참고문헌
- Oh, N. S., Han, Y. S., Eom, C. W. Oh, K. S., Lee, B. G., "Developing the Assessment Method for Information Security Level," Journal of the Society for e- Business Studies, Vol. 16, No. 2, pp. 159-169, 2011.
- Lee, H. M., Lim, J. I., "A Study on the Development of Corporate Information Security Level Assessment Models," Korea Institute of Information Security and Cryptology, Vol. 18, No. 5, pp. 161-170, 2011.
- Lee, Y. K., Kim, S. H., "A Development of Evaluation Indicators for Information Security by means of the Coincidence Analysis," Korea Society of IT Services, Vol. 7, No. 3, pp. 175-198, 2008.
- Ko, M. H., Kong, H. K., Kim, T. S., "Using a Balanced Scorecard Framework to Evaluate Corporate Information Security Level," Telecommunication Review, Vol. 19, No. 6, pp. 925-935, 2009.
- ISO/IEC 17799(BS 7799-1), "Information technology, Security techniques, Code of practice for information security," 2005.
- Eloff, j. H. P. and Eloff, M., "Integrated Information Security Architecture," Computer Fraud and Security, pp. 10-16, 2005.
- McCarthy, M. P. and Campbell, "Security Transformation," McGraw-Hill : New York, 2001.
- Tudor, J. K., "Information Security Architec ture-An integrated approach to security in an organization," Boca Raton, FL : Auerbach, 2000.
- KISA, MSIP, "Korea Information Security Management System Guideline(ISMS)," March, 2013.
- NISTIR 7628, "Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security," sep. 2010.
- Shin, K. A., Lee. S. J., "Information Security Management System on Cloud Computing Service," Journal of The Korea Institute of Information Security and Cryptology, Vol. 22, No. 1, pp. 155-167, 2012.
- Jang, E. Y., Kim, H. J., Park, C. S., Kim, J. Y., Lee. J. I., "The study on a threat countermeasure of mobile Cloud services," Journal of The Korea Institute of Information Security and Cryptology, Vol. 21, No. 1, pp. 177-186, 2011.
- Noh, B. N., Choi, J. G., "Security Technology Research in Cloud Computing Environment," Journal of Security Engineering, Vol. 8, No. 3, pp. 371-383, 2011.
- Park, C. S., "Study on Security Considerations in the Cloud Computing," Journal of academia-industrial technology, Vol. 12, No. 3, pp. 1408-1416, 2011.
- National Information Society Agency (NIA), "Big Data era opening a new future," 2013.
- "CSA Big Data Working Group Releases Top 10 Big Data Security and Privacy Challenges Report," Cloud Security Alliance, 2012.
- Da Veiga, J. H. P. Eloff, "An Information Security Governance Framework," Information Systems Management, Vol. 24, pp. 361-372, 2007. https://doi.org/10.1080/10580530701586136
- Saaty, T. L. and Luis, G. V., "Diagnosis with Dependent Symptoms : Bayes Theorem and the Analytic Hierarchy Process," Operations Research, Vol. 46, No. 4, pp. 491-502, 1998. https://doi.org/10.1287/opre.46.4.491
- Kim, H. S., "A Study on the Quantification of Information Security Level," The Korea Society of Management information Systems, Vol. 9, No. 4, pp. 182-201, 1999. https://doi.org/10.1046/j.1365-2575.1999.00060.x
- SOPHOS, "New platform and Changing threats," Security Threat Report, 2013.
- Von Solms, S. H., "Information Security- The fourth wave, Computers and Security," Vol. 25, pp. 165-168, 2006. https://doi.org/10.1016/j.cose.2006.03.004
- Martins, A. and Eloff, J. H. P., "Information Security Culture, In Security in the information society," Boston : Kluwer Academic Publishers, IFIP/SEC, pp. 203-214, 2002.
피인용 문헌
- Demand Forecasting Models for Medicines through Wireless Sensor Networks Data and Topic Trend Analysis vol.11, pp.9, 2015, https://doi.org/10.1155/2015/907169
- Designing Index for Assessing Structural Vulnerability of Supply Chain considering Risk Propagation vol.20, pp.2, 2015, https://doi.org/10.7838/jsebs.2015.20.2.125
- The Study of Developing Korean SentiWordNet for Big Data Analytics : Focusing on Anger Emotion vol.19, pp.4, 2014, https://doi.org/10.7838/jsebs.2014.19.4.001
- 기술사업화 프로세스 단계별 빅데이터 활용방안에 관한 연구 vol.19, pp.4, 2013, https://doi.org/10.7838/jsebs.2014.19.4.073
- 빅데이터 보안 분야의 연구동향 분석 vol.23, pp.1, 2013, https://doi.org/10.22693/niaip.2016.23.1.003
- AHP 방법을 활용한 디지털포렌식 전문가 역량의 우선순위 도출 vol.22, pp.1, 2017, https://doi.org/10.7838/jsebs.2017.22.1.107