References
- 최 명길 외 2인, "정보보호정책의 성숙도에 미치는 요인에 관한 연구", 정보보호학회논문지, 제18권, 제3호, 2008년 3월
- NIST, An Introduction to Computer Security; The NIST handbook ,NIST, 1999
- Don Holden, "ISO 17799 Security Standa-rd; How will It fit with other standards", CISSP-ISSMP, pp. 10-15 2006
- BS7799 정보보안 경영시스템,http://www.dnv.co.kr/binaries/BS7799 description, tcm34-89786.pdf. pp. 1-4
- S. Banerjee and D.Y. Golhar, "Electronic Data Interchange:Characteristics of Users and Nonusers", Information and Management 26(2), pp.65-74, 1994
- R. Baskerville and M. Siponen,"An Information Security Meta-Policy for Emergent Organizations", Logistics Information Management, 15, pp.337-346, 2002 https://doi.org/10.1108/09576050210447019
- R. C. Beatty, J. P. Shim and M. C. Jones, "Factors Influencing Corporate Web Site Adoption:a Time-Based Assessment", Information & Management 38, pp.337-354, 2001 https://doi.org/10.1016/S0378-7206(00)00064-1
- H. N. Higgins, "Corporate System Security: Towards an Integrated Management Approach", Information Management & Computer Security, 7(5), pp.217-222, 1999 https://doi.org/10.1108/09685229910292817
- K. Hone and J. H. P. Eloff,"Information Security Policy-What Do International Secu- rity Standards Say?", Computers & Security, 21(5), pp.402-409, 2002 https://doi.org/10.1016/S0167-4048(02)00504-7
- K. Joshi, "The Measurement of Fairness or Equity Perceptions of Management Informa- tion Systems Users", MIS Quarterly 13(3), pp.343-358, 1989 https://doi.org/10.2307/249010