참고문헌
- Parker, D. B. 'The Strategic Values of Information Security in Business', Computers & Security, Vol.16, No.7, pp.572-582, 1997 https://doi.org/10.1016/S0167-4048(97)80793-6
- 남상훈, 임종인, '기업 정보보호 투자에 대한 경제성 평가의 접근방법에 관한 연구', 한국기술혁신학회 추계학술대회, pp.282-295, 2005
- 홍기향, '정보보호 통제와 활동이 정보보호 성과에 미치는 영향에 관한 연구', 국민대학교 박사학위논문, 2003
- Webster, J. and Watson, R.T., 'Analyzing the Past to Prepare for the Future: Writing a Literature Review', MIS Quarterly, Vol.26, No.2, pp.13-23, 2002
- 이창진, 이정훈, 장덕화, 'IT 지배구조 기반의 IT 전략 및 운영관리: 문헌연구와 미래연구방향', 한국경영정보학회 춘계학술대회, pp.853-863, 2006
- 채서일, 사회과학조사방법론, 학현사, 2003
- Alpar, P. and Kim, M.A., 'A Microeconomic Approach to the Measurement of Information Technology Value', Journal of Management Information Systems, Vol.7, No.2, pp.55-69, 1990 https://doi.org/10.1080/07399019008968344
- Barua, A. and Kriebel, C.H., 'Information Technologies and Business Value : An Analytic and Empirical Investigation', GSIA Working Papers, 1991-17, Carnegie Mellon University, Pittsburgh, PA, 1991
- Brynjolfsson, E. and Hitt, L., 'Paradox Lost? Firm-level Evidence on the Returns to Information Systems', Management Science, Vol.42, No.4, pp.541-558, 1996 https://doi.org/10.1287/mnsc.42.4.541
- Kim, S. and Leem, C.S., 'Implementation of the Security System for Instant Messengers', Lecture Notes in Computer Science, Vol.3314, pp.739-744, 2004
- Kim, S. and Leem, C.S., 'Security of the Internetbased Instant Messenger: Risks and Safeguards', Internet Research: Electronic Networking Applications and Policy, Vol.15, No.1, pp.88-98, 2005 https://doi.org/10.1108/10662240510577086
- Mahmood, M.A. and Mann, G.J., 'Measuring the Organizational Impact of Information Tech nology Investment: an Exploratory Study', Journal of Management Information Systems, Vol.10, No.1, pp.97-122, 1993
- Mitra, S. and Chaya, A.K., 'Analyzing Cost-effectiveness of Organizations: the Impact of Information Technology Spending', Journal of Management Information Systems, Vol.13 No.2, pp.29-57, 1996 https://doi.org/10.1080/10580539608906969
- Soo Hoo, K.J., 'How much is enough? A Risk-Management Approach to Computer Security', Center for International Security and Cooperation (CISAC), Stanford University, Stanford, 2000
- Gordon, L., Loeb, M. and Lucyshyn, W, 'An Economics Perspective on the Sharing of Information Related to Security Breaches', Proceedings of WEIS, UC Berkeley, May. 2002
- Gal-Or, Esther and Ghose, Anindya, 'The Economic Incentives for Sharing Security Information', Working Paper, University of Pittsburgh and Carnegie Mellon University
- Anderson, Ross., 'Why Information Security is Hard-An Economic Perspective', ACSAC, 2001
- 신일순, '정보보호의 경제학적 의미에 대한 소고', Information Security Review, Vol.1, No.1, 2005
- Gordon, L.A. and Loeb, M.P., 'The Economics of Information Security Investment', ACM Transactions on Information and System Security, Vol.5, No.4, pp.438-457, 2002 https://doi.org/10.1145/581271.581274
- Cavusoglu, H., Mishra, B.K. and Raghunathan, S., 'Optimal Design of IT Security Architecture', Working Paper, University of Texas at Dallas, 2002
- Cavusoglu, H.(Hasan), Cavusoglu, H.(Huseyin) and Raghunathan S. 'Economics of IT Security Management: Four Improvements to Current Security Practices', Communications of the Association for Information System, Vol.14, pp.65-75, 2004a
- Cavusoglu, H., Mishra, B. and Raghunathan, S., 'A Model for Evaluating IT Security Investments', Communications of the ACM, Vol.47, No.7, pp.87-92, 2004b
- Al-Humaigani, M. and Dunn, D.B., 'A Model of Return on Investment for Information Systems Security', Circuits and Systems, MWSCAS Vol.1, pp.483-485, 2003
- Tsiakis, Theodosios and Stephanides, George, 'The Economic Approach of Information Security', Computers & Security, Vol. 24, No.2, pp.105-108, 2005 https://doi.org/10.1016/j.cose.2005.02.001
- Hausken, K., 'Returns to Information Security Investment: The Effect of Alternative Information Security Breach Functions on Optimal Investment and Sensitivity to Vulnerability', Information System Frontiers, Vol.8, No.5, pp. 338-349, 2006
- Blatchford, C., 'Information Security Controls-Are They Cost-effective', Computer Audit Journal, Vol.3, pp.11-19, 1995
- Davis, A., 'Return on Security Investment-Proving It's Worth It', Network Security, Vol.2, pp.8-10, 2005
- Lee, Vincent C.S., 'A Fuzzy Multi-criteria Decision Model for Information System Security Investment', Lecture Notes in Computer Science, Vol.2690, pp.436-441, 2003
- Bodin, L.D., Gordon, L.A. and Loeb, M.P, 'Evaluating Information Security Investments Using the Analytic Hierarchy Process', Communications of the ACM, Vol.48, pp.79-83, 2005
- Scott, D., 'Security Investment Justification and Success Factors', Gartner Inc., Stamford, CT, 1998
- Scott, D., 'Best Practices and Trends in Business Continuity Planning', U.S. Symposium/ITxpo, Orlando, FL, 2002
- Blakley, B., 'Returns on Security Investment: an Imprecise but Necessary Calculation', Secure Business Quarterly, Vol.1, No.2, 2001
- Witty, R.J, Girard, J., Graff, J.W., Hallawell, A., Hildreth, B., MacDonald, N., Malik, W.J., Pe scatore, J., Reynolds, M., Russell, K., Wheatman, V., Dubiel, J.P., and Weintraub, A., 'The Price of Information Security', Gartner Inc., Stamford, CT, 2001
- Harris, S., 'CISSP All-in-One Exam Guide', McGraw-Hill, New York, NY, 2001
- Roper, C.A., 'Risk Management for Security Professionals', Butterworth-Heinemann, Boston, MA, 1999
- 김정덕, 박정은, 'TCO 기반 정보보호 투자수익률(ROIS)에 대한 연구', 한국디지털정책학회 창립 학술대회, pp.251-261, 2003
- 이종선, 이희조, 'TCO기반 Security ROI를 활용한 정보보호 투자성과 평가방법', 한국정보처리학회 춘계학술대회, pp.1125-1128, 2007
- 선한길, '국내기업의 정보보호 정책 및 조직 요인이 정보보호성에 미치는 영향', 한국경영정보학회 춘계학술대회, pp.1087-1095, 2005
- Tanaka, H., Matuura, K., and Sudoh, O., 'Vulnerability and Information Security Investment: An Empirical Analysis of E-local Government in Japan', Journal of Accounting and Public Policy, Vol.24, pp.37-59, 2005 https://doi.org/10.1016/j.jaccpubpol.2004.12.003
- 남상훈, '기업 정보보호 투자효과 분석방법에서 보안 Event가 주식가격에 미치는 영향 실증연구', 고려대학교 박사학위논문, 2006
- 권영옥, '정보보안 사고와 관련 투자가 기업가치에 미치는 영향에 관한 연구', 서울대학교 석사학위논문, 2005
- 권영욱, 김병도, '정보보안 사고와 사고방지 관련 투자가 기업가치에 미치는 영향', Information Systems Review, Vol.9, No.1, pp.105-120, 2007
- 박성욱, 윤종민, '산업연관분석을 이용한 정보보호 산업의 연구개발투자에 대한 경제기여도', 한국기술혁신학회 춘계학술대회, pp.19-29, 2006