Asian Journal of Information Technology

Year: 2011
Volume: 10
Issue: 5
Page No. 170 - 179

Industrial Espionage as a Method of Technology Transfer and How to Prevent it

Authors : Hessam Zandhessami, Pouya Majd Pezeshki and Abolfazl Moradian

Abstract: The first part of this study summarizes technology transfer methods and then it looks at how espionage has never been easier. This study features a report on who the spies are why they steal electronic data and what techniques they use. Also speculates on what the potential costs of espionage could be to nations and organizations. In order to shed light on the illegal aspects, this study looks at some recent cases of industrial espionage, involving major multinationals. At the other hand we introduced a range of measures that can be taken to reduce the likelihood of becoming a target for industrial espionage and minimize the effects if you are attacked. In this study we study from two perspectives; first from who use industrial espionage techniques to achieve technology and second from who try to protect his own assets contain trade secrets and technologies etc., through necessary prevention measures. So, the researchers introduce industrial espionage techniques which are often used and prevention techniques which should take place. At end we evaluate and rank suitable prevention methods by using group TOPSIS (Technique for Order Preference by Similarity to Ideal Solution) approach. This study implies review industrial espionage cases and finds a quantitative methodology based on a structured framework for ranking the most appropriate prevention method. Send questionnaire to selected managers of information security in high tech organizations in Iran to evaluate each methods of industrial espionage and to find which ones are used more than others and rank the prevention methods to make information secured.

How to cite this article:

Hessam Zandhessami, Pouya Majd Pezeshki and Abolfazl Moradian, 2011. Industrial Espionage as a Method of Technology Transfer and How to Prevent it. Asian Journal of Information Technology, 10: 170-179.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved