Monday, December 19, 2022

Industrial Espionage in Asia: Current Practices and Perceptions

 


 

            This paper discusses in detail the research proposal on industrial espionage in Asia. In particular, the research will focus on the current practices and perceptions on this international spy game (Fraumann, 1997). In this research proposal, the background, context and theme of the study; the objectives of the study and the research statements are presented. Here, vital concepts, questions and assumptions are formulated. Finally, the scope and limitation of the study, overview of the methodology to be used and the significance of the research are discussed.

 

1.0. Background of the Study

            Espionage has generally been viewed as an activity conducted by spies to obtain the military secrets of an enemy: the use of spies helped England to defeat the Spanish Armada in 1588; the Allies to defeat the Axis powers during World War 11; and the Soviet Union to steal atomic bomb secrets from the United States and Britain (Fraumann, 1997). However, because of the increasing international economic competition, spying conducted by intelligence services has been expanding from its original focus on military secrets to collecting economic secrets (Fraumann, 1997).

Industrial espionage of all varieties is an elusive and secretive field that must be given careful attention by industrial managers and corporate executives world wide (Madsen, 2003). Meyer (1987) contends that throughout the world of commerce and industry, intelligence is on its way to becoming a key management tool for the corporate executive. Meyer (1987) suggests that the emergence of business intelligence systems is the most striking and potentially significant business trend of our time. Here, intelligence becomes the means by which companies chart their future course (Joyal, 1996). Because of the intensifying economic the importance of acquiring information concerning economic plans and intentions becomes more acute (Joyal, 1996).

A survey of 173 nations found that 57 were actively running operations to obtain proprietary economic information and technologies from U.S. corporations, and that some 100 countries spent a portion of their gross national product on collecting proprietary economic information (Richter, 1995, 8)

As the general standard of living in Asia increases, industrial security and safety concerns take on an increasingly higher profile; Asian nations have seen large increases in security and safety purchases aimed at arming themselves against general security problems and corporate intelligence initiatives (Joyal, 1996). This implies that as wealth increases, fears of increased intrusion, data collection, and industrial espionage also increases (Joyal, 1996).

Many spy agencies around the world are adapting classic spy techniques from military and political espionage endeavors to conduct industrial espionage. Agencies use a number of "intrusive" methods such as electronic and physical access of protected environment and access to personnel working in the protected environment. On the other hand, “nonintrusive” method includes the processing of data, collecting information, and forming it into intelligence for distribution (Fraumann, 1997).

 

2.0. General Purpose of the Study

            Generally, the purpose of the research is to conduct a descriptive study on the current practices and perceptions on industrial espionage in Asia.

 

2.1. Research Questions

            To support the aforementioned fundamental purpose, the research will specifically attempt to answer the following questions:

1.    Why are Asian countries turning into industrial espionage?

2.    What methodologies in data collection do Asian industries employ in their espionage activities?

3.    How do business Asian societies perceive industrial espionage in Asia?

 

2.2. Objectives

            To carry out the purpose of the study, and to address the research questions, the following aims will be realized:

1.    Examination of the current practice of industrial espionage in Asia.

2.    Review of the related literature on industrial espionage.

3.    Identification of issues and problems.

4.    Conducting survey and interview on the perception on industrial espionage practice in Asia.

5.    Generation of significant conclusions and insightful recommendations.

 

3.0. Overview of the Methodology to be Used

For this study, descriptive research method will be utilized. This type of research utilizes observations in the study.  To illustrate the descriptive type of research, Creswell (1994) states that the descriptive method of research is to gather information about the present existing condition. 

To come up with pertinent findings and to provide credible recommendations, this study will utilize two sources of research: primary and secondary. The primary research data will be obtained through this new research study; questionnaire survey and in-depth interview will be conducted. On the other hand, the secondary research data will be obtained from previous studies on the same topic. 

For this research design, the researcher will gather data, collate published studies from different local and foreign universities and articles from books and journals; and will make a content analysis of the collected documentary and verbal material. Afterwards, the researcher will summarize all the information, make a conclusion based on the hypotheses posited and provide insightful recommendations.

 

 

4.0. Scope and Limitation

            This study will only cover industrial espionage by Asian companies within Asia. The perceptions regarding this practice will come from business practitioners. The outcome of this study will be limited only to the data gathered from books and journals about industrial espionage and from the primary data gathered from the result of the questionnaire survey and interview that will be conducted by the researcher. As the research was completed in a relatively short period of time other factors and variables are not considered. This might have an impact on the results of the study.

           

References:

 

Fraumann, E. (1997) Economic espionage: security missions redefined.    

Public Administration Review, Vol. 57.

 

Joyal, P. M. (1996) Industrial Espionage Today and Information Wars of Tomorrow. Paper Presented at the19th National Information Systems Security Conference Baltimore Convention Center Baltimore, MD October 22-25.

 

Madsen, A. (2003) Industrial espionage strategic implications in an age of crime and competition. Transnational Research Associates. Available at [members.lycos.fr/transnational]. Accessed 10/10/03].

 

Meyer, H. E. (1987) Real world intelligence. New York: Reed Business Info, Inc., p.8.

 

Richter, James A. (1995). Clandestine encounters: The new wave of industrial espionage. Ann Arbor, MI: Strategic Development Staff, National Center for Manufacturing Sciences.

 

 

 

No comments:

Post a Comment