-
1
-
-
1842759006
-
Demand for countereavesdropping devices grows
-
October
-
Anonymous (1997), "Demand for countereavesdropping devices grows", Security, Vol. 34 No. 10, October, p. 90.
-
(1997)
Security
, vol.34
, Issue.10
, pp. 90
-
-
-
2
-
-
0347434453
-
Disk Tracy takes aim at employee Internet abuses
-
September, Georgetown
-
Anonymous (1998a), "Disk Tracy takes aim at employee Internet abuses", Office Systems, Vol. 15 No. 9. September, Georgetown, p. 37.
-
(1998)
Office Systems
, vol.15
, Issue.9
, pp. 37
-
-
-
3
-
-
0346173290
-
Economic espionage explosion
-
May
-
Anonymous (1998b), "Economic espionage explosion", Security, Vol. 35 No. 5, May, p. 17.
-
(1998)
Security
, vol.35
, Issue.5
, pp. 17
-
-
-
4
-
-
0347434452
-
Do-it-yourself intelligence
-
February
-
Banham, R. (1999), "Do-it-yourself intelligence", World Trade, Vol. 12 No. 2, February, pp. 48-50.
-
(1999)
World Trade
, vol.12
, Issue.2
, pp. 48-50
-
-
Banham, R.1
-
5
-
-
0012658695
-
Economic espionage: Security missions redefined
-
July/ August
-
Fraumann, E. (1997), "Economic espionage: security missions redefined", Public Administration Review, Vol. 57 No. 4, July/ August, p. 304.
-
(1997)
Public Administration Review
, vol.57
, Issue.4
, pp. 304
-
-
Fraumann, E.1
-
6
-
-
0003750785
-
-
Crown Publishers, Inc., New York, NY
-
Friedman, G., Friedman, M., Chapman, C. and Baker, J.S. (1997), The Intelligence Edge: How to Profit in the Information Age, Crown Publishers, Inc., New York, NY, pp. 220-21.
-
(1997)
The Intelligence Edge: How to Profit in the Information Age
, pp. 220-221
-
-
Friedman, G.1
Friedman, M.2
Chapman, C.3
Baker, J.S.4
-
7
-
-
1842759017
-
Don't let security slip
-
May 18
-
Hamblen, M. (1998), "Don't let security slip", Computerworld, Vol. 32 No. 20, May 18, pp. 47-50.
-
(1998)
Computerworld
, vol.32
, Issue.20
, pp. 47-50
-
-
Hamblen, M.1
-
8
-
-
1842759021
-
Firewalls aren't safe
-
August 10
-
Hayes, F. (1998), "Firewalls aren't safe", Computerworld, Vol. 32 No. 32, August 10, p. 12.
-
(1998)
Computerworld
, vol.32
, Issue.32
, pp. 12
-
-
Hayes, F.1
-
9
-
-
0348064748
-
Common sense best strategy
-
February
-
Heffernan, R. (1997), "Common sense best strategy", Security, Vol. 34 No. 2, February, pp. 26-7.
-
(1997)
Security
, vol.34
, Issue.2
, pp. 26-27
-
-
Heffernan, R.1
-
10
-
-
0348064747
-
Intensive info security
-
April
-
Johnston, D.L. (1997), "Intensive info security", Security, Vol. 34 No. 4, April, p. 10.
-
(1997)
Security
, vol.34
, Issue.4
, pp. 10
-
-
Johnston, D.L.1
-
11
-
-
0013375328
-
-
Simon & Schuster, New York, NY
-
Kahaner, L. (1996), Competitive Intelligence: From Black Ops to Boardrooms - How Businesses Gather, Analyze and Use Information to Succeed in the Marketplace, Simon & Schuster, New York, NY, p. 255.
-
(1996)
Competitive Intelligence: from Black Ops to Boardrooms - How Businesses Gather, Analyze and Use Information to Succeed in the Marketplace
, pp. 255
-
-
Kahaner, L.1
-
12
-
-
0346173289
-
Information security: It's not just what you know, it's also how well you keep it to yourself
-
December
-
Kulczycki, G. (1997), "Information security: it's not just what you know, it's also how well you keep it to yourself", Management Accounting, Vol. 79 No. 6, December, p. 19.
-
(1997)
Management Accounting
, vol.79
, Issue.6
, pp. 19
-
-
Kulczycki, G.1
-
13
-
-
0346173286
-
Go to IBM's booth. Avoid recognition, skulk
-
November 17
-
McCartney, S. (1994), "Go to IBM's booth. Avoid recognition, skulk", The Wall Street Journal, November 17, p. B1.
-
(1994)
The Wall Street Journal
-
-
McCartney, S.1
-
14
-
-
0346173288
-
-
Quorum Books, Westport, CT
-
McCongale, J.J. Jr and VeUa, C.M. (1996), A New Archetype for Competitive Intelligence, Quorum Books, Westport, CT, pp. 91 and 95.
-
(1996)
A New Archetype for Competitive Intelligence
, pp. 91
-
-
McCongale Jr., J.J.1
Veua, C.M.2
-
15
-
-
0346803778
-
Is somebody dulling your competitive edge?
-
Nolan, J. (1995), "Is somebody dulling your competitive edge?", Security, Technology and Design, Vol. 5 No. 6, pp. 50-59.
-
(1995)
Security, Technology and Design
, vol.5
, Issue.6
, pp. 50-59
-
-
Nolan, J.1
-
16
-
-
0347434449
-
What does our competition know about us?
-
March-April
-
Nolan, J. (1996), "What does our competition know about us?", Security Technology and Design, Vol. 6 No. 2, March-April, p. 69.
-
(1996)
Security Technology and Design
, vol.6
, Issue.2
, pp. 69
-
-
Nolan, J.1
-
17
-
-
0013041886
-
Invisible loot
-
November 2
-
Radcliff, D. (1998a), "Invisible loot", Industry Week, Vol. 247 No. 20, November 2, pp. 24-5.
-
(1998)
Industry Week
, vol.247
, Issue.20
, pp. 24-25
-
-
Radcliff, D.1
-
18
-
-
1842809409
-
Physical security: The danger within
-
April 20
-
Radcliff, D. (1998b), "Physical security: the danger within", Inforworld, Vol. 20 No. 16, April 20, p. 96.
-
(1998)
Inforworld
, vol.20
, Issue.16
, pp. 96
-
-
Radcliff, D.1
-
19
-
-
0348063697
-
-
Quorum Books, New York, NY
-
Roukis, G.S., Conway, H. and Charnov, B.H. (1990), Global Corporate Intelligence: Opportunities, Technologies and Threats in the 1990s, Quorum Books, New York, NY, pp. 151-2.
-
(1990)
Global Corporate Intelligence: Opportunities, Technologies and Threats in the 1990s
, pp. 151-152
-
-
Roukis, G.S.1
Conway, H.2
Charnov, B.H.3
-
20
-
-
0347433344
-
Corporate espionage: No longer a hidden threat
-
December
-
Shanley, A. and Crabb, C. (1998), "Corporate espionage: no longer a hidden threat", Chemical Engineering, Vol. 105 No. 13, December, p. 85.
-
(1998)
Chemical Engineering
, vol.105
, Issue.13
, pp. 85
-
-
Shanley, A.1
Crabb, C.2
-
21
-
-
0347433342
-
Security risk increased by e-commerce
-
September 1, London
-
Taylor, P. (1998), "Security risk increased by e-commerce", Financial Times, September 1, London, p. 6.
-
(1998)
Financial Times
, pp. 6
-
-
Taylor, P.1
-
22
-
-
0346802718
-
Too much trust: Are trade secrets safe with suppliers?
-
November 2
-
Weld Royal, "Too much trust: are trade secrets safe with suppliers?", Industry Week, Vol. 247 No. 20, November 2, p. 27.
-
Industry Week
, vol.247
, Issue.20
, pp. 27
-
-
Royal, W.1
-
23
-
-
0242444873
-
Corporate espionage
-
June
-
Winkler, I. (1997), "Corporate espionage", Inc., Vol. 19 No. 8, June, p. 91.
-
(1997)
Inc.
, vol.19
, Issue.8
, pp. 91
-
-
Winkler, I.1
|