An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage

Chi-Seok Lee, Yanghoon Kim

Abstract


Current leakage of industrial technologies with revealing state secret against nation is gradually increasing and scope of the spill is diversified from technology-oriented leakage to new economic security sector like information and communication, electrical and electronic, defense industry, illegal export of strategic material, economic order disturbance by foreign country, infringement of intellectual property, etc. So the spill damage can affect not only leaked company but also national interests and entire domestic industry. According to statistics from National Industrial Security Center of National Intelligence Service, a major cause of technology leakage is not only by external things about hacking and malignant code, but internal leakage of former and current employees account for about 80%. And technology leakage due to temptation of money and personal interests followed by technology leakage of subcontractor is steadily increased.
Most studies in the field of security have tended to focus on measuring security capability of company in order to prevent leakage core assets or developing measurement Indicators for management rather than security activities of the company members that is most important. Therefore, this study analyzes the effect of most underlying security education in security activities on security capabilities of enterprise. As a result, it indicates that security education have a positive(+) correlation with security capabilities.


Full Text:

PDF

References


Ahn, J. H., Park, J. H., Sung, K. M., and Lee, J. H., “Impacts of Punishment and Ethics Training on Information Security Compliance: Focus on the Moderating Role of Organizational Type,” Information Systems Review, Vol. 12, No. 1, pp. 23-42, 2010.

Albrechtsen, E., “A qualitative study of users’ views on information security,” Computers and Security, Vol. 26, No. 4, pp. 276-289, 2007.

Bae, Y. S. and Chang, H. B., “A Qualitative Research on ICT Policy Design for Small and Medium Business,” The Journal of Society for e-Business Studies, Vol. 18, No. 1, pp. 57-70, 2013.

Cha, I. H., “Development of Personnel Security Management for Protection against threat,” The Journal of The Korea Institute of Electronic Communication Sciences, Vol. 3, No. 4, pp. 221-232, 2008.

Chang, H. B. and Kim, K. K., “Design of Inside Information Leakage Prevention System in Ubiquitous Computing Environment,” Lecture Notes in Computer Science, Vol. 3483, pp. 128-137, 2005.

Cho, M. K., Kim, S. C., Hwang, J. M., and Kim, S. C., “A Study on the Effect of Institutionalization of the Security Education: Survey of National R&D Projects,” The Journal of Korean Association of Computer Education, Vol. 17, No. 2, pp. 21-29, 2014.

Choi, J. H., “A Study on the Institutional Improvement Directions of Industrial Security Programs: Focused upon Policies and Practices in the U.S,” Korea Security Science Association, Vol. 22, pp. 197-230, 2010.

Choi, M. G., Jeong, J. H., and Kim, J. H., “A Study on the Effects of the Security Perceptions of Top Managers and the Education on the Business Performances,” Asia Pacific Journal of Small Business, Vol. 36, No. 2, pp. 209-226, 2014.

Choi, S. T. and Yu, H. C., “A Study on the Establishment of Industrial Security Education Programs in Korea,” Korea Security Science Association, Vol. 25, pp. 185-208, 2010.

Kang, J. G., Lim, J. H., Lee, H. J., and Chang, H. B., “A Study on Classification of Information Asset Considering Business Process Characteristics for Small IT Service Organization,” The Journal of Society for e-Business Studies, Vol. 16, No. 4, pp. 97-108, 2011.

Kim, Y. H. and Chang, H. B., “Human centric security policy and management design for small and medium business,” Security and Communication Networks, Vol. 7, No. 10, pp. 1622-1632, 2014.

Kim, Y. H., Moon, J. W., Hwang, S. H. Chang, H. B., “A study on Method of Security Management in the ICT Outsourcing Environment,” Review of Korea Institute of Information Security and Cryptology, Vol. 24, No. 1, pp. 23-31, 2014.

Moon, H. J., “A study on the system and problems of educational training for developing competency of small & medium enterprise in Korea,” Review of Korea Institute of Information Security and Cryptology, Vol. 19, No. 1, pp. 29-39, 2009.

National Intelligence Service, “Industrial technology protection: trace for 5 years gone by,” High Industrial Technology Trend, Vol. 9, pp. 8-145, 2008.

No, M. S. and Lee, S. Y., “Explaining Industrial Security of SMEs in Korea: An Ordered Logit Analysis,” The Journals of Korean Public Administration Review, Vol. 44, No. 3, pp. 239-259, 2014.

Yoo, J. H. and Chang, H. B., “Public IT service strategy for social information security in the intelligence all-things environment,” Electronic Commerce Research, Vol. 14, No. 3, pp. 293-319, 2014.


Refbacks

  • There are currently no refbacks.