Trade secret theft, industrial espionage, and the China threat

Introduction: [W]e're going to aggressively protect our intellectual property. Our single greatest asset is the innovation and ingenuity and creativity of the American people. It is essential to our prosperity and it will only become more so in this century. -- President Barack Obama March 11,...

Descripción completa

Detalles Bibliográficos
Otros Autores: Roper, Carl, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boca Raton : CRC Press [2014]
Edición:1st ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628478806719
Tabla de Contenidos:
  • Front Cover; Contents; About the Author; Introduction; 1. China: The Red Dragon of Economic Espionage; 2. We Are Not Alone: Economic Espionage and the World; 3. The Background of Economic Espionage; 4. PRC Acquisition of US Technology*: An Overview and Short History; 5. Chinese Product Piracy and Counterfeiting*; 6. Who, What, and How China Targets*; 7. The China Spy Guide and Open-Source Information; 8. The Intelligence Cycle and Collection Effort; 9. Corporate Rivals; 10. Sources of Information*; 11. The Economic Espionage Act; 12. The U.S. Response to Economic Espionage
  • 13. The DOD View of IP Theft: A Trend Analysis of Reporting on Foreign Targeting of US Technologies*14. Intellectual Property Rights: Patents, Copyrights, and Trade Secrets; 15. Internet Exploitation: The Web, Your Computer, Your IT System; 16. Protecting Your Data; 17. Source Documents and Other Resources; Appendix A: The Dongfan "Gregg" Chung and Chi Mak Economic Espionage Cases; Appendix B: Economic Espionage Killed the Company, The Four Pillars Enterprise Case
  • Appendix C: Summary of Major US Export Enforcement, Economic Espionage, Trade Secret, and Embargo-Related Criminal Cases, 2007 to the PresentAppendix D: Special 301 Report, China