2015
DOI: 10.7838/jsebs.2015.20.2.027
|View full text |Cite
|
Sign up to set email alerts
|

An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage

Abstract: Current leakage of industrial technologies with revealing state secret against nation is gradually increasing and scope of the spill is diversified from technology-oriented leakage to new economic security sector like information and communication, electrical and electronic, defense industry, illegal export of strategic material, economic order disturbance by foreign country, infringement of intellectual property, etc. So the spill damage can affect not only leaked company but also national interests and entir… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…Hollingsworth (2017) suggests that college courses must integrate student assignments with desirable employment activities. To meet such expectations, many universities are partnering with potential employers to prepare students with analytics skills so they can be hired upon graduation (Lee & Kim, 2017; Saleh & Sentz, 2018).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Hollingsworth (2017) suggests that college courses must integrate student assignments with desirable employment activities. To meet such expectations, many universities are partnering with potential employers to prepare students with analytics skills so they can be hired upon graduation (Lee & Kim, 2017; Saleh & Sentz, 2018).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Accordingly, this paper will design an information security curriculum taxonomy to deliver a balanced treatment of information security subjects in order to train skilled security management talent who can deal with the enhanced information threats that now exist [10,11]. The paper will research existing information security curriculum and information security job taxonomy in order to develop this approach, and will distribute technical and practical information security topics on the basis of a literature review and expert committee meeting, to foster the development of more effective information security professionals, with a focus on the South Korean context [4,6].…”
Section: Research Background and Rationalementioning
confidence: 99%
“…With the emergence of the new environments, core assets of firms have informationized. However, in their convergence with IT, the industrial secrets that should be protected safely have more leaked to competitive firms or overseas 1,2 . A security system had mostly responded to such threats as virus and hacking.…”
Section: Introductionmentioning
confidence: 99%