelligence quotient”, unpublished Conference Report, September, p. 4.
-
(1996)
, pp. 4
-
-
Calof, L.1
-
5
-
-
80053181037
-
-
CSIS/SCRS (1996), Economic Security, http://www. csis-scrs.gc.a/eng/backgrnd/back6e.html
-
(1996)
Economic Security
-
-
-
7
-
-
84986075841
-
These guys aren't spooks. They're ‘competitive analysts’
-
October. See also: Kabay, M. 1995, No more excuses/protect the Net now, 28 September), CWK19950928S0027
-
Galen, M., Weber, J. and Anderson, S. (1997), “These guys aren't spooks. They're ‘competitive analysts’”, Business Week, October. See also: Kabay, M. (1995), “No more excuses/protect the Net now”, 28 September), http://www.techweb.com/se/ directlink.gi CWK19950928S0027
-
(1997)
Business Week
-
-
Galen, M.1
Weber, J.2
Anderson, S.3
-
8
-
-
84986054949
-
Computer advances create new data theft exposure
-
(n.d.), Information Warfare in Use, #vulnerable See also:, 14 June
-
Haeni, R. (n.d.), Information Warfare in Use, http://www.seas.gwu.du/student/reto/infowar/ in_use.htm#vulnerable See also: Jones, D.C. (1993), “Computer advances create new data theft exposure”, National Underwriter, Vol. 97, 14 June, p. 2.
-
(1993)
National Underwriter
, vol.97
, pp. 2
-
-
Haeni, R.1
Jones, D.C.2
-
9
-
-
84982723008
-
Information security: an overview and resource guide for information managers
-
January
-
Hill, B. and Michael, P.J. (1995), “Information security: an overview and resource guide for information managers”, Records Management Quarterly, Vol. 29, January, pp. 14-26.
-
(1995)
Records Management Quarterly
, vol.29
, pp. 14-26
-
-
Hill, B.1
Michael, P.J.2
-
10
-
-
84986010294
-
The target company
-
September
-
Littlejohn, R. (1994), “The target company”, Security Management, Vol. 38, September, pp. 134-41.
-
(1994)
Security Management
, vol.38
, pp. 134-141
-
-
Littlejohn, R.1
-
11
-
-
84931343527
-
The spy who came in for gold
-
May
-
McCugan, I. (1995), “The spy who came in for gold”, Canadian Business, Vol. 68, May, p. 99.
-
(1995)
Canadian Business
, vol.68
, pp. 99
-
-
McCugan, I.1
-
13
-
-
84986166159
-
The spy who loves you
-
April
-
Marino, C. (1990), “The spy who loves you”, Records Management Quarterly, Vol. 24, April, p. 24.
-
(1990)
Records Management Quarterly
, vol.24
, pp. 24
-
-
Marino, C.1
-
14
-
-
84986155189
-
Convincing management to keep a secret
-
November
-
Pattakos, A.N. (1995), “Convincing management to keep a secret”, Security Management, Vol. 39, November, pp. 35-9.
-
(1995)
Security Management
, vol.39
, pp. 35-39
-
-
Pattakos, A.N.1
-
15
-
-
84986166152
-
-
/227.62
-
Pery, S. (1995), Economic Espionage, http://emporium. turnpike.net/∼IntlInt.con.html/227.62
-
(1995)
Economic Espionage
-
-
Pery, S.1
-
16
-
-
28844443010
-
Study/much talk, little action on competitor intelligence
-
28 August
-
Shermach, K. (1995),)“Study/much talk, little action on competitor intelligence”, Marketing News, Vol. 29, 28 August, p. 40.
-
(1995)
Marketing News
, vol.29
, pp. 40
-
-
Shermach, K.1
-
17
-
-
84986155206
-
Cloak and dagger
-
March
-
Srodes, J. (1995), “Cloak and dagger”, Financial World, Vol. 164, March, pp. 16-18.
-
(1995)
Financial World
, vol.164
, pp. 16-18
-
-
Srodes, J.1
-
18
-
-
84930134735
-
Industrial intelligence: implications for engineering managers
-
April
-
Tolliver, J.M. and Kenny, G.K. (1988), “Industrial intelligence: implications for engineering managers”, Journal of Management in Engineering, Vol. 4, April, pp. 139-47.
-
(1988)
Journal of Management in Engineering
, vol.4
, pp. 139-147
-
-
Tolliver, J.M.1
Kenny, G.K.2
-
19
-
-
84986012023
-
Competitor monitoring - a brief guide
-
Weiss, A. (1997), “Competitor monitoring - a brief guide”, http://dspace.dial.pipex.om/town/square/ae034/ comp.html
-
(1997)
-
-
Weiss, A.1
-
20
-
-
0028424293
-
Fifty ways to secure dial-up connections
-
May
-
Wood, C.C. (1994), “Fifty ways to secure dial-up connections”, Computer & Security, Vol. 13, May, pp. 209-15.
-
(1994)
Computer & Security
, vol.13
, pp. 209-215
-
-
Wood, C.C.1
|