• Title/Summary/Keyword: 내부자적 연구

Search Result 104, Processing Time 0.02 seconds

A Study on the Institutional Improvement Directions of Industrial Security Programs: Focused upon Policies and Practices in the U.S. (산업보안의 제도적 발전방안 연구: 미국 사례를 중심으로)

  • Choi, Justin Jin-Hyuk
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.197-230
    • /
    • 2010
  • This study examined the institutional improvement directions of industrial security programs, particularly focusing upon policies and practices in the U.S., to enhance the effectiveness of industrial security programs in Korea. This study also aimed to investigate the significance of institutional and/or policy implementations in preventing economic espionage attempt. Data leakage and/or loss of trade secrets in corporations has been a scary proposition and a serious headache to both the CEOs and the CSOs(Chief Security Officers). Security professionals or practitioners have always had to deal with data leakage issues that arise from e-mail, instant messaging(IM), and other Internet communication channels. In addition, with the proliferation of wireless and mobile technology, it's now much easier than ever for loss by data breaches to occur, whether accidentally or maliciously or even by an economic espionage attempt. The researcher in this study used both a case study and a comparative research to analyze the different strategies and approaches between the U.S. and Korea in regard of implementing policies to mitigate damages by economic espionage attempts and prevent them from occurring. The researcher first examined the current policies and practices in the U.S. in terms of federal government's and agencies' approach and strategies on industrial security programs and their partnerships with private-commercial-sectors. The purpose of this paper is to explain and suggest selected findings, and a discussion of actions to be taken on implementing a proactive and tactical approach to enhance the effectiveness of industrial security programs to fight against information loss or data leaks. This study used case reviews, literatures, newspapers, articles, and Internet resources relating to the subject of this study for triangulation of data. The findings during this research are as follows. This research suggests that both the private and the governmental sector should closely cooperate in the filed of industrial security to strengthen its traditional prevention strategies and reduce opportunities of economic espionage as well. This study finally recognizes both the very importance of institutional development led by the Government in preventing economic espionage attempts and its effectiveness when properly united with effective industrial security programs.

  • PDF

A Case Study on the Application of Security Policy for Outsourcing Personnel in case of Large-Scale Financial IT Projects (금융회사 대형 IT프로젝트 추진 시 외주직원에 대한 보안정책 적용 사례 연구)

  • Son, Byoung-jun;Kim, In-seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.193-201
    • /
    • 2017
  • Financial firms strengthen to protect personal information from the leakage, introducing various security solutions such as print output security, internet network Isolation system, isolationg strorage of customer information, encrypting personal information, personal information detecting system, data loss prevention, personal information monitoring system, and so on. Financial companies are also entering the era of cutthroat competition due to accept of the new channels and the paradigm shift of financial instruments. Accordingly, The needs for security for customer information held by financial firms are keep growing. The large security accidents from the three card companies on January 2014 were happened, the case in which one of the outsourcing personnel seized customer personal information from the system of the thress card companies and sold them illegally to a loan publisher and lender. Three years after the large security accidents had been passed, nevertheless the security threat of the IT outsourcing workforce still exists. The governments including the regulatory agency realted to the financail firms are conducting a review efforts to prevent the leakage of personal information as well as strengthening the extent of the sanction. Through the analysis on the application of security policy for outsourcing personnel in case of large-scale Financial IT projects and the case study of appropriate security policies for security compliance, the theis is proposing a solution for both successfully completing large-scale financial IT Project and so far as possible minizing the risk from the security accidents by the outsouring personnel.

Outsider Trading Regulation under the Capital Markets Act (자본시장법상 외부자거래의 규제와 개선방안)

  • Chang, Kun-Young
    • Journal of Legislation Research
    • /
    • no.41
    • /
    • pp.367-399
    • /
    • 2011
  • This Article examines the regulation of outsider trading under the Financial Investment Services and Capital Markets Act (the "Capital Markets Act"). Outsider trading occurs when a market participant who is not a traditional corporate insider trades securities based on either "inside" or "outside" nonpublic information. Unlike "inside" information, "outside" information is referred to as information not derived directly or indirectly from the issuer. "Outside" information includes both "corporate" and "market" information. "Corporate information" is information about events or circumstances which affect the company's assets or earning power. "Outside corporate information" is information about the company's assets or earning power not derived directly or indirectly from the issuer. "Market information" is information about events or circumstances which affect the market for a company's securities but which do not affect the company's assets or earning power. The Capital Markets Act prohibits both "temporary insiders" from using "corporate" information in trading securities and "outsiders" from using "market" information, such as (i) information regarding the initiation or discontinuance of a tender offer; or (ii) information regarding acquisition or disposition of stocks in bulk. However, the Act does not encompass circumstances (i) where an outsider trades securities based on confidential corporate information obtained through certain types of wrongful conduct; (ii) where an outsider trades securities based on corporate information obtained through eavesdropping; and (iii) where an outsider trades securities based on either outside corporate information or market information created by the outsider himself. In order to plug a few of the gaps left open in the law of outsider trading under the Capital Markets Act, this Article suggests that regulators adopt a relatively broad reading of the scope of ${\S}$ 178(1) of the Act, which is similar to SEC Rule 10b-5, to include outsiders with no relationship to the corporation that had issued the securities. Since ${\S}$ 178(1) of the Act does not require "deception" for liability, it would seem to evade the limitations imposed by the U.S. misappropriation theory. Key Words : Outsider Trading, Insider Trading, Material Nonpublic Information, the Capital Markets Act, Misappropriation Theory, Fiduciary Theory.

The Korean Girl Group Kara's Differentiation Strategy Which Overcome the Trilemma and Led to the Great Reversal Success (삼중고 탈피 후 대역전의 성공을 이끈 걸 그룹'카라'의 차별화 전략)

  • Kim, Jeong-Seob
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.2
    • /
    • pp.169-178
    • /
    • 2021
  • The Korean girl group "Kara" has suffered the trilemma of its de facto failure to debut, the crisis of team breakup, and the CEO crisis of the agency. But the group has made an outstanding achievement in the history of Korean pop music after overcoming all odds. Their success strategy has never been disclosed by insiders involved in Kara's total music projects. This study has been carried out in the analysis of the strategy to provide academic implications and to honor the contribution of the late CEO Ho-yeon Lee and Kara's key member Ha-ra Gu. Therefore, between Nov. and Dec. 2020, we conducted in-depth interviews with managers, composers, stylists and Ha-ra Gu(Only in 2019, before her death) who took part in the project. The research model is set up by combining Porter's Competitive Advantage Strategy and the music value chain model into categories of "Product Innovation Differentiation (PD)" (producing, album production, performance activities) and "Marketing Differentiation (MD)" (market targeting, image specialization, promotion and communication). The analysis showed that the PD focused on complete rediscovered harmonization and revalued members' personality and sincerity with peppy songs and dainty dances as well as emission of "bright energy" which caused healing effects instead of mimicking other star singers recklessly. In terms of MD, they selected Japan's 10-20s as their main market, increasing intimacy with fans and media with the image of cute+pretty+classy+sexy. The result suggests that Poter's differentiation can function as a meaningful strategy frame in the fostering, hit, and revival of idol groups. In addition, it reaffirmed that spontaneous and passionate activities of early-stage or celebrity fan may serve as a valid catalyst for realizing differentiation, as Kara's caller of Japanese actor Gekidan Hitori caused a strong "priming effect" that drove Kara's unexpected wonderful success in Japan.