DOI QR코드

DOI QR Code

신정보화 환경에서 중소기업 기술유출에 대한 인식과 관리 실태에 관한 연구

The Research on Security Cognition and Management Status of Technology Outflow about Small-medium Companies in New IT Environment

  • 김기호 (중소기업기술정보진흥원 경영정보화부) ;
  • 하규수 (호서대학교 벤처전문대학원 벤처경영학과)
  • Kim, Ki Ho (Korea Technology and Information Promotion Agency for SMEs) ;
  • Ha, Kyu Soo (The Graduate School of Venture, Hoseo University)
  • 투고 : 2013.10.30
  • 심사 : 2013.11.20
  • 발행 : 2013.11.28

초록

이 연구의 목적은 신정보화환경에서의 중소기업의 기술유출에 대한 보안인식 및 보안관리 실태를 측정하고, 대기업과 중소기업간의 수준비교분석을 통해 기술유출 방지대책을 위한 정책의 기초자료를 제시하고자 한다. 분석결과 보안인식 및 보안관리실태 모두 중소기업은 대기업에 비해 열악한 것으로 나타났으며, 정보화환경의 급격한 발달에 따른 부문별 관리가 필요한 상황인 것으로 보인다. 현재 중소기업의 신정보화환경 구축은 도입기에 있으므로, 구축과 동시에 보안시스템을 함께 갖출 수 있는 지원이 필요하며, 동시에 중소기업 자체적 대응이 가능하도록 신정보화환경에 맞는 보안시스템이 필요하다. 중소기업의 경우 급변하는 정보화환경의 변화에 따른 기술보호 역량을 갖추기에는 한계가 있음으로 정부의 체계적인 보안관리 지원이 요구된다.

This research suggests the security countermeasures for solving technology outflow of small-medium companies in New IT Environment through level comparison of security cognition and security management between small-medium companies and major big companies. According to analysis results, it is poor for small-medium companies' level of security cognition and security management compared with major big companies. Small-medium companies need to manage technology outflow to major big companies' level in New IT Environment. Small-medium companies has started to build New IT Environment recently and it must build the appropriate security system for small-medium companies at the same time. Small-medium company has more problem with budget and proffessionals to maintain the security of technology outflow. Therefore government has to support systematic management for the security of technology outflow to Small-medium companies

키워드

참고문헌

  1. E.Y. Jang, H.J. Kim, C.S. Park, J.Y. Kim & J.I. Lee, The study on a Threat Countermeasure of Mobile Cloud Services, KIISC, Vol 21, No 1, pp.177-186, 2011
  2. H.C. Lee, J.H. Yi, K.W. Sohn, Security Threats and Countermeasures in Smartwork Environment, KIISC REVIEW, Vol.21, No.3, pp.12-21, 2011
  3. J.H. Ra, Y.J. Choi & D. I. Shin, An Exploratory Study on Threats of Smartwork Environment, Journal of Information Technology and Architecture, Vol 9, No. 1, March, pp. 33-42, 2012
  4. J.I. Lim, Security Threats Countermeasures as Changing IT Environment, Journal of Industrial Security, Vol.7, pp.1-73, 2011
  5. K.B. Lee, T.H. Park & J. I. Lim, Security Threats and Countermeasures according to the Environmental changes of Smart Work, The Journal of Digital Policy & Management, Vol. 9, No.4, pp.29-40, 2011.
  6. K.H. Nam, Smart Society IT Trends and Security Threats/Countermeasures, KIISC REVIEW, Vol.22 No.8, 2012
  7. K.J. Lee, Policy Suggestion about Security Threats and Countermeasures in Smart Society, Journal of The Korean Institute of Communication Sciences, Vol.30 No.1, pp.24-32, 2012
  8. K.J. Moon, Security Intension Plan for Research Information -Government Funded Reasearch Center-, KAITS, pp.75-140, 2006
  9. S.K. Rheem, C.K. Lee & J. E. Kim, The Information Security Risks of Smart Age and EU5's Responses, CEM-TP, Vol.7, No.4, pp.135-150, 2011

피인용 문헌

  1. A Study of Security Policy for U-Healthcare Service vol.11, pp.11, 2013, https://doi.org/10.14400/JDPM.2013.11.11.747