DOI QR코드

DOI QR Code

Revitalization Strategy of Information Security Industry Using Cognitive Map Analysis

인지지도분석을 통한 정보보호 산업 활성화전략

  • Lee, Jung Mann (Department of Mgt. of Digital Technology, Hoseo University) ;
  • Cho, Ilgu (Institute for Information & Communications Technology Promotion) ;
  • Rim, Myung Hwan (Electronics and Telecommunications Research Institute, University of Science & Technology)
  • Received : 2016.05.25
  • Accepted : 2016.06.28
  • Published : 2016.06.30

Abstract

This study analyzed President Park's speeches and the government's industry policy in the field of information security using cognitive map. The relationship analysis between policy tool variables and policy goal variables was employed to derive revitalization strategy of information security. This paper found that entrepreneurship revitalization has very strong causality with expansion of domestic market and global market. But, on the other hand, HR development has very weak causality with job creation and future growth driver because the labor market in the information security industry is poor and its transfer rate to other industry is very high. This study showed that this cognitive map could be characterized by a scarcity of feedback loops and a strong emphasis on the positive loops in the structure of virtuous circle. In this paper, we also constructed a comprehensive cognitive map on the policy vision of information security, showing that there are a risk of cyber threat, an opportunity of new fusion security market, information security reinforcing circle, global economic circle, and domestic market circle.

Keywords

References

  1. Axelrod, R., Structure of Decision : The Cognitive Maps of Political Elites, Princeton University Press, 1978.
  2. Cheon et al., Systematic dynamic analysis of information security industry policy, 2003.
  3. Cheon, J. H., Relative effect analysis of information security industry policy, 2003.
  4. Daily Secu, Presidential candidate Park' pledge to IT policy, 2012.
  5. Eden, C., "Cognitive mapping and problem structuring for system dynamics model building, System Dynamics Review, Vol. 10, No. 2-3, 1994, pp. 257-276. https://doi.org/10.1002/sdr.4260100212
  6. Electronic Times, Trend of budget in the domestic information security, 2015.
  7. ETRI, Research on information security industry policy, 2016.
  8. Forrester, J. W., Industrial Dynamics, Cambridge, The MIT Press, 1961.
  9. Kim et al., Global trend for information security industry, ETRI Trend Analysis for Electronics and Telecommunication, 2015.
  10. Kim, C. W., Policy design plan based on system thinking : for prevention to policy adverse effect, SERI, 2008.
  11. Kim, D. H. and Ahn, J. Y., "Cognitive map analysis of president Lee on the Policy of Green Growth", Journal of Korea System Dynamics, Vol. 10, No. 4, 2009, pp. 39-51.
  12. Kim, D. H., "Lesson from system thinking on real estate policy", Journal of Korea System Dynamics, Vol. 8, No. 1, 2007, pp. 187-209.
  13. Kim, D. H., "Policy dilemma analysis using casual map : IMP preparation plan of President Kim, Daejoong", Journal of Korean Public Administration, Vol. 33, No. 4, 1999, pp. 279-296.
  14. Kim, D. H., "Policy dilemma in green growth :cognitive map approach", Journal of Korea System Dynamics, Vol. 11, No. 2, 2010, pp. 29-44.
  15. Kim, D. H., "Secured value and policy dilemma", Journal of Korean Policy, Vol. 11, No. 1, 2002, pp. 27-52.
  16. KISA, 2012 Survey for HRD demand and supply in the field of information security industry, 2013.
  17. KISA, Internet and Security Biweekly, 2014.
  18. Lee et al., "Cognitive map analysis on the policy of SMEs and ventures in the field of information technology", Journal of Korea Contents, Vol. 13, No. 11, 2013, pp. 347-355.
  19. Lee et al., "Priority derivation of policy plans for ICT SMEs and ventures' globalization", The Journal of Digital Convergence, Vol. 12, No. 6, 2014, pp. 13-22.
  20. Ministry of Science, ICT and Future Planning, 2015 Year book to promotion for information industry, 2015.
  21. Ministry of Science, ICT and Future Planning, K-ICT Security development strategy, 2015.
  22. Office of legistration, law on promotion for information security industry, act on 2015, law 13343, 2015, enactment.
  23. Oh, S. Y., "Study on effective government support timing for SMESs using system thinking", Journal of Korea System Dynamics, Vol. 7, No. 2, 2006, pp. 21-34.
  24. Park, C. S., Competitiveness and development direction of cyber security industry, Korean Association of Information Security, 2014.
  25. Park, K. H., Speech for the 3rd information security commemoration day, 2014.
  26. Seo et al., "Exploratory study on information security HRD", Journal of Information System, Vol. 24, No. 2, 2015, pp. 73-96. https://doi.org/10.5859/KAIS.2015.24.2.73
  27. Shin, J. W., Kwon, J. W., and Lee, J. M., "Study on policy model for foreign HR scouting and utilization", Journal of Korea Contents, Vol. 10, No. 3, 2010, pp. 1-12.
  28. White, P. A., Naive ecology : Causal judgements about a simple ecosystem, British Journal of Psychology, Vol. 88, 1997, pp. 219-233. https://doi.org/10.1111/j.2044-8295.1997.tb02631.x
  29. Wolstenholme, E. F., System Enquiry : A System Dynamics Approach, John Wiley and Sons, 1990.

Cited by

  1. 실버산업의 ICT 융합 유형과 ICT 기여 가치 탐색 vol.34, pp.1, 2016, https://doi.org/10.7737/kmsr.2017.34.1.057
  2. 인지지도분석을 활용한 AI SW 인력양성 정책분석 vol.28, pp.3, 2016, https://doi.org/10.21219/jitam.2021.28.3.109