This chapter includes information on how you might “profile” a business spy. It examines the motivation of spies through the acronyms MICE and CRIME. While the truth is that there is no “typical” spy, there are some personal traits that frequently emerge and these can be used as possible “red flags” for more closely examining the background of someone who might be given access to sensitive business information.
One of the 64,000-dollar questions that may be asked over and over again is: How can we ...
With Safari, you learn the way you learn best. Get unlimited access to videos, live online training,
learning paths, books, interactive tutorials, and more.