Employees As Facilitators Of Corporate Espionage

Instructions

For your research paper in this course, you will write an analytical research paper addressing a topic of your choosing from among the topics covered in this course. As a research paper, your paper will have to answer a significant puzzle related to a course topic. For this assignment, you will build on what you submitted in Week 2. 

Title Page of the Paper: The title of your paper should be brief but should adequately inform the reader of your general topic and the specific focus of your research. Keywords relating to parameters, population, and other specifics are useful. The Title Page must include the title, name, course name and number, and Professor’s Name. 

Introduction, Research Question, and Hypothesis:  This section shall provide an overview of the topic that you are writing about, a concise synopsis of the issues, and why the topic presents a “puzzle” that prompts your research questions, which you will include. This section will end your introduction with your research question. 

Review of the Literature: All research projects include a literature review to set out for the reader what knowledge exists on the subject under study and helps the researcher develop the research strategy to use in the study. A good literature review is a thoughtful study of what has been written, a summary of the arguments that exist (whether you agree with them or not), arranged thematically. At the end of the summary, there should still be gaps in the literature that you intend to fill with your research.   

As a literature review, this section should identify the common themes and theories that the prior research identified. In this section, what you do is look at the conclusions of prior research and identify the common themes in the conclusions. You then identify those themes. The APUS online library has some helpful information on literature reviews. 

Methodology and Research Strategy: This section provides the reader with a description of how you carried out your qualitative research project, and the variables you identified and analyzed.  It describes any special considerations and defines any limitations and terms specific to this project, if necessary. This section can be brief or more complicated, depending on the project.  

Analysis and Findings: are not the same as conclusions. In the analysis component of this section you identify how you analyzed the data. The second part is the finding you got from your analysis of the data. The findings are the facts that you developed, not your interpretation of the facts. That interpretation is conducted in the conclusions and recommendations section of the paper. Findings will come from the prior research you examined and your analysis of those prior findings to create new findings for your paper. While there may be some facts that are such that they will stand and translate to your paper, the intent is to create new knowledge, so you will normally analyze the data to create your own findings of what facts that data represents.  

Conclusions and Recommendations: is the section where you give your interpretation of the data. Here you tell the reader what the findings mean. Often the conclusions and recommendations sections will mirror the findings in construct as the researcher tells the reader what that researcher sees as the meaning of that data, their conclusions. Then, drawing on those conclusions, the researcher tells the reader what they believe needs to be done to solve/answer the research question. This section may include recognition of any needs for further research and then finishes with a traditional conclusion to the paper as a whole. 

Remember, your paper should seek to answer a question that helps to solve the research puzzle you identified. 

Technical Requirements

  • Your paper must be at a minimum of 8-10 pages (the Title and Reference pages do not count towards the minimum limit).
  • Scholarly and credible references should be used. A good rule of thumb is at least 2 scholarly sources per page of content.
  • Type in Times New Roman, 12 point and double space.
  • Students will follow the current APA Style as the sole citation and reference style used in written work submitted as part of coursework. 
  • Points will be deducted for the use of Wikipedia or encyclopedic type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc.
  • All submissions will be graded using the assignment rubric.

RESEARCH OUTLINE 5

Research Outline

Damien J. Dickens

Industrial Espionage

SCMT 392

American Military University

Dr. Yvette Aguiar

16 May 2021

Research Topic: Employees as facilitators of Corporate Espionage

Introduction

Whenever a company falls victim to corporate espionage, executives wonder how the information got leaked. For example, a competitor may launch a new product a few months before the company launches, and executives shake their heads as they strategize to regain lost revenue. Corporate espionage is not a new threat as it dated back centuries ago. According to research, 70% of a company’s value is held in its information (Benny, 2019). Therefore, companies strive to keep their information as safe as possible.

Despite efforts to safeguard their corporate data, companies still lose a lot of revenue through corporate espionage. Shockingly, while employees are expected to safeguard a company’s competitiveness, researchers mention that they facilitate corporate espionage. Current and former employees are regarded as both direct and indirect insider threats (Toubul, 2021). Direct employee threat takes three forms; employee bribery, social engineering, and group collusion. Indirectly, employees’ internet activities such as online shopping may make a company vulnerable to corporate espionage (Rajput, 2021).

Researchers have cited several motivations behind employee facilitation of corporate espionage. The most common motivation factors are money and revenge. In most cases, employees are bribed with a lot of money to reveal company secrets. In the case of ex-employees, their main motivation is to revenge for perceived unfair treatment (Arbman, 2020). While researchers have focused on the motivation and techniques of stealing corporate data by employees, there is little research on the weaknesses that facilitate the process. It is obvious that there must be gaps that make it possible for employees to access information and provide them to competitors. A few researchers mention poor cybersecurity policies and behavior (Roberts, 2021). In this paper, the researcher will analyze these gaps and identify other gaps that support employee-facilitated corporate espionage. The researcher will also analyze existing literature to inform recommendations on how to address the challenge.

Research Question

What weaknesses do employees exploit in facilitating corporate espionage?

Research Hypothesis

The research is based on the hypothesis that employees facilitate corporate espionage and make companies vulnerable to their competitors. The hypothesis is based on existing literature that poses employees as a great threat to the company’s information. The employees include ex-employees, temporary staff, and trusted senior managers. Another hypothesis is that employees facilitate corporate espionage by exploiting weaknesses in a company. The weaknesses may be in the form of company security policies and termination policies.

Outline

The remainder of the paper will constitute;

Chapter 2; Literature Review

Chapter 3: Methodology

Chapter 4: Findings

Chapter 5: Conclusion and Recommendations

References

Hornberger, R. C. (2021). Encouraging Employee Buy-In for Cybersecurity Monitoring Programs: A Social Influence Perspective (Doctoral dissertation, University of Maryland University College).

Touboul, B. (2021). Hi-Tech Facilitators. In SERVANTS OF THE DEVIL: The Facilitators of the Criminal and Terrorist Networks (pp. 67-84).

Papadaki, M., & Shiaeles, S. Insider threat.

Roberts, D. J. (2021). An Analysis of Employee Information Security Policy Compliance Behavior: A Generic Qualitative Inquiry (Doctoral dissertation, Capella University).

Benny, D. J. (2019). Industrial espionage: Developing a counterespionage program. CRC Press.

Heavin, C., Neville, K., & O’Riordan, S. (2018). Leveraging Technology-Enhanced Teaching and Learning for Future IS Security Professionals. In Encyclopedia of Information Science and Technology, Fourth Edition (pp. 2558-2570). IGI Global.

Haelterman, H. (2020). Hard, soft, or situational controls? Bridging the gap between security, compliance, and internal control. Security Journal, 33(4), 636-656.

Rajput, B. (2020). Emerging Trends and Patterns of Cyber Economic Crimes. In Cyber Economic Crime in India (pp. 97-142). Springer, Cham.

Arbman, S. (2020). A firm’s s legal control over confidential information—a study on proactive management of trade secrets and post-employment obligations in an employment contract.

Senarak, C. (2021). Port cybersecurity and threat: A structural model for prevention and policy development. The Asian Journal of Shipping and Logistics, 37(1), 20-36.

Looking for a Similar Assignment? Our Experts can help. Use the coupon code SAVE30 to get your first order at 30% off!