Content area
Full Text
Hyungwook Yang 1 and Hyeri Kim 1 and Hangbae Chang 2
Academic Editor:Naveen Chilamkurti
1, Department of Information Security Management, Sangmyung University, Seoul 110-743, Republic of Korea
2, Department of Industrial Security, College of Business & Economics, Chung-Ang University, Seoul 156-756, Republic of Korea
Received 30 September 2014; Accepted 17 November 2014; 27 September 2015
This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
1. Study Background
In recent years, computing environment is rapidly changing into ICT convergence environment using intelligent sensor network that is a form of convergence of ICT-traditional industry upon converging with various existing industries. For the purpose of gaining competitive advantage in the midst of such environment, companies are seeking corporate informatization innovation [1, 2]. Such innovation is becoming a means of ensuring corporate competitiveness through productivity enhancement and transaction cost reduction by advancing computing environment instead of simple changes in corporate management environment.
In recent years, the change into computing environment that is a means of informatization innovation of companies has become an essential element [3]. In computing environment, a company's core assets need to be safely protected by converting them into information for storage in an intangible state [4, 5]. However, such core assets are being easily leaked outside or to competitors. Such leakage of core asset is not only causing enormous damage to respective company but also affecting industry, society, and nation.
For the purpose of preventing the leakage of core assets that impedes the continuous growth of organization, there have been efforts made to come up with a solution through advancement based on developing technological solution. However, it has come to the point where various forms of the leakage centering on people that are the subject of core asset leakage cannot be solved through technological method. In the case of Korea, particularly, the main causes of technology leakage involve internal leakage by former/current employees that occupies about 80% in addition to external cyber-attack such as hacking and malware. It is also followed by technology leakage by partner companies with a continuous increasing trend of technology leakage resulting from financial allurement and personal profit.
In the midst...