A Meta-Analysis of Industrial Security Research for Sustainable Organizational Growth
Abstract
:1. Introduction
2. Literature Review
2.1. Industrial Security and Its Characteristics
2.2. Technology Leakage Incidents
2.3. Industrial Security Countermeasures in South Korea
3. Research Methodology
3.1. Research Procedure
3.2. Identification of Resources
- (a)
- The studies were empirical;
- (b)
- They were available in either English or Korean;
- (c)
- They addressed security in an industrial context;
- (d)
- They were primarily conducted within the business, economics, psychology, legal, regulation, or educational fields.
- (a)
- Systematic reviews and/or meta-analyses;
- (b)
- Theses/dissertations.
3.3. Data Refinement
4. Meta-Analysis Results
4.1. Case Analysis Results: South Korean Research
4.1.1. Keyword Frequency and the Degree of Centrality
4.1.2. Betweenness Centrality
4.2. Case Analysis Results: International Research
4.3. Comparison of Case Analyses
5. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
Appendix A
References
- Park, J.Y.; Huh, E.N. A cost-optimization scheme using security vulnerability measurement for efficient security enhancement. J. Inf. Process. Syst. 2020, 16, 61–82. [Google Scholar]
- Gafurov, K.; Chung, T.M. Comprehensive survey on internet of things, architecture, security aspects, applications, related technologies, economic perspective, and future directions. J. Inf. Process. Syst. 2019, 15, 797–819. [Google Scholar]
- Kozlov, D.; Veijalainen, J.; Ali, Y. Security and privacy threats in IoT architectures. In Proceedings of the 7th international Conference on Body Area Networks, Oslo, Norway, 24 September 2012. [Google Scholar]
- IT Chosun. Available online: http://it.chosun.com/site/data/html_dir/2019/10/04/2019100401652.html (accessed on 4 October 2019).
- Chang, H.B. An exploratory study of industrial security studies for science and technologies protection. J. Adv. Navig. Technol. 2013, 17, 123–131. [Google Scholar] [CrossRef] [Green Version]
- Lee, C.M. A critical review of industrial security concepts. Korean Secur. J. 2017, 50, 285–303. [Google Scholar]
- Jeon, M.; Chang, H. The Design Research on ICT Security Concepts and Domains. Inf. Syst. Rev. 2019, 21, 49–61. [Google Scholar]
- Whitman, M.E.; Mattord, H.J. Principles of Information Security, 4th ed.; Cengage Learning: Boston, MA, USA, 2014. [Google Scholar]
- Hinde, S. The law, cybercrime, risk assessment and cyber protection. Comput. Secur. 2003, 22, 90–95. [Google Scholar] [CrossRef]
- Theoharidu, M.; Kokolakis, S.; Karyda, M.; Kiountouzis, E. The insider threat to information systems and the effectiveness of ISO17799. Comput. Secur. 2005, 24, 472–484. [Google Scholar] [CrossRef]
- Igloo Security. 2016 Security Threat Outlook Report. Available online: http://www.igloosec.co.kr/en/ig/PR%20CENTER_IGLOO’s%20Press_IGLOO%20Released%20a%20Prediction%20Report%20on%20Security%20Threats%20for%202016?searchItem=ALL&searchWord=IGLOO+Released+a+Prediction+Report+on+Security+Threats+for+2016&bbsCateId=0&gotoPage=1 (accessed on 9 December 2015).
- Goodall, J.R.; Lutters, W.G.; Komlodi, A. The work of intrusion detection: Rethinking the role of security analysis. In Proceedings of the Americas Conference on Information Systems (AMCIS), New York, NY, USA, 6–8 August 2004. [Google Scholar]
- Ramotsoela, D.T.; Hancke, G.P.; Abu-Mahfouz, A.M. Attack detection in water distribution systems using machine learning. Hum. Cent. Comput. Inf. Sci. 2019, 9, 1–22. [Google Scholar] [CrossRef]
- Chang, H.B. A study on the countermeasure by the types through case analysis of industrial secret leakage accident. J. Converg. Secur. 2015, 15, 39–45. [Google Scholar]
- Hovav, A.; Han, J.Y. The impact of security breach announcements on the stock value of companies in South Korea. Inf. Syst. Rev. 2013, 13, 43–67. [Google Scholar]
- Albladi, S.M.; Weir, G.R.S. User characteristics that influence judgement of social engineering attacks in social networks. Hum. Cent. Comput. Inf. Sci. 2018, 8, 5. [Google Scholar] [CrossRef]
- Korea JoongAng Daily. Available online: https://news.joins.com/article/22478252 (accessed on 27 March 2018).
- Kamruzzaman, M.D. A criminological study on the dark figure of crime as a socio-ecological bulk of victimization. Am. J. Bus. Econ. Manag. 2016, 4, 35–39. [Google Scholar]
- American Banker. Available online: https://www.americanbanker.com/news/hsbc-suffers-data-breach-on-small-number-of-online-accounts (accessed on 6 November 2018).
- Binger, C.; Kent-Walsh, J.; Ewing, C.; Taylor, S. Teaching educational assistants to facilitate the multisymbol message productions of young students who require augmentative and alternative communication. Am. J. Speech Lang. Pathol. 2010, 19, 108–120. [Google Scholar] [CrossRef]
- Solymossy, D.S. High-Tec, Low-Tech, No-Tech: Communications Strategies during Blackouts. Master’s Thesis, Naval Postgraduate School, Monetary, CA, USA, December 2013. [Google Scholar]
- The Korea Association for Industrial Security. Industrial Security White Paper; The Korea Association for Industrial Security: Seoul, Korea, 2015. [Google Scholar]
- Korea Legislation Research Institute, Korea Law Translation Center. Act on Prevention of Divulgence and Protection of Industrial Technology; Ministry of Trade, Industry and Energy: Sejong City, Korea, 2017.
- Korea Legislation Research Institute, Korea Law Translation Center. Act on Support for Protection of Technologies of Small and Medium Enterprises; Ministry of SMEs and Startups: Seoul, Korea, 2017.
- KAITS. Available online: http://www.kaits.or.kr/certificate/introduce.do? (accessed on 15 June 2018).
- PRISMA. PRISMA Flow Diagram. Available online: http://www.prisma-statement.org/ (accessed on 17 March 2020).
- Chaffin, R.; Herrmann, D.J. The similarity and diversity of semantic relations. Mem. Cognit. 1984, 12, 134–141. [Google Scholar] [CrossRef] [Green Version]
- Kim, Y.H. Analysis of connection centrality degree of hot terminologies according to the discourses of privatization of health care. J. Korea Contents Assoc. 2012, 12, 207–214. [Google Scholar] [CrossRef]
- Pryke, S.D. Towards a social network theory of project governance. Constr. Manag. Econ. 2005, 23, 927–939. [Google Scholar] [CrossRef]
- Gim, E.; Koo, J. Analysis of Social Network Change Characteristics of Participants in Urban Regeneration Project Using Netminer. J. Inf. Technol. Serv. 2020, 19, 1–16. [Google Scholar]
- Kang, M.S. A Study on the Alignments Analysis Between Strategy and Budget of the Government R&D’s Major Sectors; Korea Institute of S&T Evaluation and Planning: Chungcheongbuk-do, Korea, 2019. [Google Scholar]
- Cyram. Getting Started with Netminer, 3.3 Version; Cyram: Seoul, Korea, 2008. [Google Scholar]
- Yang, Y.S. Can Social Network of Entrepreneurs be evolved to Strategic Network of Business?—A Case Study on Social Network Analysis of Daeduck High-tech Entrepreneurs. J. Ind. Econ. Bus. 2008, 21, 1041–1060. [Google Scholar]
- Kim, W.J.; Chung, Y.M. A Study on Research Collaboration Among Asian Countries in Science and Technology. J. Korean Soc. Inf. Manag. 2010, 27, 103–123. [Google Scholar] [CrossRef]
- Choi, Y.C. Analyzing Research Trends in the Study of Local Government Administrative and Area. J. Local Gov. Stud. 2018, 30, 57–79. [Google Scholar] [CrossRef]
- Kim, H.S.; Kang, B.R. An analysis of the research topics of the academic papers published in the journal of korean society of archives and records management: From 2001 to 2017. J. Korean Soc. Arch. Rec. Manag. 2018, 18, 183–204. [Google Scholar]
- Kim, Y.H. A Correlation Study of Core Technology Leakage and Security Capability: Centric SMEs Cases. Korean J. Ind. Secur. 2014, 4, 97–108. [Google Scholar]
- Hwang, H.D.; Lee, C.M. A Study on the Relationship between Industrial Espionage, Self-Control, and Organizational Commitment. Korean Secur. J. 2016, 47, 119–138. [Google Scholar]
- Yoo, I.J.; Park, D.H. A Study on Empirical Model for the Prevention and Protection of Technology Leakage through SME Profiling Analysis. J. Inf. Syst. 2018, 27, 171–191. [Google Scholar]
- Lee, H.; Ryu, B.; Kim, H.; Lee, J.; Kim, Y.; Chang, H. A Study for Enhancing Necessity of Certain Industrial Security Charge Department through Investigating Domestic Industrial Security Organization. J. Soc. e-Bus. Stud. 2017, 21, 121–133. [Google Scholar] [CrossRef] [Green Version]
- Gong, B.W. The Situation and Security Measures of Industrial Technology Security Management of SMEs. J. Korean Soc. Priv. Secur. 2019, 18, 1–26. [Google Scholar]
- Jung, S.H.; Lee, C. A Study on the Psychological Security Vulnerabilities of Employees from a Perspective of Industrial Security—Focused on Dual Process Theory. Korean Secur. J. 2020, 63, 41–57. [Google Scholar]
- Lee, C.H.; Lee, S.H. Enhancing industrial security of casino business by developing criminal profiling of deviant behaviors in casino. Korean Secur. J. 2016, 48, 113–146. [Google Scholar]
- Jung, S.H.; Cho, S.P.; Lee, C. Effects of Sexual Violence in the Workplace upon Corporate Performance from a Perspective of Industrial Security. Korean J. Ind. Secur. 2019, 9, 135–156. [Google Scholar]
- Hwang, Y.D.; Park, D.G. Security Requirement and Framework for IP-Based Video Surveillance System. J. KIIT 2017, 15, 11–20. [Google Scholar] [CrossRef]
- Ryu, B.; Jeon, M.; Ji, J.; Lee, C.; Chang, H. Meta Analysis on Digital Forensics Research Trends for Securing its Admissibility of Digital Evidence. J. Converg. Secur. 2017, 17, 23–32. [Google Scholar]
- Kim, J.; Kim, J.; Kim, J.; Choi, Y.; Chang, H. An Exploratory Study for Clustering of Technology Leakage Activities. J. Converg. Secur. 2019, 2, 3–9. [Google Scholar]
- Lee, J.B. A Legal Study on the protection of industrial technology in corporate mergers and acquisitions (M&A). World Const. Law Rev. 2014, 14, 89–119. [Google Scholar]
- Noh, J.; Ko, Z. Legal System Problems and Improvement Plan on Technology leakage of Overseas Expansion Businesses. J. Law Res. 2017, 33, 277–303. [Google Scholar] [CrossRef]
- Kim, K.; Kim, J. The Values and Strategies of Industrial Security in Digital Economy. Korean J. Ind. Secur. 2018, 8, 61–74. [Google Scholar]
- Na, O.; Park, L.W.; Yu, H.; Kim, Y.; Chang, H. The rating model of corporate information for economic security activities. Secur. J. 2019, 32, 435–456. [Google Scholar] [CrossRef] [Green Version]
- Kim, S.H.; Han, I.J. A Study on the Relationship between Corporate Image and Employment Preference in Industrial Security Protection Activities. Korean J. Ind. Secur. 2019, 9, 87–107. [Google Scholar] [CrossRef]
- Lee, S.S. Network Analysis Methods; NonHyung: Seoul, Korea, 2012. [Google Scholar]
- Lee, S.M.; Rha, J.S. A network text analysis of published papers in service business, 2007–2017: Research trends in the service sector. Serv. Bus. 2018, 12, 809–831. [Google Scholar] [CrossRef]
- Chung, J. The Study of Protective Solution and People in Technology Outflow about SMEs. Int. Commer. Inf. Rev. 2015, 17, 133–152. [Google Scholar]
- Ahn, B.G. Development of the Corporate Participatory Security Culture Framework (CPSCF). Ph.D. Thesis, Chung-Ang University, Seoul, Korea, February 2019. [Google Scholar]
- Lee, S.O. A Study on the effective method for the prevention of industrial Secrets Leakage. CHUNG-ANG Law Rev. 2019, 21, 39–80. [Google Scholar]
- Kang, S.H. A Review of the application and scope of the Fair Transactions in Subcontracting Act on technology takeover. CHUNG-ANG Law Rev. 2019, 21, 441–474. [Google Scholar]
- Choi, Y.C.; Choi, O.C.; Kim, H.S. Analysing Key Policy Concepts Underlying Saemaul Undong Policy Within Newspaper Editorials: Application of Network Text Analysis Method. Korean Comp. Gov. Rev. 2011, 15, 45–70. [Google Scholar] [CrossRef]
Area | 2013 | 2014 | 2015 | 2016 | 2017 | 2018 | Total |
---|---|---|---|---|---|---|---|
Number of damaged organizations | 155 | 63 | 59 | 52 | 52 | 32 | 413 |
Total amount of damage (in USD) | 199 M | 105 M | 74 M | 90 M | 84 M | 92 M | 646 M |
Damage per incident (in USD) | 1.2 M | 2 M | 1 M | 1.5 M | 1 M | - | 7 M |
Term | Definition | Example |
---|---|---|
No-tech | Technology leaks occur through deception and the use of power or status, with no use of technology in cyberspace | Spear-phishing |
Joint ventures | ||
Low-tech | Technology leaks occur through low degrees/levels of technology, such as installing programs | Screenshots |
Key-logging | ||
USB memory sticks | ||
Hard disk drives | ||
High-tech | Technology leaks occur through high degrees of technology, such as targeting internal or external vulnerabilities | Persistent threats |
Dark web | ||
Cloud services | ||
Steganography |
Purpose | Relevant Institutions | |
---|---|---|
South Korea | United States | |
Policy establishment and execution (preventing leaks) | (Government) Ministry of Trade, Industry and Energy (Civil) Korean Association for Industrial Technology Security; Trade Secret Protection Center | (Government) Office of the United States Intellectual Property Enforcement Coordinator; The Committee on Foreign Investment in the United States (Civil) American Society for Industrial Security |
Dispute conciliation institution (conflict resolution for technology leakage) | Committee of Dispute Conciliation for Industrial Technology (affiliated with the Ministry of Trade, Industry and Energy) | - |
Countermeasures for illegal leakage (detection and investigation of leaked information) | National Intelligence Service (National Industrial Security Center), Public Prosecutors’ Office (High-Tech and Financial Crimes Investigation Division), The National Police Agency (Industry Technology Leakage) Investigation Team | Defense Counterintelligence and Security Agency (affiliated with the United States’ Department of Defense) |
Measures | Value |
---|---|
In-Degree Centrality | |
Mean | 0.006 |
Std. dev. | 0.008 |
Min. | 0.000 |
Max. | 0.089 |
Fields | South Korea | International |
---|---|---|
Common keywords | Law Regulation Management | |
Main keywords | Technology leakage Trade secret Industrial technology Industrial security education | Crime Fraud Victimization Evidence |
Perspective (management area) | Security management | Crime |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yu, H.; Chang, H. A Meta-Analysis of Industrial Security Research for Sustainable Organizational Growth. Sustainability 2020, 12, 9526. https://doi.org/10.3390/su12229526
Yu H, Chang H. A Meta-Analysis of Industrial Security Research for Sustainable Organizational Growth. Sustainability. 2020; 12(22):9526. https://doi.org/10.3390/su12229526
Chicago/Turabian StyleYu, Harang, and Hangbae Chang. 2020. "A Meta-Analysis of Industrial Security Research for Sustainable Organizational Growth" Sustainability 12, no. 22: 9526. https://doi.org/10.3390/su12229526
APA StyleYu, H., & Chang, H. (2020). A Meta-Analysis of Industrial Security Research for Sustainable Organizational Growth. Sustainability, 12(22), 9526. https://doi.org/10.3390/su12229526