| Peer-Reviewed

An Analysis on the Industrial Technology Leakage Cases in South Korea

Received: 27 June 2013     Published: 10 August 2013
Views:       Downloads:
Abstract

In this study, economy and technology development in South Korea is discussed and a problem that has accompanied the advancement is examined. Industrial technology leakage, which has been increasing in the South Korean society among the nation’s major industry sectors has resulted in immeasurable financial consequences; it can also threaten the country’s status as the world’s leading manufacturer in shipbuilding, semiconductor, and electronics. A total of twelve technology espionage cases, three from each industry, that have received substantial attention by the media and been introduced in the “Technology Leakage Cases and Security Tips” published by the Korean Association for Industrial Technology Security are analyzed in order to find common patterns, actors involved, and characteristics of the leakage activities. The results show that in most cases assessed, a former employee is motivated by the monetary rewards and utilized the external devices to transmit the information. Furthermore, viable policy implications are suggested to provide a possible solution to the problem.

Published in International Journal of Economic Behavior and Organization (Volume 1, Issue 3)
DOI 10.11648/j.ijebo.20130103.11
Page(s) 27-32
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2013. Published by Science Publishing Group

Keywords

Technology leakage, Industrial security, Information security, Espionage

References
[1] S. H. Jung, "The Korean Development Strategy: Trajectories of the Korean Economic Development, 1961~2010," Journal of the Economic Geographical Society of Korea, vol.14, pp. 453-466, 2011.
[2] J. W. Jeon, "A Study on the Measuring of Damage in Technology Leakage," The Korean Association for Industrial Security, vol.1, pp. 20-32, 2009.
[3] I. B. Park and J. G. Kim, "A Study on the Policy Management for Industrial Security’s Culture," The Korean Association for Industrial Security, vol. 2, pp. 33-46, 2011.
[4] The Korean Association for Industrial Security, Industrial Security, Seoul: Pakyoungsa, 2012.
[5] S. J. Kwak, S. H. Yoo and J. I. Chang, "The role of the maritime industry in the Korean national economy: an input–output analysis," Marine Policy, vol. 29, pp. 371-383, 2005.
[6] J. A. Mathews and D. S. Cho, "Tiger technology: The creation of a semiconductor industry in East Asia," Cambridge: University Press, 2007.
[7] http://en.wikipedia.org/wiki/Samsung_Electronics
[8] I. Winkler, "Corporate Espionage: what it is, why it is happening in your company, what you must do about it," Prima Pub., 1997
[9] M. E. Whitney and J. D. Gaisford, "An Inquiry Into the Rationale for Economic Espionage," International Economic Journal, vol. 13, pp. 103-123, 1999
[10] E. R. Choi, B.G. Song, Y.I. Lee and K.M. Park, "A Study on the Leaking Channels of Industrial Technology," Police Science Institute, vol. 26, pp. 225-259, 2012.
[11] B. I. Jeong, "A Study for Preventing Industrial Technology Leakage in Enterprise," The Korean Association for Industrial Security, vol.1, pp. 1-19, 2009.
[12] C. A. Sennewald, Effective security management, Butterworth-Heinemann, 2003.
[13] A. Hiles, "The definitive handbook of business continuity management," Oxford: Wiley, 2010.
[14] H. B. Chang and J. H. Song, "The Exploratory Study on the Evaluation of Security System for Industrial Technology Leakage Prevention," The Korean Association for Industrial Security, vol.1, pp. 50-61, 2009.
[15] J. H. Choi, "A Study on the Institutional Improvement Directions of Industrial Security Programs," Korea Security Science Association, vol. 22, pp. 197-230, 2010.
[16] B. Robert and C. Lajtha, "A new approach to crisis management," Journal of Contingencies and Crisis Management, vol. 10, pp. 181-191, 2002.
[17] M. A. Cohen, "Economics of Crime and Punishment: Implications for Sentencing of Economic Crimes and New Technology Offenses," The. Geo. Mason L. Rev., vol. 9, pp. 503, 2000.
[18] G. Green and R. C. Farber, "Introduction to security," Boston: Butterworths, 1987.
Cite This Article
  • APA Style

    Yongtae Chun, Ju-Lak Lee. (2013). An Analysis on the Industrial Technology Leakage Cases in South Korea. International Journal of Economic Behavior and Organization, 1(3), 27-32. https://doi.org/10.11648/j.ijebo.20130103.11

    Copy | Download

    ACS Style

    Yongtae Chun; Ju-Lak Lee. An Analysis on the Industrial Technology Leakage Cases in South Korea. Int. J. Econ. Behav. Organ. 2013, 1(3), 27-32. doi: 10.11648/j.ijebo.20130103.11

    Copy | Download

    AMA Style

    Yongtae Chun, Ju-Lak Lee. An Analysis on the Industrial Technology Leakage Cases in South Korea. Int J Econ Behav Organ. 2013;1(3):27-32. doi: 10.11648/j.ijebo.20130103.11

    Copy | Download

  • @article{10.11648/j.ijebo.20130103.11,
      author = {Yongtae Chun and Ju-Lak Lee},
      title = {An Analysis on the Industrial Technology Leakage Cases in South Korea},
      journal = {International Journal of Economic Behavior and Organization},
      volume = {1},
      number = {3},
      pages = {27-32},
      doi = {10.11648/j.ijebo.20130103.11},
      url = {https://doi.org/10.11648/j.ijebo.20130103.11},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ijebo.20130103.11},
      abstract = {In this study, economy and technology development in South Korea is discussed and a problem that has accompanied the advancement is examined. Industrial technology leakage, which has been increasing in the South Korean society among the nation’s major industry sectors has resulted in immeasurable financial consequences; it can also threaten the country’s status as the world’s leading manufacturer in shipbuilding, semiconductor, and electronics. A total of twelve technology espionage cases, three from each industry, that have received substantial attention by the media and been introduced in the “Technology Leakage Cases and Security Tips” published by the Korean Association for Industrial Technology Security are analyzed in order to find common patterns, actors involved, and characteristics of the leakage activities. The results show that in most cases assessed, a former employee is motivated by the monetary rewards and utilized the external devices to transmit the information. Furthermore, viable policy implications are suggested to provide a possible solution to the problem.},
     year = {2013}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - An Analysis on the Industrial Technology Leakage Cases in South Korea
    AU  - Yongtae Chun
    AU  - Ju-Lak Lee
    Y1  - 2013/08/10
    PY  - 2013
    N1  - https://doi.org/10.11648/j.ijebo.20130103.11
    DO  - 10.11648/j.ijebo.20130103.11
    T2  - International Journal of Economic Behavior and Organization
    JF  - International Journal of Economic Behavior and Organization
    JO  - International Journal of Economic Behavior and Organization
    SP  - 27
    EP  - 32
    PB  - Science Publishing Group
    SN  - 2328-7616
    UR  - https://doi.org/10.11648/j.ijebo.20130103.11
    AB  - In this study, economy and technology development in South Korea is discussed and a problem that has accompanied the advancement is examined. Industrial technology leakage, which has been increasing in the South Korean society among the nation’s major industry sectors has resulted in immeasurable financial consequences; it can also threaten the country’s status as the world’s leading manufacturer in shipbuilding, semiconductor, and electronics. A total of twelve technology espionage cases, three from each industry, that have received substantial attention by the media and been introduced in the “Technology Leakage Cases and Security Tips” published by the Korean Association for Industrial Technology Security are analyzed in order to find common patterns, actors involved, and characteristics of the leakage activities. The results show that in most cases assessed, a former employee is motivated by the monetary rewards and utilized the external devices to transmit the information. Furthermore, viable policy implications are suggested to provide a possible solution to the problem.
    VL  - 1
    IS  - 3
    ER  - 

    Copy | Download

Author Information
  • Dept. of Security Management, Kyonggi University, Suwon, South Korea

  • Dept. of Security Management, Kyonggi University, Suwon, South Korea

  • Sections