1. Introduction
Environments based on information and communications technology have widely incorporated innovative technologies in different business industries. As network connectivity has expanded, it has become necessary for industries to adopt information technology, compelling many organizations in various fields to continuously develop. In the computing environment, network connectivity functions have largely expanded in terms of their range and depth, which has enabled organizations to better collaborate and create new value through information-sharing. However, such connections can increase the possibility of security breaches [1] and therefore should be carefully considered from a security perspective. Devices involving the Internet of Things are particularly vulnerable to security attacks owing to their insufficient support for advanced cryptography mechanisms, cyber-attacks and low computational power, among other issues [2,3].
The number of technology leaks has also increased in South Korea, along with the magnitude of damage from such incidents. According to the Ministry of SMEs (small and medium-sized enterprises) and Start-ups in South Korea, sustainable business growth has been constrained owing to various technology leakage incidents, which have caused substantial damage [4], as illustrated in Table 1. As a country with relatively few natural resources, South Korea has increased its national competencies in cutting-edge technology to position new technology as a stable growth engine. To accomplish this goal, an environment should be established to safely secure state-of-the-art industrial technology [5].
Economic power is the most important factor globally for nations to exert influence and establish their international superiority in modern society; further, industrial competitiveness is a main factor supporting this economic power. Many countries are actively conducting economic counter-intelligence activities, as weaknesses in industrial competitiveness impact core values, and industrial security is a method of protecting and enabling the sustainable growth of economic power. The worldwide status of and trends in the continuous development of industrial security must be recognized in order to create an advantage over other nations.
As technological security becomes more important, organizations have attempted to increase awareness of this issue while struggling to implement countermeasures. Although studies of industrial security have expanded, researchers have yet to examine the trends and research directions involving industrial security. Further, a comparison with international studies and an understanding of global research trends in industrial security are necessary in order to develop these technologies and compete in a globalized society. Therefore, this study aims to analyze the diverse works on industrial security in South Korea from different perspectives and compare these to research works conducted internationally.
2. Literature Review
2.1. Industrial Security and Its Characteristics
Industrial security is defined as a comprehensive effort to protect economic activities from criminal behavior; it specifically involves asset protections—securing industrial assets from illegal acts—and loss prevention—preventing damage to such assets [6]. Jeon and Chang [7] argues that, in a narrow sense, industrial security protects the core technologies of an organization; broadly, it includes the security processes reflecting each industry’s business characteristics. Accordingly, the current study defines industrial security as protecting both the economy and technology. It is internalized in organizations’ products or services, such as research and development output, design and manufacturing information, production equipment and personnel. Industrial security differs from information security in that the latter is limited to electronic information, while the former involves the protection of information as well as its critical elements [8]. As previously mentioned, information and technology leaks occur frequently and can significantly damage the targeted organizations. Traditionally, technical issues have been the main consideration in security; however, purported “human” and “organizational” issues have recently become items of discussion [9], further highlighting the importance of a human-centric security perspective. “People” have been increasingly recognized as a primary consideration; this clearly indicates that insiders—rather than people outside the organization—tend to cause technology leaks.
Insider threats are defined as threats posed by people who have the right to access information systems and can misuse this privilege [10]. An information security forecast from Igloo Security [11], an information security corporation based in South Korea, argues that the risk of insider threats will continuously increase owing to “frenemies”—a combination of “friend” and “enemy”—in that insider information leaks and their associated levels of risk will increase as the mobile office environment develops.
This prominent problem notwithstanding, industrial security technology leaks are characterized by two main features. First, it is difficult to perceive whether a security incident has occurred at all, as the leaked information remains with the owner instead of disappearing. Any intrusion or technology leak is difficult to detect, as detection efforts require coordination among multiple stakeholders to include a well-organized detection system and corresponding technology [12]. Additionally, diverse industry fields have experienced intrusions or threats to their control systems, and this number continues to grow, while preventative security mechanisms are frequently insufficient to deter these attackers [13]. These issues emphasize that, on the one hand, detecting incidents is challenging; on the other hand, actual information infringement or leakage behavior can easily occur. Understandably, a case investigation can only proceed after an information technology leak is actually observed.
Second, although security incidents are rare, they create significant impacts. Technology leaks can critically damage organizations’ competitiveness while generating serious economic damage [14]. Organizations experiencing security incidents face direct economic losses [15] owing to the unavailability of work; ultimately, this significantly degrades the future value represented by intangible assets such as reputation, brand image and customer trust [16]. Restoring value is difficult once an information technology leak occurs, which highlights the importance of proactive prevention. When we consider unreported or undiscovered incidents—purported “hidden crimes” or “dark figures”—we find that internal information technology leaks actually occur much more frequently than those reported in official announcements [17]. This raises questions regarding the reliability of official crime statistics [18]. Moreover, technology leaks that occur domestically may spread internationally owing to a lack of reporting. Meanwhile, cyber-attacks have recently evolved into full-scale cyber-technology leaks; for example, HSBC Bank notified its customers in November 2018 that they had detected an unauthorized access to users’ online accounts. The crisis was assumed to have occurred through “credential stuffing”, in which hackers steal passwords from other websites and use them on banking websites [19]. As this case indicates, the emergence of security threats coincides with information technology leaks, which emphasizes the need for both awareness and countermeasures.
2.2. Technology Leakage Incidents
Technology leaks refer to the stealing and hiding of confidential assets with economical or industrial value, such as trade secrets or ownership information. Three technology leakage methods have been identified based on the degree of technology used in conducting the crime: no-tech, low-tech and high-tech. Although these terms were originally used in the special education [20] and communications fields [21], this study adapts these to establish an operational definition (Table 2) and define leakage methods.
Corporation A, a producer of household appliances in South Korea, developed its own technology in 2009 after several years of effort and financial support amounting to 16 million dollars from the government. However, some retired employees stole confidential data through low-tech methods, such as USB memory sticks and external hard drives. They tried to sell this information to foreign companies for approximately six million dollars, but this illegal trade was exposed during the price-negotiating process and raised awareness of organizational security [22]. No-tech leakage incidents have also occurred in the display industry. Corporation B intended to establish a manufacturing factory overseas but needed highly skilled manpower trained in manufacturing thin-film-transistor liquid-crystal displays (TFT-LCDs). They scouted for skilled personnel then employed by Corporation C by offering higher salaries. The employees they hired from Corporation C then smuggled TFT-LCD manufacturing technology using personal hard drives. Corresponding technology was developed with investments of approximately 305 million dollars to bridge Corporation B’s technical gap within several years. One suspect was apprehended in the off-boarding process, and all of the technological data were confiscated [22]. This incident illustrates how employees can be corrupted and demonstrates their lack of ethical awareness as corporations persistently attempt to lure employees.
2.3. Industrial Security Countermeasures in South Korea
As a way of revitalizing the economy, South Korea has invested in developing a venture-based industry and pioneered a new technology-industry market, resulting in the growth of semi-conductors and displays, among other technologies. Meanwhile, global competitors have limited growth opportunities with domestic corporations, leading to increased attempts to steal domestic innovative technologies through multiple illegal means. These increasing security threats have created the need for organizations to undertake industrial technology security activities against espionage, leading to the concurrent implementation of security systems.
South Korea adopted a trade secret protection system by revising its Unfair Competition Prevention Act in December 1991, which reinforced its laws on trade secret leaks. Enacting this legislation also promoted diverse industrial technology security activities: developing and managing the protection of major technologies by designating them as national core technologies, increasing funds for technology protection equipment and infrastructure and operating remote-controlled security centers to prevent leaks among SMEs. Educational programs to increase security awareness were also offered in the country’s Guidelines for Industrial Technology Security. Finally, the Korean Association for Industrial Technology Security (KAITS) was launched. Table 3 presents the details of these countermeasure systems and provides a comparison with those in the United States [22].
National-level legislation was also enacted to define related regulations that correspond to the Economy Espionage Act in the United States; specifically, the Act on the Prevention of Divulgence and Protection of Industrial Technology was enacted so as to secure superior technology and simultaneously prevent illegal outflows in order to ensure the sustainable growth of the national economy. This legislation also specifies the application target of industrial technology [23] and aims to provide a legal device to deter foreign corporations’ legal mergers and acquisitions (M&A). The Act on Support for the Protection of Technologies of Small and Medium Enterprises was enacted to systematically protect technologies and support SMEs, which are especially vulnerable to technology leaks, as most have weak technology-protection capacities [24].
Aside from the law, as previously mentioned, specialized agencies have also been proactive: the diverse and substantial work of the KAITS included developing and collaborating on policies, spreading information on industrial technology leaks abroad and preventing industrial technology leaks through education [22]. One objective of establishing the KAITS was to facilitate collaboration between the government and civil organizations; the agency also manages a specialized certification system for industrial security experts to develop a specialized workforce [25]. Furthermore, academic foundations have been established and thoroughly examined, as departments (majors) were newly organized to systematically develop studies in this field. Industrial security is characterized by its strong operational convergence, which justifies the establishment of university departments to cultivate industrial security experts. The Korean Association for Industrial Security was also established to revitalize systematic, integrated research in industrial security. This organization aims not only to build industrial security as a discipline but also to support national economic growth, increase corporations’ competencies and promote the internationalization of industries related to industrial security.
3. Research Methodology
This study conducts a dual meta-analysis of research conducted in South Korea and in other countries. This section first introduces the method for collecting relevant resources and data. Correlations between the selected data and keywords’ frequency, degree of centrality and betweenness centrality are examined to determine the relevant keywords’ relationships and characteristics.
3.1. Research Procedure
First, prior research on industrial security and related issues was analyzed. Data on relevant legislation and activities were then collected and assessed to clarify the current status of industrial security. Second, inclusion criteria were set to select accurate, meaningful data. Subsequently, selected data were identified and refined. After the final data selection, meta-analyses were conducted with Netminer V.4, which is commonly used for social network analyses. Using this software, we extracted the keyword frequency, degree of centrality and betweenness centrality to analyze the characteristics of—and relationships among—the relevant keywords. The South Korean and international data were separately examined to satisfy this study’s objective. Finally, comparisons and common considerations were analyzed to provide a central perspective on industrial security. Figure 1 below illustrates the research methodology.
3.2. Identification of Resources
First, this study considered research in South Korea by utilizing mainstream electronic academic databases, such as the National Digital Science Library and the Korean Studies Information Service System, and included specific journals, such as the Korean Journal of Industrial Security, Journal of Convergence Security and Korean Security Journal. Regarding international research, mainstream electronic academic databases were used—specifically, Web of Science, Springer, and Google Scholar—including the Security Journal and the Journal of Applied Security Research. Both data sets include five years of studies published from January 2014 to December 2019. The following inclusion criteria were used:
(a). The studies were empirical;
(b). They were available in either English or Korean;
(c). They addressed security in an industrial context;
(d). They were primarily conducted within the business, economics, psychology, legal, regulation, or educational fields.
Keywords regarding publication and document types were limited to journal articles. The search keywords included a combination of “industrial technology”, “technology leakage”, “research security” and “corporate security”.
The exclusion criteria for the selection of studies were as follows:
(a). Systematic reviews and/or meta-analyses;
(b). Theses/dissertations.
3.3. Data Refinement
General verbs, unrelated nouns and prepositions were first excluded. Similar keywords, such as “leak” and “leakage”, were considered synonyms. Abbreviations were also regarded as synonyms, such as “IS” and “industrial security”, “HR” and “human resources” and “SMEs” and “small and medium-sized enterprises”. Finally, plural nouns were treated together with their singular forms, such as “experts” and “expert”. Keywords that satisfied the inclusion criteria were used to search the databases; consequently, 125 journal articles were found for South Korea and 19 journal articles for international journals. The data selection process was adapted from the Preferred Reporting Items for Systematic Reviews and Meta-Analysis, which is known as PRISMA flow diagram [26], as illustrated in Figure 2.
4. Meta-Analysis Results
As mentioned in Section 3, this study has two research objectives that involve meta-analysis: to analyze and compare the trends and status of journals related to industrial security. Figure 3 displays the research trends in the industrial security field as well as the frequency of published papers by year in South Korea. We have analyzed the data manually by collecting and counting papers which were published during 2014–2019. Subsequently, we gathered the opinions from industrial security experts and conducted a classification. The left panel (Figure 3a) illustrates the research trends classified by area: business/economics, engineering, legal/regulations and psychology. Legal/regulations comprises the largest portion of all trends, or 34%; this reveals the importance of enacting industrial security-related laws. Psychology is ranked second at 25%, which indicates the increased number of security incidents related to human factors. This is followed by business/economics, which indicates industrial security needs in the business field—including industrial or core technologies—and represents the importance of the economic benefits gained from protecting technologies. Finally, engineering is ranked last, as technical or information-related security is considered “information security”, which significantly differs from industrial security. The literature lacks well-defined concepts for each term [7], although studies focusing on the differences in these definitions have increased as industrial security research has expanded, providing corresponding results. The right panel of the figure (Figure 3b) illustrates the frequency of industrial security research published by year.
Figure 4a displays the changes in the number of published papers by research area. The right panel (Figure 4b) shows the number of published papers each year by research area in detail.
The significance for measuring relation of different keywords is that by recognizing the relationships between keywords which consists sentence and paragraph, leading to context of whole paper, can identify what certain keywords has co-appeared or formed relations. In order to identify relation of keywords, Netminer was utilized but moreover, this study considered a concepts of Semantic relations. It is classified into five families in large which are Contrasts, Class Inclusion, Similars, Case relations and Part-wholes [27]. The concept of Similars, Class Inclusion, Case relations and Part-wholes when considering a keyword relationships. Similars refer to consisting of terms which overlap in denotative, connotative meaning or both; for example, “laugh-smile”. Class Inclusions is a relations involving oner term whose denotative definition subsumes that of the other term as in “animal”-“horse”. Case relations has been largely used in network models of propositional knowledge as it refers to being involved in attribution or predication, for example, “dog”-“bark”, “cut”-“knife”. Lastly, Part-wholes refers to inclusion for pragmatic as in “sofa”-“living room”, “tree”-“forest” [27]. We intended to identify keyword relevance in word sense and appearance degree by incorporating the concept of semantic relations between keywords and utilize Netminer.
4.1. Case Analysis Results: South Korean Research
4.1.1. Keyword Frequency and the Degree of Centrality
Keyword frequency is considered by the appearance degree in document. It referred as a density of association; the higher the density of association, the higher the appearance of related keywords. Figure 5 illustrates the keyword frequency, with the most frequently used keyword being “industrial technology leakage”—an issue often encountered in industrial security. “Trade secret” is the next most frequent keyword, which indicates the industry’s emerging need to defend against illegal security incidents as well as the importance that South Korea places on the associated laws and regulations to handle the issue on a global level. This is followed by “industrial education”, or education in terms of both providing a well-constructed curriculum and relevant security-related programs. Next, “management” refers to organizations’ need for security management at the employee and executive levels. “Industrial technology” and “convergence security” follow, which refer to the stability and importance of tackling industrial security issues. Then, “compliance” demonstrates the importance of organizational members’ participation in industrial security. “Prevention” and “strategy” follow, which indicate the importance of identifying preventive countermeasures. “Awareness” represents the overall knowledge regarding industrial security that can help deter problematic security incidents, such as insider threats. The “training” of industrial security experts or employees is also an important keyword. Finally, the keyword “security crisis level” reveals that the industrial security field largely includes studies on how to properly evaluate levels of security.
The degree of centrality refers to the influence between keywords [28] and measures the centrality based on the connectivity around a node. Node in degree centrality refers to the number of connection of connection between each node [29] and therefore, appropriate for measuring a direct effect of each node [30]. This analysis present not only which node has the most connection within the network, but also shows node’s distance from the center [31]. Table 4 displays the in-degree of centrality scores. The value varies from 0 which refers to non-central to 1 which indicates more-central [32]. The average value of node was deduced as 0.006 and the highest value was drawn as 0.089.
Concentric map shows a visualization of analysis result of degree of centrality which presents a frequency and importance of keywords within the collected literature beforehand [33,34,35]. Figure 6 below partially shows a result for specific explanation and the full concentric map is presented in Figure A1 in Appendix A. In this study, a concentric map was visualized by applying Kamada and Kawai’s algorithm and intends to find which node is carried out as a key node and figure the correlation between each nodes. The size of a node is determined by the degree of centrality of each keywords [36] and moreover, is located in center part as certain keyword has a high appearance or high degree of centrality [35].
The result of degree of centrality for South Korean research showed that “technology leakage”, “trade secret”, “industrial technology” was located near the main center part, which demonstrates that the mainly conducted research topic in South Korea was related to security incidents including technology leakage incidents, trade secret and data breach [37,38,39,40,41]. Also, this keyword group shows that among various assets owned by corporations, technology is considered as the highest protection target and conduct security activities accordingly. Following nodes were resulted as “industrial security crime”, “insider threat”, “Unfair competition prevention and trade protection act”, “convergence security”. As shown on Figure 6, the frequency of appearance and location of each node supports the detailed classification of academic field, which are security psychology, security engineering, security legal/regulations and security business/economics [5]. Specifically, “industrial crime” which represents security psychology, explains that researches of drawing a measures to overcome security vulnerabilities resulted from organization members’ psychological weakness [42] through not only technical security but also by performing a human-centric security is largely conducted as the definition of information security and industrial security was established [7] in industrial security field of South Korea [43,44]. Moreover, the result shows that malicious attack and espionage is considered as an act of crime in South Korea, also reflecting the frequent attention toward four related laws which is to be mentioned later. The next frequently appeared keyword was “insider threat”, which represents security engineering, showed that traditional security activity focused on counteracting against security incidents at the boundary of organizations’ inside and outside. This led to the limitation of recognizing insider threat which is reported to occur a lot more than attack from outside [45,46,47]. Furthermore, it reflects current direction of security incidents is arising from insiders attempt to breach security, information rather than attack from outside. “Unfair competition prevention and trade protection act” which presents security legal/regulations indicates that institutional ways of providing security infrastructure establishment for corporations in South Korea against industrial espionage as technical competitiveness improves and advocate for technology development expand. This also shows the increase in the enactment of related laws and regulations as South Korea developed and secured a leading technique [48,49]. There are mainly four related laws which are Act on Prevention of Divulgence and Protection of Industrial Technology, Unfair Competition Prevention and Trade Secret Protection Act, Act on Support for Protection of Technologies of Small and Medium Enterprises and Defense Technology Security Act, and the analysis result indicates that among four related laws, Unfair Competition Prevention and Trade Secret Protection Act is the most used and referred law. Lastly, security business/economics was not clearly clarified as a keyword however, “convergence security” emerged in light of research trend which pursue sustainable business environment and create profit by establishing enterprise-wide security management solutions and system [50,51,52]. This indicates security solutions and activities should not be limited in technical security, but integrate and make a connection between technical security and administrative security. In addition, while cyber attack from outside is counteracted with digitalized countermeasure, insider attack should be dealt with a collaboration of countermeasure. For instance, conducting DB security solely cannot prevent security incidents and instead, cooperation work of DB security, document security and network security is required. Accordingly the analysis reflects a frequent occurrence of “convergence security” as a need for collaboration of each countermeasures.
4.1.2. Betweenness Centrality
The betweenness centrality represents the extent to which a node acts as an intermediary when establishing a network with another node [36]. Accordingly, a greater betweenness centrality implies a greater connection to sub-topics and thus the ability to be extended to other topics [53]. It also measures a particular node’s extent of involvement, as illustrated in Figure A2 in Appendix A. The distance between nodes explains the extent of degree; the shorter the distance, the stronger the connection of each nodes [54]. Node with high betweenness centrality plays a role of bridging from one to other node and as a keyword appears in shorter route, it becomes higher level of centrality. Since node of high betweenness centrality can control the information flow, corresponding node will immensely affect in overall connection and communication flow [30]. Betweenness centrality is visualized as spring map which is presented in Figure 7 partially. The original map image is provided in Figure A2 in Appendix A and recommended to refer to Figure A2.
As higher nodes tend to be located in the center, Figure 7 explains that “technology outflow”, “industrial technology protection”, “industrial security crime”, “Unfair competition prevention and trade protection act”, “organizational culture”, “industrial security-related organization” are highly connected to each keyword and the result demonstrates that corresponding words and related issues have been prominently recognized in the academic arena. Specifically, a connected node between “industry-related organization”, “Will of compliance” and “organizational culture” in Figure 7, reflects that organizations’ foremost target to protect is the organization in other words, human-centric security rather than encryption against cyberattack. Accordingly, related keywords were drawn as enhancing a security awareness to establish protected organizational culture and guide organization members to spontaneously raise will of compliance toward organization security overall. A security culture must be established to internalize security awareness throughout an entire organization; accordingly, studies on security culture are gaining importance [55,56,57,58], supporting the emergence of an “organizational culture”. Therefore, outflows of industrial technology continuously increase with the high presence of “industrial espionage”.
Component dendrogram, also known as tree diagram, marks the level of similarity among formulated nodes and the relation between each keywords can be statistically supported by dendrogram [59]. It includes a keyword network and a type of cluster analysis that repeatedly clusters after measuring similarities based on the patterns of formulated connections between the nodes [36]. Formulated connections refer to when certain word is used, the other, which is connected to the particular word, tends to appear at the same time frequently [59]. The dendrogram chart presented in Figure 8 indicates that the number of clusters decreases as the level of merging increase; specifically, it displays each node’s clustering process, which also represents each node’s cohesion. Component refers to the sub-network or sub-groups of nodes that use indicators. It demonstrates cohesiveness by binding the maximum number of nodes [53].
The result identified the pairs of [data, counterplan, leakage, protection], [competition, act, prevention, protection, secret, trade] which is a combination of cluster and word and [expert, education, convergence, certificate, security…] as a main pairs. Figure 8 is an image of particular part extracted from the original result for clarified visualization. The original dendrogram result is presented in Figure A3 in Appendix A. The first pair which refers to Figure 8a, indicates not only technology but also leakage incident continuously occurs and therefore need a protection toward organizations’ assets. Also, in the field of industrial security, the appearance of “protection” and “counterplan” is reasonable, but the appearance of keyword “data” was notable. It can be construed as unlike information security which territory-centric, industrial security focuses on the needs of data-based security system. Second pair which refers to Figure 8b indicates that securing industrial technologies and developing a counterplan have a similar contextual meaning to enacting acts or laws to prevent leakage incidents. The term protection refers to a proper noun particularly used in the law, not a repetition of the other “protection” appeared in previous pair. Moreover, “trade” and “secret” was the most appeared keywords which indicates the importance of technology transfer and confidential management which lead to the practice of technology transfer based on agreement with each interested parties under secured environment. Last main cluster form which is presented in Figure 8c shows that many industrial studies focus on security education, as the importance of creating experts to proactively response against leakage incidents is being stressed which meets the intention of conducting this research. It also emphasizes that the research topics focuses on aligning security with business and conduct converged countermeasures and particularly suggest the necessity of security education for cultivating security experts.
4.2. Case Analysis Results: International Research
As Figure 2 indicates, industrial security research was insufficient based on the inclusion criteria set in this study; only 19 studies qualified as eligible. Accordingly, the extracted articles’ keyword frequency was first analyzed, followed by brief analyses of the degree of centrality and betweenness centrality. Additionally, the initial records, before any exclusions, incorporated inclusion data; based on this, most research included topics such as “physical security”, “private security” and “guards”. Figure 9 displays the keyword frequency, where “crime” is ranked the highest. Keywords such as “crime”, “attack” and “victimization” indicate that many studies perceive security as simply a countermeasure for crime and fraud and as an act that involves guarding against these.
The results imply that “crime” has a highly relevant relationship with security as illustrated in Figure 10. Various keywords, such as “theft”, “victimization”, “burglary”, “airport” and “guardianship”, represent the perspective toward security, in which a systematic concept for and range of industrial security has not yet been established. With “security” and “crime” as the highest nodes, “evidence”, “regulation” and “attack” share a common relativity. These results also reveal that international studies reflect physical and private security as a part of industrial security, which must be distinguished and considered separately. This also addresses the scarcity of industrial security-related research.
4.3. Comparison of Case Analyses
The most prominent feature in comparing the characteristics among these trends was the different perspectives considering technology leaks. As previously mentioned, far more articles from South Korea satisfied this study’s inclusion criteria than those in international journals. The two groups’ most frequent keywords also differed. Keywords that commonly appeared in both journals were “law”, “regulation” and “management”; this demonstrates the importance of legislation or regulations in ensuring effective and robust industrial security. In South Korea, keywords such as “technology leakage”, “trade secrets”, “industrial technology” and “industrial security education” were common, which indicates that the consideration of technology leaks originates with the “security” concept itself. This confirms the current status of industrial security in South Korea: the nation considers technology leaks as threats to assets and as threats to national competitiveness that should be addressed through a security system involving technical, administrative and physical security. By contrast, international journals consider technology leaks as crimes, as reflected by the most frequently related keywords in international journals: “crime”, “attack”, “fraud”, “victimization” and “evidence”. These words indicate a contrast to the case of South Korea, where industrial security is distinct and regarded as a separate academic field from crime and physical security. The research trends mentioned in this section are summarized in Table 5 below.
Additionally, multiple security-related disciplines are being investigated in South Korea. Diverse studies have largely incorporated security in the business/economics, legal/regulation, engineering and psychology fields. The meta-analysis results revealed that the business field tends to focus on evaluating levels, management systems and the cultivation of manpower in detail, while engineering focuses on control systems, sign predictions and digital forensics. The primary “industrial security” keywords were manifested in our results as “industrial technology leakage”, “trade secrets”, “industrial security education” and “management”. These not only reflect the importance of the current industrial security aspects but also reveal the existence of studies on the detection of various security incidents, such as technology leaks. Additionally, training manpower as a countermeasure to defend against threats and security attacks can sustain an organization’s well-being and thus the nation’s sustainable growth.
5. Conclusions
In this rapidly changing world, in which state-of-the-art technology has become an important asset, risks and security threats have become crucial global challenges for organizations. Accordingly, efforts to secure these assets have grown, which has led to a recognition of the importance of industrial security. South Korea’s industrial security field has also significantly expanded in recent years; a national university curriculum has been established, and organizations are prioritizing their security. This study examined the current status of industrial security in South Korea as a prominent, emerging industry, and compared it with the global level. The results revealed that a significant amount of academic research on industrial security has been published in South Korea, while the worldwide perspective has focused more on the broader concept of security, including information security. Further, searches for academic journal articles with the keyword “industrial security” revealed that private security is also a major focus. This made it difficult to find any study that particularly focused on industrial security, which reflects the major gaps between the two groups and the lack of a fundamental concept of industrial security.
This study contributes to the current literature by identifying not only the status of industrial security worldwide but also the issues and trends surrounding industrial security. It aims to raise awareness regarding industrial security’s importance in protecting organizations’ assets, which are essential for stable management and facilitate long-term sustainable growth. However, this study is limited by the few suitable articles used to provide an analysis from an international perspective. Thus, future researchers should include more articles in their reviews. Moreover, while the terms using the Korean language were translated as accurately as possible into English, all researchers could not agree on the terms used given the language differences that exist. Consequently, future research should outline definitions for specialized terms in Korean to further clarify the context.
Author Contributions
Conceptualization, H.Y. and H.C.; methodology, H.Y. and H.C.; investigation, H.Y.; resources, H.Y.; writing—original draft preparation, H.Y. and H.C.; writing—review and editing, H.Y. and H.C.; visualization, H.Y. All authors have read and agreed to the published version of the manuscript.
Funding
This research received no external funding.
Acknowledgments
This paper was supported by Korea Institute for Advancement of Technology (KIAT) grant funded by the Korea Government (MOTIE) (P0008703).
Conflicts of Interest
The authors declare no conflict of interest.
Appendix A
Figure A1
Concentric map of the degrees of centrality.
[Figure omitted. See PDF]
Figure A2
Spring map of the betweenness centrality.
[Figure omitted. See PDF]
Figure A3
Component dendrogram.
[Figure omitted. See PDF]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Figures and Tables
Figure 3. Status of industrial security research (2014–2019). (a) Research trends by area; (b) Publication of frequency by year.
Figure 4. Industrial security research areas (2014–2019). (a) Changes in number of published papers by research area; (b) Research areas in detail.
Figure 8. Component dendrogram(partial). (a) Data protection subgroup; (b) Trade secret prevention and protection subgroup; (c) Security education subgroup.
Figure 10. Results of international research. (a) Concentric map of the degree of centrality; (b) Spring map of the betweenness centrality.
Status of technology leakage incidents in small and medium-sized enterprises (SMEs) (2013–2018).
| Area | 2013 | 2014 | 2015 | 2016 | 2017 | 2018 | Total |
|---|---|---|---|---|---|---|---|
| Number of damaged organizations | 155 | 63 | 59 | 52 | 52 | 32 | 413 |
| Total amount of damage (in USD) | 199 M | 105 M | 74 M | 90 M | 84 M | 92 M | 646 M |
| Damage per incident (in USD) | 1.2 M | 2 M | 1 M | 1.5 M | 1 M | - | 7 M |
Operational definition of technical methods by degree.
| Term | Definition | Example |
|---|---|---|
| No-tech | Technology leaks occur through deception and the use of power or status, with no use of technology in cyberspace | Spear-phishing |
| Joint ventures | ||
| Low-tech | Technology leaks occur through low degrees/levels of technology, such as installing programs | Screenshots |
| Key-logging | ||
| USB memory sticks | ||
| Hard disk drives | ||
| High-tech | Technology leaks occur through high degrees of technology, such as targeting internal or external vulnerabilities | Persistent threats |
| Dark web | ||
| Cloud services | ||
| Steganography |
Comparison of technology leakage countermeasure systems.
| Purpose | Relevant Institutions | |
|---|---|---|
| South Korea | United States | |
| Policy establishment and execution (preventing leaks) | (Government) Ministry of Trade, Industry and Energy |
(Government) Office of the United States Intellectual Property Enforcement Coordinator; The Committee on Foreign Investment in the United States |
| Dispute conciliation institution (conflict resolution for technology leakage) | Committee of Dispute Conciliation for Industrial Technology (affiliated with the Ministry of Trade, Industry and Energy) | - |
| Countermeasures for illegal leakage (detection and investigation of leaked information) | National Intelligence Service (National Industrial Security Center), Public Prosecutors’ Office (High-Tech and Financial Crimes Investigation Division), The National Police Agency (Industry Technology Leakage) Investigation Team | Defense Counterintelligence and Security Agency (affiliated with the United States’ Department of Defense) |
Distribution of degree centrality scores. Std. dev.: standard deviation.
| Measures | Value |
|---|---|
| In-Degree Centrality | |
| Mean | 0.006 |
| Std. dev. | 0.008 |
| Min. | 0.000 |
| Max. | 0.089 |
Comparisons of the characteristics of research trends.
| Fields | South Korea | International |
|---|---|---|
| Common keywords | Law |
|
| Main keywords | Technology leakage |
Crime |
| Perspective (management area) | Security management | Crime |
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
As the world enters a fourth Industrial Revolution, organizations worldwide face challenges in dealing with important assets such as industrial technology. Leaking these assets can not only damage organizations economically but also negatively affect customer relationships and brand image. This has led to an increased awareness of industrial security in both the business and academic spheres and a focus on identifying and implementing countermeasures against security incidents, as future computing environments will continuously face security threats. This study first examines the literature on industrial security and its current status in South Korea, which is considered an active industrial security research environment. Subsequently, meta-analyses are conducted on South Korea and abroad to compare their status and research trends in the industrial security field. The results confirm that South Korea has more actively conducted relevant studies compared to international research. This study contributes to the current literature by not only increasing the awareness of industrial security but also encouraging future studies in the field to facilitate a safe and sustainable computing environment.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details
1 Department of Security Convergence, Chung-Ang University, Seoul 06974, Korea;
2 Department of Industrial Security, Chung-Ang University, Seoul 06974, Korea




