1. Nasheri, H. (2005). Economic Espionage and Industrial Spying. Cambridge University Press. In Chapter 1, "The Nature and Scope of Economic Espionage," industrial espionage is defined as "the unlawful or clandestine targeting or acquisition of sensitive financial, trade or economic policy information; proprietary economic information; or technological information" (p. 8). The theft of source code is a direct example of acquiring proprietary technological information.
2. Davis, M. (2021). "Conflict of Interest". In E. N. Zalta (Ed.), The Stanford Encyclopedia of Philosophy (Winter 2021 ed.). Section 1, "The Definition of 'Conflict of Interest'," defines it as "a set of conditions in which professional judgment concerning a primary interest (such as a patient’s welfare or the validity of research) tends to be unduly influenced by a secondary interest (such as financial gain)." This highlights that it is a situation, not the specific act of theft.
3. Bellow, A. (2003). In Praise of Nepotism: A Natural History. Doubleday. Chapter 1, "Defining Nepotism," establishes the term as favoritism granted to relatives in various fields, particularly regarding appointments or employment, which is not the subject of the scenario.
4. Heidenheimer, A. J., & Johnston, M. (Eds.). (2002). Political Corruption: Concepts and Contexts. Transaction Publishers. In the introduction (p. 6), corruption is broadly defined in a public context as behavior that "deviates from the formal duties of a public role because of private-regarding (personal, close family, private clique) pecuniary or status gains." While the concept can be applied to the private sector, it is less precise for this scenario than industrial espionage.