Browse > Article
http://dx.doi.org/10.13088/jiis.2017.23.1.143

Development on Early Warning System about Technology Leakage of Small and Medium Enterprises  

Seo, Bong-Goon (Graduate School of Business IT, Kookmin University)
Park, Do-Hyung (School of Management Information System, Kookmin University)
Publication Information
Journal of Intelligence and Information Systems / v.23, no.1, 2017 , pp. 143-159 More about this Journal
Abstract
Due to the rapid development of IT in recent years, not only personal information but also the key technologies and information leakage that companies have are becoming important issues. For the enterprise, the core technology that the company possesses is a very important part for the survival of the enterprise and for the continuous competitive advantage. Recently, there have been many cases of technical infringement. Technology leaks not only cause tremendous financial losses such as falling stock prices for companies, but they also have a negative impact on corporate reputation and delays in corporate development. In the case of SMEs, where core technology is an important part of the enterprise, compared to large corporations, the preparation for technological leakage can be seen as an indispensable factor in the existence of the enterprise. As the necessity and importance of Information Security Management (ISM) is emerging, it is necessary to check and prepare for the threat of technology infringement early in the enterprise. Nevertheless, previous studies have shown that the majority of policy alternatives are represented by about 90%. As a research method, literature analysis accounted for 76% and empirical and statistical analysis accounted for a relatively low rate of 16%. For this reason, it is necessary to study the management model and prediction model to prevent leakage of technology to meet the characteristics of SMEs. In this study, before analyzing the empirical analysis, we divided the technical characteristics from the technology value perspective and the organizational factor from the technology control point based on many previous researches related to the factors affecting the technology leakage. A total of 12 related variables were selected for the two factors, and the analysis was performed with these variables. In this study, we use three - year data of "Small and Medium Enterprise Technical Statistics Survey" conducted by the Small and Medium Business Administration. Analysis data includes 30 industries based on KSIC-based 2-digit classification, and the number of companies affected by technology leakage is 415 over 3 years. Through this data, we conducted a randomized sampling in the same industry based on the KSIC in the same year, and compared with the companies (n = 415) and the unaffected firms (n = 415) 1:1 Corresponding samples were prepared and analyzed. In this research, we will conduct an empirical analysis to search for factors influencing technology leakage, and propose an early warning system through data mining. Specifically, in this study, based on the questionnaire survey of SMEs conducted by the Small and Medium Business Administration (SME), we classified the factors that affect the technology leakage of SMEs into two factors(Technology Characteristics, Organization Characteristics). And we propose a model that informs the possibility of technical infringement by using Support Vector Machine(SVM) which is one of the various techniques of data mining based on the proven factors through statistical analysis. Unlike previous studies, this study focused on the cases of various industries in many years, and it can be pointed out that the artificial intelligence model was developed through this study. In addition, since the factors are derived empirically according to the actual leakage of SME technology leakage, it will be possible to suggest to policy makers which companies should be managed from the viewpoint of technology protection. Finally, it is expected that the early warning model on the possibility of technology leakage proposed in this study will provide an opportunity to prevent technology Leakage from the viewpoint of enterprise and government in advance.
Keywords
Technology Leakage; Datamining; Early Warning System; SVM;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Ahn, H. C., I. G. Han, and K. J. Kim, "Purchase prediction model using the support vector machine," Journal of Intelligence and Information Systems, Vol.11, No.3(2005), 69-81.
2 Barniv, R., A. Agarwal, and R. Leach, "Predicting the outcome following bankruptcy filing: a three‐-state classification using neural networks," Intelligent Systems in Accounting, Finance and Management, Vol.6, No.3 (1997), 177-194.   DOI
3 Chae, J. W. and Y. H. Ko, "Exploring case Study on Security Factors and Strategy to Prevent Leakage of Corporate Information for CEO," The Journal of Professional Management, Vol.15, No.1(2012), 87-113.
4 Chang, E. M., "Effects of Individual Performance Based Compensation on Employee's Work Effort: In the context of Commitment HR Bundles," Korean Journal of Management, Vol.11, No.1, 133-158.
5 Chang, H. B. and J. H. Song, "The Exploratory Study on the Evaluation of Security System for Industrial Technology Leakage Prevention," Korean Journal of Industry Security, Vol.1, No.1(2009), 50-61.
6 Choi, E. R., B. G. Lee, Y. I. Park, and K. M. Park, "A Study on the Leaking Channels of Industrial Technology," Police Science Institute, Vol.26, No.1(2012), 225-260.
7 Choi, P. A. and M. H. Lee, "A Study on Industrial Security Factors Influencing Industrial Technology Outflow Prevention Using Logistic Regression," The Korean Society of Private Security, Vol.12, No.3(2013), 182-206.
8 Deci, E. L., & R. M. Ryan, "The empirical exploration of intrinsic motivational processes," Advances in experimental social psychology, Vol.13(1980), 39-80.
9 Heneman, R. L., Merit pay: Linking pay increases to performance ratings. Addison Wesley Longman, 1992
10 Hong, J. P., "The Effect of Technological Collaboration on the Innovation Performance of Small and Medium-sized Firms," The Journal of Small Business, Vol.27, No.3(2005), 3-32.
11 Hong, J. S., W. H. Park, Y. H. Kim, and K. H. Kook, "Small Business Technological Assets Protection Factors Analysis Using Logistic Regression Analysis," The Journal of Society for e-Business Studies, Vol.20, No.3(2015), 1-10.
12 Kim, U. J, Modern technology management, economics, Ajin, Seoul, 2007
13 Hwang, H. D. and C. M. Lee, "A Study on the Relationship between Industrial Espionage, Self-Control, and Organizational Commitment," Korean Security Science Review, No.47(2016), 119-137.
14 Jung, J. S., "The Study of Protective Solution and People in Technology Outflow about SMEs," International commerce and information review, Vol.17, No.3(2015), 133-152.   DOI
15 Kim, D. B. and J. H. Kim, "Antecedents of the Performance Based Pay: A Comparison of Japanese and Korean Firms," Quarterly Journal of Labor Policy, Vol.11, No.1(2011), 25-54.
16 Kim, H. J. and J. H. Ahn, "An Empirical Study of Employee's Deviant Behavior for Improving Efficiency of Information Security Governance," The Journal of Society for e-Business Studies, Vol.18, No.1(2013), 147-165.   DOI
17 Kim, M. B. and K. J. Kim, "The law regarding the outflow prevention & a protection of industrial technology and Issues," Intellectual Property Society, Vol.23, No.2(2007), 1-36.
18 Korea Small Business Institute, "Status and Tasks of SME Technology Protection Support Policy", KOSBI SME Foucs, Vol.14, No.17(2014).
19 Lee, C. S. and Y. H. Kim, "An Analysis of Relationship between Industry Security Education and Capability," The Journal of Society for e-Business Studies, Vol.20, No.2(2015), 27-36.   DOI
20 Lee, M. S. and R. G. Choe, "Imitation Strategy, Environment, and Business Performance in followers," Korean Management Review, Vol.31, No.2(2002), 405-429.
21 Mohr, J. J., "The management and control of information in high-technology firms," The Journal of High Technology Management Research, Vol.7, No.2(1996), 245-268.   DOI
22 Noh, M. S. and S. Y. Lee, "Explaining Industrial Security of SMEs in Korea," Korean Public Administration Review, Vol.44, No.3(2010), 239-259.
23 Zhang, G., M. Y. Hu, B. E. Patuwo, and D. C. Indro, "Artificial neural networks in bankruptcy prediction: General framework and cross-validation analysis," European journal of operational research, Vol.116, No.1(1999), 16-32.   DOI
24 Tay, F. E. and L. J. Cao, "Modified support vector machines in financial time series forecasting," Neurocomputing, Vol.48, No.3(2002), 847-861.   DOI
25 Yang, K. Y., "The Limitations and New Agendas for the New Managerial Reform Initiatives in Korean Local Governments," The Korean Journal of Local Government Studies, Vol.8, No.2(2004), 245-265.
26 Yu, G. C., "Determinants and Organizational Effectiveness of Performance-based Human Resource Management," Korean Journal of Management, Vol.15, No.3(2007), 187-224.