• Title/Summary/Keyword: Technology Protection Support System

Search Result 95, Processing Time 0.042 seconds

Perception differences between users and policy-makers on technology protection support system for small and medium-sized businesses (중소기업 기술보호지원제도에 대한 이용자와 정책담당자의 인식차이 분석)

  • Park, Sanghoon;Cho, Namwook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.37-48
    • /
    • 2017
  • As the risk of technical leakage is increasing, technology protection support systems for small and medium-sized businesses have gained attention. This paper analyzed the perception gap of the user and policy-maker regarding technology protection support systems. First, to identify key elements of technology protection support systems and construct measurement factors, interviews with experts are conducted. Then, surveys are conducted to analyze the perception differences between the users and policy-makers. Factor analysis and ANOVA have been utilized to analyze survey results. The result shows that the perception gaps exist in the following areas: management system, cost reduction, copyright protection, customer satisfaction, leakage prevention, and awareness. To enhance the effectiveness of technology protection support systems, this paper suggests technology protection support systems should be customized in terms of the company's size and type of busines.

A Study on the Activation Plan of the Support Systems for SMEs' Technology Protection (중소기업 기술보호 지원제도의 활성화 방안 연구)

  • Kim, Sung-won;Park, Hyun-ae;Lee, Hwansoo
    • Korean small business review
    • /
    • v.42 no.1
    • /
    • pp.1-17
    • /
    • 2020
  • As technology competition among companies has intensified, the importance of technology protection is increasing day by day. However, according to the status of technology leakage in Korea, the technology protection level of SMEs is weak. SMEs' technology leakage continues to occur, and the damage can be even more serious to SMEs. Thus, the government is operating various support systems for SMEs. However, despite the support system, the interest and use of SMEs is low. This study examines the current status of major support systems for SME technology protection in Korea, and empirically analyzes the recognition and expectation effects of companies on the support systems. Based on the results, this study discusses ways to improve the recognition and use of the support system. The results of this study will contribute to strengthening SMEs 'technology protection by increasing the utility and enhancing the utilization of the support systems.

Implementation and Evaluation of the Wibro-based Location Identification System for Air Base Protection Force (Wibro 기반 비행기지 방어전력 위치식별체계 구축 및 실험)

  • Pyo, Sang-Ho;Koo, Jung;Ko, Young-Bae;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.3
    • /
    • pp.306-314
    • /
    • 2012
  • This paper proposes a new system to maximize efficiency of Air Base Protection Operations through the development of location identification software. The Wibro-based location identification system for Air Base Protection Force offers Blue Ground Force digitalized character message which is not exposed to enemy. Also, it is possible to automatically provide the location of Blue Ground Force to Air Base Ground Operations Center. The test result proves that this system is very helpful when Air Base Protection Force executes Air Base Protection Operations.

Analysis of Child protection system from a preventive Perspective : Focusing on the German case (예방적 관점에서 살펴 본 아동학대 대응체계 분석 - 독일 사례를 중심으로 -)

  • Hong, Moonki
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.515-522
    • /
    • 2022
  • This study analyzed the child protection system in Germany from a preventive perspective and attempts to find the applicable implications to Korea. The research method was analyzed in terms of legal, policy and professionalism. The result is as follows. First, Child and Youth Support Act in Germany stipulated a preventive support system to restore the function of the family. Second, according to the Civil Act, it was stipulated that the family court could intervene early. Third, the federal Child Protection Act stipulated community cooperation for thd child protection system. Fourth, the Youth Agency as the general authority made it possible to provide preventive support and intervention at the same time. Firth, qualification standards were specified in the Child and Youth Support Act. Child protection specialists are granted to public officials who have worked for more than three years. The implications are as follows. First, the child protection system, which operates as a child abuse reporting system, should be expanded to a preventive support system. Second, it is necessary to expand monitoring by establishing an early warning system between networks in order to establish a support system for potentially at-risk children. Third, local governments should support children and parents flexibly and comprehensively for dysfunction caused by difficulties at home. Fourth, it is necessary to enact the Child Protection System Cooperation Act for a network cooperation system.

Proposed CCPS model for comprehensive security management of CCTV (영상정보처리기기(CCTV)의 포괄적 보안관리를 위한 암호·인증·보호·체계(CCPS) 모델 제안)

  • Song, Won-Seok;Cho, Jun-Ha;Kang, Seong-Moon;Lee, MinWoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.657-660
    • /
    • 2021
  • A video information processing system (CCTV) requires comprehensive administrative, physical, and technical security management to collect, transmit and store sensitive information. However, there are no regulations related to video information processing, certification methods for the technology used, and application standards suitable for security technology. In this paper, we propose a cryptography, certification, protection, system (CCPS) model that can protect the system by including encryption technology for application to the video information processing system and authentication measures for the technology used in the system configuration.

  • PDF

Analysis of Security System Priority for the Systematic Defense Technology Security (체계적인 방위산업기술보호를 위한 보호체계 우선순위 분석 연구)

  • Park, Heungsoon;Kim, Seyong;Kim, Yonghwan
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.3-12
    • /
    • 2019
  • The outflow of defense technology can cause serious damage not only in terms of business losses, but also in terms of national security and national interests. Recently, the government has enacted the Defense Technology Security Act, recognizing the importance of technology in the defense industry, and prepared guidelines for the defense technology security accordingly. According to the law, institutions and companies with defense technologies should establish a defense technology protection system, and the government should implement various technology protection policies to improve their level of technology protection. In this study, the implications were derived by comparing existing technology protection guidelines and priority analysis was performed on the protection system details through AHP for self-diagnosis items in the defense technology security guidelines. As a result, it is expected that it will enable efficient diagnosis of the level of protection and policy support for the systematic establishment of the protection system for the target institutions.

Small Business Technological Assets Protection Factors Analysis Using Logistic Regression Analysis (로지스틱 회귀분석을 이용한 중소기업 기술보호 요인 분석)

  • Hong, Jun Suk;Park, Won Hyung;Kim, Yanghoon;Kook, Kwang Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.1-10
    • /
    • 2015
  • The main objective of this study was to identify the factors that can maximize the effect of preventing technology leakage by government support. Therefore we used the 2013 small business technology protection capabilities and level of research which is conducted by the Small and Medium Business Administration, and have analyzed the presence of small business technological assets leakage protection eand skills. Multiple logistic regression analysis was performed to identify 1,518 small companies (43 big companies are excluded) which are divided into 155 technological assets leaked small business and non-leaked 1363 small business. The most important factors associated with technology leakage were entrant control system, security audit, employee absence of security activities and important data protection measures. This result shows that if the government can support more for these details, technological asset leakage prevention effect is expected to be maximized.

Design and Implementation of Secure Distribution System for Broadcasting Contents (방송 콘텐츠를 위한 안전한 유통 시스템 설계 및 구현)

  • Lee, Jin-Heung;Lee, Hea-Ju;Shin, Sang-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.19-27
    • /
    • 2007
  • Broadcasting contents protection system for HDTV has many difficult to apply file encryption technology that using the existing DRM systems. Therefore, this system has to be processed as accommodative about broadcasting contents format such as TS and PS and so on. Also, this system must support efficient encryption technology and random access mode. In addition, this system must have suitable key distribution mechanism in broadcasting environment. In this paper, we propose and implement encryption/key distribution scheme applicable to encoder/decoder without changing the existing MPEG system.

Study on the Establishment of the Act on the Prevention and Protection of Technology Leakage ('기술유출방지 및 보호지원에 관한 법률'제정에 관한 연구)

  • Noh, Jae-Chul;Ko, Zoon-ki
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.487-497
    • /
    • 2017
  • South Korea needs reorganization of dispute resolution system due to the frequent occurrence of a case that trade secret or technique are leaked. First, the distributed various laws are established and enforced by enacting and enforcing individual laws. Therefore, the redundancy problems, the collision of individual laws, the decline in diversity, integrity, and connectivity are issues. An independent legal system is needed by Act on the Prevention and Protection of Technology Leakage. Thereby, The support system of technological protection that is sprayed in government departments such as the Small and Medium Business Administration, the Ministry of Trade, Industry and Energy, the Patent Office, the Fair Trade Commission, the Trade Committee, the National Police Agency, and the Spy Agency integrates and unifies institutionally, and it is necessary to advance a policy with functional division. Second, the Patent Tribunal, the Invention Promotion Act, the Industrial Property Right Dispute Mediation Committee by the patent law, the Industrial Technical Dispute Mediation Committee on the Industrial Technology Outflow Prevention and Protection Law and the Medium and Small Firm Dispute Mediation and Arbitration Committee on Small Business Technology Protection Support Law are installed. However, since it established the integrated law on the Act on the Prevention and Protection of Technology Leakage, it is desirable to set the merged operation of establishment on the Technical Dispute Mediation Committee under the Small and Medium Business Administration or the Ministry of Trade, Industry and Energy.

Analysis of Health and Welfare Support for Children Who Have Ended Protection in Korea - Focused on the case of Cheonan city - (국내 보호종료아동 보건복지 지원실태 분석 -천안시 사례를 중심으로-)

  • YU, TAE GYU
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.1
    • /
    • pp.115-119
    • /
    • 2022
  • According to the 「Child Welfare Act, Article 16(1)」, when the age of a child reaches 18, he or she is discharged from prison. However, in order to prepare an effective support posture from the central government and local governments, a clear fact-finding survey on children who have completed protection is necessary. Therefore, in this study, the most basic questionnaire on housing, health, education, employment, and social relations of children living in Cheonan City after completion of protection is required. An investigation was conducted. As a result, the housing and social relationship of children living in Cheonan city were good compared to children living in Cheonan city compared to children who completed protection nationwide. Therefore, it was found that it is urgent to establish a close cooperation system with related organizations in this regard.