Browse > Article
http://dx.doi.org/10.12673/jkoni.2013.17.01.123

An Exploratory Study of Industrial Security Studies for Science and Technologies Protection  

Chang, Hang-Bae (Division of Business Administration, College of Business, Sangmyung University)
Abstract
If Industrial state-of-the-art technology that made through IT convergence should be to build safely environment that can protect then IT technology and manufacturing industry become convergence and a growth engine become stable positioning. In each industry, there has been a steady effort for the industrial security. However, they introduced only managerial/technical/physical countermeasures. Therefore, it is difficult to find a reference point as industrial security necessity, protecting coverage and things and so on. It is to lack that academic research in industrial security for protecting industrial technology. In detail, a clear definition lack for industrial security. And target range classification lack for industrial security studies. In this study, we redefined the concept of industry security through previous studies. Academic classification designed industrial security studies through delphi method. we analyzed industry security trends based industrial security studies classification and presented domestic industry research orientations.
Keywords
Industry Security; Meta Analysis; Research Trends; Key Technology Protection; Manufacturing Industrial;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Albrechtsen E. "A qualitative study ofusers' views on information security", Computers and Security, 26, 2007.
2 Carnegie Mellon University CyLab, Common Sense Guide to Prevention and Detection of Insider Threats, 2006.7
3 Furnell S., "Malicious or misinformed? Exploring a contributor to the insider threat", Computer Fraud and Security, 9, 2006.
4 Kruger HA, Kearney WD."A prototype for assessing information security awareness". Computers and Security, 25, 2006
5 Lee, Chang Moo, "A Study on the Historical Origin of Private Security Industry in Korea", KOREAN SEC URITY SCIENCE REVIEW, Vol. 22, pp. 91-111, 2010
6 Wol Young Lee, Chul Hwang, "Development of a Copyright Protection System for Computer Forensics", Journal of Korea Multimedia Society, Vol. 10 No. 3, pp. 365-372, 2007
7 Hang-Bae Chang, "The Design of Information Securit y Management System for SMEs Industry Technique Leakage Prevention", Journal of Korea Multimedia Society, Vol. 13 No.1, pp. 111-121, 2010.
8 Hang-Bae Chang, Tae-Hee Joe, Hyo-Jin Kim, "A Stud y on Feasibility and Establishment of a Security Grad e Certification Scheme for the New IT Services", Journal of Korea Navigation Institute, Vol. 13 No. 1, pp.1 13-119, 2009.
9 Jung, Byung-Soo; Ryu, Sang-Il; Kim, Hwa-Soo, "Analysis of Research Trends in Industrial Security - Concentrated on Academic Research Information Services (Year 2000-2011)", Journal of Korean Public Polic e and Security Studies, Vol. 9 No.2, pp195-215, 2012.   DOI
10 Jeong Woo Chae, Young Hee Ko, "Exploring Case Study on Security Factors and Strategy to Prevent Lea kage of Corporate Information for CEO: Focused on Korea Manufacturing Company Major Cases in 2010 0", The journal of professional management, Vol. 15 No. 1, pp.87-113, 2012.
11 Choi, Justin Jin-Hyuk, "A Study on the Institutional Improvement Directions of Industrial Security Progra ms: Focused upon Policies and Practices in the U.S.", KOREAN SECURITY SCIENCE REVIEW, Vol. 22, pp. 197 - 230, 2010.