TITLE

Ouch! $1 Trillion in Intellectual Property Losses

PUB. DATE
March 2009
SOURCE
Security: Solutions for Enterprise Security Leaders;Mar2009, Vol. 46 Issue 3, p17
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the study on the risk of global recession towards vital information, conducted by researchers from Purdue University in West Lafayette, Indiana. Researchers reveal in their study, "Unsecured Economies: Protecting Vital Information," the potential and greater risk of vital information brought by global recession. Specifically, the study highlights how vital information was transferred and lost, citing the security of vital property, brands and information.
ACCESSION #
37018467

 

Related Articles

  • border Breakthrough? Kuzeljevich, Julia // Canadian Transportation & Logistics;May2008, Vol. 111 Issue 5, p34 

    The article reports on the development being made in the plan to attain recognition between the Canadian Partners in Protection (PIP) Program and the U.S. Customs-Trade Partnership Against Terrorism (C-TPAT), which will take effect on June 2008. Accordingly, there are only slight differences...

  • Security Holes. Keane, Angela Greiling // Traffic World;4/10/2006, Vol. 270 Issue 15, p13 

    The article discusses the report made by the U.S. Senate Homeland Security and Governmental Affairs Permanent Subcommittee on Investigations on the new and improved cargo security system for federal programs, dubbed the Customs-Trade Partnership Against Terrorism. The system was established to...

  • AN AUTHORIZED CONTAINER PROGRAM AT THE NEVADA TEST SITE. Long, Rustin G.; Kanning Jr., Robert A.; Garcia, Benjamin O. // Proceedings of the Institute of Nuclear Materials Management Ann;2010, p1 

    An Authorized User of Containers Program was implemented for National Security Technologies, LLC (NSTec), at the Nevada Test Site (NTS). This paper and the associated presentation will address NSTec's lessons learned for implementing this program. It will describe some of the major difficulties...

  • Notable & Quotable.  // Government Security;Aug2005, Vol. 4 Issue 6, p52 

    Presents facts and statistics relating to the security industry in the U.S. as of September 2005. Percentage of attendees at the 2005 GOVSEC Show in Washington D.C. who have annual budgets of more than $5 million; Number of men who were arrested following a tip to the Newark Police Department;...

  • What's the Price of Outsourcing? Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Apr2008, Vol. 45 Issue 4, p44 

    The article reports on the implications of having an electronic employment verification (EEV) system in the U.S. According to a Cato Institute study, the EEV is ineffective, intrusive and expensive. It notes that implementing a full-fledged EEV has many practical and technical problems and would...

  • Homeland Security Technology. Bonvillian, William B.; Sharp, Kendra V. // Issues in Science & Technology;Winter2001/2002, Vol. 18 Issue 2, p43 

    Addresses the role of technology in enhancing homeland security in the United States following the September 11, 2001 terrorist attacks. Areas of security vulnerability across the nation; Information security research and development efforts needed; Powers and characteristics needed for the...

  • Information Security Management (ISM) Practices: Lessons from Select Cases from India and Germany. Singh, Abhishek Narain; Picot, Arnold; Kranz, Johann; Gupta, M. P.; Ojha, Amitabh // Global Journal of Flexible Systems Management;Dec2013, Vol. 14 Issue 4, p225 

    The increasing dependence of businesses over information and the changing ways of information usage with modern IT/ICT tools and mediums, have created an unavoidable need of information security in organizations. Earlier, the technical measures were used to fulfill this need; however, it has...

  • Security in Initial Phase.  // Consulting-Specifying Engineer;Aug2005, Vol. 38 Issue 2, p11 

    Reports on the survey indicating the employment of security design firms by most infrastructure owners to assess threats and vulnerabilities in their homeland security projects in the U.S. Preparation of owners in case of possible terrorist attacks; Response of the market to meet the...

  • Ipsotek Provides Video Protection.  // Homeland Defense Journal;Nov2007, Vol. 5 Issue 11, p42 

    The article reports that Ipsotek, a global leader in video analytics, has been protecting armories and perimeters at a key security base in Afghanistan. The video analytics suite of the company is protecting over 3000 expatriate, Gurkha, and Afghan personnel by alerting the local guard force to...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics