Browse > Article
http://dx.doi.org/10.33778/kcsa.2019.19.4.003

Analysis of Security System Priority for the Systematic Defense Technology Security  

Park, Heungsoon (국방부 정보화기획관실 소프트웨어융합정책과)
Kim, Seyong (국방부 정보화기획관실 소프트웨어융합정책과)
Kim, Yonghwan (국방부 정보화기획관실 소프트웨어융합정책과)
Publication Information
Abstract
The outflow of defense technology can cause serious damage not only in terms of business losses, but also in terms of national security and national interests. Recently, the government has enacted the Defense Technology Security Act, recognizing the importance of technology in the defense industry, and prepared guidelines for the defense technology security accordingly. According to the law, institutions and companies with defense technologies should establish a defense technology protection system, and the government should implement various technology protection policies to improve their level of technology protection. In this study, the implications were derived by comparing existing technology protection guidelines and priority analysis was performed on the protection system details through AHP for self-diagnosis items in the defense technology security guidelines. As a result, it is expected that it will enable efficient diagnosis of the level of protection and policy support for the systematic establishment of the protection system for the target institutions.
Keywords
Defense technology security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Jong-ho Kim, "The emerging technology protectionism and competition conolidating scheme on the knowledge property," Law Review, vol. 50, pp. 55-94, Jun. 2013.
2 Jeong-Woo Chae, Jin-Hong Jeong, "Study on decision making for the industrial security management factor's priority," Journal of Society Engineering, vol. 10, no. 2, pp. 123-140, Apr. 2013.
3 Hangbae Chang, "The design of information security management system for SMEs industry technique leakage prevention," Journal of Korea Multimedia Society, vol. 13, no. 1, pp. 111-121, Jan. 2010.
4 Junsuk Hong et al., "Small business technological assets protection factors analysis using logistic regression analysis," The Journal of Society for e-Business Studies, vol. 20, no. 3, pp. 1-10, Aug. 2015.
5 Je-Min Bae et al., "A study on design direction of industry-centric security level evaluation model through analysis of security management system," The Journal of Society for e-Business Studies, vol. 20, no. 4, pp. 177-191, Nov. 2015.
6 국방기술품질원, '국방과학기술용어사전', 2017.
7 H. Park, et. al., "Conceptualization of Defense Industrial Security in Relation to Protecting Defense Technologies," in Proc. Computational Science and Its Applications - ICCSA 2018, pp. 158-169, July 2018.
8 Hyungjin Lee, "A study on the meaning of the enactment of defense technology security act and awareness improvement," Korean Journal of Industrial Security, vol. 6, no. 2, pp. 57-80, Dec. 2016
9 박흥순, "방위산업 사이버 보안을 위한 방산 정보 공유.분석센터(ISAC) 설립 방안," 정보보호학회지, 제28권, 제6호, pp. 56-62, 2018.
10 중소기업청, 대중소기업협력재단, '2016 중소기업 기술보호 수준 실태조사', 2017.
11 산업통상자원부, '산업기술보호지침 및 매뉴얼', 산업통상자원부, 2017.
12 중소벤처기업부, '중소기업기술 보호 지침', 대.중소기업.농어업협력재단, 2018.
13 방위사업청, '방위산업기술 보호지침', 2019
14 Thomas L. Saaty, Decision Making for Leaders: The Analytic Hierarchy Process for Decisions in a Complex World, 3rd ed., RWS Publications, Sep. 2012.
15 방위사업청, '방위산업물자 및 방위산업체 지정 규정', 2018.