RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      핵심기술 보호방안에 관한 연구 : 보호체계 및 인적자원 관리를 중심으로 = A Study of the Operation and Improvement in an Original Key Technology Protection

      한글로보기

      https://www.riss.kr/link?id=T11697733

      • 0

        상세조회
      • 0

        다운로드
      서지정보 열기
      • 내보내기
      • 내책장담기
      • 공유하기
      • 오류접수

      부가정보

      다국어 초록 (Multilingual Abstract)

      Development of hi-technologies occurred fierce competition among companies in the domestic and worldwide. Sometimes the competition has skipped over national boundaries of the countries. This unlimited competition has sparked up an information securit...

      Development of hi-technologies occurred fierce competition among companies in the domestic and worldwide. Sometimes the competition has skipped over national boundaries of the countries. This unlimited competition has sparked up an information security war. Therefore the problems of information leakage in key technologies have become a serious issue in the industrial security sector.
      'Samsung Electronics Co.'s information leakage incident in 1998 was the beginning of recognition on the concept of keytechnology protection in Korea. In 1998, 'the law of protection on unfair competitions and sales secrets' was enacted and received national concerns. However, the limited punishment provisions and scattered related laws could not show effective power for protecting key technologies.
      Recently, a complemented legislation has been enacted. 'The law for the prevention and protection of the leakage of industrial technologies' regulates key technology's outflows to the foreign countries, and unlawful information leakages of key technology. The issue of key technology protection is not only management problems of the private companies and individuals, but also protecting national wealth.
      The purpose of this dissertation is to understanding current protection system of key hi-technologies and critical information leakages, and then to analyze why these problems have been occurred and how to find out the solutions for protecting the key technologies.
      This study is focusing on the globalized companies and key technologies. Also other countries and private research institutes what they need to protect are in the scope of this study. Industrial scope of the study is manufacturing, distributions, and information technologies.
      This dissertation approaches the issue from the position of emphasizing preventive/proactive measures against industrial espionage. Because industrial technology outflows by industrial spy could not be predictable. This dissertation has carried out by examining the reports and the analyses, of domestic and foreign literature and relevant agencies on industrial technology.
      For the realities of industrial technology outflow, this dissertation has examined research papers by the National Intelligence and Small and Medium Business Administration, which are in charge of industrial technology's protection in Korea, and academic periodicals of the relevant members of the academic community. Also relevant agency's websites, magazines, newspaper articles, and statistics have been looked into in order to understand the current industrial technology outflow-related trends.
      Especially this dissertation is completed policies with the question about how government and relevant agency cooperate against industrial technology outflow. Therefore I suggest some methods to solve the problems against industrial technology outflow.
      Above all, it is necessary to establish network-system between government institutes or between related institutes in private area, to make these ways effective and to vitalize connection between facilities related with this matter. Especially, to be professional for dealing with the industrial technology outflow, The Korean Association for Industrial Technology Security should check and aid weak point of private area.
      Furthermore, the government and private agency should expand an protection education of industrial technology, and give consultant on all related companies.
      In conclusion, the way to protect key hi-technologies and to keep major resources safe from draining out is that the consortium of private-government-institute sector should cooperate and make an effort to seal up national wealth of key technologies. Especially private companies and institutes which are principle defense group should invest their efforts and power more to manage human resources. Because human part is the major sources of information leakage incident.

      더보기

      목차 (Table of Contents)

      • 제1장 서론 = 1
      • 제1절 연구의 목적 = 1
      • 제2절 연구의 범위 및 방법 = 4
      • 1. 연구의 범위 = 4
      • 2. 연구의 방법 = 5
      • 제1장 서론 = 1
      • 제1절 연구의 목적 = 1
      • 제2절 연구의 범위 및 방법 = 4
      • 1. 연구의 범위 = 4
      • 2. 연구의 방법 = 5
      • 제2장 연구의 이론적 배경 = 7
      • 제1절 핵심기술보호의 의의 및 중요성 = 7
      • 1. 핵심기술보호의 개념 = 7
      • 2. 핵심기술보호의 중요성 = 9
      • 제2절 핵심기술보호 관련법 및 실효성 = 12
      • 1. 핵심기술 유출 보호관련 법규 = 12
      • 2. 법규와 핵심기술 유출의 상관관계 = 22
      • 제3절 해외의 핵심기술 보호실태 = 24
      • 1. 미국 = 30
      • 2. 일본 = 24
      • 3. 독일 = 25
      • 4. 중국 = 25
      • 제4절 선행연구의 검토 = 29
      • 제3장 핵심기술 보호실태와 문제점 = 32
      • 제1절 핵심기술 보호체계 및 유출실태 = 32
      • 1. 핵심기술 보호체계 = 32
      • 2. 핵심기술 유출실태 = 41
      • 제2절 핵심기술 보호관련 문제점 = 50
      • 1. 핵심기술 보호체계 구축 미비 = 50
      • 2. 인적자원 관리 소홀 = 51
      • 3. 핵심기술 보호의식 부재 = 56
      • 제4장 핵심기술 유출방지를 위한 대응방안 = 57
      • 제1절 핵심기술 보호체계 구축 = 57
      • 1. 핵심기술 유출방지 대응체계 구축 = 57
      • 2. 핵심기술 관리 강화 = 59
      • 제2절 인적자원 관리의 철저 = 63
      • 1. 인력 선발 = 63
      • 2. 채용 전 적격심사 = 69
      • 3. 사회화와 인사관리 = 75
      • 제3절 의식제고 차원의 대책방안 = 81
      • 1. 보안의식 개혁 및 인식도 제고 = 81
      • 2. 홍보 및 교육 강화 = 82
      • 제5장 결 론 = 85
      • 참고문헌 = 88
      • ABSTRACT = 92
      더보기

      분석정보

      View

      상세정보조회

      0

      Usage

      원문다운로드

      0

      대출신청

      0

      복사신청

      0

      EDDS신청

      0

      동일 주제 내 활용도 TOP

      더보기

      주제

      연도별 연구동향

      연도별 활용동향

      연관논문

      연구자 네트워크맵

      공동연구자 (7)

      유사연구자 (20) 활용도상위20명

      이 자료와 함께 이용한 RISS 자료

      나만을 위한 추천자료

      해외이동버튼