Abstract
The digital revolution does not show any signs of slowing down. Despite all advantages also dangers emerging from the digitization. Due to increasing globalization and the importance of trade secrets, industrial espionage has become a threatening reality that companies have to deal with. The objective of this study is to investigate the influences on industrial espionage as a threat for small and medium-sized enterprises in Germany. An empirical, quantitative data collection obtained using an online-based questionnaire forms the data basis. The hypothesis model, which has been used is derived from previous qualitative research. To prove the hypotheses a multivariate analysis using structural equation modeling has been conducted.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Fleischer, D.: Industrial Espionage Phenomenology—Explanatory Approaches—Options for Action. Springer, Wiesbaden (2016)
Federal Ministry of Education and Research: Industrial Espionage and Spying on Competitors in Germany and Europe (WISKOS)—Project Outline. https://www.sifo.de/sifo/shareddocs/Downloads/files/projektumriss_wiskos.pdf. Last accessed 30 Jan 2023
Bollhöfer, E., Jäger, A.: Industrial Espionage and Spying on Competitors. Incidents and Prevention in SME in the Digital Age. Max Planck Institute for Foreign and International Criminal Law, Freiburg in Breisgau (2018)
Härting, R., Bühler, L., Winter, K., Gugel, A.: The threat of industrial espionage for SME in the age of digitalization. Procedia Comput. Sci. 207, 2934–2943 (2022)
Chidukwani, A., Zander, S., Koutsakis, P.: A survey on the cyber security of small-to-medium businesses: challenges, research focus and recommendations. IEEE Access 10, 85701–85719 (2022)
Dreißigacker, A., von Skarczinski, B., Wollinger, G.R.: Cyber Attacks against Companies in Germany. Criminological Research Institute Niedersachsen e.V, Hannover (2021)
Fähnrich, N., Roßnagel, H.: Online tool for matching company demands with IT-security offerings. In: Roßnagel, H., Schunck, C.H., Mödersheim, S. (eds.) Open Identity Summit 2022. Lecture Notes in Informatics (LNI), pp. 131–136. Gesellschaft für Informatik e.V., Bonn (2022)
CarÃas, J.F., Arrizabalaga, S., Labaka, L., Hernantes, J.: Cyber resilience self-assessment tool (CR-SAT) for SMEs. IEEE Access 9, 80741–80762 (2021)
Hair, J.F., Hult, G.T.M., Ringle, C.M., Sarstedt, M., Richter, N.F., Hauff, S.: Partial Least Squares Structural Equation Modeling: An Application-Oriented Introduction. Vahlen, München (2017)
Commission, E.: Directorate—General for Internal Market, Industry, Entrepreneurship and SMEs: The Scale and Impact of Industrial Espionage and Theft of Trade Secrets Through Cyber. Publications Office, Luxembourg (2019)
Horten, B., Gräber, M.: Cybercrime. Forens. Psychiatr. Psychol. Kriminol. 14, 233–241 (2020)
Hellmann, R.: IT Security: An Introduction. Walter de Gruyter GmbH, Berlin, Boston (2018)
Lee, C.M.: Criminal profiling and industrial security. Multimed. Tools Appl. 74, 1689–1696 (2015)
Bressler, M.S., Bressler, L.: Protecting your company’s intellectual property assets from cyber-espionage. J. Legal Ethical Regul. Issues 17(2) (2014)
Knickmeier, S.: Spies without borders? The phenomena of economic and industrial espionage and the deterrence strategies of Germany and other selected European countries. Secur. J. 33, 6–26 (2020)
Ringle, C.M., Wende, S., Becker, J.-M.: SmartPLS 3. Boenningstedt: SmartPLS GmbH (2015). http://www.smartpls.com
Wong, K.K.K.: Partial least squares structural equation modeling (PLS-SEM) techniques using SmartPLS. Mark. Bull. 24(1), 1–32 (2013)
Fornell, C., Larcker, D.F.: Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 18(1), 39–50 (1981)
Tenenhaus, M., Vinzi, V.E., Chatelin, Y.-M., Lauro, C.: PLS path modeling. Comput. Stat. Data Anal. 48(1), 159–205 (2005)
Chin, W.W.: The partial least squares approach to structural equation modeling. Mod. Methods Bus. Res. 295(2), 295–336 (1998)
Ringle, C.M., Sarstedt, M., Straub, D.W.: Editor’s comments: a critical look at the use of PLS-SEM. MIS Q. 36(1), iii–xiv (2012)
Homburg, C., Baumgartner, H.: Evaluation of Causal Models: Inventory and Recommendations for Use. Schäffer-Poeschel, Stuttgart (1998)
Gazem, M., Härting R., Reichstein, C.: Impact of Covid-19 on employee satisfaction and trust with focus on working from home. In: Jezic, G., et al. (eds.) Agents and Multi-Agent Systems: Technologies and Applications. Smart Innovation, Systems and Technologies. Springer (2023)
Acknowledgements
This work was supported by Sophie-Marie Miehlke and Manuel Götz. We would like to take this opportunity to thank you very much for your great support.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Härting, RC., Schulz, GN., Deffner, D., Karg, C. (2023). Digital Transformation and Cyber Threats for Small and Medium Sized Enterprises. In: Jezic, G., Chen-Burger, J., Kusek, M., Sperka, R., Howlett, R.J., Jain, L.C. (eds) Agents and Multi-agent Systems: Technologies and Applications 2023. KES-AMSTA 2023. Smart Innovation, Systems and Technologies, vol 354. Springer, Singapore. https://doi.org/10.1007/978-981-99-3068-5_15
Download citation
DOI: https://doi.org/10.1007/978-981-99-3068-5_15
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-3067-8
Online ISBN: 978-981-99-3068-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)