DOI QR코드

DOI QR Code

Small Business Technological Assets Protection Factors Analysis Using Logistic Regression Analysis

로지스틱 회귀분석을 이용한 중소기업 기술보호 요인 분석

  • Hong, Jun Suk (Graduate School of Public and Information Technology, Seoul National University Of Science & Technology) ;
  • Park, Won Hyung (Department of Cyber Security, Far East University) ;
  • Kim, Yanghoon (Department of Cyber Security, Far East University) ;
  • Kook, Kwang Ho (College of Business and Technology, Seoul National University Of Science & Technology)
  • Received : 2015.04.13
  • Accepted : 2015.07.07
  • Published : 2015.08.31

Abstract

The main objective of this study was to identify the factors that can maximize the effect of preventing technology leakage by government support. Therefore we used the 2013 small business technology protection capabilities and level of research which is conducted by the Small and Medium Business Administration, and have analyzed the presence of small business technological assets leakage protection eand skills. Multiple logistic regression analysis was performed to identify 1,518 small companies (43 big companies are excluded) which are divided into 155 technological assets leaked small business and non-leaked 1363 small business. The most important factors associated with technology leakage were entrant control system, security audit, employee absence of security activities and important data protection measures. This result shows that if the government can support more for these details, technological asset leakage prevention effect is expected to be maximized.

본 연구는 중소기업청에서 실시한 2013년 중소기업 기술보호 역량 및 수준조사를 바탕으로 중소기업의 기술유출 경험유무와 기술보호 요인을 분석하여 정부지원을 통한 기술유출방지 효과를 극대화 할 수 있는 핵심 요인을 도출하고자 한다. 중소기업 기술보호 역량 및 수준조사 대상 1,561개 기업 중 대기업 43개를 제외한 1,518개 중소기업 중 기술유출 중소기업 155개와 미유출 중소기업 1,363개 중소기업에 대해 기술보호 요인을 로지스틱 회귀분석 하였다. 기술유출 관련 요인을 분석한 결과, 출입자 통제 시스템 운영, 보안감사 실시여부, 임직원 부재 시 보안활동, 중요자료 보호대책 마련이 핵심요인으로 도출되었으며, 이들 사항에 대해 정부차원에서 집중적인 지원이 이루어진다면 기술보호 효과가 극대화 될 수 있을 것으로 사료된다.

Keywords

References

  1. Bae, Y. S. and Chang, H. B., "A Qualitative Research on ICT Policy Design for Small and Medium Business," The Journal of Society for e-Business Studies, Vol. 18, No. 1, pp. 57-70, 2013. https://doi.org/10.7838/jsebs.2013.18.1.057
  2. Hong, S. C., "Recent SMEs main phase indicator changes cause and implications," Focus for Korea Small Business Institute, 2014. 8. 13.
  3. Jung, C. H., Lee, J. T. and Chung, D. K., "A Study on the Security Management System Model for the Information Security of the Aviation infrastructure," The Journal of Society for e-Business Studies, Vol. 16, No. 4, pp. 87-96, 2011. https://doi.org/10.7838/jsebs.2011.16.4.087
  4. Kim, H. J. and Ahn, J. H., "An Empirical Study of Employee's Deviant Behavi or for Improving Efficiency of Information Security Governance," Society for e-Business Studies, Vol. 18, No. 1, pp. 147-164, 2013. https://doi.org/10.7838/jsebs.2013.18.1.147
  5. Kim, J. D., Chang, H. B., and Ryoo, S. Y., "A Study of Information Security Management System for Small and Medium Enterprises," Journal of The Korean Association of Small Business Studies, Vol. 28, No. 2, pp. 267-294, 2006.
  6. Kim, J. K. and Jeon, J. H., "Comparison of Users' Perception of Information Security Elements on Computer Virus Between Large and Small-and-Medium Companies," International Journal of Reliable Information and Assurance, Vol. 16, No. 2, pp. 79-92, 2006.
  7. Kim, M. J., Sung, J. H., and Kwon, K. H., "Analysis of The Relation Between The Material Weakness of Internal Accounting Control System and Firm's Characteristics Variables, Validation Comparison of Testing Models," Korean international accounting review, Vol. 29, pp. 1-23, 2010.
  8. Korean National Police Agency, "The White Paper for Korean National Police Agency 2011," 2011.
  9. Korean National Police Agency, "The White Paper for Korean National Police Agency 2013," 2013.
  10. Lee, C. S. and Kim, Y. H., "An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage," The Journal of Society for e-Business Studies, Vol. 20, No. 2, pp. 27-36, 2015.
  11. Lee, J. W., "Developing Information Security Management Model for SMEs: An Empirical Study," Asia Pacific Journal of Information Systems, Vol. 15, No. 1, pp. 115-133, 2005.
  12. Moon, H. J., "Training Status and Problems for Information Security empowerment of Small-and-Medium Companies in Korea," International Journal of Reliable Information and Assurance, Vol. 19, No. 1, pp. 29-39, 2009.
  13. Mun, B. K., "The competitiveness in world export markets the number one item," Trade Focus for Institute for International Trade, Vol. 14, No. 2, 2015.
  14. Nam, J. S., "Actual Condition of Damage of Industrial Secrets Leakage Crime and its Measures at Small or Medium Sized Business Focusing on Legal.Systematic Methods," Korean Association of Public Safety and Criminal Justice, Vol. 46, No. 1, pp. 44-75, 2012.
  15. National Industrial Security Center, "Technology Leakage Statistics," 2014.
  16. No, M. S., "Factors Assessment of industrial security capabilities of Smalland-Medium Companies," Korean Public Administration Review, Vol. 44, No. 3, pp. 239-259, 2010.
  17. OECD, "2013 OECD Science, Technolog and Industry Scoreboard 2013," 2013. 10. 23.
  18. Park, C. S., "Information Security Measures Guidelines Trends of Small-and-Medium Companies in Japan," International Journal of Reliable Information and Assurance, Vol. 20, No. 1, pp. 19-30, 2010.
  19. Park, J. K., "Problems and Legal Solutions related to the Technology Protection Support System for Small and Medium Enterprise(SME) in Korea," Institute for Law of Science and Technology, Vol. 20, pp. 185-224, 2014.
  20. Small and Medium Business Administration, "2013 Technology Protection Capabilitiy & Sueftyrvey on the level of Small & Medium Business," 2014.

Cited by

  1. 정보보호관리체계(ISMS)를 이용한 중소기업 기술보호 개선방안 연구 vol.12, pp.3, 2015, https://doi.org/10.17662/ksdim.2016.12.3.033
  2. 중소기업 프로파일링 분석을 통한 기술유출 방지 및 보호 모형 연구 vol.27, pp.1, 2015, https://doi.org/10.5859/kais.2018.27.1.171