Advanced SearchSearch Tips
Effects of the Recognition of Business Information Protection Activities in Ranks on Leaks of Industrial Secretes
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Effects of the Recognition of Business Information Protection Activities in Ranks on Leaks of Industrial Secretes
Choi, Panam; Han, Seungwhoon;
  PDF(new window)
The objective of this study is to analyze control factors in protecting activities of business information that affects the effects of protecting leaks of industrial secretes during business security works in the ranks of staffs. A regression analysis was implemented by 36 items of protecting activities of information and 10 items of preventing industrial secretes for a total of 354 users and managers who use internal information systems in governments, public organizations, and civilian enterprises. In the recognition of protecting activities of business information that affects the prevention of controlling industrial secretes, clerks showed recognitions in physical control, environmental control, and human resource control, and software control and assistant chiefs showed recognitions in hardware control and environmental control. Also, ranks of department managers and higher levels represented recognitions in security control activities. It showed that clerks, assistant chiefs, and above department managers show effects of technical control factors on protecting activities of industrial secretes but section chiefs represent system control factors in preventing industrial secretes.
Industrial security;Business security Activities;Industrial Secretes;Business information protection activity;Management security;Technical security;Physical security;
 Cited by
Ki-Hyo Nam․Hyung-Suk Kang․Ji-Ho Gil․Sung-In Kim(2009). "Internal information leakage prevention (DLP) technology trends". Week Technology Trends. No. 1413.

Min-Sun No․Sam-Yeol Lee(2010). "Factors assessment of the security capabilities of the SME industry". Korea Public Administration Review. Vol44, No. 3.

Sung-Uk Park․Sang-Ho Lee(2008). "An Analysis on Information Security Industry in Korea : An Input-Output Analysis". Industrial Innovation. Vol24, No. 3.

Tae-Wan Park(1997). Information Systems Security Supervision. Korea Computerization Agency.

Min-Hyeong Lee(2013), A Study on the Developmental Activation Plan of Local Medium and Small Firms - Focussed on Industrial Security . Korea Local Government Studies, Vol.15, No. 2, pp141-159.

Sang-Jun Lee(2008). Assessing the accounting errors of the job relevance of skills. HoSeo University Graduate School.

Gu-Hun Jung(2011). "Effect of Information Security Management and Control Activities for Proprietary Information Leakage Prevention on Information Asset Protection Performance". Ph.D. Diissertation, KookMin University Business IT Graduate School.

Hae-Chul Jung․Hyun-Soo Kim(2000). "Relationship between consciousness and organization of information security and information security level of the organization". Journal of Information Technology Applications & Management. Vol7, No. 2.

Korea Information Society Development Institute(2008). National Informatization White Paper. Korea Information Society Development Institute.

MOPAS(2008). Privacy medium-term Master Plan. MOPAS.

New Daily News. 'Industrial espionage damage 年60 80% an inside job jo bomb technology delivered' Aug 25th, 2014.

Daily TR, 'Hyundai Kia's design leaked a bunch of drawings China'. July 22th, 2015

E-Daily. 'Group opposing nuclear power, nuclear power figures released ... "I sell in other countries," Cash requirements ". Aug 3th, 2015.

Ariss, S. S. (2002). Computer Monitoring: Benefits and Pitfalls Facing Management. Information & Management, Vol39, No.7, pp. 553-558. crossref(new window)

Brian, E. B. (2005). Worldwide Outbound Content Compliance 2005-2009 Forecast and Analysis: IT Security Turns Inside Out. Internet Data Center(IDC).

Dan, Y. (2005). InfoWatch: A Multi-layered Approach for Information Leakage Detection and Prevention. Internet Data Center(IDC).

Forte, S. (2002). Vulnerability Management: One Problem, Several Potential Approaches. Network Security, Vol5, pp. 11-13.

Gerber, M., Solms, R., Overbeek, P. (2001). Formalizing Information Security Requirements. Information Management and Computer Security, Vol9, No.1, pp. 32-37. crossref(new window)

Holmes, D. (2001). E-Gov: e-Business Strategy for Government. London: Nicholas Brealey Publishing.

Kevin, S. H. (2002). The Digital Security Debate: How to Manage Risk?, Secure Business Quarterly, First Quarter.

Post, G. & Kagan, A. (2000). Management Tradeoffs in Anti-virus Strategies. Information & Management, Vol37, No.1, pp. 13-24. crossref(new window)

Raul, E. P. & Rich, M. (2006). Magic Quadrant for Content Monitoring and Filtering and Data Loss Prevention. Gartner RAS Core Research Note.

Solms, B. (1996). Information Security Management: The Second Generation. Computer and Security, Vol15, No.4, pp. 281-288. crossref(new window)

Solms, B. (2001). Corporate Governance and Information Security. Computers and Security, Vol20, No.3, pp. 215-218. crossref(new window)

Kwon, Y. T., Yoon, M. O., Choi, H. C., The Comparative Study on the Perception of Business Activities about Disaster Preparedness between Korea and Japan, Journal of The Korean Society of Disaster Information, Vol 9, No.4