DOI QR코드

DOI QR Code

Effects of the Recognition of Business Information Protection Activities in Ranks on Leaks of Industrial Secretes

직위에 따른 기업정보보호활동인식이 산업기밀유출에 미치는 영향

  • Choi, Panam (Department of protection Science, Kyungwoon University) ;
  • Han, Seungwhoon (Department of protection Science, Kyungwoon University)
  • Received : 2015.11.27
  • Accepted : 2015.12.07
  • Published : 2015.12.31

Abstract

The objective of this study is to analyze control factors in protecting activities of business information that affects the effects of protecting leaks of industrial secretes during business security works in the ranks of staffs. A regression analysis was implemented by 36 items of protecting activities of information and 10 items of preventing industrial secretes for a total of 354 users and managers who use internal information systems in governments, public organizations, and civilian enterprises. In the recognition of protecting activities of business information that affects the prevention of controlling industrial secretes, clerks showed recognitions in physical control, environmental control, and human resource control, and software control and assistant chiefs showed recognitions in hardware control and environmental control. Also, ranks of department managers and higher levels represented recognitions in security control activities. It showed that clerks, assistant chiefs, and above department managers show effects of technical control factors on protecting activities of industrial secretes but section chiefs represent system control factors in preventing industrial secretes.

본 연구에서는 직원들의 직위에 따른 기업보안 활동 중 산업기밀 유출 방지에 영향을 미치는 기업정보보호활동 통제요인을 분석하고자 하였다. 정부, 공공기관, 민간기업 종사자를 대상으로 내부 정보시스템에 대한 사용자 및 관리자 354 명을 정보보호활동 36문항, 산업기밀유출방지 10문항을 조사 하여 회귀분석을 실시하였다. 산업기밀 유출 통제 활동에 영향 미치는 기업정보보호활동인식으로 사원은 물리적 통제, 환경적 통제, 인적 통제, 소프트웨어통제를 대리는 환경적 통제, 하드웨어 통제, 과장은 하드웨어통제, 환경적 통제, 부장급 이상은 물리적 통제 순서로 보안통제활동 인식을 나타났다. 사원, 대리, 부장 직위이상에서는 기술적 통제 요인이 과장 직위에서만 시스템 통제 요인이 산업기밀유출 방지 통제활동에 가장 많은 영향을 미친다고 지목하였다.

Keywords

References

  1. Ki-Hyo Nam․Hyung-Suk Kang․Ji-Ho Gil․Sung-In Kim(2009). "Internal information leakage prevention (DLP) technology trends". Week Technology Trends. No. 1413.
  2. Min-Sun No․Sam-Yeol Lee(2010). "Factors assessment of the security capabilities of the SME industry". Korea Public Administration Review. Vol44, No. 3.
  3. Sung-Uk Park․Sang-Ho Lee(2008). "An Analysis on Information Security Industry in Korea : An Input-Output Analysis". Industrial Innovation. Vol24, No. 3.
  4. Tae-Wan Park(1997). Information Systems Security Supervision. Korea Computerization Agency.
  5. Min-Hyeong Lee(2013), A Study on the Developmental Activation Plan of Local Medium and Small Firms - Focussed on Industrial Security . Korea Local Government Studies, Vol.15, No. 2, pp141-159.
  6. Sang-Jun Lee(2008). Assessing the accounting errors of the job relevance of skills. HoSeo University Graduate School.
  7. Gu-Hun Jung(2011). "Effect of Information Security Management and Control Activities for Proprietary Information Leakage Prevention on Information Asset Protection Performance". Ph.D. Diissertation, KookMin University Business IT Graduate School.
  8. Hae-Chul Jung․Hyun-Soo Kim(2000). "Relationship between consciousness and organization of information security and information security level of the organization". Journal of Information Technology Applications & Management. Vol7, No. 2.
  9. Korea Information Society Development Institute(2008). National Informatization White Paper. Korea Information Society Development Institute.
  10. MOPAS(2008). Privacy medium-term Master Plan. MOPAS.
  11. New Daily News. 'Industrial espionage damage 年60 80% an inside job jo bomb technology delivered' Aug 25th, 2014.
  12. Daily TR, 'Hyundai Kia's design leaked a bunch of drawings China'. July 22th, 2015
  13. E-Daily. 'Group opposing nuclear power, nuclear power figures released ... "I sell in other countries," Cash requirements ". Aug 3th, 2015.
  14. Ariss, S. S. (2002). Computer Monitoring: Benefits and Pitfalls Facing Management. Information & Management, Vol39, No.7, pp. 553-558. https://doi.org/10.1016/S0378-7206(01)00121-5
  15. Brian, E. B. (2005). Worldwide Outbound Content Compliance 2005-2009 Forecast and Analysis: IT Security Turns Inside Out. Internet Data Center(IDC).
  16. Dan, Y. (2005). InfoWatch: A Multi-layered Approach for Information Leakage Detection and Prevention. Internet Data Center(IDC).
  17. Forte, S. (2002). Vulnerability Management: One Problem, Several Potential Approaches. Network Security, Vol5, pp. 11-13.
  18. Gerber, M., Solms, R., Overbeek, P. (2001). Formalizing Information Security Requirements. Information Management and Computer Security, Vol9, No.1, pp. 32-37. https://doi.org/10.1108/09685220110366768
  19. Holmes, D. (2001). E-Gov: e-Business Strategy for Government. London: Nicholas Brealey Publishing.
  20. Kevin, S. H. (2002). The Digital Security Debate: How to Manage Risk?, Secure Business Quarterly, First Quarter.
  21. Post, G. & Kagan, A. (2000). Management Tradeoffs in Anti-virus Strategies. Information & Management, Vol37, No.1, pp. 13-24. https://doi.org/10.1016/S0378-7206(99)00028-2
  22. Raul, E. P. & Rich, M. (2006). Magic Quadrant for Content Monitoring and Filtering and Data Loss Prevention. Gartner RAS Core Research Note.
  23. Solms, B. (1996). Information Security Management: The Second Generation. Computer and Security, Vol15, No.4, pp. 281-288. https://doi.org/10.1016/0167-4048(96)88939-5
  24. Solms, B. (2001). Corporate Governance and Information Security. Computers and Security, Vol20, No.3, pp. 215-218. https://doi.org/10.1016/S0167-4048(01)00305-4
  25. Kwon, Y. T., Yoon, M. O., Choi, H. C., The Comparative Study on the Perception of Business Activities about Disaster Preparedness between Korea and Japan, Journal of The Korean Society of Disaster Information, Vol 9, No.4