References
- Finne, T., 'A Conceptual Framework for Information Security Management,' Computers & Security, Vol. 17, No. 4, pp. 303-307, 1998 https://doi.org/10.1016/S0167-4048(98)80010-2
- 김세헌, 정보보호 관리 및 정책, 생능, 2002
- Russell, D. and G. Gangemi, Computer Security Basics, O'Reilly & Associates, 1991
- David, J., 'The New Face of the Virus Threat,' Computers & Security, Vol. 15, No. 1, pp. 13-16, 1996 https://doi.org/10.1016/0167-4048(96)87618-8
- Szor, P., The Art of Computer Virus Research and Defense, Addison-Wesley, 2005
- Nachenberg, C., 'Computer Virus-Anti Virus Coevolution,' Communications of the ACM, Vol. 40, No. 1, pp. 46-51, 1997 https://doi.org/10.1145/242857.242869
- Tedeschi, B., 'Protect Your Identity,' PCWORLD, pp. 107-112, Dec. 2004
- 최운호, 전영태, '대규모 컴퓨터 바이러스/웜의 공격시 종합침해사고대응시스템에서의 자동화된 역추적 절차,' 정보보호학회논문지, 제15권, 제1호, pp. 50-60, 2005
- 한국정보보호진흥원, 새로운 사이버 위협: 피싱 - 피싱에 따른 기술, 사회, 법제적 대응 및 시사점, 정책기획 05-6K, 한국정보보호진흥원, 2005
- Lee, J. and Y. Lee, 'A Holistic Model of Computer Abuse within Organizations,' Information Management & Computer Security, Vol. 10, No. 2, pp. 57-63, 2002 https://doi.org/10.1108/09685220210424104
- Gordineer, J., 'Blended Threats: A New Era in Anti-Virus Protection,' Information Systems Security, Vol. 12, No. 3, pp. 45-47, 2003 https://doi.org/10.1201/1086/43327.12.3.20030701/43626.7
- Kankanhalli, A., H. Teo, B. Tan, and K. Wei, 'An Integrative Study of Information Systems Security Effectiveness,' International Journal of Information Management, Vol. 23, No. 2, pp. 139-154, 2003 https://doi.org/10.1016/S0268-4012(02)00105-6
- Post, G. and A. Kagan, 'Management Tradeoffs in Anti-Virus Strategies,' Information & Management, Vol. 37, No. 1, pp. 13-24, 2000 https://doi.org/10.1016/S0378-7206(99)00028-2
- Hoffer, J. and D. Straub, 'The 9 to 5 Underground: Are You Policing Computer Crimes?,' Sloan Management Review, Vol. 30, No. 4, pp. 35-43, 1989
- White, S., Open Problems in Computer Virus Research, IBM Thomas J. Watson Research Center, NY USA, 1998
- Lee, Y. and K. Kozar, 'Investigating Factors Affecting the Adoption of Anti-Spyware Systems,' Communications of the ACM, Vol. 48, No. 8, pp. 72-77, 2005
- Hubbard, J. and K. Forcht, 'Computer Viruses: How Companies Can Protect Their Systems,' Industrial Management & Data Systems, Vol. 98, No. 1, pp. 12-16, 1998 https://doi.org/10.1108/02635579810199708
- Frank, J., B. Shamir, and W. Briggs, 'Security-related Behavior of PC Users in Organizations,' Information & Management, Vol. 21, No. 3, pp. 127-135, 1991 https://doi.org/10.1016/0378-7206(91)90059-B
- Wen, H., 'Internet Computer Virus Protection Policy,' Information Management & Computer Security, Vol. 6, No. 2, pp. 66-71, 1998 https://doi.org/10.1108/09685229810209388
- Thatcher, J. and P. Perrewe, 'An Empirical Examination of Individual Traits as Antecedents to Computer Anxiety and Computer Self-Efficiency,' MIS Quarterly, Vol. 26, No. 4, pp. 381-396, 2002 https://doi.org/10.2307/4132314
- Stonburner, G., A. Goguen, and A. Feringa, Risk Management Guide for Information Technology Systems, NIST SP 800-30, National Institute of Standard and Technology, 2001
- BSI, BS7799: Code of Practices for information Security Management, United Kingdom, 1999
- ISO/IEC, Guidelines for the management of IT security (GMITS)-Part 1: Concepts and models of IT security, ISO/IEC JTC1 SC27 TR 13335-1, 2000
- CSI, IPAK: Information Protection Assessment Kit, Computer Security Institute, 1997
- Pipkin, D., Information Security - Protecting the Global Enterprise, Hewlett-Packard Professional Books, 2000
- Peltier, T., Information Security Risk Analysis, Auerbach, 2001
- Bissett, A. and G. Shipton, 'Some Human Dimensions of Computer Virus Creation and Infection,' International Journal of Human-Computer Studies, Vol. 52, pp. 899-913, 2000 https://doi.org/10.1006/ijhc.1999.0361
- CMU/SEI, Operationally Critical Threat, Asset, Vulnerability Evaluation (OCTAVE) Framework, Ver. 1.0, CMU/SEI-99-TR- 017, June 1999
- Wack, J. and L. Carnahan, Computer Viruses and Related Treats: A Management Guide, NIST SP 500-166, National Institute of Standards and Technology, 1989
- Gordon, S., 'Application Program Security Fighting Spyware and Adware in the Enterprise,' Information systems security, Vol. 14, No. 3, pp. 14-17, 2005 https://doi.org/10.1201/1086.1065898X/45390.14.3.20050701/89147.4
- CSE, Guide to Security Risk Management for IT Systems, Communications Security Establishment, Government of Canada, 1996
- Cannon, C., 'The Real Computer Virus,' American journalism review, pp. 28-35. Apr., 2001
- Poston, R., F. Stafford, and A. Hennington, 'Spyware: A View from the (Online) Street,' Communications of the ACM, Vol.48, No. 8, pp. 96-99, 2005 https://doi.org/10.1145/1076211.1076247
- CSI, Eighth Annual CSI/FBI Computer Crime and Security Survey, Computer Security Institute, 2005
- Lee, S., S. Lee, and S. Yoo, 'An Integrative Model of Computer Abuse Based on Social Control and General Deterrence Theories,' Information & Management, Vol. 41, No. 6, pp. 707-718, 2004 https://doi.org/10.1016/j.im.2003.08.008
- Skoudis, E. and Zeltser, L., Malware: Fighting Malicious Code, Prentice Hall, 2003
- Loch, K., H. Carr, and M. Warkentin, 'Threats to Information Systems: Today's Reality, Yesterday's Understanding,' MIS Quarterly, Vol. 16, No. 2, pp. 173-186, 1992 https://doi.org/10.2307/249574
- Jung, B., I. Han, and S. Lee, 'Security Threats to Internet: A Korean Multi-Industry Investigation,' Information & Management, Vol. 38, No. 8, pp. 487-498, 2001 https://doi.org/10.1016/S0378-7206(01)00071-4
- Mtembu, K. and Y. Cairns, 'How to Manage and Reduce Computer Crime,' IS Audit & Control Journal, Vol. 6, pp. 27-31, 1997
- Highland, H., 'A History of Computer Viruses: The Famous Trio,' Computer & Security, Vol. 16, No. 5, pp. 416-429, 1997 https://doi.org/10.1016/S0167-4048(97)82246-8
- Straub, D. and W. Nance, 'Discovering and Disciplining Computer Abuse in Organizations: A Field Study,' MIS Quarterly, Vol. 14, No. 1, pp. 45-60, 1990 https://doi.org/10.2307/249307
- Straub, D., 'Effective IS Security: An Empirical Study,' Information System Research, Vol. 1, No. 3, pp. 255-276, 1990 https://doi.org/10.1287/isre.1.3.255
- Gogan, J., 'Should 'Personal' Computers Be Personally Allocated?', Journal of Management Information Systems, Vol. 7, No. 4, pp. 91-106, 1991 https://doi.org/10.1080/07421222.1991.11517905
- Goodhue, D. and D. Straub, 'Security Concerns of System Users: A Study of Perception of the Adequacy of Security,' Information & Management, Vol. 20, No. 1, pp. 13-27, 1991 https://doi.org/10.1016/0378-7206(91)90024-V
- Venkatesh, V. and M. Morris, 'Why Don't Men Ever Stop to Ask For Direction? Gender, Social Influence, ad Their Role in Technology Acceptance and Usage Behavior,' MIS Quarterly, Vol. 24, No. 1, pp. 115-139, 2000 https://doi.org/10.2307/3250981
- Agarwal, R. and J. Prasad, 'The Antecedents and Consequents of User Perceptions in Information Technology Adoption,' Decision Support Systems, Vol. 22, No. 1, pp. 15-29, 1998 https://doi.org/10.1016/S0167-9236(97)00006-7
- McGraw, G. and G. Morrisett, 'Attacking Malicious Code: A Report to the Infosec Research Council,' IEEE Software, Vol. 17, No. 5, pp. 33-41, 2000
- Sherif, J. and D. Gilliam, 'Deployment of Anti-Virus Software: A Case Study,' Information Management & Computer Security, Vol. 11, No. 1, pp. 5-10, 2003 https://doi.org/10.1108/09685220310463678
- Gasser, M., Building a Secure Computer Systems, Van Nostrand Rienhold Company, 1988
- Barsanti, C., 'Modern Network Complexity Needs Comprehensive Security,' Security, Vol. 36, No. 7, pp. 65, 1999
- Coursen, S., 'Financial Impact of Viruses,' Information Systems Security, Vol. 6, No. 1, pp. 64-70, 1997 https://doi.org/10.1080/10658989709342530
- 김종기, 이동호, 서창갑, '전자상거래환경에서 위험분석방법론의 타당성에 대한 연구,' 정보보호학회논문지, 제14권, 제4호, pp. 61-74, 2004
- 채서일, 사회과학조사방법론, 학현사, 2003
- Whitman, M., 'In Defense of the Realm: Understanding the Threats to Information Security,' International Journal of Information Management, Vol. 24, No. 1, pp. 43-57, 2004 https://doi.org/10.1016/j.ijinfomgt.2003.12.003