Browse > Article

A need assessment on the key tasks of convergence security specialists  

Woo, Kwang Jea (중앙대학교 인적자원개발학과)
Song, Hae-Deok (중앙대학교 인적자원개발학과)
Publication Information
Abstract
As the informative society becomes intensified, the rise of the convergence security offers an alternative strategic correspondence to the technology leaks that are becoming more advanced, complex, and intelligent. In order to the convergence security to provide its efficacy, training convergence security specialists is essential. However, research on the subject has yet to be considered sufficient. Thus this research focuses on defense industry security specialists to define the duty and analze critical task as well as drawn and therefore the required academic level of the critical task was examined. These research work contributes to the competence development of convergence security specialists and further enhancement on convergence security training process of academic institutions and job training institutions.
Keywords
DACUM;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 강경종, 김두현, 공배완, 연규일, 이민용, 백봉현. (2000). 경호경비원 직무분석. 서울: 한국직업능력개발원.
2 국방부. (2012). 방위산업보안업무훈령. 대한민국정부
3 김기윤, 나현미. (2000). 정보보호관리자에 대한 직무분석. 통신정보학회논문지, 10(3), 63-74.
4 김정덕, 김건우, 이용덕. (2009). 융합보안의 개념 정립과 접근방법. 정보보안학회지, 19(6). 68-73.
5 대학알리미. (2014). http://www.academyinfo.go.kr/ 에서 2014년 5월 1일 검색.
6 명지대학교. 융합보안학과 http://www.gss.mju.ac.kr 에서 2014년 5월 1일 검색.
7 박용호, 조대연, 김벼리, 노유경, 왕몽, 정희정, 홍순현. (2011). DACUM법을 이용한 초등학교 방과후학교 강사 직무분석. HRD연구, 13(1), 163-186.
8 산업통산자원부. (2014). 산업융합촉진법. 대한민국정부.
9 우광제, 송해덕. (2014). DACUM기법을 이용한 방위산업체 정보통신보안실무자 직무분석. 융합보안논문지, 14(4), 73-84.
10 장수용. (2007). 직부분석 이렇게 한다. Job Analysis. 서울: SBC 전략기업컨설팅.
11 조대연. (2009). 설문조사를 통한 요구분석에서 우선순위결정 방안 탐색. 교육학연구. 교육문제연구, 35, 165-187.
12 중앙대학교. (2014). 산업보안학과. http://www.cau.ac.kr 에서 2014년 10월 8일 검색.
13 최진묵, 권정옥. (2010). 융합보안시장 동향 보고. 삼성SDS저널, 7(2). 13-29.
14 한국산업기술보호협회. (2014). 산업보안교육. http://www.kaits.or.kr 에서 2014년 10월 10일 검색.
15 한국정보보호학회. (2010). 지식정보보안 분야 인력현황 및 중장기 인력수급 정망 분석. 서울: 한국인터넷진흥원
16 ASIS. (2014). Convergence of security risks. ASIS International. Retrieved May 4, 2014 from http://www.asis.org.uk/documents.
17 Booz, E. G., Allen, J. L., & Hamilton, C. L. (2005). Convergence of Enterprise Security Organization. Alexandria, VA: The Alliance for Enterprise Security Risk Management.
18 Brannick, M. T., Levine, E. L., & Morgeson, F. P. (2007). Job and work analysis: Methods, research, and application for human resource management(2nd ed.). Thousand Oaks, CA: SAGE.
19 CETE(Center on Education and Training for Employment). (2006). DACUM research chart for information security specialist. Columbus, OH: The Ohio State University.
20 Contos, B. T., Hunt, S., & Derodeff, C. (2007). Physical and logical security convergence: Powered by enterprise security management. Maryland Heights, MO: Syngress Publishing.
21 George, D., & Mallery, P. (2003). SPSS for Windows step by step: A simple guide and reference. 11.0 update (4th Ed.). Boston MA: Allyn & Bacon.
22 Krejcie, R. V., & Morgan, D. W. (1970). Determing sample size for research activities. Educational and Psychological Measurement, 30, 607-610.   DOI
23 Latimer-Livingston, N. S. (2007). Let's get physical: What clients are asking about the integration of physical and logical(IT) security. Retrieved April 8, 2014 from http://www.gartner.com/analyst/14279.
24 Lawshe, C. H. (1975). A quantitative approach to content validity. Personnel Psychology, 28(4), 563-575.   DOI
25 Norton, R. E., & Moser, J. (2008). DACUM Handbook(3rd ed.). Columbus, OH: Center of Education and Training for Employment, The Ohio State University.
26 Tyson, D. (2011). Security convergence: Managing enterprise security risk. Burlington, MA: Butterworth-Heinemann.
27 Nunnally, J. C. (1978). Psychometric theory (2nd Ed.). New York, NY: McGraw-Hill.
28 Slater, D. (2005). Security convergence, Defined. CSO online. Retrieved May 4, 2014 from http://www.csoonline.com/article/2118703/security-leadership/security-convergence--defined.html.