참고문헌
- Ki-Hyo Nam․Hyung-Suk Kang․Ji-Ho Gil․Sung-In Kim(2009). "Internal information leakage prevention (DLP) technology trends". Week Technology Trends. No. 1413.
- Min-Sun No․Sam-Yeol Lee(2010). "Factors assessment of the security capabilities of the SME industry". Korea Public Administration Review. Vol44, No. 3.
- Sung-Uk Park․Sang-Ho Lee(2008). "An Analysis on Information Security Industry in Korea : An Input-Output Analysis". Industrial Innovation. Vol24, No. 3.
- Tae-Wan Park(1997). Information Systems Security Supervision. Korea Computerization Agency.
- Min-Hyeong Lee(2013), A Study on the Developmental Activation Plan of Local Medium and Small Firms - Focussed on Industrial Security . Korea Local Government Studies, Vol.15, No. 2, pp141-159.
- Sang-Jun Lee(2008). Assessing the accounting errors of the job relevance of skills. HoSeo University Graduate School.
- Gu-Hun Jung(2011). "Effect of Information Security Management and Control Activities for Proprietary Information Leakage Prevention on Information Asset Protection Performance". Ph.D. Diissertation, KookMin University Business IT Graduate School.
- Hae-Chul Jung․Hyun-Soo Kim(2000). "Relationship between consciousness and organization of information security and information security level of the organization". Journal of Information Technology Applications & Management. Vol7, No. 2.
- Korea Information Society Development Institute(2008). National Informatization White Paper. Korea Information Society Development Institute.
- MOPAS(2008). Privacy medium-term Master Plan. MOPAS.
- New Daily News. 'Industrial espionage damage 年60 80% an inside job jo bomb technology delivered' Aug 25th, 2014.
- Daily TR, 'Hyundai Kia's design leaked a bunch of drawings China'. July 22th, 2015
- E-Daily. 'Group opposing nuclear power, nuclear power figures released ... "I sell in other countries," Cash requirements ". Aug 3th, 2015.
- Ariss, S. S. (2002). Computer Monitoring: Benefits and Pitfalls Facing Management. Information & Management, Vol39, No.7, pp. 553-558. https://doi.org/10.1016/S0378-7206(01)00121-5
- Brian, E. B. (2005). Worldwide Outbound Content Compliance 2005-2009 Forecast and Analysis: IT Security Turns Inside Out. Internet Data Center(IDC).
- Dan, Y. (2005). InfoWatch: A Multi-layered Approach for Information Leakage Detection and Prevention. Internet Data Center(IDC).
- Forte, S. (2002). Vulnerability Management: One Problem, Several Potential Approaches. Network Security, Vol5, pp. 11-13.
- Gerber, M., Solms, R., Overbeek, P. (2001). Formalizing Information Security Requirements. Information Management and Computer Security, Vol9, No.1, pp. 32-37. https://doi.org/10.1108/09685220110366768
- Holmes, D. (2001). E-Gov: e-Business Strategy for Government. London: Nicholas Brealey Publishing.
- Kevin, S. H. (2002). The Digital Security Debate: How to Manage Risk?, Secure Business Quarterly, First Quarter.
- Post, G. & Kagan, A. (2000). Management Tradeoffs in Anti-virus Strategies. Information & Management, Vol37, No.1, pp. 13-24. https://doi.org/10.1016/S0378-7206(99)00028-2
- Raul, E. P. & Rich, M. (2006). Magic Quadrant for Content Monitoring and Filtering and Data Loss Prevention. Gartner RAS Core Research Note.
- Solms, B. (1996). Information Security Management: The Second Generation. Computer and Security, Vol15, No.4, pp. 281-288. https://doi.org/10.1016/0167-4048(96)88939-5
- Solms, B. (2001). Corporate Governance and Information Security. Computers and Security, Vol20, No.3, pp. 215-218. https://doi.org/10.1016/S0167-4048(01)00305-4
- Kwon, Y. T., Yoon, M. O., Choi, H. C., The Comparative Study on the Perception of Business Activities about Disaster Preparedness between Korea and Japan, Journal of The Korean Society of Disaster Information, Vol 9, No.4