McGraw-Hill OnlineMcGraw-Hill Higher EducationLearning Center
Student Center | Instructor Center | Information Center | Home
Chapter Updates
Discussion Board
Career Opportunities
Business Week
PowerWeb
CESIM
E Learning Sessions
Concept Previews
Multiple Choice Quiz
Internet Assignments
Chapter Discussion
E Business Cases
Feedback
Help Center


International Business : The Challenge of Global Competition, 8/e
Donald Ball
Wendell H. McCulloch, California State University Long Beach
Paul L. Frantz, California State University Long Beach
Michael Geringer, California Polytechnic State University
Michael S. Minor, University of Texas Pan American

Competitive Forces

Internet Assignments

Students:

Included here are some internet/case assignments that you can use to review or that your instructor may give as assignments. Your instructors have been given the answers to these questions and may choose to give them out to you or not.


This case is designed to:
  • Familiarize you with the current business climate related to industrial espionage;
  • Provide you with a detailed look at a specific case of industrial espionage; and
  • Give you insight into how corporations are reacting in an effort to protect themselves from industrial espionage.
It reads like a James Bond novel. A retired employee of Kodak steals the design specifications of a top-secret device code-named the 401 Machine and sells them to the enemy--a competitor corporation. Intel hires key employees of Motorola to obtain Motorola's microchip trade secrets. A Taiwanese father and daughter business team pays a disgruntled US research engineer to pilfer manufacturing secrets from label maker Avery Dennison. Another Taiwan based executive attempts to buy the secret formula for Bristol-Myers Squibb's cancer drug Taxol.

Cheating in business is not new. Corporate spooks and saboteurs however, are especially busy in today's global, high-tech economy, where a company's most prized assets can often be stored on a computer disk and surveillance equipment can fit on a shirt button. To find out more about this, read the March 22, 1999 Time article "Eyeing the Competition" by Daniel Eisenberg http://www.time.com/time/magazine/article/0,9171,21461,00.html . In addition, with more and more company information made available via the Internet, corporate snoops can often gather extensive information about a company's future moves. To find out more about this, read the September 27, 1999 Computerworld article "Your Web site May be a Spy Magnet" by Gary Anthes. http://www.computerworld.com/cwi/story/0,1199,NAV47_STO42784,00.html .

Some of the most common business espionage-related tactics used today include: (1) posing as a reporter, student researcher or potential customer when visiting a company; (2) participating in group tours of company facilities; (3) rummaging through a company's trash dumpster for business information; (4) recruiting a penetration agent; (5) hiring employees away from a company to gain access to competitive business information; (6) enlisting the support of disgruntled employees or ex-employees; (7) breaking into computer systems; (8) planting wiretaps and secret recording devices; and (9) eavesdropping.

One of the more famous cases of industrial espionage involved Jose Ignacio Lopez de Arriortua, a former General Motors executive who joined Volkswagen and took with him box loads of GM documents. Read about this in the April 17, 1997 Fortune article "Blood Feud" by Peter Elkind at http://www.britannica.com/bcom/magazine/article/0,5744,14392,00.html?query=volkswagen

Case Instructions:

Answer the following questions.

  1. List twelve things that rival's search for on a company's web site and what that information reveals.
  2. What exactly did Jose Ignacio Lopez de Arriortua steal from General Motors?
  3. In the final analysis, do you feel that the documents that Jose Ignacio Lopez de Arriortua stole from General Motors placed or could have placed General Motors at a competitive disadvantage? Why or why not?
  4. In addition to minimizing the amount of information that a company makes available on its web site, identify at least five things can a company do to protect itself from industrial espionage and explain how each of these five things offer protection. (Hint: Try surfing the net to find information about this.)
Sources:

Anthes, Gary H. September 27, 1999. "Your Web Site May be a Spy Magnet." Computerworld. v. 33, issue 39. pp. 62-63.

Barth, Steve. August, 1998. "Spy vs. Spy." World Trade. v. 11, issue 8. pp. 34-37.

Crock, Stan. February 10, 1997. "Business Spies: The New Enemy Within?" Business Week.issue 3513. p. 16.

Eisenberg, Daniel and Chris Taylor. March 22, 1999. "Eyeing the Competition." Time. v. 153, issue 11. pp. 58.60.

Elkind, Peter. April 14, 1997. "Blood Feud." Fortune. v. 135, issue 7. pp. 90-102.

Farnham, Alan. September 8, 1997. "How Safe are Your Secrets?" Fortune. v. 136, issue 5. pp. 114-120.

Kaltenheuser, Skip. July, 1997. "Industrial Espionage is Alive and Well." World Trade. v. 10, issue 7. pp. 24.26.

Robinson, Edward A. March 30, 1998. "China's Spies Target Corporate America." Fortune. v. 137, issue 6. pp. 118.122.





McGraw-Hill/Irwin