Search results for "espionage"

showing 10 items of 10 documents

Market Must Be Defended: The Role of Counter-Espionage Policy in Maximizing Domestic Market Welfare

2020

Countering economic espionage is becoming one of the priorities of the governments of advanced economies. The present paper takes a step forward in the theoretical analysis of the interaction between economic espionage and counter-espionage by focusing on the case of a market opened to international trade. This analysis represents a first approximation to an inquiry into the rationale for the influence of the market level of competition on the dynamics of such interaction. The results suggest that this influence is complex in the case of the effort exerted in economic espionage and the characteristics of market demand play an important role in it. In the case of the counter-espionage policy…

Competition (economics)Market economyIndustrial espionagemedia_common.quotation_subjectEconomicsEspionageCounterintelligenceDomestic marketWelfareSupply and demandmedia_commonSSRN Electronic Journal
researchProduct

Entry and espionage with noisy signals

2014

Abstract We analyze the effect of industrial espionage on entry deterrence. We consider a monopoly incumbent who may expand capacity to deter entry, and a potential entrant who owns an Intelligence System. The Intelligence System (IS) generates a noisy signal based on the incumbentʼs actions. The potential entrant uses this signal to decide whether or not to enter the market. The incumbent may signal-jam to manipulate the likelihood of the noisy signals and hence affect the entrantʼs decisions. If the precision of the IS is commonly known, the incumbent benefits from his rivalʼs espionage. Actually, he benefits more the higher is the precision of the IS while the spying entrant is worse off…

Economics and Econometricsbusiness.industrymedia_common.quotation_subjectRadio jammingEspionagePublic relationsComputer securitycomputer.software_genreInformation asymmetryIndustrial espionageQuality (business)Deterrence theoryBusinessMonopolycomputerPrivate information retrievalFinancemedia_commonGames and Economic Behavior
researchProduct

Market must be defended: The role of counter-espionage policy in protecting domestic market welfare

2022

Governments of advanced economies are extremely concerned about the illicit acquisition of information on critical technologies employed by their industries, and countering this economic espionage is quickly becoming one of their top priorities. The present paper advances the theoretical analysis of the interaction between economic espionage and counter-espionage, and presents a first approximation to an inquiry into the rationale for the influence of market competition in its dynamics. The proposed model assumes a country with a one-market economy open to international trade whose product is supplied by domestic firms. Moreover, successful economic espionage implying market entry of foreig…

Economics and Econometricsmarket entry barriersecret technologyUNESCO::CIENCIAS ECONÓMICASeconomic espionagemarket welfareManagement Monitoring Policy and Lawcounter-espionage policy
researchProduct

Finnish Cyber Security Strategy and Implementation

2015

Technical and automated solutions and information networks, which make planning, guidance and implementation possible fast and in a cost-efficient way, are widely used in Finnish information society. The flipside of this development is increased dependency on extensive and complicated technical systems and information networks. Failures in these systems or, for example, in their power supply may rapidly affect comprehensive security in society. Threats against security in society have become more multifaceted and, as a consequence, more complicated. Threats can no longer be divided clearly into military and non-military threats or internal and external threats; they are often interconnected…

Security analysisInternal securityNoticeSituation awarenessTechnical systemsEspionageBusinessInformation societyComputer securitycomputer.software_genrecomputerDependency (project management)
researchProduct

Entry with two correlated signals : the case of industrial espionage and its positive competitive effects

2021

Recent advances in information and communication technologies have increased the incentives for firms to acquire information about rivals. These advances may have major implications for market entry because they make it easier for potential entrants to gather valuable information about, for example, an incumbent’s cost structure. However, little theoretical research has actually analyzed this question. This paper advances the literature by extending a one-sided asymmetric information version of Milgrom and Roberts’ (1982) limit pricing model. Here, the entrant is allowed access to an intelligence system (IS) of a certain precision that generates a noisy signal on the incumbent’s cost struct…

Statistics and ProbabilityEconomics and EconometricsPoolingMicroeconomicsCompetition (economics)C72Mathematics (miscellaneous)Information asymmetryasymmetric informationEconomicsSet (psychology)EspionatgeL12L10Competència econòmicaentry deterrencepooling equilibriaD82IncentiveIndustrial espionageInformation and Communications TechnologySocietat de la informaciólimit pricingStatistics Probability and UncertaintySocial Sciences (miscellaneous)Limit price
researchProduct

Adopting encryption to protect confidential data in public clouds: A review of solutions, implementation challenges and alternatives

2015

A shift towards use of public cloud services is ongoing and more and more enterprises will start to use them in the near future. As public cloud services certainly promise to deliver many benefits, this new way of delivering services also introduces new types of risks. Due to the NSA’s surveillance programs, non-US enterprises need to reassess the risks of public cloud services provided by US companies and look for available solutions to protect their confidential data transferred and stored in the cloud. Encryption is seen as a solution to help enterprises full fill the requirements related to security and privacy, but is often challenging to implement. Encryption has its own security prob…

confidential datapublic cloudspilvipalveluttrustworthysalauscyber espionageluottamuksellisuusdata encryptiontietoturva
researchProduct

Przestępstwo szpiegostwa w opracowaniach Stanisława Pikulskiego

2018

espionageactive griefforeign intelligencecounterintelligencenewsStudia Prawnoustrojowe
researchProduct

O tak zwanym szpiegu i terroryście koronnym

2017

The subject of this article is the authorization of intelligence services in preventing and combating the offences of espionage and terrorism. It describes the regulations of the Second Polish Republic regarding espionage, a draft Act on Intelligence Activities, the rule of law and opportunism, and most importantly new regulations under the anti-terrorism law

espionagestate securityterrorist offencelegalizing documents
researchProduct

Theoretical Models of Industrial Espionage

2012

Dada la importancia del espionaje industrial en la realidad económica, el objetivo de la presente tesis es analizar teóricamente el comportamiento de las empresas a la hora de obtener información de sus competidores, para poder comprenderlo mejor y ver cuáles pueden ser sus consecuencias, ya que, aunque el espionaje industrial es una práctica muy extendida, pocos trabajos teóricos han tratado de analizarlo. Más concretamente, nuestro objetivo es analizar teóricamente el impacto del espionaje industrial sobre el comportamiento estratégico de las empresas en un contexto de disuasión de la entrada usando las herramientas propias de la Teoría de Juegos. En los modelos de la presente tesis se co…

non-cooperative games:CIENCIAS ECONÓMICAS::Organización industrial y política pública::Monopolio y competencia [UNESCO]Espionagesignaling gamesUNESCO::CIENCIAS ECONÓMICAS::Organización industrial y política pública::Monopolio y competenciaentry:CIENCIAS ECONÓMICAS::Teoría económica::Teoría microeconómica [UNESCO]Espionage; entry; non-cooperative games; signaling games;UNESCO::CIENCIAS ECONÓMICAS::Teoría económica::Teoría microeconómica
researchProduct

Recenzja: J. Widacki, A. Szuba-Boroń, Sprawy o szpiegostwo przed sądami wileńskimi w okresie II RP. Przyczynek do historii zmagań polskiego wywiadu i…

2021

Problematyka badawcza, którą podjęli J. Widacki i A. Szuba-Boroń nie była dotąd przedmiotem zainteresowań naukowych. Jan Widacki podczas sprawowania misji dyplomatycznej w Wilnie kontynuował swoje zainteresowania naukowe, docierając do akt spraw o szpiegostwo z okresu międzywojennego. Natomiast Anna Szuba- -Boroń badając m.in. akta spraw o szpiegostwo zajęła się prozą Sergiusza Piaseckiego, pisarza i byłego szpiega. Obraz pogranicza, a w nim walka wywiadów sowieckiego, litewskiego oraz polskiego kontrwywiadu to niewątpliwie interesujące tło do ba-dań. Autorzy zdają sobie sprawę z ograniczeń badawczych, nie dotarli bowiem do spraw sądzonych w innych sądach okręgowych znajdujących się na tere…

szpiegostwo litewskieespionage in criminal law Second Polish Republicszpiegostwo w prawie karnym II RPintelligence KOP (Border Protection Corps)Soviet intelligenceLithuanian espionagewywiad sowieckiwywiad KOP (Korpusu Ochrony Pogranicza)wywiad litewskiLithuanian intelligenceMiscellanea Historico-Iuridica
researchProduct