DOI QR코드

DOI QR Code

An Exploratory Study of Industrial Security Studies for Science and Technologies Protection

제조산업 기술보호를 위한 산업보안학 메타적 분석 연구

  • Chang, Hang-Bae (Division of Business Administration, College of Business, Sangmyung University)
  • Received : 2013.01.31
  • Accepted : 2013.02.28
  • Published : 2013.02.28

Abstract

If Industrial state-of-the-art technology that made through IT convergence should be to build safely environment that can protect then IT technology and manufacturing industry become convergence and a growth engine become stable positioning. In each industry, there has been a steady effort for the industrial security. However, they introduced only managerial/technical/physical countermeasures. Therefore, it is difficult to find a reference point as industrial security necessity, protecting coverage and things and so on. It is to lack that academic research in industrial security for protecting industrial technology. In detail, a clear definition lack for industrial security. And target range classification lack for industrial security studies. In this study, we redefined the concept of industry security through previous studies. Academic classification designed industrial security studies through delphi method. we analyzed industry security trends based industrial security studies classification and presented domestic industry research orientations.

제조업이 IT기술과 융합되면서 성장 동력으로써 안정적인 자리 매김하기 위해서는 IT 융합을 통하여 산출된 첨단의 산업기술을 안전하게 보호할 수 있는 환경구축이 선행되어야 한다. 이를 위하여 각 산업에서는 산업기술을 보호하기 위한 노력은 꾸준히 진행되어 왔으나, 학문적 기반 체계가 갖추어지지 않은 채 단발성의 관리적/기술적/물리적 대응에 머물고 있다. 이에 따라 산업기술을 보호하기 위한 다차원적인 산업보안 학(學)에 대한 연구 필요성이 꾸준히 제기되어 왔으나, 아직까지 학문적 범위와 함께 세부적인 분류체계 연구가 아집 미흡한 상태이다. 따라서 본 연구에서는 이제까지 연구된 산업보안 학(學)에 연관된 선행연구를 수집 분석하여 산업보안 학(學)에 대한 개념을 재 정의하고, 관련분야 전문가 대상의 델파이방법을 수차례 실시하여 통하여 산업보안 학(學)에 대한 학문적 분류체계를 설계하였다. 아울러 설계된 분류체계를 기반으로 해외 산업보안 학(學) 연구동향에 대한 메타적 분석을 수행함으로써 산업기술을 보호하고자하는 연구자 및 실무자에게 연구방향성 및 기초자료를 제공하고자 하였다.

Keywords

References

  1. Albrechtsen E. "A qualitative study ofusers' views on information security", Computers and Security, 26, 2007.
  2. Carnegie Mellon University CyLab, Common Sense Guide to Prevention and Detection of Insider Threats, 2006.7
  3. Furnell S., "Malicious or misinformed? Exploring a contributor to the insider threat", Computer Fraud and Security, 9, 2006.
  4. Kruger HA, Kearney WD."A prototype for assessing information security awareness". Computers and Security, 25, 2006
  5. Lee, Chang Moo, "A Study on the Historical Origin of Private Security Industry in Korea", KOREAN SEC URITY SCIENCE REVIEW, Vol. 22, pp. 91-111, 2010
  6. Wol Young Lee, Chul Hwang, "Development of a Copyright Protection System for Computer Forensics", Journal of Korea Multimedia Society, Vol. 10 No. 3, pp. 365-372, 2007
  7. Hang-Bae Chang, "The Design of Information Securit y Management System for SMEs Industry Technique Leakage Prevention", Journal of Korea Multimedia Society, Vol. 13 No.1, pp. 111-121, 2010.
  8. Hang-Bae Chang, Tae-Hee Joe, Hyo-Jin Kim, "A Stud y on Feasibility and Establishment of a Security Grad e Certification Scheme for the New IT Services", Journal of Korea Navigation Institute, Vol. 13 No. 1, pp.1 13-119, 2009.
  9. Jung, Byung-Soo; Ryu, Sang-Il; Kim, Hwa-Soo, "Analysis of Research Trends in Industrial Security - Concentrated on Academic Research Information Services (Year 2000-2011)", Journal of Korean Public Polic e and Security Studies, Vol. 9 No.2, pp195-215, 2012. https://doi.org/10.25023/kapsa.9.2.201208.195
  10. Jeong Woo Chae, Young Hee Ko, "Exploring Case Study on Security Factors and Strategy to Prevent Lea kage of Corporate Information for CEO: Focused on Korea Manufacturing Company Major Cases in 2010 0", The journal of professional management, Vol. 15 No. 1, pp.87-113, 2012.
  11. Choi, Justin Jin-Hyuk, "A Study on the Institutional Improvement Directions of Industrial Security Progra ms: Focused upon Policies and Practices in the U.S.", KOREAN SECURITY SCIENCE REVIEW, Vol. 22, pp. 197 - 230, 2010.

Cited by

  1. A Meta-Analysis of Industrial Security Research for Sustainable Organizational Growth vol.12, pp.22, 2013, https://doi.org/10.3390/su12229526