DOI QR코드

DOI QR Code

Development on Early Warning System about Technology Leakage of Small and Medium Enterprises

중소기업 기술 유출에 대한 조기경보시스템 개발에 대한 연구

  • Seo, Bong-Goon (Graduate School of Business IT, Kookmin University) ;
  • Park, Do-Hyung (School of Management Information System, Kookmin University)
  • 서봉군 (국민대학교 BIT 전문대학원) ;
  • 박도형 (국민대학교 경영대학 경영정보학부)
  • Received : 2017.03.13
  • Accepted : 2017.03.20
  • Published : 2017.03.31

Abstract

Due to the rapid development of IT in recent years, not only personal information but also the key technologies and information leakage that companies have are becoming important issues. For the enterprise, the core technology that the company possesses is a very important part for the survival of the enterprise and for the continuous competitive advantage. Recently, there have been many cases of technical infringement. Technology leaks not only cause tremendous financial losses such as falling stock prices for companies, but they also have a negative impact on corporate reputation and delays in corporate development. In the case of SMEs, where core technology is an important part of the enterprise, compared to large corporations, the preparation for technological leakage can be seen as an indispensable factor in the existence of the enterprise. As the necessity and importance of Information Security Management (ISM) is emerging, it is necessary to check and prepare for the threat of technology infringement early in the enterprise. Nevertheless, previous studies have shown that the majority of policy alternatives are represented by about 90%. As a research method, literature analysis accounted for 76% and empirical and statistical analysis accounted for a relatively low rate of 16%. For this reason, it is necessary to study the management model and prediction model to prevent leakage of technology to meet the characteristics of SMEs. In this study, before analyzing the empirical analysis, we divided the technical characteristics from the technology value perspective and the organizational factor from the technology control point based on many previous researches related to the factors affecting the technology leakage. A total of 12 related variables were selected for the two factors, and the analysis was performed with these variables. In this study, we use three - year data of "Small and Medium Enterprise Technical Statistics Survey" conducted by the Small and Medium Business Administration. Analysis data includes 30 industries based on KSIC-based 2-digit classification, and the number of companies affected by technology leakage is 415 over 3 years. Through this data, we conducted a randomized sampling in the same industry based on the KSIC in the same year, and compared with the companies (n = 415) and the unaffected firms (n = 415) 1:1 Corresponding samples were prepared and analyzed. In this research, we will conduct an empirical analysis to search for factors influencing technology leakage, and propose an early warning system through data mining. Specifically, in this study, based on the questionnaire survey of SMEs conducted by the Small and Medium Business Administration (SME), we classified the factors that affect the technology leakage of SMEs into two factors(Technology Characteristics, Organization Characteristics). And we propose a model that informs the possibility of technical infringement by using Support Vector Machine(SVM) which is one of the various techniques of data mining based on the proven factors through statistical analysis. Unlike previous studies, this study focused on the cases of various industries in many years, and it can be pointed out that the artificial intelligence model was developed through this study. In addition, since the factors are derived empirically according to the actual leakage of SME technology leakage, it will be possible to suggest to policy makers which companies should be managed from the viewpoint of technology protection. Finally, it is expected that the early warning model on the possibility of technology leakage proposed in this study will provide an opportunity to prevent technology Leakage from the viewpoint of enterprise and government in advance.

급속한 IT의 발전으로 인해 개인정보뿐만 아니라 기업이 보유하고 있는 핵심 기술 및 정보에 대한 유출 위협이 중요한 이슈로 인식되고 있다. 기업에게 있어서 보유하고 있는 핵심 기술은 기업의 생존 및 지속적으로 경쟁 우위를 차지하기 위해 매우 중요한 부분이다. 최근 기술 침해 사례가 많이 일어나고 있는데, 기술 유출은 기업에게 있어서 주가하락 등의 막대한 재무적인 손실을 가져올 뿐만 아니라, 기업의 신뢰에 손상을 입게 되고, 기업의 발전을 지연시키게 되는 악영향을 미치게 된다. 특히, 대기업에 비해 핵심기술이 기업 내 중요한 많은 부분을 차지하는 중소기업에 있어서 기술 유출에 대한 대비는 기업의 존립에 있어서 필수적인 요소로 볼 수 있다. 이처럼 정보 보안 관리의 필요성과 중요성이 대두되면서 기업 입장에서 조기에 기술 침해 위협에 대해 확인하고 대비할 필요가 있다. 본 연구에서는 기술 유출에 영향을 미치는 요인들을 탐색하는 실증 분석을 수행하고, 인공지능 알고리즘을 통해 기술유출 조기경보시스템을 개발하고자 한다. 구체적으로 본 연구에서는 중소기업이 보유한 기술 유출에 영향을 미치는 요인들을 로지스틱 회귀분석을 통해 확인해보고, 통계분석을 통해 검증된 요인들을 기반으로 인공지능 여러 기법들 중 하나인 Support Vector Machine을 활용하여 기술침해 가능성을 조기에 알려주는 모형을 개발하였다. 본 연구에서 제안하는 기술 유출 가능성에 대한 조기 경보 모형을 통해 기업 및 정부 관점에서 기술 유출을 미리 예방할 수 있는 기회를 제공할 수 있을 것으로 기대된다.

Keywords

References

  1. Ahn, H. C., I. G. Han, and K. J. Kim, "Purchase prediction model using the support vector machine," Journal of Intelligence and Information Systems, Vol.11, No.3(2005), 69-81.
  2. Barniv, R., A. Agarwal, and R. Leach, "Predicting the outcome following bankruptcy filing: a three‐-state classification using neural networks," Intelligent Systems in Accounting, Finance and Management, Vol.6, No.3 (1997), 177-194. https://doi.org/10.1002/(SICI)1099-1174(199709)6:3<177::AID-ISAF134>3.0.CO;2-D
  3. Chae, J. W. and Y. H. Ko, "Exploring case Study on Security Factors and Strategy to Prevent Leakage of Corporate Information for CEO," The Journal of Professional Management, Vol.15, No.1(2012), 87-113.
  4. Chang, E. M., "Effects of Individual Performance Based Compensation on Employee's Work Effort: In the context of Commitment HR Bundles," Korean Journal of Management, Vol.11, No.1, 133-158.
  5. Chang, H. B. and J. H. Song, "The Exploratory Study on the Evaluation of Security System for Industrial Technology Leakage Prevention," Korean Journal of Industry Security, Vol.1, No.1(2009), 50-61.
  6. Choi, E. R., B. G. Lee, Y. I. Park, and K. M. Park, "A Study on the Leaking Channels of Industrial Technology," Police Science Institute, Vol.26, No.1(2012), 225-260.
  7. Choi, P. A. and M. H. Lee, "A Study on Industrial Security Factors Influencing Industrial Technology Outflow Prevention Using Logistic Regression," The Korean Society of Private Security, Vol.12, No.3(2013), 182-206.
  8. Deci, E. L., & R. M. Ryan, "The empirical exploration of intrinsic motivational processes," Advances in experimental social psychology, Vol.13(1980), 39-80.
  9. Heneman, R. L., Merit pay: Linking pay increases to performance ratings. Addison Wesley Longman, 1992
  10. Hong, J. P., "The Effect of Technological Collaboration on the Innovation Performance of Small and Medium-sized Firms," The Journal of Small Business, Vol.27, No.3(2005), 3-32.
  11. Hong, J. S., W. H. Park, Y. H. Kim, and K. H. Kook, "Small Business Technological Assets Protection Factors Analysis Using Logistic Regression Analysis," The Journal of Society for e-Business Studies, Vol.20, No.3(2015), 1-10.
  12. Hwang, H. D. and C. M. Lee, "A Study on the Relationship between Industrial Espionage, Self-Control, and Organizational Commitment," Korean Security Science Review, No.47(2016), 119-137.
  13. Jung, J. S., "The Study of Protective Solution and People in Technology Outflow about SMEs," International commerce and information review, Vol.17, No.3(2015), 133-152. https://doi.org/10.15798/kaici.17.3.201509.133
  14. Kim, D. B. and J. H. Kim, "Antecedents of the Performance Based Pay: A Comparison of Japanese and Korean Firms," Quarterly Journal of Labor Policy, Vol.11, No.1(2011), 25-54.
  15. Kim, H. J. and J. H. Ahn, "An Empirical Study of Employee's Deviant Behavior for Improving Efficiency of Information Security Governance," The Journal of Society for e-Business Studies, Vol.18, No.1(2013), 147-165. https://doi.org/10.7838/jsebs.2013.18.1.147
  16. Kim, M. B. and K. J. Kim, "The law regarding the outflow prevention & a protection of industrial technology and Issues," Intellectual Property Society, Vol.23, No.2(2007), 1-36.
  17. Kim, U. J, Modern technology management, economics, Ajin, Seoul, 2007
  18. Korea Small Business Institute, "Status and Tasks of SME Technology Protection Support Policy", KOSBI SME Foucs, Vol.14, No.17(2014).
  19. Lee, C. S. and Y. H. Kim, "An Analysis of Relationship between Industry Security Education and Capability," The Journal of Society for e-Business Studies, Vol.20, No.2(2015), 27-36. https://doi.org/10.7838/jsebs.2015.20.2.027
  20. Lee, M. S. and R. G. Choe, "Imitation Strategy, Environment, and Business Performance in followers," Korean Management Review, Vol.31, No.2(2002), 405-429.
  21. Mohr, J. J., "The management and control of information in high-technology firms," The Journal of High Technology Management Research, Vol.7, No.2(1996), 245-268. https://doi.org/10.1016/S1047-8310(96)90007-3
  22. Noh, M. S. and S. Y. Lee, "Explaining Industrial Security of SMEs in Korea," Korean Public Administration Review, Vol.44, No.3(2010), 239-259.
  23. Tay, F. E. and L. J. Cao, "Modified support vector machines in financial time series forecasting," Neurocomputing, Vol.48, No.3(2002), 847-861. https://doi.org/10.1016/S0925-2312(01)00676-2
  24. Yang, K. Y., "The Limitations and New Agendas for the New Managerial Reform Initiatives in Korean Local Governments," The Korean Journal of Local Government Studies, Vol.8, No.2(2004), 245-265.
  25. Yu, G. C., "Determinants and Organizational Effectiveness of Performance-based Human Resource Management," Korean Journal of Management, Vol.15, No.3(2007), 187-224.
  26. Zhang, G., M. Y. Hu, B. E. Patuwo, and D. C. Indro, "Artificial neural networks in bankruptcy prediction: General framework and cross-validation analysis," European journal of operational research, Vol.116, No.1(1999), 16-32. https://doi.org/10.1016/S0377-2217(98)00051-4

Cited by

  1. 효율적인 개인정보 관리를 위한 IPIMS 설계 vol.7, pp.3, 2017, https://doi.org/10.22156/cs4smb.2017.7.3.083
  2. 웹검색 트래픽 정보를 활용한 유커 인바운드 여행 수요 예측 모형 및 유커마이닝 시스템 개발 vol.23, pp.3, 2017, https://doi.org/10.13088/jiis.2017.23.3.155
  3. Smart Store in Smart City: 소비자 감성기반 상권분석 시스템 개발 vol.24, pp.1, 2017, https://doi.org/10.13088/jiis.2018.24.1.025
  4. 온라인 협업 시스템을 통한 프로젝트 성과 창출 메커니즘 연구 : 개인특성, 관계특성, 시스템특성을 중심으로 vol.25, pp.1, 2017, https://doi.org/10.21219/jitam.2018.25.1.047
  5. 중소기업 프로파일링 분석을 통한 기술유출 방지 및 보호 모형 연구 vol.27, pp.1, 2017, https://doi.org/10.5859/kais.2018.27.1.171
  6. 비트코인 가격 변화에 관한 실증분석: 소비자, 산업, 그리고 거시변수를 중심으로 vol.24, pp.2, 2017, https://doi.org/10.13088/jiis.2018.24.2.195
  7. A Study on Early Warning System of China Iron Ore Price Based on AI Models vol.61, pp.None, 2017, https://doi.org/10.26585/chlab.2018..61.009
  8. 브랜드 명성에 따른 기술 침해에 대한 소비자의 태도 변화: 약자 브랜드의 언더독 효과를 중심으로 vol.27, pp.4, 2017, https://doi.org/10.5859/kais.2018.27.4.167
  9. 정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화 vol.26, pp.3, 2020, https://doi.org/10.13088/jiis.2020.26.3.037