In this study, economy and technology development in South Korea is discussed and a problem that has accompanied the advancement is examined. Industrial technology leakage, which has been increasing in the South Korean society among the nation’s major industry sectors has resulted in immeasurable financial consequences; it can also threaten the country’s status as the world’s leading manufacturer in shipbuilding, semiconductor, and electronics. A total of twelve technology espionage cases, three from each industry, that have received substantial attention by the media and been introduced in the “Technology Leakage Cases and Security Tips” published by the Korean Association for Industrial Technology Security are analyzed in order to find common patterns, actors involved, and characteristics of the leakage activities. The results show that in most cases assessed, a former employee is motivated by the monetary rewards and utilized the external devices to transmit the information. Furthermore, viable policy implications are suggested to provide a possible solution to the problem.
Published in | International Journal of Economic Behavior and Organization (Volume 1, Issue 3) |
DOI | 10.11648/j.ijebo.20130103.11 |
Page(s) | 27-32 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2013. Published by Science Publishing Group |
Technology leakage, Industrial security, Information security, Espionage
[1] | S. H. Jung, "The Korean Development Strategy: Trajectories of the Korean Economic Development, 1961~2010," Journal of the Economic Geographical Society of Korea, vol.14, pp. 453-466, 2011. |
[2] | J. W. Jeon, "A Study on the Measuring of Damage in Technology Leakage," The Korean Association for Industrial Security, vol.1, pp. 20-32, 2009. |
[3] | I. B. Park and J. G. Kim, "A Study on the Policy Management for Industrial Security’s Culture," The Korean Association for Industrial Security, vol. 2, pp. 33-46, 2011. |
[4] | The Korean Association for Industrial Security, Industrial Security, Seoul: Pakyoungsa, 2012. |
[5] | S. J. Kwak, S. H. Yoo and J. I. Chang, "The role of the maritime industry in the Korean national economy: an input–output analysis," Marine Policy, vol. 29, pp. 371-383, 2005. |
[6] | J. A. Mathews and D. S. Cho, "Tiger technology: The creation of a semiconductor industry in East Asia," Cambridge: University Press, 2007. |
[7] | http://en.wikipedia.org/wiki/Samsung_Electronics |
[8] | I. Winkler, "Corporate Espionage: what it is, why it is happening in your company, what you must do about it," Prima Pub., 1997 |
[9] | M. E. Whitney and J. D. Gaisford, "An Inquiry Into the Rationale for Economic Espionage," International Economic Journal, vol. 13, pp. 103-123, 1999 |
[10] | E. R. Choi, B.G. Song, Y.I. Lee and K.M. Park, "A Study on the Leaking Channels of Industrial Technology," Police Science Institute, vol. 26, pp. 225-259, 2012. |
[11] | B. I. Jeong, "A Study for Preventing Industrial Technology Leakage in Enterprise," The Korean Association for Industrial Security, vol.1, pp. 1-19, 2009. |
[12] | C. A. Sennewald, Effective security management, Butterworth-Heinemann, 2003. |
[13] | A. Hiles, "The definitive handbook of business continuity management," Oxford: Wiley, 2010. |
[14] | H. B. Chang and J. H. Song, "The Exploratory Study on the Evaluation of Security System for Industrial Technology Leakage Prevention," The Korean Association for Industrial Security, vol.1, pp. 50-61, 2009. |
[15] | J. H. Choi, "A Study on the Institutional Improvement Directions of Industrial Security Programs," Korea Security Science Association, vol. 22, pp. 197-230, 2010. |
[16] | B. Robert and C. Lajtha, "A new approach to crisis management," Journal of Contingencies and Crisis Management, vol. 10, pp. 181-191, 2002. |
[17] | M. A. Cohen, "Economics of Crime and Punishment: Implications for Sentencing of Economic Crimes and New Technology Offenses," The. Geo. Mason L. Rev., vol. 9, pp. 503, 2000. |
[18] | G. Green and R. C. Farber, "Introduction to security," Boston: Butterworths, 1987. |
APA Style
Yongtae Chun, Ju-Lak Lee. (2013). An Analysis on the Industrial Technology Leakage Cases in South Korea. International Journal of Economic Behavior and Organization, 1(3), 27-32. https://doi.org/10.11648/j.ijebo.20130103.11
ACS Style
Yongtae Chun; Ju-Lak Lee. An Analysis on the Industrial Technology Leakage Cases in South Korea. Int. J. Econ. Behav. Organ. 2013, 1(3), 27-32. doi: 10.11648/j.ijebo.20130103.11
AMA Style
Yongtae Chun, Ju-Lak Lee. An Analysis on the Industrial Technology Leakage Cases in South Korea. Int J Econ Behav Organ. 2013;1(3):27-32. doi: 10.11648/j.ijebo.20130103.11
@article{10.11648/j.ijebo.20130103.11, author = {Yongtae Chun and Ju-Lak Lee}, title = {An Analysis on the Industrial Technology Leakage Cases in South Korea}, journal = {International Journal of Economic Behavior and Organization}, volume = {1}, number = {3}, pages = {27-32}, doi = {10.11648/j.ijebo.20130103.11}, url = {https://doi.org/10.11648/j.ijebo.20130103.11}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ijebo.20130103.11}, abstract = {In this study, economy and technology development in South Korea is discussed and a problem that has accompanied the advancement is examined. Industrial technology leakage, which has been increasing in the South Korean society among the nation’s major industry sectors has resulted in immeasurable financial consequences; it can also threaten the country’s status as the world’s leading manufacturer in shipbuilding, semiconductor, and electronics. A total of twelve technology espionage cases, three from each industry, that have received substantial attention by the media and been introduced in the “Technology Leakage Cases and Security Tips” published by the Korean Association for Industrial Technology Security are analyzed in order to find common patterns, actors involved, and characteristics of the leakage activities. The results show that in most cases assessed, a former employee is motivated by the monetary rewards and utilized the external devices to transmit the information. Furthermore, viable policy implications are suggested to provide a possible solution to the problem.}, year = {2013} }
TY - JOUR T1 - An Analysis on the Industrial Technology Leakage Cases in South Korea AU - Yongtae Chun AU - Ju-Lak Lee Y1 - 2013/08/10 PY - 2013 N1 - https://doi.org/10.11648/j.ijebo.20130103.11 DO - 10.11648/j.ijebo.20130103.11 T2 - International Journal of Economic Behavior and Organization JF - International Journal of Economic Behavior and Organization JO - International Journal of Economic Behavior and Organization SP - 27 EP - 32 PB - Science Publishing Group SN - 2328-7616 UR - https://doi.org/10.11648/j.ijebo.20130103.11 AB - In this study, economy and technology development in South Korea is discussed and a problem that has accompanied the advancement is examined. Industrial technology leakage, which has been increasing in the South Korean society among the nation’s major industry sectors has resulted in immeasurable financial consequences; it can also threaten the country’s status as the world’s leading manufacturer in shipbuilding, semiconductor, and electronics. A total of twelve technology espionage cases, three from each industry, that have received substantial attention by the media and been introduced in the “Technology Leakage Cases and Security Tips” published by the Korean Association for Industrial Technology Security are analyzed in order to find common patterns, actors involved, and characteristics of the leakage activities. The results show that in most cases assessed, a former employee is motivated by the monetary rewards and utilized the external devices to transmit the information. Furthermore, viable policy implications are suggested to provide a possible solution to the problem. VL - 1 IS - 3 ER -