Research Article
BibTex RIS Cite

STRATEGIC ANALYSIS AND METHODOLOGY OF CORPORATE ESPIONAGE FOR GLOBAL COMPANIES WITHIN THE FRAMEWORK OF POST-MODERN MANAGEMENT FUNCTIONS

Year 2023, Volume: 1 Issue: 1, 1 - 23, 27.12.2023

Abstract

Corporate espionage through the misuse or theft of trade secrets and/or intellectual properties threaten the innovation ability and growth potential of business organizations as well as national economies. The potential damage can be faced by companies such as losing their competitive superiority, declining in stock unit prices, losing of prestige/trust among customers/stakeholders, descending in market share or loss of investment opportunities, or the disappearance of effectiveness in internal decision-making mechanisms. The primary purpose of this study is to emphasize the conceptual framework and strategic importance of corporate espionage, which has a guiding function, especially in terms of the global commercial activities of multinational companies. In addition, the study aims to comparatively analyze the economic/financial effects of such kind of recent espionage attacks on global markets. Strategically important corporate espionage attacks are a serious source of threat, especially for companies operating on a global scale, but these initiatives also contain serious opportunities. Therefore, the ideal strategy for companies is, on the one hand, to protect their technological know-how against corporate espionage attacks in line with the CI principles, and on the other hand, not to ignore the extraordinary gains of corporate espionage by remaining within legal limits.

References

  • Almeling, D. (2012). Seven reasons why trade secrets are increasingly important. Berkeley Technology Law Journal, 27(2), 1091–1118.
  • Almeling, D. S., W. Snyder, D., Sapoznikow, M., E. McCollum, W., & Weader, J. (2010). A statistical analysis of trade secret litigation in state courts. Gonzaga Law Review, 46(1), 57–101.
  • Altıntaş, K. M. (2021). İstihbarata karşı koyma prensipleri bakımından atik istihbaratının stratejik önemi ve karşılaştırmalı analizi. Uluslararası Kriz Ve Siyaset Araştırmaları Dergisi, 5(2), 879–914.
  • Altıntaş, K. M. ve Asal, S. 2021. Ekonomik İstihbarat Kapsamında Endüstriyel Casusluk. ISBN 978-625-400-286-1, Nobel Academic Publishing. 5th. Edition. Ankara.
  • Baker McKenzie. (2017). The Board Ultimatum: Protect and Preserve (The Rising Importance of Safeguarding Trade Secrets). https://www.bakermckenzie.com/- /media/files/insight/publications/2017/trade-secrets
  • Barnes, J. E. (2001, September 7). P.& G. Said to Agree to Pay Unilever $10 Million in Spying Case. The New York Times. https://www.nytimes.com/2001/09/07/business/p-g-said-to- agree-to-pay-unilever-10-million-in-spying-case.html
  • Billand, P., Bravard, C., Chakrabarti, S., & Sarangi, S. (2009). Corporate Espionage (SSRN Scholarly Paper 1430908). https://doi.org/10.2139/ssrn.1430908
  • Bless, C., Higson-Smith, C., & Sithole, S. L. (2013). Fundamentals of social research Methods.
  • Breed, T. 1999. Tea consumers, tea trade, and colonial cultivation. Accessed 10 November, 2023, https://vdocuments.mx/tea-consumers-tea-trade-and-colonial-cultivation- consumers-tea-tradetea-consumers.html?page=1.
  • Bressler, M. S., & Bressler, L. (2015). Protecting your company’s intellectual property assets from cyber-espionage. Journal of Legal, Ethical and Regulatory Issues, 18(1).
  • Brown, A., & Brown, D. O. H. P. A. (2011). The Grey line: Modern Corporate Espionage & Counter Intelligence. Createspace Independent Publishing Platform.
  • Budiono, G. L., & Sawitri, N. N. (2017). Strategic Business Espionage: an ethics and business practices to gain opportunity or community problems. Studies in Business and Economics, 12(1), 29–39. https://doi.org/10.1515/sbe-2017-0003
  • Burgess, C., & Power, R. (2008). Secrets stolen, fortunes lost: Preventing intellectual property theft and economic espionage in the 21st (1st ed.). Syngress.
  • Chan, M. (2003). Corporate espionage and workplace trust/distrust. Journal of Business Ethics, 42(1), 45–58.
  • European Commission 2013. “Proposal for a Directive of the European Parliament and of the Council on the protection of undisclosed know-how and business information (trade secrets) against their unlawful acquisition”. Accessed 29 August, 2023. https://eur- lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52013SC0471.
  • Eaton, K. (2013). Samsung, Did You Have to Spy on Apple and Nokia’s Licensing Deal? https://www.fastcompany.com/3019303/samsung-did-you-have-to-spy-on-apple-and- nokias-licensing-deal
  • Fink, S. (2002). Sticky fingers: Managing the Global Risk of Economic Espionage. Dearborn Trade.
  • Fitzpatrick, W. M., DiLullo, S. A., & Burke, D. R. (2004). Trade secret piracy and protection: Corporate espionage, corporate security and the law. Advances in Competitiveness Research, 12(1), 57–72.
  • Glitz, A., & Meyersson, E. (2017). Industrial espionage and productivity. Social Science Research Network. https://doi.org/10.2139/ssrn.3003864.
  • Gönültaş, B. (2018). Internet espionage cost German companies $50.5 billion. Anadolu Agency. Accessed 21 July, 2023. https://www.aa.com.tr/tr/dunya/internet-casuslugu- alman sirketlerine -50-5-milyar-dolara-mal-oldu-/1253821.
  • Javers, E. (2011). Secrets and Lies: The Rise of Corporate Espionage in a Global Economy. Georgetown Journal of International Affairs, 12(1), 53–60.
  • Kellett, A. (2015). Trends and Future Directions in Data Security. Vormetric Insider Threat Technical Report. Vormetric Data Security.
  • Koc, Yaman. (2014). Dış Ticaret İstihbarat Kanalları. İstanbul Sanayi Odası. Yayın No 6.
  • Lippoldt, D. C., & Schultz, M. F. (2010) Uncovering Trade Secrets—An Empirical Assessment of Economic Implications of Protection for Undisclosed Data (OECD Trade Policy Papers 167; OECD Trade Policy Papers, Vol. 167). (2014). https://doi.org/10.1787/5jxzl5w3j3s6-en
  • Lyakhovich, E. V. (2019). Chinese porcelain interpretation in Europe: History of Chinese and European porcelain cultures relationships. Proceedings of the 3rd International Conference on Art Studies: Science, Experience, Education (ICASSEE 2019). https://doi.org/10.2991/icassee-19.2019.10
  • Mashingaidze, S. (2015). Corporate espionage masquerading as business intelligence in local banks: A descriptive cross-sectional research. Corporate Ownership and Control, 12(4), 653–659. https://doi.org/10.22495/cocv12i4c6p5
  • Dunn, G. M. A., & Jr, J. S. (2000, June 29). Oracle Defends Its Spying on Microsoft as “Public Service.” Los Angeles Times. https://www.latimes.com/archives/la-xpm-2000-jun-29-fi- 45932-story.html
  • Miller, S. (2018, January 17). 2017 U.S. State of Cybercrime Highlights. Retrieved December 7, 2023, from https://insights.sei.cmu.edu/blog/2017-us-state-of-cybercrime-highlights/.
  • Office of the National Counterintelligence Executive. (2001). “Annual Report to Congress on Foreign Economic Collection and Industrial Espionage”. Accessed 13 September, 2023, https://irp.fas.org/ops/ci/docs/fy01.pdf.
  • PricewaterhouseCoopers. 2014. “Economic Impact of Trade Secret Theft: A framework for companies to safeguard trade secrets and mitigate potential threats”. The Center for Responsible Enterprise and Trade. February. Accessed August, 14, 2023. https://www.innovation-asset.com/hubfs/blog-files/CREATe.org-PwC-Trade-Secret- Theft-FINAL-Feb-2014_01.pdf.
  • PricewaterhouseCoopers. (2016). Global economic crime survey 2016: Adjusting the lens on economic crime preparation brings opportunity back into focus. In PWC. PwC Group. Accessed December 1, 2023, from https://www.pwc.com/gx/en/economic-crime- survey/pdf/GlobalEconomicCrimeSurvey2016.pdf
  • Podszywalow, M. (2012). Risk Management Magazine—Preventing Corporate Espionage. Magazine. https://www.rmmagazine.com/articles/article/2012/03/01/- Preventing-Corporate-Espionage-
  • Rothke, B. (2001). Corporate espionage and what can be done to prevent it. Informtion Systems Security, 10(5), 1–7. https://doi.org/10.1201/1086/43315.10.5.20011101/31716.3
  • Rodgers G. Marrs S. D. (2004). Trade Secrets and Corporate Espionage: Protecting Your Company’s Crown Jewels, Acc Docket. Apr., 60-62.
  • Salaria, N. (2009). Meaning of the term-descriptive survey research method. International Journal of Transformations in Business Management, 2(2).
  • Sandberg, J. (2015). Human Element of Corporate Espionage Risk Management – Literature Review on Assessment and Control of Outsider and Insider Threats [Master Thesis]. University of Tampere.
  • Schafer, J., & Karlins, M. (2021). Hacked by Bits and Pieces: What Can We Learn from an Example of Corporate Espionage? Journal of Information Security, 12(03), 224–231. https://doi.org/10.4236/jis.2021.123012
  • Schumpeter, Joseph. (1970). Das wesen des geldes. Neuauflage, Göttingen, Germany: Vandenhoeck & Ruprecht.
  • Scott, C. (2021). Corporate Espionage by Drone: Why corporations need better physical and legal protections. Social Science Research Network. https://doi.org/10.2139/ssrn.3772434
  • Trzeciak, R. F. (2017). “SEI Cyber Minute: Insider Threats”. Accessed 16 August, 2023. https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=496626.
  • Vashisth, A., & Kumar, A. (2013). Corporate Espionage. Business Information Review, 30(2), 83–90. https://doi.org/10.1177/0266382113491816
  • Winkler, I. (1999). Corporate Espionage: What it Is, why it is Happening in Your Company, what You Must Do about it. Prima Lifestyles.
  • World Association of Intellectual Property-WIPO (2018). “What Qualifies as a Trade Secret”. Accessed 28 August, 2023. https://www.wipo.int/tradesecrets/en.

POST-MODERN YÖNETIM FONKSİYONLARI KAPSAMINDA KÜRESEL ŞİRKETLERE YÖNELİK KURUMSAL CASUSLUĞUN STRATEJİK ANALİZİ VE METODOLOJİSİ

Year 2023, Volume: 1 Issue: 1, 1 - 23, 27.12.2023

Abstract

Ticari sırların ve/veya fikri mülkiyet haklarının kötüye kullanılması veya çalınması yoluyla icra edilen kurumsal casusluk faaliyetleri, ulusal ekonomilerin yanı sıra ticari kuruluşların inovasyon yeteneğini ve büyüme potansiyelini tehdit etmektedir. Kurumsal casusluk saldırıları sonucu mağdur şirketlerin rekabet üstünlüğünü kaybetmesi, hisse senedi birim fiyatlarının düşmesi, müşteriler/paydaşlar nezdinde prestij/güven kaybı, pazar payının düşmesi veya yatırım fırsatlarının kaybedilmesi ya da iç karar alma mekanizmalarındaki etkinliğin ortadan kalkması gibi potansiyel zararlar ile karşılaşabilmeleri muhtemeldir. Bu çalışmanın temel amacı, özellikle çok uluslu şirketlerin küresel ticari faaliyetleri açısından yol gösterici bir işleve sahip olan kurumsal casusluğun kavramsal çerçevesini ve stratejik önemini vurgulamaktır. Ayrıca çalışma, son dönemde gerçekleşen bu tür casusluk saldırılarının küresel piyasalar üzerindeki ekonomik/finansal etkilerini karşılaştırmalı olarak analiz etmeyi amaçlamaktadır. Stratejik öneme sahip olan kurumsal casusluk saldırıları, özellikle küresel ölçekte faaliyet gösteren şirketler için ciddi bir tehdit kaynağı olmakla birlikte, bu girişimler aynı zamanda kendi içinde önemli fırsatlar da barındırmaktadır. Bu nedenle şirketler için ideal olan strateji, bir yandan kurumsal casusluk saldırılarına karşı teknolojik bilgi birikimini istihbarata karşı koyma prensipleri doğrultusunda korumak, diğer yandan da yasal sınırlar dahilinde kalınmak şartıyla kurumsal casusluğun olağanüstü kazanımlarını da göz ardı etmemek gerekmektedir.

References

  • Almeling, D. (2012). Seven reasons why trade secrets are increasingly important. Berkeley Technology Law Journal, 27(2), 1091–1118.
  • Almeling, D. S., W. Snyder, D., Sapoznikow, M., E. McCollum, W., & Weader, J. (2010). A statistical analysis of trade secret litigation in state courts. Gonzaga Law Review, 46(1), 57–101.
  • Altıntaş, K. M. (2021). İstihbarata karşı koyma prensipleri bakımından atik istihbaratının stratejik önemi ve karşılaştırmalı analizi. Uluslararası Kriz Ve Siyaset Araştırmaları Dergisi, 5(2), 879–914.
  • Altıntaş, K. M. ve Asal, S. 2021. Ekonomik İstihbarat Kapsamında Endüstriyel Casusluk. ISBN 978-625-400-286-1, Nobel Academic Publishing. 5th. Edition. Ankara.
  • Baker McKenzie. (2017). The Board Ultimatum: Protect and Preserve (The Rising Importance of Safeguarding Trade Secrets). https://www.bakermckenzie.com/- /media/files/insight/publications/2017/trade-secrets
  • Barnes, J. E. (2001, September 7). P.& G. Said to Agree to Pay Unilever $10 Million in Spying Case. The New York Times. https://www.nytimes.com/2001/09/07/business/p-g-said-to- agree-to-pay-unilever-10-million-in-spying-case.html
  • Billand, P., Bravard, C., Chakrabarti, S., & Sarangi, S. (2009). Corporate Espionage (SSRN Scholarly Paper 1430908). https://doi.org/10.2139/ssrn.1430908
  • Bless, C., Higson-Smith, C., & Sithole, S. L. (2013). Fundamentals of social research Methods.
  • Breed, T. 1999. Tea consumers, tea trade, and colonial cultivation. Accessed 10 November, 2023, https://vdocuments.mx/tea-consumers-tea-trade-and-colonial-cultivation- consumers-tea-tradetea-consumers.html?page=1.
  • Bressler, M. S., & Bressler, L. (2015). Protecting your company’s intellectual property assets from cyber-espionage. Journal of Legal, Ethical and Regulatory Issues, 18(1).
  • Brown, A., & Brown, D. O. H. P. A. (2011). The Grey line: Modern Corporate Espionage & Counter Intelligence. Createspace Independent Publishing Platform.
  • Budiono, G. L., & Sawitri, N. N. (2017). Strategic Business Espionage: an ethics and business practices to gain opportunity or community problems. Studies in Business and Economics, 12(1), 29–39. https://doi.org/10.1515/sbe-2017-0003
  • Burgess, C., & Power, R. (2008). Secrets stolen, fortunes lost: Preventing intellectual property theft and economic espionage in the 21st (1st ed.). Syngress.
  • Chan, M. (2003). Corporate espionage and workplace trust/distrust. Journal of Business Ethics, 42(1), 45–58.
  • European Commission 2013. “Proposal for a Directive of the European Parliament and of the Council on the protection of undisclosed know-how and business information (trade secrets) against their unlawful acquisition”. Accessed 29 August, 2023. https://eur- lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52013SC0471.
  • Eaton, K. (2013). Samsung, Did You Have to Spy on Apple and Nokia’s Licensing Deal? https://www.fastcompany.com/3019303/samsung-did-you-have-to-spy-on-apple-and- nokias-licensing-deal
  • Fink, S. (2002). Sticky fingers: Managing the Global Risk of Economic Espionage. Dearborn Trade.
  • Fitzpatrick, W. M., DiLullo, S. A., & Burke, D. R. (2004). Trade secret piracy and protection: Corporate espionage, corporate security and the law. Advances in Competitiveness Research, 12(1), 57–72.
  • Glitz, A., & Meyersson, E. (2017). Industrial espionage and productivity. Social Science Research Network. https://doi.org/10.2139/ssrn.3003864.
  • Gönültaş, B. (2018). Internet espionage cost German companies $50.5 billion. Anadolu Agency. Accessed 21 July, 2023. https://www.aa.com.tr/tr/dunya/internet-casuslugu- alman sirketlerine -50-5-milyar-dolara-mal-oldu-/1253821.
  • Javers, E. (2011). Secrets and Lies: The Rise of Corporate Espionage in a Global Economy. Georgetown Journal of International Affairs, 12(1), 53–60.
  • Kellett, A. (2015). Trends and Future Directions in Data Security. Vormetric Insider Threat Technical Report. Vormetric Data Security.
  • Koc, Yaman. (2014). Dış Ticaret İstihbarat Kanalları. İstanbul Sanayi Odası. Yayın No 6.
  • Lippoldt, D. C., & Schultz, M. F. (2010) Uncovering Trade Secrets—An Empirical Assessment of Economic Implications of Protection for Undisclosed Data (OECD Trade Policy Papers 167; OECD Trade Policy Papers, Vol. 167). (2014). https://doi.org/10.1787/5jxzl5w3j3s6-en
  • Lyakhovich, E. V. (2019). Chinese porcelain interpretation in Europe: History of Chinese and European porcelain cultures relationships. Proceedings of the 3rd International Conference on Art Studies: Science, Experience, Education (ICASSEE 2019). https://doi.org/10.2991/icassee-19.2019.10
  • Mashingaidze, S. (2015). Corporate espionage masquerading as business intelligence in local banks: A descriptive cross-sectional research. Corporate Ownership and Control, 12(4), 653–659. https://doi.org/10.22495/cocv12i4c6p5
  • Dunn, G. M. A., & Jr, J. S. (2000, June 29). Oracle Defends Its Spying on Microsoft as “Public Service.” Los Angeles Times. https://www.latimes.com/archives/la-xpm-2000-jun-29-fi- 45932-story.html
  • Miller, S. (2018, January 17). 2017 U.S. State of Cybercrime Highlights. Retrieved December 7, 2023, from https://insights.sei.cmu.edu/blog/2017-us-state-of-cybercrime-highlights/.
  • Office of the National Counterintelligence Executive. (2001). “Annual Report to Congress on Foreign Economic Collection and Industrial Espionage”. Accessed 13 September, 2023, https://irp.fas.org/ops/ci/docs/fy01.pdf.
  • PricewaterhouseCoopers. 2014. “Economic Impact of Trade Secret Theft: A framework for companies to safeguard trade secrets and mitigate potential threats”. The Center for Responsible Enterprise and Trade. February. Accessed August, 14, 2023. https://www.innovation-asset.com/hubfs/blog-files/CREATe.org-PwC-Trade-Secret- Theft-FINAL-Feb-2014_01.pdf.
  • PricewaterhouseCoopers. (2016). Global economic crime survey 2016: Adjusting the lens on economic crime preparation brings opportunity back into focus. In PWC. PwC Group. Accessed December 1, 2023, from https://www.pwc.com/gx/en/economic-crime- survey/pdf/GlobalEconomicCrimeSurvey2016.pdf
  • Podszywalow, M. (2012). Risk Management Magazine—Preventing Corporate Espionage. Magazine. https://www.rmmagazine.com/articles/article/2012/03/01/- Preventing-Corporate-Espionage-
  • Rothke, B. (2001). Corporate espionage and what can be done to prevent it. Informtion Systems Security, 10(5), 1–7. https://doi.org/10.1201/1086/43315.10.5.20011101/31716.3
  • Rodgers G. Marrs S. D. (2004). Trade Secrets and Corporate Espionage: Protecting Your Company’s Crown Jewels, Acc Docket. Apr., 60-62.
  • Salaria, N. (2009). Meaning of the term-descriptive survey research method. International Journal of Transformations in Business Management, 2(2).
  • Sandberg, J. (2015). Human Element of Corporate Espionage Risk Management – Literature Review on Assessment and Control of Outsider and Insider Threats [Master Thesis]. University of Tampere.
  • Schafer, J., & Karlins, M. (2021). Hacked by Bits and Pieces: What Can We Learn from an Example of Corporate Espionage? Journal of Information Security, 12(03), 224–231. https://doi.org/10.4236/jis.2021.123012
  • Schumpeter, Joseph. (1970). Das wesen des geldes. Neuauflage, Göttingen, Germany: Vandenhoeck & Ruprecht.
  • Scott, C. (2021). Corporate Espionage by Drone: Why corporations need better physical and legal protections. Social Science Research Network. https://doi.org/10.2139/ssrn.3772434
  • Trzeciak, R. F. (2017). “SEI Cyber Minute: Insider Threats”. Accessed 16 August, 2023. https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=496626.
  • Vashisth, A., & Kumar, A. (2013). Corporate Espionage. Business Information Review, 30(2), 83–90. https://doi.org/10.1177/0266382113491816
  • Winkler, I. (1999). Corporate Espionage: What it Is, why it is Happening in Your Company, what You Must Do about it. Prima Lifestyles.
  • World Association of Intellectual Property-WIPO (2018). “What Qualifies as a Trade Secret”. Accessed 28 August, 2023. https://www.wipo.int/tradesecrets/en.
There are 43 citations in total.

Details

Primary Language English
Subjects Security Studies
Journal Section Research Article
Authors

Kadir Murat Altıntaş 0000-0001-8422-1086

Publication Date December 27, 2023
Submission Date November 11, 2023
Acceptance Date December 1, 2023
Published in Issue Year 2023 Volume: 1 Issue: 1

Cite

APA Altıntaş, K. M. (2023). STRATEGIC ANALYSIS AND METHODOLOGY OF CORPORATE ESPIONAGE FOR GLOBAL COMPANIES WITHIN THE FRAMEWORK OF POST-MODERN MANAGEMENT FUNCTIONS. Güvenlik Ve İstihbarat Çalışmaları Dergisi, 1(1), 1-23.