Date of Submission
Master of Science in National Security
Robert A. Sanders
Intellectual Property Protection, National Security, American Businesses, Economic Espionage
National security, Intellectual property (International law), Intellectual property--China—Cases, Intellectual property infringement, Patent infringement, Trade secrets, Business intelligence, United States--Foreign relations--China
The reason for doing this paper is that I am engaged in the protection of intellectual property in the Taiwan police department. I'm interested in studying international intellectual property protection. Dealing mostly with Chinese-related cases, this paper aims to explore the relation between China stealing intellectual property rights from the US and how this threatens national security. Therefore, this paper will focus on four issues: how does China steal intellectual property from American businesses? Why does intellectual property infringement frequently occur in China? What national security threat China poses to the U.S.? What policy or method does the U.S. take to respond? China has stolen U.S. technology, committed patent infringement, and has even forced American companies to transfer trade secrets since the 1980s. All of these have become a U.S. national security threat. In 2019, the Senate Intelligence Committee of the US Justice Department reported that more than 90 percent of economic espionage crimes were associated with China from 2011-2018. This suggests that China is the biggest offender of transferring state secrets and spying on the US government. In addition, this paper will review different opinions on the relationship between protection policy, the change of infringement of intellectual property, and national security and attempt to analyze their impact on U.S.-China relations
Ji, Bi I., "The U.S. National Security Threat—The Challenge for Intellectual Property Protection of U.S. Business in the China Market" (2021). Master's Theses. 178.
Off campus users: To download campus access theses or dissertations, log in to proxy server.