CYBER-INDUSTRIAL ESPIONAGE: ITS NATURE AND CONSEQUENCES

Keywords: intellectual property, trade secrets, cyber-industrial espionage, cyber-espionage, industrial espionage, cyber-attack

Abstract

The article highlights the theoretical aspects of cyber-industrial espionage. The importance of ensuring the protection of trade secrets of companies from cyber intrusions is substantiated, which is confirmed by the amount of damage caused by successful cyber attacks on the scale of the global economic space. The paper examines the essence of cyber industrial espionage through the prism of its comparison with cyber espionage and industrial espionage. It is established that cyber-industrial espionage is a type of cyber-espionage and industrial espionage. Its key features are illegality, unethicality, and unauthorised access by an unauthorised user to a company's trade secret in cyberspace, which is carried out in favour of private entities in order to gain competitive advantages and economic benefits. By the logic of the dialectical combination of the general and the particular, the author identifies the features inherent in cyber-industrial espionage (in particular, its covert, highly organised, planned, systematic nature; wide arsenal of possible technologies, methods of implementation, their combined use; a significant scope and list of negative consequences, difficulties in assessing losses from cyber intrusions, etc.), and reveals the peculiarities of their manifestation in cyberspace. Considerable attention is paid to identifying and clarifying the content of possible negative consequences of successful cyberattacks for companies, including financial losses associated with the theft of confidential information; reputational losses due to loss of trust in the company; theft of intellectual property, R&D results kept as commercial secrets; disruption of critical business processes of companies; forced changes in business practices to improve security, legal, regulatory, psychological and emotional consequences. Determination of the essential characteristics of cyber-industrial espionage and the range of possible negative consequences of its implementation is of theoretical and methodological importance for the development of an effective system of trade secret protection in companies and will help to increase the efficiency of its use.

References

PricewaterhouseCoopers. The scale and impact of industrial espionage and theft of trade secrets through cyber. European Commission. 2018. URL: https://ec.europa.eu/docsroom/documents/34841/attachments/1/translations/en/renditions/native

Civuli A., Luma-Osmani Sh., Rufati E., Arifi G. Cyber espionage consequences as a growing threat. 2022. URL: https://www.researchgate.net/publication/368461675_Cyber_Espionage_Consequences_as_a_Growing_Threat

The economic impacts of cyber crime: how it costs us all. 2022. URL: https://mitigatecyber.com/the-economic-impacts-of-cyber-crime-how-it-costs-us-all/

Searle, N. The economic and innovation impacts of trade secrets. Intellectual Property Office. 2021. URL: https://www.gov.uk/government/publications/economic-and-innovation-impacts-of-trade-secrets/the-economic-and-innovation-impacts-of-trade-secrets

Threat Landscape Developments. 2021 State-Sponsored Cyber Activity. Herjavec Group’s. 2021. 14 p. URL: https://eadn-wc01-3468285.nxedge.io/wp-content/uploads/2021/12/State-Sponsored-Cyber-Activity-Report.pdf

Cyberthteat Defense Report. URL: https://cyber-edge.com/cdr/

Андрощук Г. Економічне шпигунство: зростання масштабів і агресивності. Частина 1. Наука, технології, інновації. 2018. № 3. С. 39–49. URL: http://dspace.nbuv.gov.ua/handle/123456789/162638

Березіна Л.М. Братанов Б.В. Характерні особливості конкурентної розвідки та промислового шпигунства підприємств. Інтелект ХХІ. 2020. № 2. URL: http://www.intellect21.nuft.org.ua/journal/2020/2020_2/3.pdf

Богданович В.Ю., Бадрак В.В. Конкурентна розвідка та промислове шпигунство. Сучасний захист інформації. 2014. № 1. С. 16–22. URL: http://nbuv.gov.ua/UJRN/szi_2014_1_5

Маліцька Г.Г., Кутаренко Н.Я. Промислове шпигунство в контексті економічної злочинності. Ефективна економіка. 2019. № 5. URL: http://nbuv.gov.ua/UJRN/efek_2019_5_32

Якубівська Ю.Є. Вплив промислового шпигунства на сферу інтелектуальної власності. Зовнішня торгівля: економіка, фінанси, право. 2013. № 4 (69). С. 158–162. URL: http://zt.knute.edu.ua/files/2013/4(69)/uazt_2013_4_24.pdf

Beattie A. Corporate espionage: fact and fiction. 2022. URL: https://www.investopedia.com/financial-edge/0310/corporate-espionage-fact-and-fiction.aspx

Crane A. In the company of spies: when competitive intelligence gathering becomes industrial espionage. Business Horizons, 2005. Volume 48 (3), pp. 233–240. DOI: https://doi.org/10.1016/j.bushor.2004.11.005

Gibbs E. The new face of corporate espionage and what can be done about. 2022. URL: https://www.securitymagazine.com/articles/98087-the-new-face-of-corporate-espionage-and-what-can-be-done-about-it

Easttom C. Industrial Espionage in Cyberspace. Computer Security Fundamentals 5ed. 2023. URL: https://www.pearsonitcertification.com/articles/article.aspx?p=3172433

Hou T., Wang V. Industrial espionage - A systematic literature review (SLR). Computer&Security. 2020. Volume 98. URL:https://www.sciencedirect.com/science/article/pii/S0167404820302923

Kenton W. Industrial Espionage: Definition, Examples, Types, Legality. 2022. URL: https://www.investopedia.com/terms/i/industrial-espionage.asp

Mueller R. F. Industrial espionage: what is it, who's involved and what harm can it cause? Journal Polygraph. 2001. Volume: 30. P. 47–55. URL: https://www.ojp.gov/ncjrs/virtual-library/abstracts/industrial-espionage-what-it-whos-involved-and-what-harm-can-it

Бурячок В.Л., Толубко В.Б., Хорошко В.О., Толюпа С.В. Інформаційна та кібербезпека: соціотехнічний аспект. Львів. 2018. 320 с. URL: https://kr-labs.com.ua/books/Buryachok-Osnovy-info-ta-ciberbezpeky.pdf

Гнатюк С. Кібертероризм: історія розвитку, сучасні тенденції та контрзаходи. Безпека інформації. 2013. Т. 19, № 2. С. 118–129. URL: http://nbuv.gov.ua/UJRN/bezin_2013_19_2_8

Діордіца І.В. Поняття та зміст кібершпигунства. Наукові праці Національного університету “Одеська юридична академія”. 2020. В. 26. С. 49–55. URL: http://naukovipraci.nuoua.od.ua/arhiv/tom26/9.pdf

Дубов Д.В. Кіберпростір як новий вимір геополітичного суперництва: монографія. Київ : НІСД, 2014. 328 с. URL: https://niss.gov.ua/sites/default/files/2015-02/Dubov_mon-89e8e.pdf

Корсун К. Огляд ринку кібербезпеки України/ Stakeholders' dialogue in the process of Ukraine's integration into the EU Digital Single Market” Project of European Media Platform 2021. URL: https://eump.org/media/2021/ukraine-into-dsm/korsun_ukr.pdf

Котух Є.В. Кібербезпека у публічному секторі: монографія. Харків : Колегіум, 2021. 272 с.

Якубівська Ю.Є. Цільові атаки в контексті промислового шпигунства. 2014. URL: http://dspace.wunu.edu.ua/jspui/bitstream/316497/1537/1/10_%D1%84%D0%B0%D1%85.pdf

Baker K. What is Cyber Espionage? 2023. URL: https://www.crowdstrike.com/cybersecurity-101/cyberattacks/cyber-espionage/

Neumann P. Computer-Related Risk. ACM Press/Addison Wesley, 1995.

O'Harat G. Cyber-espionage: a growing threat to the american economy. Commlaw conspectus. 2009. Vol. 19. P. 241–275. URL: https://scholarship.law.edu/cgi/viewcontent.cgi?referer=&httpsredir=1&article=1522&context=commlaw

Frankenfield J. Cybrsecurity: Meaning, Types of Cyber Attacks, Common Targets. URL: https://www.investopedia.com/terms/c/cybersecurity.asp

Закон України «Про основні засади забезпечення кібербезпеки України», від 05.10.2017 № 2163-VIII. Відомості Верховної Ради (ВВР), 2017, № 45. URL: https://zakon.rada.gov.ua/laws/show/2163-19#Text

Cyber espionage. ENISA Threat Landscape. 2020. 10 p. URL: https://www.enisa.europa.eu/publications/enisa-threat-landscape-2020-cyber-espionage/@@download/fullReport

From Espionage to Cyber Espionage. URL: https://www.cyber-espionage.ch/

What is Cyber Espionage? Vmware. URL: http://www.vmware.com/topics/glossary/content/cyber-espionage.html

Study on the scale and impact of industrial espionage and theft of trade secrets through cyber. Pwc. 2019. URL: https://www.pwc.com/it/it/publications/docs/study-on-the-scale-and-Impact.pdf

Bigelow J. Sentonas M. The economic impact of cybercrime and cyber espionage. 2014. URL: https://www.securitysolutionsmedia.com/2014/03/11/the-economic-impact-of-cybercrime-and-cyber-espionage/

EU Cyber Resilience Act: what to watch out for now. 2023. URL: https://onekey.com/blog/eu-cyber-resilience-act-what-to-watch-out-for-now/

Industrial espionage: the threat to global business. URL: https://www.enderi.fr/Industrial-Espionage-The-Threat-to-Global-Business_a1143.html

6 Ways Cybercrime Impacts Business. URL: https://www.investopedia.com/financial-edge/0112/3-ways-cyber-crime-impacts-business.aspx

The impact of cybersecurity threats and cybercrime on businesses. URL: https://www.bitsioinc.com/cybercrime-impact-on-businesses/

PricewaterhouseCoopers. (2018)The scale and impact of industrial espionage and theft of trade secrets through cyber. European Commission. Available at: https://ec.europa.eu/docsroom/documents/34841/attachments/1/translations/en/renditions/native

Civuli A., Luma-Osmani Sh., Rufati E., Arifi G. (2022) Cyber espionage consequences as a growing threat. Available at: https://www.researchgate.net/publication/368461675_Cyber_Espionage_Consequences_as_a_Growing_Threat

The economic impacts of cyber crime: how it costs us all. (2022). Available at: https://mitigatecyber.com/the-economic-impacts-of-cyber-crime-how-it-costs-us-all/

Searle, N. (2021) The economic and innovation impacts of trade secrets. Intellectual Property Office. Available at: https://www.gov.uk/government/publications/economic-and-innovation-impacts-of-trade-secrets/the-economic-and-innovation-impacts-of-trade-secrets

Threat Landscape Developments. 2021 State-Sponsored Cyber Activity. (2021) Herjavec Group’s. 14 p. Available at: https://eadn-wc01-3468285.nxedge.io/wp-content/uploads/2021/12/State-Sponsored-Cyber-Activity-Report.pdf

Cyberthteat Defense Report. (n.d.). Available at: https://cyber-edge.com/cdr/

Androshchuk H. (2018). Ekonomichne shpyhunstvo: zrostannia masshtabiv i ahresyvnosti. Chastyna 1. Nauka, tekhnolohii, innovatsii. no. 3. pp. 39–49. Available at: http://dspace.nbuv.gov.ua/handle/123456789/162638

Berezina L. M. Bratanov B. V. (2020) Kharakterni osoblyvosti konkurentnoi rozvidky ta promyslovoho shpyhunstva pidpryiemstv. Intelekt XXI. no. 2. Available at: http://www.intellect21.nuft.org.ua/journal/2020/2020_2/3.pdf

Bohdanovych V. Yu., Badrak V. V. (2014) Konkurentna rozvidka ta promyslove shpyhunstvo. Suchasnyi zakhyst informatsii. no. 1. pp. 16–22. Available at: http://nbuv.gov.ua/UJRN/szi_2014_1_5

Malitska H. H., Kutarenko N. Ya. (2019) Promyslove shpyhunstvo v konteksti ekonomichnoi zlochynnosti. Efektyvna ekonomika. no. 5. Available at: http://nbuv.gov.ua/UJRN/efek_2019_5_32

Yakubivska Yu. (2013) Vplyv promyslovoho shpyhunstva na sferu intelektualnoi vlasnosti. Zovnishnia torhivlia: ekonomika, finansy, pravo. no. 4 (69). pp. 158–162. Available at: http://zt.knute.edu.ua/files/2013/4(69)/uazt_2013_4_24.pdf

Beattie A. (2022) Corporate espionage: fact and fiction. Available at: https://www.investopedia.com/financial-edge/0310/corporate-espionage-fact-and-fiction.aspx

Crane A. (2005) In the company of spies: when competitive intelligence gathering becomes industrial espionage. Business Horizons. volume 48 (3), pp. 233–240. DOI: https://doi.org/10.1016/j.bushor.2004.11.005

Gibbs E. (2022) The new face of corporate espionage and what can be done about. Available at: https://www.securitymagazine.com/articles/98087-the-new-face-of-corporate-espionage-and-what-can-be-done-about-it

Easttom C. (2023) Industrial Espionage in Cyberspace. Computer Security Fundamentals 5ed. Available at: https://www.pearsonitcertification.com/articles/article.aspx?p=3172433

Hou T., Wang V. (2020). Industrial espionage - A systematic literature review (SLR). Computer&Security. volume 98. Available at: https://www.sciencedirect.com/science/article/pii/S0167404820302923

Kenton W. (2022) Industrial Espionage: Definition, Examples, Types, Legality. Available at: https://www.investopedia.com/terms/i/industrial-espionage.asp

Mueller R. F. (2001) Industrial espionage: what is it, who's involved and what harm can it cause? Journal Polygraph. volume: 30. pp. 47–55. Available at: https://www.ojp.gov/ncjrs/virtual-library/abstracts/industrial-espionage-what-it-whos-involved-and-what-harm-can-it

Buriachok V. L., Tolubko V. B., Khoroshko V. O., Toliupa S. V. (2018) Informatsiina ta kiberbezpeka: sotsiotekhnichnyi aspekt. Lviv. 320 p. Available at: https://kr-labs.com.ua/books/Buryachok-Osnovy-info-ta-ciberbezpeky.pdf

Hnatiuk S. (2013) Kiberteroryzm: istoriia rozvytku, suchasni tendentsii ta kontrzakhody. Bezpeka informatsii. vol. 19, no. 2. pp. 118–129. Available at: http://nbuv.gov.ua/UJRN/bezin_2013_19_2_8

Diorditsa I. V. (2020) Poniattia ta zmist kibershpyhunstva. Naukovi pratsi Natsionalnoho universytetu “Odeska yurydychna akademiia”. vol. 26. pp. 49–55. Available at: http://naukovipraci.nuoua.od.ua/arhiv/tom26/9.pdf

Dubov D. V. (2014) Kiberprostir yak novyi vymir heopolitychnoho supernytstva: monohrafiia. Kyiv: NISD. 328 p. Available at: https://niss.gov.ua/sites/default/files/2015-02/Dubov_mon-89e8e.pdf

Korsun K. (2021) Ohliad rynku kiberbezpeky Ukrainy / Stakeholders' dialogue in the process of Ukraine's integration into the EU Digital Single Market” Project of European Media Platform. Available at: https://eump.org/media/2021/ukraine-into-dsm/korsun_ukr.pdf

Kotukh Ye. V. (2021) Kiberbezpeka u publichnomu sektori : monohrafiia. Kharkiv: Kolehium, 272 p.

Yakubivska Yu. (2014) Tsilovi ataky v konteksti promyslovoho shpyhunstva. Available at: http://dspace.wunu.edu.ua/jspui/bitstream/316497/1537/1/10_%D1%84%D0%B0%D1%85.pdf

Baker K. (2023) What is Cyber Espionage? Available at: https://www.crowdstrike.com/cybersecurity-101/cyberattacks/cyber-espionage/

Neumann P. (1995) Computer-Related Risk. ACM Press/Addison Wesley.

O'Harat G. (2009) Cyber-espionage: a growing threat to the american economy. Commlaw conspectus. vol. 19. pp. 241–275. Available at: https://scholarship.law.edu/cgi/viewcontent.cgi?referer=&httpsredir=1&article=1522&context=commlaw

Frankenfield J. (n.d.) Cybrsecurity: Meaning, Types of Cyber Attacks, Common Targets. Available at: https://www.investopedia.com/terms/c/cybersecurity.asp

Zakon Ukrainy «Pro osnovni zasady zabezpechennia kiberbezpeky Ukrainy», vid 05.10.2017 No. 2163-VIII. Vidomosti Verkhovnoi Rady (VVR). 2017. No. 45. Available at: https://zakon.rada.gov.ua/laws/show/2163-19#Text

Cyber espionage. (2020) ENISA Threat Landscape. 10 p. Available at: https://www.enisa.europa.eu/publications/enisa-threat-landscape-2020-cyber-espionage/@@download/fullReport

From Espionage to Cyber Espionage. (n.d.). Available at: https://www.cyber-espionage.ch/

What is Cyber Espionage? (n.d.) Vmware. Available at: http://www.vmware.com/topics/glossary/content/cyber-espionage.html

Study on the scale and impact of industrial espionage and theft of trade secrets through cyber. (2019). Pwc. Available at: https://www.pwc.com/it/it/publications/docs/study-on-the-scale-and-Impact.pdf

Bigelow J. Sentonas M. (2014) The economic impact of cybercrime and cyber espionage. Available at: https://www.securitysolutionsmedia.com/2014/03/11/the-economic-impact-of-cybercrime-and-cyber-espionage/

EU Cyber Resilience Act: what to watch out for now. (2023). Available at: https://onekey.com/blog/eu-cyber-resilience-act-what-to-watch-out-for-now/

Industrial espionage: the threat to global business. (n.d.). Available at: https://www.enderi.fr/Industrial-Espionage-The-Threat-to-Global-Business_a1143.html

6 Ways Cybercrime Impacts Business. (n.d.). Available at: https://www.investopedia.com/financial-edge/0112/3-ways-cyber-crime-impacts-business.aspx

The impact of cybersecurity threats and cybercrime on businesses. (n.d.). Available at: https://www.bitsioinc.com/cybercrime-impact-on-businesses/

Article views: 26
PDF Downloads: 3
Published
2024-03-29
How to Cite
Kornilova, I. (2024). CYBER-INDUSTRIAL ESPIONAGE: ITS NATURE AND CONSEQUENCES. Economic Scope, (190), 248-253. https://doi.org/10.32782/2224-6282/190-45
Section
Статті