{"id":5229,"date":"2024-11-28T10:20:07","date_gmt":"2024-11-28T10:20:07","guid":{"rendered":"https:\/\/campus.hesge.ch\/blog-master-is\/?p=5229"},"modified":"2024-12-05T07:45:40","modified_gmt":"2024-12-05T07:45:40","slug":"elementor-5229","status":"publish","type":"post","link":"https:\/\/campus.hesge.ch\/blog-master-is\/elementor-5229\/","title":{"rendered":"Intelligence \u00e9conomique et espionnage industriel : Opportunit\u00e9s, enjeux et d\u00e9rives"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"5229\" class=\"elementor elementor-5229\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8c5e637 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8c5e637\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b0b3617\" data-id=\"b0b3617\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-305370f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"305370f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0fb3183\" data-id=\"0fb3183\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c66d3a9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c66d3a9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-39b4a54\" data-id=\"39b4a54\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eed472e elementor-widget elementor-widget-text-editor\" data-id=\"eed472e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>L\u2019intelligence \u00e9conomique (IE) est une discipline essentielle pour les entreprises souhaitant rester comp\u00e9titives dans un monde globalis\u00e9 et connect\u00e9. Pourtant, \u00e0 la fronti\u00e8re de cette pratique l\u00e9gale et strat\u00e9gique se trouve l&#8217;espionnage industriel, souvent associ\u00e9 \u00e0 des m\u00e9thodes douteuses. La question ici est d\u2019explorer&nbsp;: \u00ab&nbsp;Quelle est la distinction entre ces deux concepts, leurs enjeux et leurs implications pour les organisations modernes&nbsp;?&nbsp;\u00bb.<\/p>\n<p><strong>L\u2019intelligence \u00e9conomique : un levier strat\u00e9gique<\/strong><\/p>\n<p>L\u2019intelligence \u00e9conomique englobe l&#8217;ensemble des actions de collecte, d\u2019analyse et de diffusion d\u2019informations strat\u00e9giques \u00e0 des fins de comp\u00e9titivit\u00e9. Elle repose sur trois axes principaux :<\/p>\n<ol>\n<li><strong>La veille strat\u00e9gique<\/strong> : surveiller les \u00e9volutions du march\u00e9, les tendances technologiques et les actions des concurrents.<\/li>\n<li><strong>La protection de l\u2019information<\/strong> : s\u00e9curiser les donn\u00e9es sensibles pour pr\u00e9venir les intrusions.<\/li>\n<li><strong>L\u2019influence<\/strong> : orienter les d\u00e9cisions publiques et priv\u00e9es en fonction des int\u00e9r\u00eats de l\u2019entreprise.<\/li>\n<\/ol>\n<p>Contrairement \u00e0 l\u2019espionnage, ces pratiques sont l\u00e9gales et encadr\u00e9es par des r\u00e8gles \u00e9thiques, mais elles n\u00e9cessitent une rigueur m\u00e9thodologique et une ma\u00eetrise des outils num\u00e9riques.<\/p>\n<p><strong>L\u2019espionnage industriel : un risque croissant<\/strong><\/p>\n<p>L\u2019espionnage industriel, en revanche, implique l\u2019obtention d\u2019informations confidentielles par des moyens ill\u00e9gaux ou \u00e9thiquement discutables, comme :<\/p>\n<ul>\n<li><strong>Le piratage informatique<\/strong> : acc\u00e9der \u00e0 des bases de donn\u00e9es prot\u00e9g\u00e9es.<\/li>\n<li><strong>L\u2019ing\u00e9nierie sociale<\/strong> : manipuler des employ\u00e9s pour obtenir des donn\u00e9es sensibles.<\/li>\n<li><strong>Les infiltrations internes<\/strong> : placer des espions dans une entreprise cible.<\/li>\n<\/ul>\n<p>Selon une \u00e9tude r\u00e9cente, les cyberattaques visant des secrets commerciaux ont explos\u00e9, causant des pertes estim\u00e9es \u00e0 des milliards de dollars chaque ann\u00e9e. Les secteurs les plus vuln\u00e9rables face \u00e0 ce ph\u00e9nom\u00e8ne sont ceux de la technologie, la pharmaceutique et de la d\u00e9fense.<\/p>\n<p style=\"text-align: justify\"><span style=\"font-weight: bold\">Un exemple marquant : le conflit XPeng vs Tesla<\/span><\/p>\n<p style=\"text-align: justify\">Un cas r\u00e9cent datant de 2019 illustre les d\u00e9fis pos\u00e9s par l\u2019espionnage industriel. Tesla a accus\u00e9 Guangzhi Cao, un ancien employ\u00e9, d\u2019avoir transf\u00e9r\u00e9 300 000 fichiers confidentiels, notamment le code source de l\u2019Autopilot, sur son iCloud personnel avant de rejoindre XPeng, un fabricant chinois de v\u00e9hicules \u00e9lectriques.<\/p>\n<p style=\"text-align: justify\"><span style=\"color: var( --e-global-color-text )\">Bien que XPeng ait ni\u00e9 toute implication directe, les ressemblances entre ses technologies et celles de Tesla ont attir\u00e9 l\u2019attention. Certaines voix qualifient m\u00eame les produits de XPeng de &#8220;clones&#8221; de Tesla, mettant en lumi\u00e8re les risques d\u2019espionnage dans un secteur technologique en pleine expansion.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd6c8b9 elementor-widget elementor-widget-image\" data-id=\"fd6c8b9\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"768\" src=\"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2024\/11\/ai-generated-8349304_1280-768x768.jpg\" class=\"attachment-medium_large size-medium_large wp-image-5232\" alt=\"\" srcset=\"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2024\/11\/ai-generated-8349304_1280-768x768.jpg 768w, https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2024\/11\/ai-generated-8349304_1280-300x300.jpg 300w, https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2024\/11\/ai-generated-8349304_1280-1024x1024.jpg 1024w, https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2024\/11\/ai-generated-8349304_1280-150x150.jpg 150w, https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2024\/11\/ai-generated-8349304_1280.jpg 1280w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image : Ai g\u00e9n\u00e9r\u00e9, Tesla, Auto. Utilisation gratuite.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f7e4f1 elementor-widget elementor-widget-text-editor\" data-id=\"2f7e4f1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><b>Comment se<\/b> <b>prot\u00e9ger ?<\/b><\/p><p>Les entreprises doivent investir dans la s\u00e9curisation de leurs donn\u00e9es et la sensibilisation de leurs employ\u00e9s. Voici quelques pratiques cl\u00e9s :\u00a0<\/p><ul><li>\u00a0<b>Renforcer la cybers\u00e9curit\u00e9 :<\/b> utiliser des pare-feu, chiffrer les communications et surveiller les acc\u00e8s.<\/li><li>\u00a0<b>Former les \u00e9quipes : <\/b>sensibiliser les employ\u00e9s aux techniques d&#8217;ing\u00e9nierie sociale.<\/li><li>\u00a0<b>Collaborer avec des experts :<\/b> engager des consultants en intelligence \u00e9conomique pour identifier les vuln\u00e9rabilit\u00e9s.<\/li><\/ul><div>Ces mesures, bien que co\u00fbteuses sont indispensables pour prot\u00e9ger l&#8217;innovation et garantir une croissance durable.<\/div><div>\u00a0<\/div><div><b>Mise en perspective : une course aux armements informationnels ?<\/b><\/div><div>\u00a0<\/div><div>\u00c0 l&#8217;\u00e8re num\u00e9rique et de l&#8217;avanc\u00e9e technologique, la fronti\u00e8re entre intelligence \u00e9conomique et espionnage industriel devient de plus en plus difficile \u00e0 tracer. Avec l&#8217;\u00e9mergence des technologies d&#8217;intelligence artificielle et de collecte massive de donn\u00e9es, les pratiques l\u00e9gales d&#8217;IE pourraient parfois fr\u00f4ler les limites \u00e9thiques. Les gouvernements ont donc un r\u00f4le important a jou\u00e9 dans cette dynamique. Par exemple, certaines entreprises sont accus\u00e9es de collusion avec des Etats pour acc\u00e9der \u00e0 des informations strat\u00e9giques, posant des questions sur la r\u00e9glementation et la souverainet\u00e9 des donn\u00e9es.<br \/><br \/><\/div><p><b>Vers une intelligence \u00e9conomique \u00e9thique<\/b><\/p><p><b>S<\/b>i l&#8217;IE est un outil l\u00e9gitime et n\u00e9cessaire, son utilisation doit \u00eatre encadr\u00e9e par des principes \u00e9thiques pour \u00e9viter les d\u00e9rives. Promouvoir la transparence, la collaboration et le respect des lois internationales peut aider \u00e0 distinguer les pratiques acceptables des comportements r\u00e9pr\u00e9hensibles. Les entreprises ont tout int\u00e9r\u00eat \u00e0 int\u00e9grer ces dimensions dans leurs strat\u00e9gies, car la r\u00e9putation et la confiances des parties prenantes sont des actifs aussi pr\u00e9cieux que l&#8217;information elle-m\u00eame.<\/p><p><b>Conclusion<\/b><\/p><p>L&#8217;intelligence \u00e9conomique et l&#8217;espionnage industriel sont au fond comme le pile ou face d&#8217;une m\u00eame pi\u00e8ce : l&#8217;acc\u00e8s \u00e0 l&#8217;information strat\u00e9gique. L&#8217;un repose sur des pratiques l\u00e9gales et \u00e9thiques, tandis que l&#8217;autre repr\u00e9sente une menace croissante dans un monde interconnect\u00e9. \u00c0 mesure que les technologies \u00e9voluent, les entreprises doivent redoubler d&#8217;efforts pour prot\u00e9ger leurs donn\u00e9es tout en respectant les r\u00e8gles du jeu.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad1d3a5 elementor-widget elementor-widget-text-editor\" data-id=\"ad1d3a5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><b><span style=\"font-size: 12.0pt;font-family: 'Times New Roman',serif\">Bibliographie\u00a0: <\/span><\/b><\/p><p><i><span style=\"font-size: 12.0pt;font-family: 'Times New Roman',serif\">Comparison Of Source Codes Proves Xpeng Didn\u2019t Use Tesla IP<\/span><\/i><span style=\"font-size: 12.0pt;font-family: 'Times New Roman',serif\">. (s.\u00a0d.). InsideEVs. Consult\u00e9 27 novembre 2024, \u00e0 l\u2019adresse <\/span><a href=\"https:\/\/insideevs.com\/news\/501591\/xpeng-cleared-of-ip-theft-allegations\/\"><span style=\"font-size: 12.0pt;font-family: 'Times New Roman',serif\">https:\/\/insideevs.com\/news\/501591\/xpeng-cleared-of-ip-theft-allegations\/<\/span><\/a><\/p><p><i><span style=\"font-size: 12.0pt;font-family: 'Times New Roman',serif\">Corporate Espionage and Its Impact on Business and Economies<\/span><\/i><span style=\"font-size: 12.0pt;font-family: 'Times New Roman',serif\">. (s.\u00a0d.). Investopedia. Consult\u00e9 27 novembre 2024, \u00e0 l\u2019adresse <\/span><a href=\"https:\/\/www.investopedia.com\/financial-edge\/0310\/corporate-espionage-fact-and-fiction.aspx\"><span style=\"font-size: 12.0pt;font-family: 'Times New Roman',serif\">https:\/\/www.investopedia.com\/financial-edge\/0310\/corporate-espionage-fact-and-fiction.aspx<\/span><\/a><\/p><p><span style=\"font-size: 12.0pt;font-family: 'Times New Roman',serif\">Julian, M. (2018, avril 23). Competitive Intelligence vs Espionage\u2014National Business Investigations. <i>National Business Investigations, Inc.<\/i> <\/span><a href=\"https:\/\/investigations-nbi.com\/differentiating-competitive-intelligence-and-corporate-espionage\/\"><span style=\"font-size: 12.0pt;font-family: 'Times New Roman',serif\">https:\/\/investigations-nbi.com\/differentiating-competitive-intelligence-and-corporate-espionage\/<\/span><\/a><\/p><p><i><span style=\"font-size: 12.0pt;font-family: 'Times New Roman',serif\">The Ultimate Guide to Competitive Intelligence Research | SafeGraph<\/span><\/i><span style=\"font-size: 12.0pt;font-family: 'Times New Roman',serif\">. (s.\u00a0d.). Consult\u00e9 27 novembre 2024, \u00e0 l\u2019adresse <\/span><a href=\"https:\/\/safegraph.com\/guides\/competitive-intelligence\"><span style=\"font-size: 12.0pt;font-family: 'Times New Roman',serif\">https:\/\/safegraph.com\/guides\/competitive-intelligence<\/span><\/a><\/p><p><i><span style=\"font-size: 12.0pt;font-family: 'Times New Roman',serif\">When Competitive Intelligence Goes Too Far<\/span><\/i><span style=\"font-size: 12.0pt;font-family: 'Times New Roman',serif\">. (s.\u00a0d.). Consult\u00e9 27 novembre 2024, \u00e0 l\u2019adresse <\/span><a href=\"https:\/\/www.kompyte.com\/blog\/when-competitive-intelligence-goes-too-far\"><span style=\"font-size: 12.0pt;font-family: 'Times New Roman',serif\">https:\/\/www.kompyte.com\/blog\/when-competitive-intelligence-goes-too-far<\/span><\/a><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Intelligence \u00e9conomique et espionnage industriel : Opportunit\u00e9s, enjeux et d\u00e9rives L\u2019intelligence \u00e9conomique (IE) est une discipline essentielle pour les entreprises souhaitant rester comp\u00e9titives dans un monde globalis\u00e9 et connect\u00e9. Pourtant, \u00e0 la fronti\u00e8re de cette pratique l\u00e9gale et strat\u00e9gique se &hellip; <a href=\"https:\/\/campus.hesge.ch\/blog-master-is\/elementor-5229\/\">Lire la suite\u00ad\u00ad<\/a><\/p>\n","protected":false},"author":147,"featured_media":5240,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[428,429,230,30],"class_list":["post-5229","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-intelligence-economique","tag-carnet-didees","tag-espionnage-industriel","tag-intelligence-economique","tag-master-is"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Intelligence \u00e9conomique et espionnage industriel : Opportunit\u00e9s, enjeux et d\u00e9rives - Recherche d&#039;Id\u00e9eS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/campus.hesge.ch\/blog-master-is\/elementor-5229\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intelligence \u00e9conomique et espionnage industriel : Opportunit\u00e9s, enjeux et d\u00e9rives - Recherche d&#039;Id\u00e9eS\" \/>\n<meta property=\"og:description\" content=\"Intelligence \u00e9conomique et espionnage industriel : Opportunit\u00e9s, enjeux et d\u00e9rives L\u2019intelligence \u00e9conomique (IE) est une discipline essentielle pour les entreprises souhaitant rester comp\u00e9titives dans un monde globalis\u00e9 et connect\u00e9. Pourtant, \u00e0 la fronti\u00e8re de cette pratique l\u00e9gale et strat\u00e9gique se &hellip; Lire la suite\u00ad\u00ad\" \/>\n<meta property=\"og:url\" content=\"https:\/\/campus.hesge.ch\/blog-master-is\/elementor-5229\/\" \/>\n<meta property=\"og:site_name\" content=\"Recherche d&#039;Id\u00e9eS\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-28T10:20:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-05T07:45:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2024\/11\/ai-generated-8857204_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"723\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dan Linh Aur\u00e9lie Pham\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dan Linh Aur\u00e9lie Pham\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/campus.hesge.ch\/blog-master-is\/elementor-5229\/\",\"url\":\"https:\/\/campus.hesge.ch\/blog-master-is\/elementor-5229\/\",\"name\":\"Intelligence \u00e9conomique et espionnage industriel : Opportunit\u00e9s, enjeux et d\u00e9rives - Recherche d&#039;Id\u00e9eS\",\"isPartOf\":{\"@id\":\"https:\/\/campus.hesge.ch\/blog-master-is\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/campus.hesge.ch\/blog-master-is\/elementor-5229\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/campus.hesge.ch\/blog-master-is\/elementor-5229\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2024\/11\/ai-generated-8857204_1280.jpg\",\"datePublished\":\"2024-11-28T10:20:07+00:00\",\"dateModified\":\"2024-12-05T07:45:40+00:00\",\"author\":{\"@id\":\"https:\/\/campus.hesge.ch\/blog-master-is\/#\/schema\/person\/98b8932d73160874cad3293b7e01a286\"},\"breadcrumb\":{\"@id\":\"https:\/\/campus.hesge.ch\/blog-master-is\/elementor-5229\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/campus.hesge.ch\/blog-master-is\/elementor-5229\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/campus.hesge.ch\/blog-master-is\/elementor-5229\/#primaryimage\",\"url\":\"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2024\/11\/ai-generated-8857204_1280.jpg\",\"contentUrl\":\"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2024\/11\/ai-generated-8857204_1280.jpg\",\"width\":1280,\"height\":723},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/campus.hesge.ch\/blog-master-is\/elementor-5229\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/campus.hesge.ch\/blog-master-is\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intelligence \u00e9conomique et espionnage industriel : Opportunit\u00e9s, enjeux et d\u00e9rives\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/campus.hesge.ch\/blog-master-is\/#website\",\"url\":\"https:\/\/campus.hesge.ch\/blog-master-is\/\",\"name\":\"Recherche d&#039;Id\u00e9eS\",\"description\":\"Carnet de recherche des \u00e9tudiants du Master en sciences de l&#039;information et des donn\u00e9es (Information Science - IS) de la Haute \u00e9cole de gestion de Gen\u00e8ve\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/campus.hesge.ch\/blog-master-is\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/campus.hesge.ch\/blog-master-is\/#\/schema\/person\/98b8932d73160874cad3293b7e01a286\",\"name\":\"Dan Linh Aur\u00e9lie Pham\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/campus.hesge.ch\/blog-master-is\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4fb29a8f2980a9cbc06dd3cc5a276895?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4fb29a8f2980a9cbc06dd3cc5a276895?s=96&d=mm&r=g\",\"caption\":\"Dan Linh Aur\u00e9lie Pham\"},\"url\":\"https:\/\/campus.hesge.ch\/blog-master-is\/author\/dan-linh-aurelie-pham\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Intelligence \u00e9conomique et espionnage industriel : Opportunit\u00e9s, enjeux et d\u00e9rives - Recherche d&#039;Id\u00e9eS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/campus.hesge.ch\/blog-master-is\/elementor-5229\/","og_locale":"fr_FR","og_type":"article","og_title":"Intelligence \u00e9conomique et espionnage industriel : Opportunit\u00e9s, enjeux et d\u00e9rives - Recherche d&#039;Id\u00e9eS","og_description":"Intelligence \u00e9conomique et espionnage industriel : Opportunit\u00e9s, enjeux et d\u00e9rives L\u2019intelligence \u00e9conomique (IE) est une discipline essentielle pour les entreprises souhaitant rester comp\u00e9titives dans un monde globalis\u00e9 et connect\u00e9. Pourtant, \u00e0 la fronti\u00e8re de cette pratique l\u00e9gale et strat\u00e9gique se &hellip; Lire la suite\u00ad\u00ad","og_url":"https:\/\/campus.hesge.ch\/blog-master-is\/elementor-5229\/","og_site_name":"Recherche d&#039;Id\u00e9eS","article_published_time":"2024-11-28T10:20:07+00:00","article_modified_time":"2024-12-05T07:45:40+00:00","og_image":[{"width":1280,"height":723,"url":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2024\/11\/ai-generated-8857204_1280.jpg","type":"image\/jpeg"}],"author":"Dan Linh Aur\u00e9lie Pham","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Dan Linh Aur\u00e9lie Pham","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/campus.hesge.ch\/blog-master-is\/elementor-5229\/","url":"https:\/\/campus.hesge.ch\/blog-master-is\/elementor-5229\/","name":"Intelligence \u00e9conomique et espionnage industriel : Opportunit\u00e9s, enjeux et d\u00e9rives - Recherche d&#039;Id\u00e9eS","isPartOf":{"@id":"https:\/\/campus.hesge.ch\/blog-master-is\/#website"},"primaryImageOfPage":{"@id":"https:\/\/campus.hesge.ch\/blog-master-is\/elementor-5229\/#primaryimage"},"image":{"@id":"https:\/\/campus.hesge.ch\/blog-master-is\/elementor-5229\/#primaryimage"},"thumbnailUrl":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2024\/11\/ai-generated-8857204_1280.jpg","datePublished":"2024-11-28T10:20:07+00:00","dateModified":"2024-12-05T07:45:40+00:00","author":{"@id":"https:\/\/campus.hesge.ch\/blog-master-is\/#\/schema\/person\/98b8932d73160874cad3293b7e01a286"},"breadcrumb":{"@id":"https:\/\/campus.hesge.ch\/blog-master-is\/elementor-5229\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/campus.hesge.ch\/blog-master-is\/elementor-5229\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/campus.hesge.ch\/blog-master-is\/elementor-5229\/#primaryimage","url":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2024\/11\/ai-generated-8857204_1280.jpg","contentUrl":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2024\/11\/ai-generated-8857204_1280.jpg","width":1280,"height":723},{"@type":"BreadcrumbList","@id":"https:\/\/campus.hesge.ch\/blog-master-is\/elementor-5229\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/campus.hesge.ch\/blog-master-is\/"},{"@type":"ListItem","position":2,"name":"Intelligence \u00e9conomique et espionnage industriel : Opportunit\u00e9s, enjeux et d\u00e9rives"}]},{"@type":"WebSite","@id":"https:\/\/campus.hesge.ch\/blog-master-is\/#website","url":"https:\/\/campus.hesge.ch\/blog-master-is\/","name":"Recherche d&#039;Id\u00e9eS","description":"Carnet de recherche des \u00e9tudiants du Master en sciences de l&#039;information et des donn\u00e9es (Information Science - IS) de la Haute \u00e9cole de gestion de Gen\u00e8ve","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/campus.hesge.ch\/blog-master-is\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/campus.hesge.ch\/blog-master-is\/#\/schema\/person\/98b8932d73160874cad3293b7e01a286","name":"Dan Linh Aur\u00e9lie Pham","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/campus.hesge.ch\/blog-master-is\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4fb29a8f2980a9cbc06dd3cc5a276895?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4fb29a8f2980a9cbc06dd3cc5a276895?s=96&d=mm&r=g","caption":"Dan Linh Aur\u00e9lie Pham"},"url":"https:\/\/campus.hesge.ch\/blog-master-is\/author\/dan-linh-aurelie-pham\/"}]}},"_links":{"self":[{"href":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-json\/wp\/v2\/posts\/5229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-json\/wp\/v2\/users\/147"}],"replies":[{"embeddable":true,"href":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-json\/wp\/v2\/comments?post=5229"}],"version-history":[{"count":14,"href":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-json\/wp\/v2\/posts\/5229\/revisions"}],"predecessor-version":[{"id":5247,"href":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-json\/wp\/v2\/posts\/5229\/revisions\/5247"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-json\/wp\/v2\/media\/5240"}],"wp:attachment":[{"href":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-json\/wp\/v2\/media?parent=5229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-json\/wp\/v2\/categories?post=5229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-json\/wp\/v2\/tags?post=5229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}