Book description
This book provides an overview of economic espionage as practiced by a range of nations from around the world focusing on the mass scale in which information is being taken for China's growth and development. It supplies an understanding of how the economy of a nation can prosper or suffer, depending on whether that nation is protecting its intellectual property, or whether it is stealing such property for its own use. The text concludes by outlining specific measures that corporations and their employees can practice to protect information and assets, both at home and abroad.
Table of contents
- Front Cover
- Contents (1/2)
- Contents (2/2)
- About the Author
- Introduction
- 1. China: The Red Dragon of Economic Espionage (1/5)
- 1. China: The Red Dragon of Economic Espionage (2/5)
- 1. China: The Red Dragon of Economic Espionage (3/5)
- 1. China: The Red Dragon of Economic Espionage (4/5)
- 1. China: The Red Dragon of Economic Espionage (5/5)
- 2. We Are Not Alone: Economic Espionage and the World (1/2)
- 2. We Are Not Alone: Economic Espionage and the World (2/2)
- 3. The Background of Economic Espionage (1/2)
- 3. The Background of Economic Espionage (2/2)
- 4. PRC Acquisition of US Technology*: An Overview and Short History (1/5)
- 4. PRC Acquisition of US Technology*: An Overview and Short History (2/5)
- 4. PRC Acquisition of US Technology*: An Overview and Short History (3/5)
- 4. PRC Acquisition of US Technology*: An Overview and Short History (4/5)
- 4. PRC Acquisition of US Technology*: An Overview and Short History (5/5)
- 5. Chinese Product Piracy and Counterfeiting* (1/2)
- 5. Chinese Product Piracy and Counterfeiting* (2/2)
- 6. Who, What, and How China Targets* (1/4)
- 6. Who, What, and How China Targets* (2/4)
- 6. Who, What, and How China Targets* (3/4)
- 6. Who, What, and How China Targets* (4/4)
- 7. The China Spy Guide and Open-Source Information (1/3)
- 7. The China Spy Guide and Open-Source Information (2/3)
- 7. The China Spy Guide and Open-Source Information (3/3)
- 8. The Intelligence Cycle and Collection Effort (1/2)
- 8. The Intelligence Cycle and Collection Effort (2/2)
- 9. Corporate Rivals (1/2)
- 9. Corporate Rivals (2/2)
- 10. Sources of Information* (1/5)
- 10. Sources of Information* (2/5)
- 10. Sources of Information* (3/5)
- 10. Sources of Information* (4/5)
- 10. Sources of Information* (5/5)
- 11. The Economic Espionage Act (1/2)
- 11. The Economic Espionage Act (2/2)
- 12. The U.S. Response to Economic Espionage (1/4)
- 12. The U.S. Response to Economic Espionage (2/4)
- 12. The U.S. Response to Economic Espionage (3/4)
- 12. The U.S. Response to Economic Espionage (4/4)
- 13. The DOD View of IP Theft: A Trend Analysis of Reporting on Foreign Targeting of US Technologies* (1/2)
- 13. The DOD View of IP Theft: A Trend Analysis of Reporting on Foreign Targeting of US Technologies* (2/2)
- 14. Intellectual Property Rights: Patents, Copyrights, and Trade Secrets (1/3)
- 14. Intellectual Property Rights: Patents, Copyrights, and Trade Secrets (2/3)
- 14. Intellectual Property Rights: Patents, Copyrights, and Trade Secrets (3/3)
- 15. Internet Exploitation: The Web, Your Computer, Your IT System (1/2)
- 15. Internet Exploitation: The Web, Your Computer, Your IT System (2/2)
- 16. Protecting Your Data (1/6)
- 16. Protecting Your Data (2/6)
- 16. Protecting Your Data (3/6)
- 16. Protecting Your Data (4/6)
- 16. Protecting Your Data (5/6)
- 16. Protecting Your Data (6/6)
- 17. Source Documents and Other Resources (1/3)
- 17. Source Documents and Other Resources (2/3)
- 17. Source Documents and Other Resources (3/3)
- Appendix A: The Dongfan “Gregg” Chung and Chi Mak Economic Espionage Cases (1/2)
- Appendix A: The Dongfan “Gregg” Chung and Chi Mak Economic Espionage Cases (2/2)
- Appendix B: Economic Espionage Killed the Company, The Four Pillars Enterprise Case (1/2)
- Appendix B: Economic Espionage Killed the Company, The Four Pillars Enterprise Case (2/2)
- Appendix C: Summary of Major US Export Enforcement, Economic Espionage, Trade Secret, and Embargo-Related Criminal Cases, 2007 to the Present (1/5)
- Appendix C: Summary of Major US Export Enforcement, Economic Espionage, Trade Secret, and Embargo-Related Criminal Cases, 2007 to the Present (2/5)
- Appendix C: Summary of Major US Export Enforcement, Economic Espionage, Trade Secret, and Embargo-Related Criminal Cases, 2007 to the Present (3/5)
- Appendix C: Summary of Major US Export Enforcement, Economic Espionage, Trade Secret, and Embargo-Related Criminal Cases, 2007 to the Present (4/5)
- Appendix C: Summary of Major US Export Enforcement, Economic Espionage, Trade Secret, and Embargo-Related Criminal Cases, 2007 to the Present (5/5)
- Appendix D: Special 301 Report, China (1/3)
- Appendix D: Special 301 Report, China (2/3)
- Appendix D: Special 301 Report, China (3/3)
Product information
- Title: Trade Secret Theft, Industrial Espionage, and the China Threat
- Author(s):
- Release date: December 2013
- Publisher(s): CRC Press
- ISBN: 9781439899397
You might also like
book
Secrets Stolen, Fortunes Lost
The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly …
book
The Coming China Wars: Where They Will Be Fought and How They Can Be Won, Revised and Expanded Edition
For years, China has served as the "factory floor" for global production, driving down prices for …
book
Business Espionage
Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most …
book
China's Quest for Foreign Technology
This book analyses China’s foreign technology acquisition activity and how this has helped its rapid rise …