Author: Hedieh Nasheri

Publisher: Cambridge University Press

ISBN: 9780521543712

Category: Law

Page: 270

View: 7857

This 2005 book provides an analytic overview and assessment of the changing nature of crime in the burgeoning information society. Bringing together views from leading national and international authorities, Hedieh Nasheri explains the historical and theoretical background surrounding issues of economic espionage, trade secret theft and industrial spying and its impact on society. She looks at legislative history, the progression of electronic and corporate criminal behavior by introducing the concept of information theft and computer crimes, exploring its definition, its identification and its development within criminology. Nasheri presents an assessment of the state of economic espionage activities within a criminological context and based on that assessment addresses areas where additional action is required. The book also draws attention to a variety of issues raised by economic espionage and technological development. It draws on a variety of disciplines, including criminology, criminal justice, sociology, law and society, economics and political science.
Read More

Economic Espionage in America

Author: John J. Fialka

Publisher: W. W. Norton & Company

ISBN: 9780393318210

Category: Business & Economics

Page: 242

View: 404

"The best book yet on the threat to American business posed by industrial spies. . . . Historians may well turn to Fialka's book for a quick study."--John Mintz, Washington Post
Read More

What It Is, Why It's Happening in Your Company, What You Must Do about It

Author: Ira Winkler

Publisher: Prima Lifestyles

ISBN: 9780761518099

Category: Business & Economics

Page: 384

View: 5640

Information can make the difference between success and failure in business. Lose a trade secret to a competitor, and you lose the edge your product had. Lose a client list, and you lose the account. Lose too much, and you're out of business. American firms lose as much as $100 billion a year to corporate espionage. Yours may be one of them. You can protect yourself. You don't have to invest in expensive counter-measures, and you don't have to disrupt your operations. But you do have to change the way you do business. Information security expert Ira Winkler shows you how, with simple, practical solutions that can increase your safety and protect your profits. You'll learn how to safeguard your sensitive information without sacrificing a friendly workplace; hire trustworthy employees and keep them loyal; burglar-proof your documents, equipment, and building; and use technology to detect and prevent theft.
Read More

The Secret World of Corporate Espionage

Author: Eamon Javers

Publisher: Harper Collins

ISBN: 0061969389

Category: Business & Economics

Page: 320

View: 3637

“Eamon Javers has produced a remarkable book about the secret world of business warfare—a world filled with corporate spies and covert ops and skullduggery… An important book that has the added pleasure of reading like a spy novel.” —David Grann, author of The Lost City of Z Award-winning reporter Eamon Javers’s Broker, Trader, Lawyer, Spy is a penetrating work of investigative and historical journalism about the evolution of corporate espionage, exploring the dangerous and combustible power spies hold over international business. From the birth of the Pinkertons to Howard Hughes, from presidents to Cold War spies, Broker, Trader, Lawyer, Spy is, like Legacy of Ashes and Blackwater, a first rate political thriller that also just happens to be true.
Read More

Technology Acquisition and Military Modernisation

Author: William C. Hannas,James Mulvenon,Anna B. Puglisi

Publisher: Routledge

ISBN: 1135952612

Category: History

Page: 320

View: 2203

This new book is the first full account, inside or outside government, of China’s efforts to acquire foreign technology. Based on primary sources and meticulously researched, the book lays bare China’s efforts to prosper technologically through others' achievements. For decades, China has operated an elaborate system to spot foreign technologies, acquire them by all conceivable means, and convert them into weapons and competitive goods—without compensating the owners. The director of the US National Security Agency recently called it "the greatest transfer of wealth in history." Written by two of America's leading government analysts and an expert on Chinese cyber networks, this book describes these transfer processes comprehensively and in detail, providing the breadth and depth missing in other works. Drawing upon previously unexploited Chinese language sources, the authors begin by placing the new research within historical context, before examining the People’s Republic of China’s policy support for economic espionage, clandestine technology transfers, theft through cyberspace and its impact on the future of the US. This book will be of much interest to students of Chinese politics, Asian security studies, US defence, US foreign policy and IR in general.
Read More

Developing a Counterespionage Program

Author: Daniel J. Benny

Publisher: CRC Press

ISBN: 1466568143

Category: Business & Economics

Page: 232

View: 8891

The FBI estimates that billions of U.S. dollars are lost each year to foreign and domestic competitors who deliberately target industrial trade secrets. And, although today’s organizations face unprecedented threats to the security of their proprietary information and assets, most books on industrial espionage fail to supply guidelines for establishing a program to prevent and thwart such threats. Filling this need, Industrial Espionage: Developing a Counterespionage Program provides complete coverage of how to ensure the protection of company proprietary information and assets, including how to develop an effective corporate counterespionage program. The book presents the insights of a former veteran of the Office of Naval Intelligence. The book examines the motives behind industrial espionage and illustrates the variety of spy tradecraft utilized. Through the use of real-world case examples, the author provides guidelines to determine the current threat level to your organization’s proprietary assets as well as the physical security countermeasures, policy, and procedures that must be in place to establish an effective counterespionage program. Outlining the day-to-day aspects of protecting sensitive data and trade secrets in a corporate security setting, this book is suitable for organizations that have proprietary information and assets to protect, businesses that have operations or partner with companies overseas such as China, organizations that work with the federal government on classified projects, security and counterespionage professionals, and university degree programs in Homeland Security and intelligence.
Read More

Fighting Industrial Espionage in America

Author: Ronald L. Mendell

Publisher: Charles C Thomas Publisher

ISBN: 0398079684

Category: Business

Page: 272

View: 4036

In the years since the first edition, industrial and corporate espionage have not diminished. There has been, however, an increase in awareness about the issues. There are more graduate-level programs in business and in security that are offering courses and training on intelligence gathering in the commercial sector. Training in the protection of confidential documents and materials that forms a part of security certification programs has been updated. With the large amount of outsourcing in the technological sector overseas, information transfer and leakage continues to be a serious problem, and as long as corporations see outsourcing as a way to save money in the short term, dangers will persist. The security community will need to continue to pursue this issue politically and socially. Accordingly, the text focuses on these issues and gives the reader a real sense of how industrial spies are persistent and clever in circumventing defenses. It examines both the defensive and offensive tactics necessary to fight industrial espionage. Living with paradox should be the theme for the security professional, and the book draws wisdom from political philosophers like Machiavelli to aid in that perspective. A clear plan of action in dealing with industrial espionage in a fluid, mobile, information-rich business environment is offered. Two additional chapters cover the tradecraft of the industrial spy and the uses of data mining in gathering business intelligence. An outline is offered for planning an intelligence campaign against a target, and a sample strategic intelligence report about a business is included. In addition, there is also a glossary of terms related to industrial espionage. These additional tools should increase a security professionalOCOs awareness of the corporate spyOCOs mindset, which is a major portion of the battle. This book will serve as a valuable resource to security professionals in law enforcement and the business sector."
Read More

Risks, Threats, and Countermeasures

Author: Bruce Wimmer, CPP

Publisher: Butterworth-Heinemann

ISBN: 0124200591

Category: Business & Economics

Page: 204

View: 6771

Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and weaknesses. The text fully explains the threat landscape, showing not only how spies operate, but how they can be detected. Drawn from the author’s 40 years of experience, this vital resource will give readers a true understanding of the threat of business spying and what businesses can do to protect themselves. It is ideal for use as a tool to educate staff on the seriousness of the threat of business espionage. Shows how to identify a company’s threats, weaknesses, and most critical assets Provides proven and practical countermeasures that any business can employ to protect their most sensitive assets from both internal and external threats Uses real-life case studies and examples to help the reader understand how to apply the tactics discussed
Read More

Designing for Critical Infrastructure Protection and Crime Prevention, Second Edition

Author: Randall I. Atlas

Publisher: CRC Press

ISBN: 1439880220

Category: Business & Economics

Page: 954

View: 1300

The concept of Crime Prevention Through Environmental Design (CPTED) has undergone dramatic changes over the last several decades since C. Ray Jeffery coined the term in the early 1970s, and Tim Crowe wrote the first CPTED applications book. The second edition of 21st Century Security and CPTED includes the latest theory, knowledge, and practice of CPTED as it relates to the current security threats facing the modern world: theft, violent crime, terrorism, gang activity, and school and workplace violence. This significantly expanded edition includes the latest coverage of proper lighting, building design—both the interior and exterior—physical security barriers, the usage of fencing, bollards, natural surveillance, landscaping, and landscape design. Such design concepts and security elements can be applied to address a wide variety of threats including crime prevention, blast mitigation, and CBRNE threat protection. Authored by one of the U.S.’s renowned security experts—and a premiere architect and criminologist—the book is the most comprehensive examination of CPTED and CPTED principles available. This edition includes a complete update of all chapters in addition to five new chapters, over 700 figure illustrations and photos, numerous tables and checklists, and a 20-page color plate section. This latest edition: Features five new chapters including green and sustainable buildings, infrastructure protection, and premises liability Presents step-by-step guidelines and real-world applications of CPTED concepts, principles and processes—from risk assessment to construction and post-occupancy evaluation Outlines national building security codes and standards Examines architectural surety from the perspective of risk analysis and premises liability Demonstrates CPTED implementation in high-security environments, such as hospitals, parks, ATMs, schools, and public and private sector buildings A practical resource for architects, urban planners and designers, security managers, law enforcement, CPTED practitioners, building and property managers, homeland security professionals, and students, 21st Century Security and CPTED, Second Edition continues to serve as the most complete and up-to-date reference available on next-generation CPTED practices today.
Read More

Author: Russell G. Smith,Peter Grabosky,Gregor Urbas

Publisher: Cambridge University Press

ISBN: 9781139454810

Category: Social Science

Page: N.A

View: 6532

As computer-related crime becomes more important globally, both scholarly and journalistic accounts tend to focus on the ways in which the crime has been committed and how it could have been prevented. Very little has been written about what follows: the capture, possible extradition, prosecution, sentencing and incarceration of the cyber criminal. Originally published in 2004, this book provides an international study of the manner in which cyber criminals are dealt with by the judicial process. It is a sequel to the groundbreaking Electronic Theft: Unlawful Acquisition in Cyberspace by Grabosky, Smith and Dempsey (Cambridge University Press, 2001). Some of the most prominent cases from around the world are presented in an attempt to discern trends in the handling of cases, and common factors and problems that emerge during the processes of prosecution, trial and sentencing.
Read More

An Introduction

Author: John Harrison Watts,Cliff Roberson

Publisher: CRC Press

ISBN: 1466583304

Category: Law

Page: 350

View: 8985

In recent years, legal studies courses have increased the focus on contemporary social issues as part of the curriculum. Law and Society: An Introduction discusses the interface between these two institutions and encourages students in the development of new insights on the topic. The book begins by introducing definitions, classifications, and the concept of the "rule of law." It then explores: Principal legal systems, including common law, civil law, Islamic and socialist systems, and American Indian law Feminist legal theories, critical race theory, and the roles of morality and values in social control The contributions of sociological research and its impact on the law Court systems and procedures, the exclusionary rule, and plea bargaining The nature and process of legislative, administrative, and judicial lawmaking Alternative dispute resolution and international arbitration and mediation The law as a mechanism for social changes, such as those brought on by the 1964 Civil Rights Act Issues related to the legal profession and professional responsibility This text eliminates the need for a separate reader by also discussing controversial legal topics—including affirmative action, education, the death penalty, right to work laws, and abortion. Each chapter builds on the previous ones and includes concrete examples of the issues involved. Enhanced by chapter summaries of salient points, review questions, and practical exercises, the book is designed to encourage students in the development of new insights into the relationships between law and society.
Read More

Author: Phil Scraton

Publisher: Routledge

ISBN: 1134101112

Category: Social Science

Page: 265

View: 6345

Drawing on a body of empirical, qualitative work spanning three decades, this unique text traces the significance of critical social research and critical analyses in understanding some of the most significant and controversial issues in contemporary society. Focusing on central debates in the UK and Ireland – prison protests; inner-city uprisings; deaths in custody; women’s imprisonment; transition in the north of Ireland; the ‘crisis’ in childhood; the Hillsborough and Dunblane tragedies; and the ‘war on terror’ – Phil Scraton argues that ‘marginalisation’ and ‘criminalisation’ are social forces central to the application of state power and authority. Each case study demonstrates how structural relations of power, authority and legitimacy, establish the determining contexts of everyday life, social interaction and individual opportunity. This book explores the politics and ethics of critical social research, making a persuasive case for the application of critical theory to analysing the rule of law, its enforcement and the administration of criminal justice. It is indispensable for students in the fields of criminology, criminal justice and socio-legal studies, social policy and social work.
Read More

The Birth of the Prison

Author: Michel Foucault

Publisher: Vintage

ISBN: 0307819299

Category: Social Science

Page: 352

View: 7815

In this brilliant work, the most influential philosopher since Sartre suggests that such vaunted reforms as the abolition of torture and the emergence of the modern penitentiary have merely shifted the focus of punishment from the prisoner's body to his soul.
Read More

A Comparative Assessment of Plea Bargaining in the United States and Canada

Author: Hedieh Nasheri

Publisher: University Press of America

ISBN: 9780761811091

Category: Law

Page: 200

View: 8253

Betrayal of Due Process is a landmark study of the criminal justice systems of two common-law nations, the United States and Canada. By focusing on plea bargaining, which is one of the most dominant practices in the criminal justice system of both countries, Nasheri makes a historical comparison of guilty plea practices and ideologies. She draws on historical, criminological, sociological, and political perspectives to construct her argument. Because plea bargaining is a crucial part of the criminal justice system yet has received little scholarly attention, this much-needed book fills a wide gap in legal scholarship.
Read More

Government's Changing Approach to Compliance

Author: Malcolm K. Sparrow

Publisher: Greenwood

ISBN: 9780275947811

Category: Business & Economics

Page: 181

View: 634

Policing, environmental protection, and tax administration have much more in common than practitioners in these areas often recognize. In this book, Sparrow draws out remarkable parallels in the ways these professions are adapting to meet their current challenges, as they reject their traditional reliance on retrospective, case-by-case, after-the-fact enforcement. Rather than perpetuating their dependence on processes, procedures, and "coverage," these professions are each developing new capacities for analyzing important patterns of noncompliance, prioritizing risks, and designing intelligent interventions using a much broader range of tools. Sparrow extracts the essence of the transformations underway, explores the critical implications for information management, and lays out the issues that need resolution before the emerging compliance strategies can reach maturity.
Read More

Author: Frank H. Knight

Publisher: Courier Corporation

ISBN: 0486147932

Category: Business & Economics

Page: 448

View: 4644

DIVThis enduring economics text provided the theoretical basis of the entrepreneurial American economy during the post-industrial era. A revolutionary work, it taught the world how to systematically distinguish between risk and uncertainty. /div
Read More

Author: Charles M. Katz,Vincent J. Webb

Publisher: Cambridge University Press

ISBN: 9781139448277

Category: Social Science

Page: N.A

View: 3106

Policing Gangs in America describes the assumptions, issues, problems, and events that characterize, shape, and define the police response to gangs in America today. The focus of this 2006 book is on the gang unit officers themselves and the environment in which they work. A discussion of research, statistical facts, theory, and policy with regard to gangs, gang members, and gang activity is used as a backdrop. The book is broadly focused on describing how gang units respond to community gang problems, and answers such questions as: why do police agencies organize their responses to gangs in certain ways? Who are the people who elect to police gangs? How do they make sense of gang members - individuals who spark fear in most citizens? What are their jobs really like? What characterizes their working environment? How do their responses to the gang problem fit with other policing strategies, such as community policing?
Read More

Author: Tali Walters,Rachel Monaghan

Publisher: Cambridge Scholars Publishing

ISBN: 144385090X

Category: Law

Page: 335

View: 1822

Radicalization, Terrorism, and Conflict is a collection of scholarly works, authored by international researchers and leading thinkers, addressing contemporary, history-making issues in international security and terrorism from an interdisciplinary perspective. Contributors to this edited volume represent global perspectives, ideas, analysis, and research. Radicalization, Terrorism, and Conflict transmits relevant findings, theory, and policy ideas for scholars of security and terrorism studies, for policy makers, and to the general public who are interested in keeping up with this global area of concern. It provides a jumping-off point for conversation and collaboration that can lead to new knowledge and broader understanding. As an interdisciplinary collection of manuscripts, this book integrates and synthesizes theory, research, and public policy analysis in an effort to solve the complex questions and problems presented by this topic. Recognition of the need to approach the problems of radicalization, terrorism, and interpersonal conflict from an interdisciplinary perspective is gaining strength within academic settings, policy institutes, and global conferences. Unlike most recent edited books on the subject that are on the market at this time, Radicalization, Terrorism, and Conflict provides an interdisciplinary approach to understanding related current issues. This approach encourages a broader perspective and thought process, trans-discipline and global collaboration and cooperation, and an integrated synthesis of knowledge. Radicalization, Terrorism, and Conflict opens with an analysis of the ongoing phenomenon of the Arab Spring. In Section 1, contributors look at how players in the theatres of local and international terror become radicalized. Section 2 analyzes how terrorism becomes manifest in the global theatre and how governments and their actors attempt to prevent it. Section 3 presents research to bring understanding to the actors’ behavior and provide settings for future collaboration in understanding these phenomena.
Read More

Author: N.A

Publisher: N.A

ISBN: N.A

Category: Libraries

Page: N.A

View: 399

Includes, beginning Sept. 15, 1954 (and on the 15th of each month, Sept.-May) a special section: School library journal, ISSN 0000-0035, (called Junior libraries, 1954-May 1961). Also issued separately.
Read More