Research on the Level Evaluation Model of the Organization Research Security

Onechul Na, Hangbae Chang

Abstract


Recently, the importance of research and development for technological innovation is increasing. The rapid development of research and development has a number of positive effects, but at the same time there are also negative effects that accelerate crimes of information and technology leakage. In this study, a research security level measurement model was developed that can safely protect the R&D environment conducted at the organizational level in order to prepare for the increasingly serious R&D result leakage accident. First, by analyzing and synthesizing security policies related to domestic and overseas R&D, 10 research security level evaluation items (Research Security Promotion System, Research Facility and Equipment Security, Electronic Information Security, Major Research Information Security Management, Research Note Security Management, Patent/Intellectual Property Security Management, Technology Commercialization Security Management, Internal Researcher Security Management, Authorized Third Party Researcher Security Management, External Researcher Security Management) were derived through expert interviews. Next, the research security level evaluation model was designed so that the derived research security level evaluation items can be applied to the organization’s research and development environment from a multidimensional perspective. Finally, the validity of the model was verified, and the level of research security was evaluated by applying a pilot target to the organizations that actually conduct R&D. The research security level evaluation model developed in this study is expected to be useful for appropriately measuring the security level of organizations and projects that are actually conducting R&D. It is believed that it will be helpful in establishing a research security system and preparing security management measures. In addition, it is expected that stable and effective results of R&D investments can be achieved by safely carrying out R&D at the project level as well as improving the security of the organization performing R&D.


Full Text:

PDF

References


Ahn, C. and Lee, Y., “An empirical analysis of the influence factors on open innovation activities in Korea,” Journal of Korea Technology Innovation Society, Vol. 14, No. 3, pp. 431-465, 2011.

Bae, S. T. and Kim, J. H., “A study on development of the evaluation model about level of security in national R&D program,” The Journal of Korean Association of Computer Education, Vol. 16, No. 1, pp. 73-80, 2015.

Bland, J. M. and Altman, D. G., “Statistics notes: Cronbach’s alpha,” Bmj, Vol. 314, No. 7080, p. 572, 1997.

Brits, H. and du Plessis, L., “Application of focus group interviews for quality management: An action research project,” Systemic Practice and Action Research, Vol. 20, No. 2, pp. 117-126, 2007.

Choi, S., Hwang, H. J., and Shin, H. K., “Research and development of achievement and assessment standards for school mathematics based on the 7th national curriculum,” Journal of Educational Research in Mathematics, Vol. 12, No. 1, pp. 145-162, 2002.

Gim Chung, R. H., Kim, B. S., and Abreu, J. M., “Asian American multidimensional acculturation scale: Development, factor analysis, reliability, and validity,” Cultural Diversity and Ethnic Minority Psychology, Vol. 10, No. 1, pp. 66-80, 2004.

Gong, B., “The situation and security measures of industrial technology security management of SMEs,” The Korean Society of Private Security, Vol. 18, No. 1, pp. 1-26, 2019.

Government of Saskatchewan, Project Security Compliance Assessment Checklist, 2011.

Huh, Y. D., “A study on the determinants of and relationship between technology import and R&D,” Korean Management Review, Vol. 25, No. 3, pp. 83-110, 1996.

Hwang, K., “R&D accountability and dilemma within the Korean science and technology context,” Korean Public Administration Review, Vol. 50, No. 2, pp. 189-213, 2016.

Kang, H., “A guide on the use of factor analysis in the assessment of construct validity,” J Korean Acad Nurs, Vol. 43, No. 5, pp. 587-594, 2013.

Kang, S. J., Research Security Theory, Korean Studies Information, 2014.

Kim, B. R., “Building evaluation structure for selecting contractor in local government’s contracting-out of welfare service,” Journal of Regional Studies, Vol. 14, No. 2, pp. 69-94, 2006.

Kim, H. and Kim, B. K., “Analyzing the effectiveness of public R&D subsidies on private R&D expenditure,” Journal of Korea Technology Innovation Society, Vol. 15, No. 3, pp. 649-674, 2012.

Kim, H. and Koo, N., “Prevention of divulgence and protection of national core technology,” Journal of the Korean Society of Automotive Engineers, Vol. 42, No. 5, pp. 21-24, 2020.

Kim, S., “A review on security management of government-sponsored R&D program,” Korean Journal of Industry Security, Vol 1, No. 1, pp. 75-91, 2009.

Kim, S., Park, J., and Park, G., “Research of dealing with Industrial technology disclosure crime,” The Journal of Korean Association of Security and Safety, Vol. 9, No. 1, pp. 91-109, 2013.

Kim, S., “Strategic implications of open innovation for the public sector,” STEPI Insight, Vol. 28, pp. 1-28, 2009.

Kim, Y., “Development of indicators for evaluating the web credibility by goodness-of-fit analysis,” Journal of the Korean Society for Information Management, Vol. 25, No. 4, pp. 185-204, 2008.

Kim, Y. O., “A study on the development of prosocial behavior scale for young children,” Korean J Child Stud, Vol. 24, No. 5, pp. 105-118, 2003.

Korea Institute of Human Resources Development in Science and Technology, An Introduction of R&D Management in Science and Technology, 2019.

Korea Institute of Human Resources Development in Science and Technology, Understanding Research Security, 2015.

Korea Internet & Security Agency, Information Security Management System, 2018.

Korean National Police Agency, stats statistical data, 2020.

Kwon, N., Lee, J., and Chung, E., “Understanding scientific research lifecycle : based on bio and nano scientists’ research activities,” Journal of the Korean Society for Library and Information Science, Vol. 46, No. 3, pp. 103-131, 2012.

Kwon, W. H., “A study on the concept of R&D phases: From basic research to product development,” KAST Research Report, Vol. 73, pp. 1-68, 2010.

Kwon, Y. and Lim, J., “New business development of small venture firms through open innovation strategy: A case of acquiring technology from university,” The Journal of Intellectual Property, Vol. 8, No. 2, pp. 151-177, 2013.

Lederman, L. C., “Assessing educational effectiveness: The focus group interview as a technique for data collection,” Communication Education, Vol. 39, No. 2, pp. 117-127, 1990.

Lee, H., “A study on counter-measures on the technology leakage crimes an their enhancement,” The Korean Society of Private Security, Vol. 11, No. 2, pp. 283-301, 2012.

Lee, H. Y., “A study on the raised problems related to complementing the industrial technology outflow prevention and protection law,” Inha Law Review: The Institute of Legal Studies Inha University, Vol. 11, No. 3, pp. 67-95, 2008.

Lee, J., “researcher-centric security management system”, Ph.D. Thesis, Chung-Ang University, 2018.

Lee, K. and Yeom, D., “A study on the establishment of weight for sustainability assessment indicators and test scoring for super high-rise residential complexes,” Journal of the Architectural Institute of Korea Planning & Design, Vol. 24, No. 3, pp. 23-32, 2008.

Lee, S., “A study on the effective method for the prevention of industrial secrets leakage,” Chung_Ang Law Review, Vol. 21, No. 1, pp. 39-80, 2019.

Lee, S. B. and Kim, M. S., “The method of evaluating the validity in making the checklist of statistical method,” Journal of the Korean Data And Information Science Society, Vol. 9, No. 2, pp. 323-336, 1998.

Lee, Y. and Kang, D., “Empirical study on the determinants of improving open innovation performance: Based on new product development collaboration with suppliers,” Journal of Korea Technology Innovation Society, Vol. 21, No. 3, pp. 1050-1076, 2018.

Lisa, M. and Tina, M., “Chemical laboratory safty and security,” The National Academies Press, pp. 59-70, 2011.

Ludvigson, S. C. and Ng, S., “The empirical risk-return relation: A factor analysis approach,” Journal of Financial Economics, Vol. 83, No. 1, pp. 171-222, 2007.

Ministry of Science and ICT, Regulations on the Management, Etc. of National Research and Development Projects, 2020.

Ministry of Science, ICT and Future Planning, Manual of Security Management on National Research Development Project, 2014.

Ministry of Trade, Industry and Energy, Act on Prevention of Divulgence and Protection of Industrial Technology, 2020.

MISWG(The Multinational Industrial Security Working Group), Project Security Instruction, 2007.

National Intelligence Service, Industrial Security White Paper, 2015.

National Security Authority, Industrial Security Manual Finland, 2011.

NAVER, “research,” “security,” https://dict.naver.com, May 2020.

Park, C. and Hwang, J. H., “Countermeasures against national outflows,” STEPI Insight, Vol. 120, pp. 1-33, 2013.

Park, K. H. and Jang, M. H., “Exploring decision-making factors of psychiatric nurses in the application of seclusion and restraint: Applying focus group interviews,” Journal of Korean Academy of Psychiatric and Mental Health Nursing, Vol. 27, No. 4, pp. 380-393, 2018.

Park, W., Son, S. Y., Park, H., and Park, H. S., “A proposal on determining appropriate sample size considering statistical conclusion validity,” Seoul Journal of Industrial Relations, Vol. 21, pp. 51-85, 2010.

Roh, H., “A study on the countermeasure of industrial technology outflow,” Korean Association of Public Safety and Criminal Justice Review, Vol. 17, No. 1, pp. 45-77, 2008.

Ryoo, W. and Jung, H., “Defining and tailoring R&D standard process to improve the quality of R&D outcomes,” Journal of the Korean Institute of Industrial Engineers, Vol. 43, No. 2, pp. 112-119, 2017.

SANS(SysAdmin, Audit, Network and Security) Institute, Lab Security Policy, 2014.

Society for e-Business Studies, A study on the Improvement of the National R&D Programs Security Management System and the Revision of the Standard Manual, Science and Technology Comprehensive Coordination Support Project Report, 2017.

The Korean Association for Research of Industrial Security, Industrial Security Studies, 2019.

Um, I., Hong, C., and Hwang, W., “Optimal ratio of r&d investment and improvement methods for sustainable economic growth,” Kistep Issue Paper, Vol. 17, pp. 1-64, 2019.

Vagias, W. M., “Likert-type scale response anchors,” Clemson International Institute for Tourism & Research Development, Department of Parks, Recreation and Tourism Management, Clemson University, 2006.

Williams, B., Onsman, A., and Brown, T., “Exploratory factor analysis: A five-step guide for novices,” Australasian Journal of Paramedicine, Vol. 8, No. 3, 2010.

Yang, C. J., Hong, J. S., and Ko, S. W., “Impulse Responses Analysis of Government and Public Sector R&D in IT Industry,” Korean Management Science Review, Vol. 25, No. 3, pp. 13-26, 2008.

Yim, S. and Jung, U., “A study on the strategic management of the public R&D facilities: The direction of service quality improvement and managerial role reformation,” Journal of Korea Technology Innovation Society, Vol. 12, No. 2, pp. 388-412, 2009.

Yoo, I., Seo, B., and Park, D., “The role of open innovation for SMEs R&D success,” Journal of Intelligence and Information Systems, Vol. 24, No. 3, pp. 89-117, 2018.

Yoon, C., “A study on the improvement of product management system in international collaborative research,” Journal of Korea Technology Innovation Society, Vol. 12, No. 3, pp. 499-524, 2009.

Yoon, H., Hong, A., and Jung, S., “The effects of R&Ds, technology innovation capability and the innovation support system of small- and medium-sized businesses on the company performance,” Innovation Studies, Vol. 13, No. 2, pp. 209-238, 2018.

You, Y. C., “The study of applying the indices of performance evaluation on the research and development in agricultural science and technology,” Korean Public Administration Quarterly, Vol. 24, No. 1, pp. 27-49, 2012.

Yun, S. and Kim, J., “A study on security requirments analysis through security threat modeling of home IoT appliance,” The Journal of Society for e-Business Studies, Vol. 24, No. 2, pp. 113-124, 2019.


Refbacks

  • There are currently no refbacks.