Access the full text.
Sign up today, get DeepDyve free for 14 days.
David Francis (1997)
Your competitors: Who will they be?Competitive Intelligence Review, 8
Stephen Miller (1997)
The Economic Espionage Act of 1996Competitive Intelligence Review, 8
R. Halligan (1997)
The theft of trade secrets is now a federal crimeCompetitive Intelligence Review, 8
Allison Collins, Norman Schultz (1996)
A review of ethics for competitive intelligence activitiesCompetitive Intelligence Review, 7
E. Levitas, M. Hitt, M. Dacin (1997)
Competitive intelligence and tacit knowledge development in strategic alliancesCompetitive Intelligence Review, 8
Peter Kalitka (1996)
The equalizer versus competitive intelligenceCompetitive Intelligence Review, 7
Jean‐Marie Bonthous (1993)
Understanding intelligence across culturesCompetitive Intelligence Review, 4
James Pooley (1997)
Criminal consequences of trade secret theft: The EEA and compliance plansCompetitive Intelligence Review, 8
Stephen Miller (1997)
Economic espionage: Now it's a federal caseCompetitive Intelligence Review, 8
Judith Vezmar (1996)
Competitive intelligence at xeroxCompetitive Intelligence Review, 7
Peter Kalitka (1997)
Counterintelligence and law enforcement: The Economic Espionage Act of 1996 versus Competitive IntelligenceCompetitive Intelligence Review, 8
David Mark (1997)
Competitive Intelligence and the corporate jewelsCompetitive Intelligence Review, 8
P. Sommer (1994)
Industrial espionage: Analysing the riskComput. Secur., 13
Rivhard Klavans (1994)
Technology strategy and competitive intelligenceCompetitive Intelligence Review, 5
Robert Galvin (1997)
Competitive intelligence at motorolaCompetitive Intelligence Review, 8
Amid all enthusiasm regarding the rise of the Digital Age, industrial espionage remains the dark side of the postindustrial revolution. The Federal Industrial Espionage Act of 1996 aimed at leveling the field regarding widespread cheating and stealing of intellectual properties by competitors in the marketplace. In this paper we aim at defining various forms of industrial espionage in the light of the ongoing information technology revolution.
Competitiveness Review – Emerald Publishing
Published: Feb 1, 2002
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.