Browse > Article
http://dx.doi.org/10.13089/JKIISC.2011.21.4.77

Promising Fields for Promoting Workforce in Knowledge Information Security Sector: A Case of KISA Employment-Contract Master Program  

Jun, Hyo-Jung (Department of Management Information Systems, Chungbuk National University)
Kim, Tae-Sung (Department of Management Information Systems, Chungbuk National University)
Abstract
As information services have been widely used in various environments, the knowledge information security sector plays a significant role in development and management of products and services, information privacy management, risk management and safety, etc. Thus, the process of acquiring knowledge information security professionals is getting more attention for promoting the stable and long-term development of the knowledge information security sector. This study identifies and analyzes the promising fields for the KISA Employment-Contract Master Program and suggests promotion strategies for knowledge information security professionals. By surveying participants and would-be participants, and interviewing experts, it is analyzed that 'mobile security' and 'convergence security' are the two most important fields to be included in the program.
Keywords
Workforce Promotion; Promising Fields; Knowledge Information Security; Analytic Hierarchy Process;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 IBM, IBM Security Technology Outlook: An Outlook on Emerging Security Technology Trends, pp. 1-16, Oct. 2008.
2 IBM, Introducing the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security, pp. 1-8, Mar. 2009.
3 IDC, Secure Enterprise Threat Management through an Integrated Security Framework, pp. 1-13, Aug. 2006.
4 IDC, Utilizing Professional Services to Cut Costs by Minimizing Deployment Risks, pp. 1-9, Sep. 2009.
5 Microsoft, Business-Ready Security, pp. 1-10, Nov. 2009.
6 NIST, Information Technology Security Training Requirements: A Role- and Performance-based Model, Special Publication 800-16, pp. 1-171, Apr. 1998.
7 Rand Corporation, The Global Technology Revolution 2020: In-depth Analyses, pp. 1-281, 2006.
8 T.L. Saaty, "Diagnosis with dependent symptoms: Bayes theorem and the Analytic Hierarchy Process," Operations Research, Vol.46, No.4, pp. 491-502, Aug. 1998.   DOI   ScienceOn
9 T.L. Saaty, The Analytic Hierarchy Process: Planning, Priority Setting, Resource Allocation, McGraw-Hill, pp. 1-287, Jan. 1980.
10 VTT, Technology Roadmap of Security Research, pp. 1-33, 2007.
11 www.itstat.go.kr (IT통계포탈), 2010.11.
12 www.kisa.or.kr (한국인터넷진흥원), 2010.11.
13 www.kisia.or.kr(지식정보보안산업협회), 2010.11.
14 한국인터넷진흥원, 국가 정보보호 교육 프레임워크 개발, pp. 1-92, 2009년 11월.
15 방송통신위원회, 행정안전부, 지식경제부, 2010 국가정보보호백서, pp. 1-333, 2010년 4월.
16 전효정, 김태성, 유진호, 지상호, "정보보호 분야 직무체계 개발," 정보보호학회논문지, 19(3), pp. 143-152, 2009년 6월.
17 지식경제부, 지식정보보안 IT전략기술로드맵 2015, pp. 1-29, 2009년 7월.
18 한국인터넷진흥원, 지식정보보안 분야 인력 현황 및 중장기 인력수급 전망 분석, pp. 1-242, 2010년 10월.
19 한국정보보호진흥원, 유비쿼터스 환경에서의 정보보호 정책 방향, pp. 1-326, 2008년 3월.
20 한국정보보호진흥원, 2007 국내 정보보호산업 시장 및 동향 조사, pp. 1-227, 2007년 11월.
21 Alcatel-Lucent, Creating the Trusted, Dynamic Enterprise: An Enterprise Security Blueprint, pp. 1-12, Jul 2009.
22 CheckPoint, Comprehensive Endpoint Security, pp. 1-10, 2009.
23 Cisco, Cisco Smart Business Roadmap - Security, pp. 1-8, 2006.
24 EU, Beyond the Horizon: Thematic Group 3 - Security, Dependability and Trust, pp. 1-23, Jan. 2006.