[Bussman, K.D, 2007, Economic Crime: People, Culture and Controls. Martin-Luther-University Germany, Pricewaterhouse Coopers, Fourth Biennial Global Economic Crime Survey]Search in Google Scholar
[Calder, A, and Watkins, S, 2006, International IT Governance, London: Kogan Page]Search in Google Scholar
[Cornwall, Hugo, 1992, The Industrial Espionage Handbook, p-17-24, ISBN: 9780091773434, Ebury Press, London]Search in Google Scholar
[Danielson, Mark, E.A. 2009, Espionage: A Framework for a Workable Sotution, MINN, J.L. SCI & TECH; 10 (2): 503-548]Search in Google Scholar
[Dobrin, Arthur, 2009, Business Ethics The Right Way to Riches, https://arthurdobrin.files.wordpress.com/2008/08/business-ethics.pdf]Search in Google Scholar
[Effendy, Dody, 2006, Spionase Bisnis Ulah Mata-Mata yang Berpontensi Menghancurkan Perusahaan, Abdi Tandur, Jakarta]Search in Google Scholar
[Elangovan, A. R. and Shapiro, Debra L. Betrayal of Trust in Organizations, The Academy of Management Review, Vol. 23, No. 3 (Jul., 1998), pp. 547-566, Academy of Management, ISSN: 03637425, New York, USA10.5465/amr.1998.926626]Search in Google Scholar
[Ellis, Jason D. 2001, Defense by other means: The Politics of US-NIS threat reduction and Nuclear Security Cooperation, ISBN 0-275-96940, Preager, Westport, USA]Search in Google Scholar
[Eystein, Hansen, September 2008, Industrial Espionage – A Management Perspective, Thesis, University of Wales, Robert Kennedy College, UK]Search in Google Scholar
[Fink, S, 2003, Sticky Fingers: Managing the Global Risk of Economic Espionage, iUniverse, Lincoln, Nebraska]Search in Google Scholar
[Gitosudarmo, Indriyo, 1996, Pengantar Bisnis, BPFE UGM, Yogyakarta]Search in Google Scholar
[Griffin, Ricky W, dan Ebert, Ronald J, 2007, Bisnis, Edisi Kedelapan, Jilid 2, Penerbit Salemba Empat, Jakarta]Search in Google Scholar
[Hanssen, Eystein, Industrial Espionage-A Management Perspective, Published Thesis, MBA, University of Wales Robert Kennedy College, England]Search in Google Scholar
[Hartman, Laura P & Desjardins Joe, 2011, Etika Bisnis, Penerbit Erlangga, Jakarta]Search in Google Scholar
[Hou, Wee Chow, Sheang, Lee Kay dan Hidayat, Bambang Walujo, 1992, “Sun Tzu: war & Management”, PT. Elex Media Komputindo, Jakarta]Search in Google Scholar
[Lauri Holstrom, Lauri, 2010, Industrial Espionage and Corporate Security: The Ericsson Case, Reports of the Police College of Finland, Finland]Search in Google Scholar
[Nasheri, Hedieh, 2004, Economic Espionage and Industrial Spying, Cambridge, Cambridge University Press, ISBN: 978052154371210.1017/CBO9780511610288]Search in Google Scholar
[Nasheri, Hedieh, 2005, Economic Espionage and Industrial Spying, Cambridge, Cambridge University Press, ISBN: 0-521-83582-8]Search in Google Scholar
[Peacock W.E, 1984, Corporate Combat, Maple-Vail: London]Search in Google Scholar
[Perry, David L. Ethics and War in Comparative Religious Perspective, 2016, philpapers, philosophical research online, philpapers.org/rec/PEREAW]Search in Google Scholar
[Rose, Sarah, 2009, For All The Tea in China, published by Hutchisen, 2009 in England and year 2010 in the United States, published by Viking]Search in Google Scholar
[Rustmann, F.W. Jr, 2002, CIA Inc: Espionage and the Craft of Business Intelligence, p-80-90, Brassey’s Inc, Virginia, USA]Search in Google Scholar
[Schröder, Peter. 2011, Politische Strategien, Friedrich-Naumann-Stiftung für die Freiheit, Potsdam]Search in Google Scholar
[Sumarsono, Bambang, 2005, Strategi Perang Berbisnis, Suara Merdeka, Edisi 24 Agustus]Search in Google Scholar
[Suwarsono, Muhamad, 2013, Manajemen Stratejik, Konsep dan alat analisis, Sekolah Tinggi Ilmu Manajemen YKPN, Yogyakarta]Search in Google Scholar
[Velasquez, Manuel G. Trevisan, Richard. Heller, Victor. 2012, Business Ethics Concepts and Cases, Seventh Edition, Pearson Education, Inc., Upper Saddle River, NJ 07458, USA]Search in Google Scholar
[Wimmer, Bruce, CPP, March 18, 2015, Business Espionage Risk, Threats and Countermeasures, Butterworth-Heinemann, Elsevier, 1st edition, ISBN: 9780124200548]Search in Google Scholar
[Winkler, Ira S, 1996, Case Study of Industrial Espionage through Social Engineering. USA, Journal]Search in Google Scholar
[Winkler, Ira S, 1997, Corporate Espionage: What It Is, Why It Is Happening In Your Company and What You Must Do About It, P-3, Prima Publishing, USA]Search in Google Scholar
[Widodo, Eko, 2000, Sistem Intelijen Kompetitif, STIE YKPN Yogyakarta]Search in Google Scholar
[www.bloomberg.com, Bloomberg Business Week, Famous Cases of Corporate Espionage, Stepped in Tea’s Secrets, Posted on September 20, 2011]Search in Google Scholar
[www.bloomberg.com, Bloomberg Business Week, Famous Cases of Corporate Espionage, HP Spies on Itself, Posted on September 20, 2011]Search in Google Scholar