Spelling suggestions: "subject:"grade secrecy""
1 |
Espionagem corporativa por meio da internet e segurança da informação nas empresas brasileiras / Corporative espionage through internet and security of information in brazilian companiesFreitas, Vitor Hugo das Dores 12 December 2015 (has links)
Submitted by Nadir Basilio (nadirsb@uninove.br) on 2016-05-13T19:31:23Z
No. of bitstreams: 1
Vitor Hugo das Dores Freitas.pdf: 4490734 bytes, checksum: b281b5be1f7b51ff13fac3c9abcb43b3 (MD5) / Made available in DSpace on 2016-05-13T19:31:23Z (GMT). No. of bitstreams: 1
Vitor Hugo das Dores Freitas.pdf: 4490734 bytes, checksum: b281b5be1f7b51ff13fac3c9abcb43b3 (MD5)
Previous issue date: 2015-12-12 / To achieve your goals in a highly competitive market companies use strategic confidential information, which constitute most valuable asset, which travels over the Internet and internal computer networks. This asset is targeted for corporate espionage practiced through the Internet, whose activity is growing on a global scale. The aim of this study is whether there are legal, standardized safety standards and technology for Brazilian companies dealing with corporate espionage and security of your confidential information. For this we used the hypothetical-deductive method, analysis of legal literature on trade secrets, technical literature on espionage, Internet, cyberspace, methods of attacks by the World Wide Web, malicious programs, statistics and specific cases. The results showed that: a) there are legal, standardized safety standards and technology for the prevention of corporate espionage and protection of confidential business information; b) due to cultural and financial factors, among others, companies are not giving the real importance in their strategic asset protection, confidential information; c) that adoption of physical and virtual barriers to preventive protection of confidential information constitutes a key element for business activities and their disregard not only imply negative factor for the sustainability and corporate social responsibility as well as that information loses its character confidentiality. It must be the creation of a public agency, nationwide, that has the objective of developing concrete and effective awareness policies, awareness and prevention of security incidents on the Internet as well as public forums. It is suggested that future research should be made to investigate any need for implementation in the curriculum of educational institutions, specific matters aimed at information security as a means of developing and consolidating culture on the subject. / Para a consecução de seus objetivos em mercado altamente competitivo as empresas utilizam informações confidenciais estratégicas, que se constituem em seu ativo mais valioso, as quais trafegam pela Internet e redes internas de computadores. Este ativo é visado pela espionagem corporativa praticada por meio da Internet, cuja atividade vem crescendo em escala global. O objetivo deste estudo consiste em saber se existem condições legais, normas de segurança padronizadas e tecnologia para as empresas brasileiras lidarem com a espionagem corporativa e a segurança de suas informações confidenciais. Para tanto foi utilizado o método hipotético-dedutivo, a análise da literatura jurídica sobre segredo comercial, literatura técnica sobre espionagem, Internet, ciberespaço, métodos de ataques pela rede mundial de computadores, programas maliciosos, estatísticas e casos concretos. Dos resultados obtidos se conclui que: a) existem condições legais, normas de segurança padronizadas e tecnologia para a prevenção contra a espionagem corporativa e a proteção das informações confidenciais da empresa; b) em razão de fatores culturais e financeiros, dentre outros, as empresas ainda não estão dando a devida importância na proteção de seu ativo estratégico, a informação confidencial; c) que a adoção de barreiras físicas e virtuais para a proteção preventiva da informação confidencial se constitui elemento chave para as atividades empresariais e sua desconsideração não só implica em fator negativo para a sustentabilidade e responsabilidade social corporativa como também que a informação perde seu caráter de confidencialidade. Impõe-se a criação de órgão público, de âmbito nacional, que tenha por objetivo desenvolver políticas concretas e efetivas de conscientização, sensibilização e prevenção de incidentes de segurança na Internet além de fóruns públicos. Sugere-se que futuramente sejam efetuadas pesquisas que visem apurar eventual necessidade de implementação, na grade curricular de instituições de ensino, de matéria específica voltada à segurança da informação como forma de desenvolver e consolidar cultura a respeito do assunto.
|
2 |
The economics of trade secrets : evidence from the Economic Espionage ActSearle, Nicola C. January 2010 (has links)
This thesis reports on the economic analysis of trade secrets via data collected from prosecutions under the U.S. Economic Espionage Act (EEA.) Ratified in 1996, the EEA increases protection for trade secrets by criminalizing the theft of trade secrets. The empirical basis of the thesis is a unique database constructed using EEA prosecutions from 1996 to 2008. A critical and empirical analysis of these cases provides insight into the use of trade secrets. The increase in the criminal culpability of trade secret theft has important impacts on the use of trade secrets and the incentives for would-be thieves. A statistical analysis of the EEA data suggest that trade secrets are used primarily in manufacturing and construction. A cluster analysis suggests three broad categories of EEA cases based on the type of trade secret and the sector of the owner. A series of illustrative case studies demonstrates these clusters. A critical analysis of the damages valuations methods in trade secrets cases demonstrates the highly variable estimates of trade secrets. Given the criminal context of EEA cases, these valuation methods play an important role in sentencing and affect the incentives of the owners of trade secrets. The analysis of the lognormal distribution of the observed values is furthered by a statistical analysis of the EEA valuations, which suggests that the methods can result in very different estimates for the same trade secret. A regression analysis examines the determinants of trade secret intensity at the firm level. This econometric analysis suggests that trade secret intensity is negatively related to firm size. Collectively, this thesis presents an empirical analysis of trade secrets.
|
Page generated in 0.0759 seconds