An Analysis on the Industrial Technology Leakage Cases in South Korea
International Journal of Economic Behavior and Organization
Volume 1, Issue 3, June 2013, Pages: 27-32
Received: Jun. 27, 2013; Published: Aug. 10, 2013
Views 2529      Downloads 142
Authors
Yongtae Chun, Dept. of Security Management, Kyonggi University, Suwon, South Korea
Ju-Lak Lee, Dept. of Security Management, Kyonggi University, Suwon, South Korea
Article Tools
PDF
Follow on us
Abstract
In this study, economy and technology development in South Korea is discussed and a problem that has accompanied the advancement is examined. Industrial technology leakage, which has been increasing in the South Korean society among the nation’s major industry sectors has resulted in immeasurable financial consequences; it can also threaten the country’s status as the world’s leading manufacturer in shipbuilding, semiconductor, and electronics. A total of twelve technology espionage cases, three from each industry, that have received substantial attention by the media and been introduced in the “Technology Leakage Cases and Security Tips” published by the Korean Association for Industrial Technology Security are analyzed in order to find common patterns, actors involved, and characteristics of the leakage activities. The results show that in most cases assessed, a former employee is motivated by the monetary rewards and utilized the external devices to transmit the information. Furthermore, viable policy implications are suggested to provide a possible solution to the problem.
Keywords
Technology leakage, Industrial security, Information security, Espionage
To cite this article
Yongtae Chun, Ju-Lak Lee, An Analysis on the Industrial Technology Leakage Cases in South Korea, International Journal of Economic Behavior and Organization. Vol. 1, No. 3, 2013, pp. 27-32. doi: 10.11648/j.ijebo.20130103.11
References
[1]
S. H. Jung, "The Korean Development Strategy: Trajectories of the Korean Economic Development, 1961~2010," Journal of the Economic Geographical Society of Korea, vol.14, pp. 453-466, 2011.
[2]
J. W. Jeon, "A Study on the Measuring of Damage in Technology Leakage," The Korean Association for Industrial Security, vol.1, pp. 20-32, 2009.
[3]
I. B. Park and J. G. Kim, "A Study on the Policy Management for Industrial Security’s Culture," The Korean Association for Industrial Security, vol. 2, pp. 33-46, 2011.
[4]
The Korean Association for Industrial Security, Industrial Security, Seoul: Pakyoungsa, 2012.
[5]
S. J. Kwak, S. H. Yoo and J. I. Chang, "The role of the maritime industry in the Korean national economy: an input–output analysis," Marine Policy, vol. 29, pp. 371-383, 2005.
[6]
J. A. Mathews and D. S. Cho, "Tiger technology: The creation of a semiconductor industry in East Asia," Cambridge: University Press, 2007.
[7]
http://en.wikipedia.org/wiki/Samsung_Electronics
[8]
I. Winkler, "Corporate Espionage: what it is, why it is happening in your company, what you must do about it," Prima Pub., 1997
[9]
M. E. Whitney and J. D. Gaisford, "An Inquiry Into the Rationale for Economic Espionage," International Economic Journal, vol. 13, pp. 103-123, 1999
[10]
E. R. Choi, B.G. Song, Y.I. Lee and K.M. Park, "A Study on the Leaking Channels of Industrial Technology," Police Science Institute, vol. 26, pp. 225-259, 2012.
[11]
B. I. Jeong, "A Study for Preventing Industrial Technology Leakage in Enterprise," The Korean Association for Industrial Security, vol.1, pp. 1-19, 2009.
[12]
C. A. Sennewald, Effective security management, Butterworth-Heinemann, 2003.
[13]
A. Hiles, "The definitive handbook of business continuity management," Oxford: Wiley, 2010.
[14]
H. B. Chang and J. H. Song, "The Exploratory Study on the Evaluation of Security System for Industrial Technology Leakage Prevention," The Korean Association for Industrial Security, vol.1, pp. 50-61, 2009.
[15]
J. H. Choi, "A Study on the Institutional Improvement Directions of Industrial Security Programs," Korea Security Science Association, vol. 22, pp. 197-230, 2010.
[16]
B. Robert and C. Lajtha, "A new approach to crisis management," Journal of Contingencies and Crisis Management, vol. 10, pp. 181-191, 2002.
[17]
M. A. Cohen, "Economics of Crime and Punishment: Implications for Sentencing of Economic Crimes and New Technology Offenses," The. Geo. Mason L. Rev., vol. 9, pp. 503, 2000.
[18]
G. Green and R. C. Farber, "Introduction to security," Boston: Butterworths, 1987.
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186