Skip to main content
Taylor & Francis Group Logo
    Advanced Search

    Click here to search products using title name,author name and keywords.

    • Login
    • Hi, User  
      • Your Account
      • Logout
      Advanced Search

      Click here to search products using title name,author name and keywords.

      Breadcrumbs Section. Click here to navigate to respective pages.

      Book

      Trade Secret Theft, Industrial Espionage, and the China Threat
      loading

      Book

      Trade Secret Theft, Industrial Espionage, and the China Threat

      DOI link for Trade Secret Theft, Industrial Espionage, and the China Threat

      Trade Secret Theft, Industrial Espionage, and the China Threat book

      Trade Secret Theft, Industrial Espionage, and the China Threat

      DOI link for Trade Secret Theft, Industrial Espionage, and the China Threat

      Trade Secret Theft, Industrial Espionage, and the China Threat book

      ByCarl Roper
      Edition 1st Edition
      First Published 2013
      eBook Published 9 December 2013
      Pub. Location Boca Raton
      Imprint CRC Press
      DOI https://doi.org/10.1201/b16112
      Pages 320
      eBook ISBN 9780429252587
      Subjects Computer Science, Politics & International Relations
      Share
      Share

      Get Citation

      Roper, C. (2013). Trade Secret Theft, Industrial Espionage, and the China Threat (1st ed.). CRC Press. https://doi.org/10.1201/b16112

      ABSTRACT

      Although every country seeks out information on other nations, China is the leading threat when it comes to the theft of intellectual assets, including inventions, patents, and R&D secrets. Trade Secret Theft, Industrial Espionage, and the China Threat provides an overview of economic espionage as practiced by a range of nations from around the

      TABLE OF CONTENTS

      chapter 1|22 pages

      China: The Red Dragon of Economic Espionage

      chapter 2|10 pages

      We Are Not Alone: Economic Espionage and the World

      chapter 3|8 pages

      The Background of Economic Espionage

      chapter 4|22 pages

      PRC Acquisition of US Technology: An Overview and Short History

      chapter 5|10 pages

      Chinese Product Piracy and Counterfeiting*

      chapter 6|16 pages

      Who, What, and How China Targets*

      chapter 7|12 pages

      The China Spy Guide and Open-Source Information

      chapter 8|10 pages

      The Intelligence Cycle and Collection Effort

      chapter 9|10 pages

      Corporate Rivals

      chapter 10|22 pages

      Sources of Information*

      chapter 11|10 pages

      The Economic Espionage Act

      chapter 12|20 pages

      The U.S. Response to Economic Espionage

      chapter 13|10 pages

      The DOD View of IP Theft: A Trend Analysis of Reporting on Foreign Targeting of US Technologies*

      chapter 14|14 pages

      Intellectual Property Rights: Patents, Copyrights, and Trade Secrets

      chapter 15|10 pages

      Internet Exploitation: The Web, Your Computer, Your IT System

      chapter 16|26 pages

      Protecting Your Data

      chapter 17|12 pages

      Source Documents and Other Resources

      T&F logoTaylor & Francis Group logo
      • Policies
        • Privacy Policy
        • Terms & Conditions
        • Cookie Policy
        • Privacy Policy
        • Terms & Conditions
        • Cookie Policy
      • Journals
        • Taylor & Francis Online
        • CogentOA
        • Taylor & Francis Online
        • CogentOA
      • Corporate
        • Taylor & Francis Group
        • Taylor & Francis Group
        • Taylor & Francis Group
        • Taylor & Francis Group
      • Help & Contact
        • Students/Researchers
        • Librarians/Institutions
        • Students/Researchers
        • Librarians/Institutions
      • Connect with us

      Connect with us

      Registered in England & Wales No. 3099067
      5 Howick Place | London | SW1P 1WG © 2022 Informa UK Limited