Share these talks and lectures with your colleagues
Invite colleaguesWe noted you are experiencing viewing problems
-
Check with your IT department that JWPlatform, JWPlayer and Amazon AWS & CloudFront are not being blocked by your network. The relevant domains are *.jwplatform.com, *.jwpsrv.com, *.jwpcdn.com, jwpltx.com, jwpsrv.a.ssl.fastly.net, *.amazonaws.com and *.cloudfront.net. The relevant ports are 80 and 443.
-
Check the following talk links to see which ones work correctly:
Auto Mode
HTTP Progressive Download Send us your results from the above test links at access@hstalks.com and we will contact you with further advice on troubleshooting your viewing problems. -
No luck yet? More tips for troubleshooting viewing issues
-
Contact HST Support access@hstalks.com
-
Please review our troubleshooting guide for tips and advice on resolving your viewing problems.
-
For additional help, please don't hesitate to contact HST support access@hstalks.com
We hope you have enjoyed this limited-length demo
This is a limited length demo talk; you may
login or
review methods of
obtaining more access.
Printable Handouts
Navigable Slide Index
- Introduction
- Information age threat spectrum
- Multiple points of access, and of vulnerability
- Profile of electric power system
- Threats to infrastructure
- Economic espionage
- "New age crime" poses unique challenges
- High technology crimes (1)
- High technology crimes (2)
- Internet as a criminal's best friend
- The internet offer
- Tools to do harm
- Intellectual property
- Comparison of various enforcement measures
- The impact of e-commerce
- IP crimes
- Global markets and trade secret protection
- An increase in information containing products
- Why is it tempting to steal information
- Modern vs. undeveloped countries
- Computer networks as a primary tool
- Trade secret theft has increased in recent years
- No business is immune to theft
- Technology in law enforcement
- Electronic crime is unique
- Issues for investigators
- Dimensions of the problem
- Three simple messages for law enforcement
- Successful outcome
- Conclusions
Topics Covered
- Information age threat spectrum
- The internet
- Threats to infrastructure
- Interdependence: new risks and vulnerabilities
- "New age crime"
- Weapons of mass disruption
- Enforcement measures
- E-commerce
- Fraud
- Trade secrets
- Technology in law enforcement
Talk Citation
Nasheri, H. (2009, August 19). Global risks of economic espionage, industrial spying and international trade secrets [Video file]. In The Business & Management Collection, Henry Stewart Talks. Retrieved December 21, 2024, from https://doi.org/10.69645/AIFR7641.Export Citation (RIS)
Publication History
Global risks of economic espionage, industrial spying and international trade secrets
A selection of talks on Global Business Management
Hide