DOI QR코드

DOI QR Code

A Study on the Role of the Private Investigator in the Industrial Security Market

산업보안 시장에서의 탐정 직무역할에 관한 연구

  • Jong-Wook Sohn (Vad Fint Partners Co.) ;
  • Eun-Sun Jeong (Vad Fint Partners Co.) ;
  • Yeom Keon-Ryeong (Major on Private Investigation, Catholic University of Korea)
  • 손종욱 ((주)바핀파트너스) ;
  • 정은선 ((주)바핀파트너스) ;
  • 염건령 (가톨릭대학교 행정학과 탐정학)
  • Received : 2024.10.01
  • Accepted : 2024.10.24
  • Published : 2024.10.31

Abstract

This objective of this study is to identify the roles of private investigation in the industrial security market. In order to achieve this, the converged security framework was subjected to analysis, with the x-axis defined as prevention, monitoring, and follow-up, and the y-axis defined as administrative security, physical security, and technical security. To gain a more detailed understanding of job classification, the job duties were analyzed using the ASIS industrial security certification framework, and job roles were derived according to the process. As a result of the study, 25 job role derived from 8 areas for industrial security investigation from the perspective of converged security. The job areas are as follows: prevention-management, prevention-physical, prevention-technical, monitoring-management, monitoring-physical, monitoring-technical, post-management-management, post-management-physical security, and technical security. This study has enabled the duties and role tasks of private investigation in the industrial security industry to be identified, and it has also facilitated the specifiction of the role of industrial security investigation and their revitalisation. Furthermore, the finding of this study represent an initial effort to delineate the role of the private investigarion in the industrial security market. It may serve as a foundation for future research into strategies for revitalising the private investigation industry.

본 연구는 산업보안 시장에서의 탐정 직무역할을 도출하는 것을 목적으로 한다. 이를 위하여 융합보안 프레임워크를 분석하여 x축을 예방-모니터링-사후관리로 설정하고, y축은 관리적 보안, 물리적 보안, 기술적 보안으로 설정하였다. 세부 직무 분류를 위해 ASIS 산업보안 자격증별 직무를 분석하여 프로세스에 따른 직무역할을 도출하였다. 연구결과 융합보안 관점에서 산업보안 탐정의 직무는 8개 영역에서 25개의 직무역할이 도출되었다. 직무영역은 예방-관리, 예방-물리, 예방-기술, 모니터링-관리, 모니터링-물리, 모니터링-기술, 사후관리-관리, 사후관리-물리보안, 기술보안으로 나타났다. 이를 통해 산업보안 산업에서 탐정의 직무와 역할과제를 도출할 수 있었고, 향후 산업보안 탐정의 직역 구체화 및 역할 활성화를 가능하게 할 것이다. 또한 본 연구 결과는 산업보안 시장에서 탐정의 직무역할을 제시하는 초기적 시도로 향후 탐정산업의 활성화 방안 연구의 기초로 활용될 수 있다.

Keywords

References

  1. Rao, P. M., & Deebak, B. D. (2023). Security and privacy issues in smart cities/industries: technologies, applications, and challenges, Journal of Ambient Intelligence and Humanized Computing, 14(8), 10517-10553.
  2. 과학기술정보통신부.정보보호산업협회(2022). 「2022 정보보호 실태조사」, 193-194, 정보보호산업협회.
  3. 이준호.신승수 (2021). 산업안보 개념 정립에 따른 국가 핵심 기술 확대 필요성 연구, 한국산업보안연구, 11(1), 327-349.
  4. 최선영.임현묵 (2024). 국가핵심기술과 전략기술의 관계 정립과 체계적인 보호관리를 위한 개선방안, 한국산업보안연구, 14, 137-160.
  5. 통계청 (2024). 「제11차 한국표준산업분류」, http://kostat.go.kr. 통계청.
  6. 이창무 (2011). 산업보안의 개념적 정의에 관한 고찰. 한국산업보안연구, 2(1), 73-90.
  7. McCrie, R. (2021). American Society for Industrial Security(ASIS), In Encyclopedia of Security and Emergency Management. Cham:Springer International Publishing, 17-22.
  8. 국가정보원 (2002). 「산업보안업무편람」, 국가정보원, 3.
  9. Cunningham, W. C., & Taylor, T. H. (1985). Private security and police in America: The Hallcrest report. Portland, OR: Chancellor Press, 186.
  10. Talbot, J., & Jakeman, M. (2011). Security risk management body of knowledge. John Wiley & Sons, 53-269.
  11. Tyson, D. (2011). Security convergence: Managing enterprise security risk. Elsevier, 33-141.
  12. 한상암.김윤영(2024). 산업기술 유출범죄 대응역량 강화방안 고찰. 한국민간경비학회보, 23(2), 235-268.
  13. 임양규.박원형.이환수 (2023). 산업기술 유출 방지를 위한 보안 프레임워크 연구. 융합보안논문지, 23(4), 33-41.
  14. Brooks, D. J. (2010). What is security: Definition through knowledge categorization. Security Journal, 23, 225-239.
  15. Gartner. (n.d.). Definition of Operational Technology (OT). Retrieved March 14, 2022, https://www.gartner.com/en/information-technology/glossary/operational-technology-ot.
  16. Wakefield, A. (2014). Corporate security and enterprise risk management. In Corporate Security in the 21st Century: Theory and Practice in International Perspective, London: Palgrave Macmillan UK, 235-253.
  17. Westby, J. R., & Allen, J. H. (2007). Governing for enterprise security (GES) implementation guide, CMU/SEI, 1-61.
  18. Chapple, M., & Seidl, D. (2022). (ISC) 2 CCSP Certified Cloud Security Professional Official Study Guide. John Wiley & Sons, 151-245.
  19. Johnson, M. P., & Spivey, J. M. (2008). ERM and the security profession, Risk Management, 55(1), 30-35.
  20. Fischer, R., & Halibozek, E. (2008). Introduction to security. Butterworth-Heinemann, 47-86.
  21. U.S.Bureau of Labor Statistics. (2023). Occupational Employment and Wage Statistics. Private Detectives and Investigators, https://data.bls.gov/search/query/results?cx=013738036195919377644%3A6ih0hfrgl50&q=Private+Investigator.
  22. Vargo, S. L., & Lusch, R. F. (2004). Evolving to a new dominant logic for marketing, Journal of marketing, 68(1), 1-17.