skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 119565 Find in a Library
Title: Competitor Intelligence: Can You Plug the Leaks?
Journal: Security Management  Volume:33  Issue:8  Dated:(August 1989)  Pages:84-87
Author(s): L M Fuld
Date Published: 1989
Page Count: 4
Type: Training (Aid/Material)
Format: Article
Language: English
Country: United States of America
Annotation: Although intelligence "leaks" that can help a business competitor are inevitable, such leaks can be curtailed via effective security measures.
Abstract: Leaks inevitably occur through gossip at trade shows, papers presented at technical conferences, help-wanted advertisements, discussions among business associates on airplanes, supplier knowledge, sales pitches, company press releases, and off-site relationships and activities. Although employees may not be aware that the information they are offering in public places can be used to advance a competitor's business at the expense of their own company, bits of seemingly harmless information can be pieced together by a competitor to undermine a company's market strategy and reduce the distinctiveness or market impact of a new product. Some ways to reduce such leaks are to review public relations documents or any other public documents the firm releases to the public, eliminate noncompliance information from filings, conduct employee security-awareness programs, and brief employees before they attend trade shows.
Main Term(s): Industrial espionage
Index Term(s): Industrial security; Security management
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.