...Intellectual Property Theft in the Automotive Industry Scope, Trends, and Mitigating Strategies Table of Contents Introduction………………………………………………………………………………..3 Scope of Intellectual Property Theft………………………………………………………3 Intellectual Property Theft and China……………………………………………………..4 Intellectual Property Theft in the Automotive Industry…………………………………...5 The Subtle Pick-Off……………………………………………………………….5 Piracy and China’s Global Emergence…………..………………………………………..6 Consequences of IP Theft…………………………………………………………………7 Mitigating Strategies………………………………………………………………………7 The Autoweb Intellectual Property Exchange…………………………………………….8 Fusion-DX………………………...………………………………………………9 GlobalSource………………………………………………………………….…..9 Data Integration Services……………………………………………………….…9 GlobalSource...………………………………………………………………….…9 Integrated Translations…………………………………………………………….9 Autoweb Company Overview……………………………………………………10 Bibliography………………………………………………………..……………………11 www.autoweb.net 2 Introduction I ntellectual Property protection in the manufactured goods sector is not a new idea. Laws prohibiting manufactured goods counterfeiting and piracy activities existed as far back as the Middle Ages when bakers, artisans, and craftsmen used distinctive marks to distinguish their products and work from would-be counterfeiters. The general problems associated with modern day counterfeiting and intellectual property piracy have long been recognized, yet today’s high-tech economy has magnified the problem of...
Words: 3125 - Pages: 13
...Report/National Incident-Based Reporting System and the National Victimization Survey. Data from the two sources, although collected differently, show an array of crime data in the United States and is a method to monitor criminal activity. They both have positive and negative attributes that have influenced different aspects of society. It is important to remember that statistical aggregates of reporting crime, whatever the source, does not reveal the lost lives, human suffering, lessened productivity, and reduces quality of life that crime causes (Schmallager, 2011). The Uniform Crime Reporting (UCR) Program is the crime statistics of more than 16,000 law enforcement agencies (Schmallager, 2011). Congress created this program in 1930 and designated the FBI to implement the program (Schmallager, 2011). The programs primary objective is to generate a reliable set of criminal statistics for use in law enforcement administration, operation, and management; however, its data have over the years become on of the country’s leading social indicators (national atlas, 2003). Citizens use these reports to see fluctuations in crime levels and law enforcement uses it for planning and crime prevention programs. Eight Part I offenses are included in the UCR Reports, also known as the Crime Index. The violent crimes are murder, forcible rape, robbery, aggravates assault, burglary, larceny-theft, motor vehicle theft, and arson. Clearance rates are also included in the report. Clearance rates are...
Words: 1067 - Pages: 5
...essentially anyone who has access to the systems. Thinking like a hacker, how would one infiltrate closed digital training network? Well, sometimes one not even need to be a hacker to stumble upon unauthorized or restricted documents. Usually the weaknesses of a closed network are going to lie with access and account rights. Granting proper account rights consists of the administrator weighing what kind of access is appropriate to give to the type of user. In a larger environment where an administrator is in charge of hundreds of systems this task might be very difficult. As stated by Einwechter in his explanation of the finesse it takes to grant access and account rights, “Give a person too much access, and they may gain access to data and other resources that are not required for their job . . . [access rights that are too] restrictive and he or she may be unable to do their job” (2002). A written policy or memo which informs users of the different accounts...
Words: 2338 - Pages: 10
...Associate Level Material Critical Analysis Forms Fill out one form for each source. |Source 1 Title and Citation: Identity Theft Is a Serious Problem | |Swecker, C. (2009). Identity Theft Is a Problem (Cyber Crime ed.) Louise I. Gerdes. Detroit: Greenhaven Press. | | | | | |1 |Identify the principal issue presented by the |Identity theft has emerged as one of the dominant white collar crime | | |source. |problems of the twenty-first century | | | | | |2 |Identify any examples of bias presented by the |This particular article seemed bias free to me. The author did a good job of| | |author. If none exist, explain how you |producing statistics backing his claims. The author gives detailed | | |determined this. |information about the FBI internet crime numbers along with information | | | |regarding the Internet Crime Complain Center. I never felt that the author | | | |was...
Words: 1132 - Pages: 5
... Abstract Computer crime is any crime that has to do with a computer and a network. Computer crimes are criminal activities which involve the use of information technology to get illegal or unauthorized access to a a computer system with the mind set of damaging, deleting, and altering computer data. Computer crimes are include but are not limited to electronic frauds, misuse of devices, identity theft and data. Computer crimes do not necessarily have to involve damage to physical property. The computer could have participated in the crime or may have been the target. There are for common types of computer crimes computer as the target, the computer as an instrument of a crime, the computer as incidental to a crime, and crimes associated with the prevalence of computers. Categories of Computer Crime There are four common types of computer crimes. Computers can be used as an target. Crimes were the computer is the can include offenses like theft of intellectual property, theft of marketing information or blackmail based on information gained from computerized files. Crimes of this nature can sabotage intellectual property, marketing, pricing, or personnel data or can even sabotage of operating systems and programs with the thought of creating chaos in a business operations. There are many ways computers can be targeted unlawful access to criminal justice and other government records is another crime that targets the computer directly. This type of crime...
Words: 802 - Pages: 4
...workplace: * The Larceny theft data from Federal Bureau of Investigation’s official website for the years 2011, 2012 and 2013; * 25th and 26th Annual Retail Theft Surveys by Hayes International for the years 2011, 2012 and 2013; * National Conference of State Legislatures website for Labor and employment data for the years 2011, 2012 and 2013. ‘Shoplifting’ is undoubtedly a psychological issue for most of the people. Shoplifting for most individuals is rarely about greed or poverty. It’s about people struggling with their own personal conflicts and needs. There are approximately 27 million shoplifters (or 1 in 11 people) in the USA today. More than 10 million people have been caught shoplifting in the last five years. The pleasure produced from “getting away with it” yields a chemical reaction causing in what shoplifters describe as an incredible “rush” or “high” feeling. Many shoplifters have committed to the fact that this high is their “true reward,” rather than the stolen product itself. It is assumed in this project that all the shoplifting instances in different states of the USA have been performed by the front-end Retail Salesperson. This might not be 100% true as the members of the Retail Store management of a company may also get themselves involved in such heinous crime, but this possibility has been disregarded. Data from the three aforementioned sources were compiled according to the respective states, years and concrete data-sets were formulated. MS...
Words: 3519 - Pages: 15
...Computer Crimes Computer Crimes Computer Crimes Advances in telecommunications and in computer technology have brought us to the information revolution. The rapid advancement of the telephone, cable, satellite and computer networks, combined with the help of technological breakthroughs in computer processing speed, and information storage, has lead us to the latest revolution, and also the newest style of crime, "computer crime". The following information will provide you with evidence that without reasonable doubt, computer crime is on the increase in the following areas: hackers, hardware theft, software piracy and the information highway. This information is gathered from expert sources such as researchers, journalists, and others involved in the field. Computer crimes are often heard a lot about in the news. When you ask someone why he/she robbed banks, they world replied, "Because that's where the money is." Today's criminals have learned where the money is. Instead of settling for a few thousand dollars in a bank robbery, those with enough computer knowledge can walk away from a computer crime with many millions. The National Computer Crimes Squad estimates that between 85 and 97 percent of computer crimes are not even detected. Fewer than 10 percent of all computer crimes are reported this is mainly because organizations fear that their employees, clients, and stockholders will lose faith in them if they admit that their computers have been attacked. And...
Words: 1814 - Pages: 8
...perpetrators. Cyber-crime is relatively new, however, has been in existence since the implementation of computers in mainstream society. This could be a general explanation as to why and how unprepared society and the world are towards fighting these types of crimes [ (Joseph, 2006) ]. There are numerous crimes of this nature being committed on a daily basis. Examples of cyber-crime where the computer itself is the target include things like data alteration, denial of network access, theft of information, denial of service, and vandalism. The next category that the author would like to point out is the computer as an instrument of a crime. What this means is that the computer is used to profit with some other criminal activity in mind. Some examples of this are general theft, theft of service, fraud, and threats and/or harassment [ (Taylor, Fritsch, Liederbach, & Holt, 2011) ]. The implementation of computers as a criminal tool or device to obtain information to be used in a criminal manner increases yearly. Criminals use computers to store data relating to drug deals, money laundering, embezzlement, mail fraud, extortion, and a myriad of other crimes. In addition to the simple storage of records, criminals also...
Words: 1361 - Pages: 6
...Descriptive research is concerned with finding out who, what, where, when, or how much. We chose not to use exploratory research because it is more appropriate for the total study in topic areas where the developed data are limited. We also chose not to use causal research because it focuses on the effect that a variable(s) has on another (or others) or why certain outcomes are obtained. Our study’s method of data collection is communication and the researcher control of variables is the ex post facto design. Longitudinal studies are the time dimension, statistical study for the topical scope, and field conditions for the research environment are most appropriate for our organizational problem. What data collection instrument(s) will be used? Survey? Interview? There are two methods of research in which we are preparing to use. One method of research is the observation method and the other is the focus group method. Both methods are an excellent choice when trying to take control of the losses of a business do to theft. The observation method which is sometime referred to as the field method will give Bloomingdale’s loss prevention team the ability to observer and gather first hand information from the loss prevention team on the behaviors of its employees’ theft problems and issues as well as the consumers. The biggest advantage of this method is that is gives the loss prevention teams an opportunity to participate in the survey. It also gives a greater validation to the information...
Words: 552 - Pages: 3
...methods, and focus on somewhat different aspects of crime, the information they produce together provides a more comprehensive panorama of the Nation’s crime problem than either could produce alone. The International Association of Chiefs of Police (IACP) began publishing information for the UCR Program in 1929, just two years after the IACP had established a committee to research the uniform reporting of crime statistics. Since September 1930, the FBI has administered the program and currently collects information on the following crimes: murder and non-negligent manslaughter, forcible rape, robbery, aggravated assault, burglary, larceny-theft, motor vehicle theft, and arson. Law enforcement agencies report arrest data for 21 additional crime categories. The UCR Program compiles data from monthly law enforcement reports or individual crime incident records transmitted directly to the FBI or to centralized state agencies that then report to the FBI. The program thoroughly examines each report it receives for reasonableness, accuracy, and deviations that may indicate errors. Large variations in crime levels may indicate modified records procedures, incomplete reporting, or changes in a jurisdiction’s boundaries. To identify any unusual fluctuations in an agency’s crime counts, the program compares monthly reports to previous submissions of the agency and with those for similar agencies. The UCR Program presents crime counts...
Words: 417 - Pages: 2
...Property and Computer Crimes Paper John Samaniego, CJA354 May 22, 2011 Property and Computer Crimes Paper In today’s society because of the economic stress and high unemployment rate many crimes exist. The criminal justice system has become overwhelmed with various crimes. Summarizing and defining these crimes society will have a better understanding of these crimes as well as the effect these crimes may have on the community in a negative manner. Not only do these crimes effect society these crimes put a major strain on the criminal justice system as well as the professionals within this system. Kidnapping is the act of removing an individual(s) through intimidation, threat(s) fraud or force from the place for which he or she is found. Kidnapping invades one`s privacy as well as disrupts his or her freedom. Kidnapping also considered a form of aggravated false imprisonment because of the moving and hiding an individual(s). Early common law says that abduction by force and transporting of individual(s) out of his or her country created an act of kidnapping. In today`s judicial system kidnapping cases look more upon the degree of movement in regard to the distance that the abductor(s) forcefully moved an individual(s) Movement must involve substantial amount of distance. For example, forcing an individual out of one`s way or even moving an individual across the street is not looked upon as kidnapping in the criminal justice system (Schmalleger, 2010). False imprisonment...
Words: 1179 - Pages: 5
...computer as a target, the computer as Instrument of the crime, the computer as incidental to crime and crimes associated with the prevalence of computer. This computer crime used the computer as the target by accesses the operating program as the system’s manager, then deny the legitimate user or owner of the system access to his or her date or computer. When committing this crime we have four sub categories that the hacker may fall under, a network intruder who target the server and may cause harm to the network owners or the operation of their business, date alteration that directly targets the computer by attacking the useful information stored or processed by computer, malicious network intruders who primary focus is to alter critical data, are a ways a computer can be used as the target. One of the earliest cases of the computer being target took place when Robert Morris Jr, a computer science student who wrote a self-replicating, self-propagating program that infected an estimated 6,000 computer systems, that later became known as “The Morris Worm.” Computers can be...
Words: 1491 - Pages: 6
...The first category, the computer as an instrument of crime is basically using the computer to facilitate the crime. The criminal introduces a program to manipulate the computer's analytical processes, thereby facilitating the crime. The computer is used to connect to networks so the criminal can do such crimes as fraud, theft of service, theft, threats and even harassment. Another method involves converting legitimate computer processes for illegitimate purposes. Crimes in this category include fraudulent use of automated teller machine (ATM) cards and accounts; theft of money from accrual, conversion, or transfer accounts; credit card fraud; fraud from computer transactions (stock transfers, sales, or billings); and telecommunications fraud. Crimes in which the computer is the target include such offenses as theft of intellectual property, theft of marketing information (e.g., customer lists, pricing data, or marketing plans), or blackmail based on information gained from computerized files (e.g., medical information, personal history, or sexual preference). These crimes also could entail sabotage of intellectual property, marketing, pricing, or personnel data or sabotage of operating systems and programs with the intent to impede a business or create chaos in a business' operations. Unlawful access to criminal justice and other government records is another crime that targets the computer directly. This...
Words: 803 - Pages: 4
...Operation High Roller CSIA 301 November 23, 2014 New forms of cyber crime continue to come up all the time. Technology has aided the theft of money from bank accounts from banks from all over the world and one such cyber attack was Operation High Roller a cyber attack that targeted corporate bank accounts. According to The Wall Street Journal, these attacks which began in Europe spread to Latin America and even the United States (Booker 2012). The attackers did fraudulent transfer of money from accounts belonging to financial institutions. For instance, in the United States, the victims of the attack were companies whose commercial accounts had a minimum of several million dollars. The attackers sent SpyEye and Zeus software to hack computers that were infected with malware. This cyber attack has an extensive network and automation which interacts with serves that are used by their target victims. But much of the transactions are carried out in the servers used by the criminals. Two security firms, McAFee and Gurdian Analytic (Business Insider) were behind this discovery and they realized that there was no human participation required in the transactions. All the criminals needed were insider understanding of the goings on in the banking industry transaction systems. They then developed commercial and custom codes which they maliciously used to siphon millions of dollars into their virtual accounts. About sixty serves were identified as the ones used in making attempted...
Words: 1415 - Pages: 6
...The first category, the computer as an instrument of crime is basically using the computer to facilitate the crime. The criminal introduces a program to manipulate the computer's analytical processes, thereby facilitating the crime. The computer is used to connect to networks so the criminal can do such crimes as fraud, theft of service, theft, threats and even harassment. Another method involves converting legitimate computer processes for illegitimate purposes. Crimes in this category include fraudulent use of automated teller machine (ATM) cards and accounts; theft of money from accrual, conversion, or transfer accounts; credit card fraud; fraud from computer transactions (stock transfers, sales, or billings); and telecommunications fraud. Crimes in which the computer is the target include such offenses as theft of intellectual property, theft of marketing information (e.g., customer lists, pricing data, or marketing plans), or blackmail based on information gained from computerized files (e.g., medical information, personal history, or sexual preference). These crimes also could entail sabotage of intellectual property, marketing, pricing, or personnel data or sabotage of operating systems and programs with the intent to impede a business or create chaos in a business' operations. Unlawful access to criminal justice and other government records is another crime that targets the computer directly. This...
Words: 803 - Pages: 4