This
paper discusses in detail the research proposal on industrial espionage in
Asia. In particular, the research will focus on the current practices and
perceptions on this international spy game (Fraumann, 1997). In this research
proposal, the background, context and theme of the study; the objectives of the
study and the research statements are presented. Here, vital concepts,
questions and assumptions are formulated. Finally, the scope and limitation of
the study, overview of the methodology to be used and the significance of the
research are discussed.
1.0. Background of the Study
Espionage has generally been viewed as an activity conducted by
spies to obtain the military secrets of an enemy: the use of spies helped
England to defeat the Spanish Armada in 1588; the Allies to defeat the Axis
powers during World War 11; and the Soviet Union to steal atomic bomb secrets
from the United States and Britain (Fraumann, 1997). However, because of the
increasing international economic competition, spying conducted by intelligence
services has been expanding from its original focus on military secrets to
collecting economic secrets (Fraumann, 1997).
Industrial espionage of all varieties is an elusive and secretive
field that must be given careful attention by industrial managers and corporate
executives world wide (Madsen, 2003). Meyer (1987) contends that throughout the world of
commerce and industry, intelligence is on its way to becoming a key management
tool for the corporate executive. Meyer (1987) suggests that the emergence of
business intelligence systems is the most striking and potentially significant
business trend of our time. Here, intelligence becomes the means by which
companies chart their future course (Joyal, 1996). Because of the intensifying
economic the importance of acquiring information concerning economic plans and
intentions becomes more acute (Joyal, 1996).
A survey of 173 nations found that 57 were actively running
operations to obtain proprietary economic information and technologies from
U.S. corporations, and that some 100 countries spent a portion of their gross
national product on collecting proprietary economic information (Richter, 1995,
8)
As the general standard of living in Asia increases, industrial
security and safety concerns take on an increasingly higher profile; Asian
nations have seen large increases in security and safety purchases aimed at
arming themselves against general security problems and corporate intelligence
initiatives (Joyal, 1996). This implies that as wealth increases, fears of
increased intrusion, data collection, and industrial espionage also increases
(Joyal, 1996).
Many spy agencies
around the world are adapting classic spy techniques from military and
political espionage endeavors to conduct industrial espionage. Agencies use a
number of "intrusive" methods such as electronic and physical access
of protected environment and access to personnel working in the protected
environment. On the other hand, “nonintrusive” method includes the processing
of data, collecting information, and forming it into intelligence for
distribution (Fraumann, 1997).
2.0.
General Purpose of the Study
Generally, the purpose of the research is to
conduct a descriptive study on the current practices and perceptions on
industrial espionage in Asia.
2.1. Research Questions
To support the aforementioned fundamental purpose, the
research will specifically attempt to answer the following questions:
1.
Why are Asian countries turning into industrial
espionage?
2. What methodologies in
data collection do Asian industries employ in their espionage activities?
3. How do business Asian
societies perceive industrial espionage in Asia?
2.2.
Objectives
To carry out the purpose of the study,
and to address the research questions, the following aims will be realized:
1.
Examination of the current practice of industrial
espionage in Asia.
2. Review
of the related literature on industrial espionage.
3. Identification
of issues and problems.
4. Conducting
survey and interview on the perception on industrial espionage practice in
Asia.
5. Generation
of significant conclusions and insightful recommendations.
3.0. Overview of the Methodology to be Used
For this study, descriptive research method will
be utilized. This type of research utilizes observations in the study. To illustrate the descriptive type of
research, Creswell (1994) states that the descriptive method of research is to
gather information about the present existing condition.
To come up with
pertinent findings and to provide credible recommendations, this study will
utilize two sources of research: primary and secondary. The primary research
data will be obtained through this new research study; questionnaire survey and
in-depth interview will be conducted. On the other hand, the secondary research
data will be obtained from previous studies on the same topic.
For this research design, the researcher will
gather data, collate published studies from different local and foreign
universities and articles from books and journals; and will make a content
analysis of the collected documentary and verbal material. Afterwards, the
researcher will summarize all the information, make a conclusion based on the
hypotheses posited and provide insightful recommendations.
4.0. Scope and Limitation
This
study will only cover industrial espionage by Asian companies within Asia. The
perceptions regarding this practice will come from business practitioners. The outcome of this study will be limited only
to the data gathered from books and journals about industrial espionage and
from the primary data gathered from the result of the questionnaire survey and
interview that will be conducted by the researcher. As the research was completed in a relatively short period
of time other factors and variables are not considered. This might have an
impact on the results of the study.
References:
Fraumann, E.
(1997) Economic espionage: security missions redefined.
Public
Administration Review, Vol. 57.
Joyal, P. M. (1996) Industrial
Espionage Today and Information Wars of Tomorrow. Paper Presented at the19th
National Information Systems Security Conference Baltimore Convention Center
Baltimore, MD October 22-25.
Madsen, A. (2003) Industrial espionage strategic
implications in an age of crime and competition. Transnational
Research Associates. Available at [members.lycos.fr/transnational]. Accessed
10/10/03].
Meyer, H. E. (1987) Real world
intelligence. New York: Reed Business Info, Inc., p.8.
Richter,
James A. (1995). Clandestine encounters: The new wave of industrial espionage.
Ann Arbor, MI: Strategic Development Staff, National Center for Manufacturing
Sciences.
No comments:
Post a Comment