Fig. 1. Analysis procedure
Fig. 2. Number of security/hacking articles by year
Fig. 3. Monthly Security/Hacking Articles
Fig. 4. Frequency by Monthly Information Security Solution
Fig. 5. Security Solution Articles (Title/Body) ratio analysis
Fig. 6. Frequency of network security solutions
Fig. 7. Frequency of system(terminal) security solution
Fig. 8. Frequency of content(data) / information leakage prevention solution
Fig. 9. Frequency of password/authentication solutions
Fig. 10. Frequency of security management solution
Fig. 11. Security Solutions Sales and Word Frequency(Network Security)
Fig. 12. Security Solutions Sales and Word Frequency(System (Terminal) Security)
Fig. 13. Security Solutions Sales and Word Frequency(Security management)
Table 1. Security/Hacking Articles(Unit: number)
Table 2. Security Solutions Classify
Table 3. Security/Hacking News Title Keyword Frequency Rank
Table 4. Security/Hacking News Body Keyword Frequency Rank
Table 5. Security solution title Frequency ranking
Table 6. Security solution body Frequency ranking
Table 7. Information security solution sales - Solution word frequency
References
- Defense Agency for Technology and Quality,"Future defense technology linked with the fourth industrial revolution", 2017
- S. J. Yun,"[Military china - Yoon Seok-joon's 'Chaimil'] Already started US-China version "US naval ship accident, is not it a coincidence?", 2017, [cited 2017 November 24], Avaliable From: https://blog.naver.com/china_lab/221147405605
- S. W. Jang,"President Trump's signature 'Block Chain Cyber Security Research' bill", 2017,[cited 2017 December 14], Avaliable From: http://bigdata. getnews.co.kr/view.php?ud=201712141002174184d48e16fff2_23
- Blue house,"Enhanced capacity to respond to asymmetric threats such as North Korea's Nuclear Issue No.85 (Ministry of National Defense)", 2017, Avaliable From: http://www1.president.go.kr/governmentprojects
- Korea Information Security Industry Association, "National Survey on Information Protection Industry", 2017.
- Y. H. Noh, T. Y. Kim, D. K. Jeong, K. H. Lee, "Trend Analysis of Convergence Research based on Social Big Data" JOURNAL OF THE KOREA CONTENTS ASSOCIATION, Vol. 19, No. 2, pp. 135-146, Feb, 2019. DOI: https://10.5392/JKCA.2019.19.02.135
- M. Song, "Technology Trend Analysis Using Text Mining: Newspaper Article Data," Proceedings of the Korea Information Management Society, pp. 9-30, Nov, 2017.
- J. H. Kim, S. H. Kim, I. K. Cho, H. S. Cho, B. K. Noh, "Cyber Security Technology Trends Using Big Data", ETRI, pp. 19-29, 28, 2013.
- J.A. Park, Im, H. B. Im, "Understanding Customer's Mind using Big Data Analytics," Korean Psychological Association Conference, pp. 200-200, Aug, 2018.
- M. J. Kim, C. J. Kim, "Trend Analysis of News Articles Regarding Sungnyemun Gate using Text Mining," JOURNAL OF THE KOREA CONTENTS ASSOCIATION, Vol. 17, No. 3, pp. 474-485, Mar, 2017. DOI: https://doi.org/10.5392/JKCA.2017.17.03.474
- INTERNET TREND, May 3, 2012 - December 31, 2018, Avaliable From: http://trend.logger.co.kr/trendForward.tsp
- Naver,"Security/Hacking News", May 3, 2012 - December 31, 2018, Avaliable From: http://news.naver.com/main/list.nhn?mode=LS2D &mid=shm&sid1=105&sid2=732
- Korea Information Security Industry Association, "National Survey on Information Protection Industry", 2018.
- C. Y. Park, Naver News Crawlong, N2H4 R package, Avaliable From: https://github.com/mrchy park/N2H4
- A. Alexandra, C. Paulo, R. Paulo, M. Sergio, "Research trends on Big Data in Marketing: A text mining and topicmodeling based literature analysis", Vol. 24, Issue 1, pp. 1-7, 2018
- "K-ICT Strategy 2016", July 1, 2016, Avaliable From: https://blog.naver.com/0mikyoung0/220750945661
- S. J. Kim ,S. W. Lee, 2018, "Social Engineering based Security Requirements Recommendation Framework to Prevent an Advanced Persistent Threat," Journal of KIISE, Vol. 45, No. 10, pp. 1015-1028. DOI: http://dx.doi.org/18-510 https://doi.org/10.5626/JOK.2018.45.10.1015
- B. H. Kim, D. W. Cho, "Network security technology trends and prospects", The Journal of The Korean Institute of Communication Sciences, Vol. 31, No. 4, pp. 99-106, 2014
- Digital Story,"SK Communications Nate Hack, 2011", 2011, Avaliable From: https://blog.naver.com /hahaseyo/10115157336
- Cisco Korea Blog,"How many spam do you receive?",February 28, 2017, Avaliable From: http://www.ciscokrblog.com/1169
- National Institute of Standards and Technology, Framework for Improving Critical Infrastructure Cybersecurity, 2017
- "Top 10 vulnerabilities in 2016", January 24, 2017, Avaliable From: http://blog.alyac.co.kr/942
- J. H. Eom, M. J. Kim, 2016, "Effect of Information Security Incident on Outcome of Investment by Type of Investors: Case of Personal Information Leakage Incident," Journal of the Korea Institute of Information Security & Cryptology, Vol. 26, No. 2, pp. 463-474. DOI: http://dx.doi.org/10.13089/JKIISC.2016.26.2.463