Advertisement

An exploration of the necessary competencies of professional police investigators for industrial espionage cases in South Korea

  • Seoungyong Lee
  • Julak LeeEmail author
  • Jeyong Jung
Original Article

Abstract

Most of the research on the role of police in the protection of industrial technology has recommended the expansion of police departments and the provision of education to strengthen the expertise of investigators. However, no research has sought to identify which specific expertise should be strengthened. This study analyzed which competencies are required by professional police investigators in industrial espionage cases to gain expertise. The study used the Developing A Curriculum (DACUM) technique, normally used to develop curriculum through job analysis. The study produced a series of competency items in three stages: (1) created a job model, (2) filtered out unnecessary competency items via expert reviews, and (3) verified the selected items via surveys and focus group interviews. Unnecessary items were filtered out throughout the study. The study found that “knowledge about laws related to industrial espionage,” “case types and modus operandi,” and “knowledge related to digital forensics and utilization of useful tools” are necessary competencies for the police investigating industrial espionage cases. Several non-essential but beneficial competencies were also found, such as “understanding of the latest technology trends,” “knowledge of internal computer systems and relevant organizations,” and “ability to use programs to design drawings or program source codes.”

Keywords

Industrial espionage Professional police investigator Competency Knowledge Skill DACUM 

Notes

References

  1. Agency, Korean National Police. 2009. 2008 Annual Police Statistics. Seoul: TSO.Google Scholar
  2. Agency, Korean National Police. 2013. A Study on Basic Education and Evaluation of Investigators. Seoul: TSO.Google Scholar
  3. Agency, Korean National Police. 2015. Development of Education and Training System to Improve Cybercrime Response Ability. Seoul: TSO.Google Scholar
  4. Agency, Korean National Police. 2016. 2015 Annual Police Statistics. Seoul: TSO.Google Scholar
  5. Agency, Korean National Police. 2017. 2016 Annual Police Statistics. Seoul: TSO.Google Scholar
  6. Almeling, D.S. 2008. Four Reasons to Enact a Federal Trade Secrets Act. Fordham Intellectual Property, Media and Entertainment Law Journal 19: 769–798.Google Scholar
  7. Andrijcic, E., and B. Horowitz. 2006. A Macro-Economic Framework for Evaluation of Cyber Security Risks Related to Protection of Intellectual Property. Risk Analysis 26(4): 907–923.CrossRefGoogle Scholar
  8. Berg, I. 1970. Education and Jobs: The Great Training Robbery. New York: Praeger.Google Scholar
  9. Boyatzis, R.E. 1982. The Competent Manager: A Model for Effective Performance. New York: Wiley.Google Scholar
  10. Cho, H.D. 2013. Confrontation Capacity Strengthening Plan About Industrial Espionage in Police. The Korean Association of Police Science Review 40: 193–213.Google Scholar
  11. Cho, J., and Y. Chun. 2017. A New Direction for Police Activities to Respond to the Industrial Technology Outflow Crime. Journal of Korea Security Science Association 50: 239–262.Google Scholar
  12. Colwill, C. 2009. Human Factors in Information Security: The Insider Threat–Who Can You Trust These Days? Information Security Technical Report 14(4): 186–196.CrossRefGoogle Scholar
  13. Dofasco. 1996. The DACUM Job Analysis Process. Columbus, OH: Educational Resources Information Centre.Google Scholar
  14. Elliott, S.M. 2007. The Threat from Within: Trade Secret Theft by Employees. Nature Biotechnology 25(3): 293–295.CrossRefGoogle Scholar
  15. Hinduja, S., and J.R. Ingram. 2008. Self-Control and Ethical Beliefs on the Social Learning of Intellectual Property Theft. Western Criminology Review 9(2): 52–72.Google Scholar
  16. Hong, S. 2015. A Study on the Police Policy to Counter Industrial Espionage. Journal of the Institute of Police Science 10(3): 65–93.Google Scholar
  17. Hoyt, D. P. 1965. The Relationship Between College Grades and Adult Achievement. A Review of the Literature (Res. rep. No. 7). Iowa City, LA: American College Testing Program.Google Scholar
  18. Hudson, L. 1960. Degree Class and Attainment in Scientific Research. British Journal of Psychology 51: 67–73.CrossRefGoogle Scholar
  19. Joo, S.B. 2011. A Study on the Countermeasure of Police About Industrial Espionage. Public Policy Review 28(1): 161–179.Google Scholar
  20. Lee, H.S. 2012. A Study on the Measure of Facilitating Industrial Security by the Police. Journal of Korean Association of Governmental Studies 2012(4): 173–192.Google Scholar
  21. Lee, G. 2014. Understanding of Research Methodology. Seoul: Booknet.Google Scholar
  22. Lee, H.M. 2016. Organizational Capability and Core Talents. Seoul: Readread Press.Google Scholar
  23. McClelland, D.C. 1973. Testing for Competence Rather than for Intelligence. American Psychologist 28(1): 1–14.CrossRefGoogle Scholar
  24. McCormick, M. 2008. Data Theft: A Prototypical Insider Threat. In Insider Attack and Cyber Security, eds. S.J. Stolfo et al., 53–68. Boston: Springer.CrossRefGoogle Scholar
  25. Ministry of Trade, Industry and Energy. 2015. The Second Comprehensive Plan for Prevention and Protection of Industrial Technology. Retrieved from http://www.is-portal.net/bmt/newbbs/view.act?pageCode=P14030101&bbs_config_nid=26&bbs_nid=525. Accessed 15 Jan 2019.
  26. Nasheri, H. 2005. Economic Espionage and Industrial Spying. Cambridge: Cambridge University Press.Google Scholar
  27. Shultz II, C.J., and B. Saporito. 1996. Protecting Intellectual Property: Strategies and Recommendations to Deter Counterfeiting and Brand Piracy in global markets. The Columbia Journal of World Business 31(1): 18–28.CrossRefGoogle Scholar
  28. Spencer, L.M., and S.M. Spencer. 1993. Competence at Work: Models for Superior Performance. New York: Wiley.Google Scholar
  29. Warkentin, M., and R. Willison. 2009. Behavioral and Policy Issues in Information Systems Security: The Insider Threat. European Journal of Information Systems 18(2): 101–105.CrossRefGoogle Scholar
  30. Wing Jr., C.W., and M.A. Wallace. 1971. College Admissions and the Psychology of Talent. New York: Holt, Rinehart & Winston.Google Scholar
  31. Yoon, D., S. Cho, and E. Bae. 2011. A Study Based on the Critical Review of Previous Research on the DACUM Job Analysis in Korea. Journal of Education and Culture 17(3): 87–115.CrossRefGoogle Scholar

Copyright information

© Springer Nature Limited 2019

Authors and Affiliations

  1. 1.Department of Security ManagementKyonggi UniversitySuwonSouth Korea
  2. 2.Department of Police Science, College of Social SciencesUniversity of UlsanUlsanSouth Korea

Personalised recommendations