DOI QR코드

DOI QR Code

Research on the Level Evaluation Model of the Organization Research Security

조직의 연구보안 수준평가 모형 연구

  • Na, Onechul (Department of Security Convergence, Chung-Ang University) ;
  • Chang, Hangbae (Department of Industrial Security, Chung-Ang University)
  • Received : 2020.08.10
  • Accepted : 2020.08.27
  • Published : 2020.08.31

Abstract

Recently, the importance of research and development for technological innovation is increasing. The rapid development of research and development has a number of positive effects, but at the same time there are also negative effects that accelerate crimes of information and technology leakage. In this study, a research security level measurement model was developed that can safely protect the R&D environment conducted at the organizational level in order to prepare for the increasingly serious R&D result leakage accident. First, by analyzing and synthesizing security policies related to domestic and overseas R&D, 10 research security level evaluation items (Research Security Promotion System, Research Facility and Equipment Security, Electronic Information Security, Major Research Information Security Management, Research Note Security Management, Patent/Intellectual Property Security Management, Technology Commercialization Security Management, Internal Researcher Security Management, Authorized Third Party Researcher Security Management, External Researcher Security Management) were derived through expert interviews. Next, the research security level evaluation model was designed so that the derived research security level evaluation items can be applied to the organization's research and development environment from a multidimensional perspective. Finally, the validity of the model was verified, and the level of research security was evaluated by applying a pilot target to the organizations that actually conduct R&D. The research security level evaluation model developed in this study is expected to be useful for appropriately measuring the security level of organizations and projects that are actually conducting R&D. It is believed that it will be helpful in establishing a research security system and preparing security management measures. In addition, it is expected that stable and effective results of R&D investments can be achieved by safely carrying out R&D at the project level as well as improving the security of the organization performing R&D.

최근 기술의 혁신을 위한 연구개발의 중요성이 커지고 있다. 연구개발의 급속한 발전은 다양한 긍정적 효과가 있지만, 동시에 정보 및 기술에 대한 유출 범죄를 가속화시키는 부정적 영향 또한 존재한다. 본 연구에서는 점차 심각해지는 연구개발 결과물 유출 사고를 대비하기 위해 조직 차원에서 이루어지는 연구개발 환경을 안전하게 보호할 수 있는 연구보안 수준측정 모형을 개발하였다. 먼저 국내외 연구개발 관련 보안정책들을 분석하고 종합하여, 연구보안 수준평가 항목 10개(연구보안 추진체계, 연구시설과 장비 보안, 전자정보 보안, 주요 연구정보 관리, 연구노트 관리, 지식재산권/특허 관리, 기술사업화 관리, 내부연구원 관리, 인가된 제3자 관리, 외부자 관리)를 전문가 인터뷰를 통해 도출하였다. 다음으로, 도출한 연구보안 수준평가 항목을 조직의 연구개발 환경에 다차원적 관점에서 적용 가능하도록 연구보안 수준평가 모형을 설계하였다. 마지막으로 모형에 대한 타당성을 검증하고, 실제 연구개발을 수행하는 조직을 대상으로 시범 적용하여 연구보안 수준을 평가해보았다. 본 연구에서 개발한 연구보안 수준평가 모형은 실제 연구개발을 수행하고 있는 조직 및 프로젝트의 보안 수준을 적절하게 측정하는 데 유용하게 활용될 수 있을 것으로 기대되고, 연구개발을 직접 수행하는 연구원들이 자체적으로 연구보안 체계를 수립하고 보안관리 대책을 마련하는 데 도움이 될 것이라 판단된다. 또한 연구개발을 수행하는 조직 차원의 보안성 향상뿐만 아니라 프로젝트 단위의 연구개발을 안전하게 수행함으로써, 연구개발 투자에 대한 안정적이고 효과적인 성과를 낼 수 있을 것이라 기대한다.

Keywords

References

  1. Ahn, C. and Lee, Y., "An empirical analysis of the influence factors on open innovation activities in Korea," Journal of Korea Technology Innovation Society, Vol. 14, No. 3, pp. 431-465, 2011.
  2. Bae, S. T. and Kim, J. H., "A study on development of the evaluation model about level of security in national R&D program," The Journal of Korean Association of Computer Education, Vol. 16, No. 1, pp. 73-80, 2015. https://doi.org/10.32431/KACE.2013.16.1.008
  3. Bland, J. M. and Altman, D. G., "Statistics notes: Cronbach's alpha," Bmj, Vol. 314, No. 7080, p. 572, 1997. https://doi.org/10.1136/bmj.314.7080.572
  4. Brits, H. and du Plessis, L., "Application of focus group interviews for quality management: An action research project," Systemic Practice and Action Research, Vol. 20, No. 2, pp. 117-126, 2007. https://doi.org/10.1007/s11213-006-9054-0
  5. Choi, S., Hwang, H. J., and Shin, H. K., "Research and development of achievement and assessment standards for school mathematics based on the 7th national curriculum," Journal of Educational Research in Mathematics, Vol. 12, No. 1, pp. 145-162, 2002.
  6. Gim Chung, R. H., Kim, B. S., and Abreu, J. M., "Asian American multidimensional acculturation scale: Development, factor analysis, reliability, and validity," Cultural Diversity and Ethnic Minority Psychology, Vol. 10, No. 1, pp. 66-80, 2004. https://doi.org/10.1037/1099-9809.10.1.66
  7. Gong, B., "The situation and security measures of industrial technology security management of SMEs," The Korean Society of Private Security, Vol. 18, No. 1, pp. 1-26, 2019.
  8. Government of Saskatchewan, Project Security Compliance Assessment Checklist, 2011.
  9. Huh, Y. D., "A study on the determinants of and relationship between technology import and R&D," Korean Management Review, Vol. 25, No. 3, pp. 83-110, 1996.
  10. Hwang, K., "R&D accountability and dilemma within the Korean science and technology context," Korean Public Administration Review, Vol. 50, No. 2, pp. 189-213, 2016. https://doi.org/10.18333/KPAR.50.2.189
  11. Kang, H., "A guide on the use of factor analysis in the assessment of construct validity," J Korean Acad Nurs, Vol. 43, No. 5, pp. 587-594, 2013. https://doi.org/10.4040/jkan.2013.43.5.587
  12. Kang, S. J., Research Security Theory, Korean Studies Information, 2014.
  13. Kim, B. R., "Building evaluation structure for selecting contractor in local government's contracting-out of welfare service," Journal of Regional Studies, Vol. 14, No. 2, pp. 69-94, 2006.
  14. Kim, H. and Kim, B. K., "Analyzing the effectiveness of public R&D subsidies on private R&D expenditure," Journal of Korea Technology Innovation Society, Vol. 15, No. 3, pp. 649-674, 2012.
  15. Kim, H. and Koo, N., "Prevention of divulgence and protection of national core technology," Journal of the Korean Society of Automotive Engineers, Vol. 42, No. 5, pp. 21-24, 2020.
  16. Kim, S., "A review on security management of government-sponsored R&D program," Korean Journal of Industry Security, Vol 1, No. 1, pp. 75-91, 2009.
  17. Kim, S., Park, J., and Park, G., "Research of dealing with Industrial technology disclosure crime," The Journal of Korean Association of Security and Safety, Vol. 9, No. 1, pp. 91-109, 2013.
  18. Kim, S., "Strategic implications of open innovation for the public sector," STEPI Insight, Vol. 28, pp. 1-28, 2009.
  19. Kim, Y., "Development of indicators for evaluating the web credibility by goodness-of-fit analysis," Journal of the Korean Society for Information Management, Vol. 25, No. 4, pp. 185-204, 2008. https://doi.org/10.3743/KOSIM.2008.25.4.185
  20. Kim, Y. O., "A study on the development of prosocial behavior scale for young children," Korean J Child Stud, Vol. 24, No. 5, pp. 105-118, 2003.
  21. Korea Institute of Human Resources Development in Science and Technology, An Introduction of R&D Management in Science and Technology, 2019.
  22. Korea Institute of Human Resources Development in Science and Technology, Understanding Research Security, 2015.
  23. Korea Internet & Security Agency, Information Security Management System, 2018.
  24. Korean National Police Agency, stats statistical data, 2020.
  25. Kwon, N., Lee, J., and Chung, E., "Understanding scientific research lifecycle : based on bio and nano scientists' research activities," Journal of the Korean Society for Library and Information Science, Vol. 46, No. 3, pp. 103-131, 2012. https://doi.org/10.4275/KSLIS.2012.46.3.103
  26. Kwon, W. H., "A study on the concept of R&D phases: From basic research to product development," KAST Research Report, Vol. 73, pp. 1-68, 2010.
  27. Kwon, Y. and Lim, J., "New business development of small venture firms through open innovation strategy: A case of acquiring technology from university," The Journal of Intellectual Property, Vol. 8, No. 2, pp. 151-177, 2013. https://doi.org/10.34122/jip.2013.06.8.2.151
  28. Lederman, L. C., "Assessing educational effectiveness: The focus group interview as a technique for data collection," Communication Education, Vol. 39, No. 2, pp. 117-127, 1990. https://doi.org/10.1080/03634529009378794
  29. Lee, H., "A study on counter-measures on the technology leakage crimes an their enhancement," The Korean Society of Private Security, Vol. 11, No. 2, pp. 283-301, 2012.
  30. Lee, H. Y., "A study on the raised problems related to complementing the industrial technology outflow prevention and protection law," Inha Law Review: The Institute of Legal Studies Inha University, Vol. 11, No. 3, pp. 67-95, 2008.
  31. Lee, J., "researcher-centric security management system", Ph.D. Thesis, Chung-Ang University, 2018.
  32. Lee, K. and Yeom, D., "A study on the establishment of weight for sustainability assessment indicators and test scoring for super high-rise residential complexes," Journal of the Architectural Institute of Korea Planning & Design, Vol. 24, No. 3, pp. 23-32, 2008.
  33. Lee, S., "A study on the effective method for the prevention of industrial secrets leakage," Chung_Ang Law Review, Vol. 21, No. 1, pp. 39-80, 2019. https://doi.org/10.21759/CAULAW.2019.21.1.39
  34. Lee, S. B. and Kim, M. S., "The method of evaluating the validity in making the checklist of statistical method," Journal of the Korean Data And Information Science Society, Vol. 9, No. 2, pp. 323-336, 1998.
  35. Lee, Y. and Kang, D., "Empirical study on the determinants of improving open innovation performance: Based on new product development collaboration with suppliers," Journal of Korea Technology Innovation Society, Vol. 21, No. 3, pp. 1050-1076, 2018.
  36. Lisa, M. and Tina, M., "Chemical laboratory safty and security," The National Academies Press, pp. 59-70, 2011.
  37. Ludvigson, S. C. and Ng, S., "The empirical risk-return relation: A factor analysis approach," Journal of Financial Economics, Vol. 83, No. 1, pp. 171-222, 2007. https://doi.org/10.1016/j.jfineco.2005.12.002
  38. Ministry of Science and ICT, Regulations on the Management, Etc. of National Research and Development Projects, 2020.
  39. Ministry of Science, ICT and Future Planning, Manual of Security Management on National Research Development Project, 2014.
  40. Ministry of Trade, Industry and Energy, Act on Prevention of Divulgence and Protection of Industrial Technology, 2020.
  41. MISWG(The Multinational Industrial Security Working Group), Project Security Instruction, 2007.
  42. National Intelligence Service, Industrial Security White Paper, 2015.
  43. National Security Authority, Industrial Security Manual Finland, 2011.
  44. NAVER, "research," "security," https://dict.naver.com, May 2020.
  45. Park, C. and Hwang, J. H., "Countermeasures against national outflows," STEPI Insight, Vol. 120, pp. 1-33, 2013.
  46. Park, K. H. and Jang, M. H., "Exploring decision-making factors of psychiatric nurses in the application of seclusion and restraint: Applying focus group interviews," Journal of Korean Academy of Psychiatric and Mental Health Nursing, Vol. 27, No. 4, pp. 380-393, 2018. https://doi.org/10.12934/jkpmhn.2018.27.4.380
  47. Park, W., Son, S. Y., Park, H., and Park, H. S., "A proposal on determining appropriate sample size considering statistical conclusion validity," Seoul Journal of Industrial Relations, Vol. 21, pp. 51-85, 2010.
  48. Roh, H., "A study on the countermeasure of industrial technology outflow," Korean Association of Public Safety and Criminal Justice Review, Vol. 17, No. 1, pp. 45-77, 2008.
  49. Ryoo, W. and Jung, H., "Defining and tailoring R&D standard process to improve the quality of R&D outcomes," Journal of the Korean Institute of Industrial Engineers, Vol. 43, No. 2, pp. 112-119, 2017. https://doi.org/10.7232/JKIIE.2017.43.2.112
  50. SANS(SysAdmin, Audit, Network and Security) Institute, Lab Security Policy, 2014.
  51. Society for e-Business Studies, A study on the Improvement of the National R&D Programs Security Management System and the Revision of the Standard Manual, Science and Technology Comprehensive Coordination Support Project Report, 2017.
  52. The Korean Association for Research of Industrial Security, Industrial Security Studies, 2019.
  53. Um, I., Hong, C., and Hwang, W., "Optimal ratio of r&d investment and improvement methods for sustainable economic growth," Kistep Issue Paper, Vol. 17, pp. 1-64, 2019.
  54. Vagias, W. M., "Likert-type scale response anchors," Clemson International Institute for Tourism & Research Development, Department of Parks, Recreation and Tourism Management, Clemson University, 2006.
  55. Williams, B., Onsman, A., and Brown, T., "Exploratory factor analysis: A five-step guide for novices," Australasian Journal of Paramedicine, Vol. 8, No. 3, 2010.
  56. Yang, C. J., Hong, J. S., and Ko, S. W., "Impulse Responses Analysis of Government and Public Sector R&D in IT Industry," Korean Management Science Review, Vol. 25, No. 3, pp. 13-26, 2008.
  57. Yim, S. and Jung, U., "A study on the strategic management of the public R&D facilities: The direction of service quality improvement and managerial role reformation," Journal of Korea Technology Innovation Society, Vol. 12, No. 2, pp. 388-412, 2009.
  58. Yoo, I., Seo, B., and Park, D., "The role of open innovation for SMEs R&D success," Journal of Intelligence and Information Systems, Vol. 24, No. 3, pp. 89-117, 2018. https://doi.org/10.13088/jiis.2018.24.3.089
  59. Yoon, C., "A study on the improvement of product management system in international collaborative research," Journal of Korea Technology Innovation Society, Vol. 12, No. 3, pp. 499-524, 2009.
  60. Yoon, H., Hong, A., and Jung, S., "The effects of R&Ds, technology innovation capability and the innovation support system of small- and medium-sized businesses on the company performance," Innovation Studies, Vol. 13, No. 2, pp. 209-238, 2018. https://doi.org/10.46251/INNOS.2018.05.13.2.209
  61. You, Y. C., "The study of applying the indices of performance evaluation on the research and development in agricultural science and technology," Korean Public Administration Quarterly, Vol. 24, No. 1, pp. 27-49, 2012.
  62. Yun, S. and Kim, J., "A study on security requirments analysis through security threat modeling of home IoT appliance," The Journal of Society for e-Business Studies, Vol. 24, No. 2, pp. 113-124, 2019.