• Title/Summary/Keyword: 연구자 중심 보안

Search Result 27, Processing Time 0.019 seconds

A Study on the Research Security System of the Researcher-Centric (연구자 중심의 연구보안 체계 개선방안 연구)

  • Lee, Jeakyun;Na, Onechul;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.65-84
    • /
    • 2018
  • The government is continuously expanding its national R&D investment to actively respond to the advent of the $4^{th}$ industrial revolution era and to develop the national economy. The R&D structure is likely to be liberalized as the paradigm shifts from the pursuit type R&D to the leading type R&D, and R&D capacity enhancement that focuses on researchers' creativity is emphasized. Such changes in R&D environment will increase the risk of security accidents such as leakage of research information. In addition, security policy for protection of research result should be the Researcher-Centric Security and security policy should be changed. This study explored transforming the research security system into the Researcher-Centric Security system so that researchers can voluntarily implement necessary security measures in the course of conducting research.

An Exploratory Study for Designing Researcher-Centric Research Security Information Requirements (연구자 중심의 연구보안 정보요구사항 설계를 위한 탐색적 연구)

  • SoYoung Han;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.11 no.1
    • /
    • pp.23-37
    • /
    • 2023
  • As the importance of R&D increases amid the paradigm of technology hegemony competition, countries around the world are increasing investment in R&D, at the same time, making effrots to portect R&D. Centering to technology-leading countries, such as Korea, the United States and Japan, they reorganize research security regulations to protect national R&D; however, the burden of compliance for researcher and research institutes is still high. Korea enacted the National R&D Innovation Act and the Enforcement Decree of the same Act to establish an integrated and systematic research security support system, but research institutes and researchers still lack understanding and practice of research security. In order to strengthen researcher's research security compliance, this study organized information requirements for each security management area through domestic and foreign research security laws and prior research analysis, and designed research security information requirements items centered on researchers. The designed information requirements are meaningful in that they were designed by considering both the management area and the stage of R&D, focusing on researchers performing R&D in the field. Based on the designed information requirements items, it is expected that systematic security management will be possible at the research site, which will ease the security burden of researchers and improve research security compliance at the research and development site.

  • PDF

The Observational Study on Researcher Security Design Direction by R&D Security Accident Case (연구보안 사고사례분석을 통한 연구자 보안대책 설계방향 관찰연구 )

  • Youngkwon Kim;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.10 no.4
    • /
    • pp.91-96
    • /
    • 2022
  • Recently, the importance of Research and Development(R&D) security as well as R&D investment is emphasized in the flow of technology hegemony competition, where technology is directly related to national competitiveness.However, despite the enormous impact of the R&D security failure results, research output leakage accidents continue to occur.To solve this problem, this study analyzed leakage accidents and cases of R&D output and concluded that it is priory to develop regulations to raise security awareness at the field researcher level rather than the macroscopic security management system. In addition, in order to design the direction of the researcher security measures, observational study was conducted at the university research site, and four directions were presented, including case analysis and integration. The direction for designing researcher security measures will be used as a basis for developing security regulations specialized in future research sites and security management systems for research institutes.

국내 암호연구 성과에 대한 소고: Crypto DB를 중심으로

  • Park, Sang-Min;Kim, Tae-Sung
    • Review of KIISC
    • /
    • v.22 no.6
    • /
    • pp.22-28
    • /
    • 2012
  • 정보서비스 이용이 보편화됨에 따라 개인과 조직 모두에게 보안은 매우 중요한 이슈가 되었다. 보안위협에 대비하기 위해 사용되는 정보보안 제품 및 서비스에 필수적인 요소가 암호이며, 정보 이용 및 관리 환경이 다양해짐에 따라 그 중요성이 점차 강조되고 있다. 암호분야의 지속적인 발전을 위해서는 관련 연구의 성과에 대한 측정 및 평가가 필수적일 것이다. 본고에서는 세계암호학회(International Association for Cryptologic Research, IACR) 주관의 학술행사 및 학술지에서 발표된 논문을 기준으로 암호분야 연구의 성과를 고찰하였다. 발표논문편수와 발표자수 기준으로 국내 암호연구 성과를 파악하였고, 국내 연구자의 연구결과물의 국제적 위상에 대해 비교하였다.

A Study on the Effect of Institutionalization of the Security Education : Survey of National R&D Projects (국가연구개발사업 보안교육 실태조사를 통한 교육제도화에 관한 연구 -정부출연연구기관을 중심으로-)

  • Cho, Moo-Kwoan;Kim, Seong-Cheol;Hwang, Jeong-Mi;Kim, Seung-Chul
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.2
    • /
    • pp.21-29
    • /
    • 2014
  • In spite of the R&D level of Korea, the efforts to protect the R&D results from outflowing has not been raised up. We investigated the current status of security education and the level of researcher's awareness for research security in the government-financed institutes. Also, we attempted to find out the needs for institutionalization of the security education. We conducted a survey and in-depth interviews of all the security officers in the thirty-seven government-financed institutes. The results show that the awareness level of the researchers for R&D security is below adequate level, and that security education is necessary in order to increase the security awareness. Also, it is necessary to institutionalize the security education.

  • PDF

A Study on Integrated Management System of Researcher Identifiers based on the ISNI (International Standard Name Identifier) (국제표준이름식별자(ISNI)를 중심으로 한 연구자 식별자의 통합관리체계 연구)

  • Byeon, Hoi-Kyun;Oh, Bok-hee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.29 no.3
    • /
    • pp.139-155
    • /
    • 2018
  • This study proposed an integrated management system model of researcher identifiers using the ISNI(International Standard Name Identifier) that can prevent duplicate issuance of identifiers and can be used to reorganize the authors' information. We looked at the metadata structure and management system of the ISNI that can be applied in various fields among identifiers. And we have designed the integrated ID system and system model that can manage the identifiers issued by each institute based on the ISNI. This model consists of data structure layer, platform layer, application layer, management and security layer (4 layers) and we have presented some of the key features and issues to consider when managing the integrations.

A Priority Analysis on E-Commerce Security Factors - Focused on Researchers and Practitioners (전자상거래를 위한 보안 항목 우선순위 분석: 연구자그룹과 실무자그룹을 중심으로)

  • Kim, Hyun-Woo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.5
    • /
    • pp.163-171
    • /
    • 2011
  • In e-commerce environment, security should be considered as an essential factor for success. In this paper, we analyze security requirements for e-commerce system, and it is focused on the practical usage, not theoretical contribution, in the field of e-commerce security. To identify the security requirements being specific to e-commerce environment, the researches related to e-commerce security are surveyed and a phase of Delphi method and Analytic Hierarchy Process(AHP) are used to determine the relative importance of e-commerce security factors. Since researchers and practitioners can have significantly different views because of each different work environment, we divide the professionals into two respondents' group. This survey result can be useful security guidelines in the development of e-commerce service system from the initial system development step to the completion.

An Analysis of Research Trends in Information Security Based on Behavioral Economics (행동경제학 기반 정보보안 연구 동향 분석)

  • Oh, Myeong Oak;Kim, Jung Duk
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.39-46
    • /
    • 2019
  • Recently, information security accidents are becoming more advanced as social engineering attacks using new types of malicious codes such as phishing. Organizations have made various efforts to prevent information security incidents, but tend to rely on technical solutions. Nevertheless, not all security incidents can be prevented completely. In order to overcome the limitations of the information security approach that depends on these technologies, many researchers are increasingly interested in People-Centric Security. On the other hand, some researchers have applied behavioral economics to the information security field to understand human behavior and identify the consequences of the behavior. This study is a trend analysis study to grasp the recent research trend applying the concept and idea of behavioral economics to information security. We analyzed the research trends, research themes, research methodology, etc. As a result, the most part of previous research is focused on 'operational security' topics, and in the future, it is required to expand research themes and combine behavioral economics with security behavioral issues to identify frameworks and influencing factors.

TLS 안전성 연구 : 최근 Crypto 연구 결과를 중심으로

  • Byun, Jin Wook
    • Review of KIISC
    • /
    • v.23 no.5
    • /
    • pp.36-45
    • /
    • 2013
  • TLS 프로토콜은 인터넷 보안에서 가장 널리 사용되는 핵심 기술로서, 핸드쉐이크(handshake) 프로토콜과 레코드 레이어(record layer) 프로토콜로 구성된다. 핸드쉐이크에서 형성된 키를 이용하여 레코드 레이어 프로토콜에서 데이터들에 대해 인증, 무결성, 기밀성과 같은 정보보호 서비스를 제공한다. 이와 같이, TLS 프로토콜은 키 공유라고 하는 고전적인 암호학 문제를 포함하고 있기 때문에, 암호학 연구자들에게 접근성이 매우 뛰어난 연구 주제가 되어 왔다. 이를 반영하듯, 최근에 암호학 분야의 최고 권위 있는 Crypto학회에 TLS 이론 연구에 관한 논문이 연속적인 주제로 게재되었다. 본 논문에서는 최근 Crypto학회 및 eprint에 올라온 TLS와 관련된 최신 연구 동향 및 결과를 분석하여, TLS 프로토콜의 안전성을 연구하였다.

Research Trends in Information Security Economics: Focused on the Articles Presented at WEIS (보안경제성 연구동향 분석: WEIS 발표 논문을 중심으로)

  • Kang, Mi-Hwa;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1561-1570
    • /
    • 2015
  • Even though much investment to prevent or mitigate damage from information security breaches have been considered, researches on economically rational information security decision-making such as investment, management, etc. are not introduced in Korea. This study analyzes research themes and methodologies of articles presented at the Workshop on the Economics of Information Security (WEIS) for 2002 - 2014. Results of the study can suggest future research topics for researchers, and help make rational information security decision-making for practitioners.