References
- 백윤철, 이창범, 장교식, 개인정보보호법, 한국학술정보(주), 2008.
- 방송통신위원회, 개인정보의 기술적․관리적 보호조치 기준(제2011-01호), 2011.
- 장인주, 유영선, "개인정보보호 강화를 위한 동적 보안 수준 결정", 한국전자거래학회지, 제17권, 제1호, 2012.
- 정보통신부, u-프라이버시 환경 구축을 위한 개인정보보호기술 개발 추진 방향 (중장기 기술개발 계획(안)), 2005.
- 한국인터넷진흥원, 개인정보법 조문별 설명자료, 2010.
- 한국인터넷진흥원, 개인정보보호관리 체계 인증준비 안내서(사업자용), 2010.
- 한국인터넷진흥원, 개인정보보호 프레임워크 개발, 2009.
- 한국정보보호진흥원, 개인정보의 안전한 수집, 저장 및 관리, 이용, 제공, 파기를 위한 개인정보 관리모델 연구, 2006.
- 한국정보보호진흥원, 개인정보 영향 평가 기준 정비 방안에 관한 연구, 2005.
- 한국정보사회진흥원, "신 가치창출 엔진, 빅 데이터의 새로운 가능성과 대응 전략", IT and Future Strategy, 제18호, 2011, pp. 1-29.
- 한국정보통신기술협회, 정보통신 단체 표준 개인정보 생명주기별 보안 관리모델, TTAS.KO-12.0063, 2007.
- 한창희, 채승환, 유병준 등, "기업의 개인 정보 유출로 인한 경제적 피해규모 산출 방법", 한국전자거래학회지, 제16권, 제4호, 2011.
- 홍승필, 이철수, "유비쿼터스 컴퓨팅 환경 내 개인정보보호 프레임워크 적용 방안", 한국정보보호학회논문지, 제16권, 제3호, pp. 157-164, 2006.
- 행정안전부․한국인터넷진흥원, 공공 기관 개인정보 영향평가 수행안내서, 2011.
- APEC, APEC Privacy Framework, 2005.
- Aquilina, K., "Public security versus privacy in technology law : A balancing act?," Computer Law and Security Review : International Journal of Technology and Practice, Vol. 26, No. 2, pp. 130-141, 2010. https://doi.org/10.1016/j.clsr.2010.01.002
- Boneh, D., Feigenbaum, J., Silberschatz, A., and Wright, R. N., "PORTIA : Privacy, Obligations, and Rights in Technologies of Information Assessment," Bulletin of the IEEE Computer Society Technical Committee on Data Engineering, Vol. 27, pp. 10-18, 2004.
- Clarke, R., "Privacy impact assessment : Its origins and development," Computer Law and Security Review, Vol. 25, pp. 123-135, 2009. https://doi.org/10.1016/j.clsr.2009.02.002
- Homeland Security, Privacy Impact Assessments : The Privacy Office Official Guidance, 2010.
- Information Commissioner's office, The ICO Privacy Impact Assessment Hand book, 2007.
- International Security, Trust, and Privacy Alliance(ISTPA), http://www.istapa.org/ISTPA.
- Jafari-Lafti, M., Huang, C., and Farkas, C., "P2F : A User-Centric Privacy Protection Framework," 2009 International Conference on Availability, Reliability and Security, pp. 386-391, 2009.
- Jendricke, U. and Gerd tom Markotten, D., "Usability Meets Security-the Identity Manager as Your Personal Security Assistant for the Internet," Proceedings 16th Annual Computer Security Applications Conference, pp. 344-353, 2000.
- Kang, Y., Lee, H., Chun, K., and Song, J., "Classification of Privacy Enhancing Technologies on Life-cycle of Information," International Conference on Emerging Security Information, Systems and Technologies, IEEE, pp. 66-70, 2007.
- Laudon, K. C. and Laudon J. P., Management Information Systems : Managing the Digital firm, Pearson, 2011.
- Meziane, H. and Benbernou, S., "A dynamic privacy model for web services," Computer Standards and Interfaces, Vol. 32, pp. 288-304, 2010. https://doi.org/10.1016/j.csi.2010.02.001
- Nilsson, M., Lindskog, H., and Fischer- Hubner, S., "Privacy Enhancements in the Mobile Internet," IFIP WG9.6, 2001.
- Office of the New Zealand Privacy Commissioner, Privacy Impact Assessment Handbook, 2002.
- Office of the Privacy Commissioner(Australian Government), Privacy Impact Assessment Guide 2006.
- Peng, H., Gu, J., and Ye, X., "Towards Compliance and Accountability : A Framework for Privacy Online," Journal of Computers, Vol. 4, No. 6, pp. 494-501, 2009.
- Perkel, J., "How safe are your data? Many scientists want to keep their data and resources free; cyber security specialists want them under lock and key," Nature, Vol. 464(7293), pp. 1260-1261, 2010. https://doi.org/10.1038/4641260a
- The Treasury Board Secretariat of Canada, Privacy Impact Assessment Guidelines : A Framework to Manage Privacy Risks, 2007.
- U.S. Department of Commerce(DOC), Safe harbor, 2000.
- Weider D., Doddapaneni, S., and Murthy, S., "A Privacy Assessment Approach for Serviced Oriented Architecture Applications," 2006 second IEEE International Symposium on Service-Oriented System Engineering, pp. 67-75, 2006.
- Williams, M., "Privacy Management," The Law and Business Strategies, 2009 International Conference on Computational Science and Engineering, pp. 60-67, 2009.
Cited by
- A Study of Factors Influencing the Intention to Share the Information Security Knowledge on SNS(Social Network Services) vol.20, pp.1, 2015, https://doi.org/10.7838/jsebs.2015.20.1.001