References
- Agrawal, P. & P. J. Narayanan (2011). Person De-identification in Videos. IEEE Trans. on Circuits and Systems for Video Technology, 21(3), 299-310. https://doi.org/10.1109/TCSVT.2011.2105551
- Gu H. G. & Na J. Y. (2014). An Exploratory Study on Consumer Perception of Giving Consent for Personal Information. Korean Consumption Culture Association, 17(2), 151-18. https://doi.org/10.17053/jcc.2014.17.2.008
- Gurung, Anil, Xim:uo, and Qinyu:iao (2009). Consumer motivations in taking action against spyware: an empirical investigation. Information Management & Computer Security, 17(3), 276-289. https://doi.org/10.1108/09685220910978112
- Gwon J. I. & An S. J. (2013). A Study of a Teaching and Learning Process of the Information and Communication Ethics Based on Creative Problem Solving Method. The Journal of Korean Association of Computer Education, 16(3), 41-48.
- Ifinedo, Princely (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), 83-95. https://doi.org/10.1016/j.cose.2011.10.007
- Jo K. H. (2011). Development of a Teaching-Learning Process Plan for Private Information Security Education in the 'Information Security and Sharing' Unit of Technology.Home Economics Subject of Middle School. Master's dissertation. Graduate School of Korea National University of Education.
- Kim D. U. & Chae S. W. & Lyu J. C. (2013). A Study on Domestic Information Security Education System. The Journal of Korea Institute of Information Security & Cryptology, 23(3), 545-559. https://doi.org/10.13089/JKIISC.2013.23.3.545
- Kim H. M. & Jo M. H. (2013). The Current Status of Elementary School Students' Information Dysfunction and the Information & Communication Ethics Education. The Journal of Korean Association of Computer Education, 6(1), 23-32.
- Kim M. J. & Lee H. N. & Song S. J. & Yu J. H. (2014). A Study on the Curriculum of Department of Information Security in Domestic Universities and Graduate Schools and Comparison with the Needs of Industry Knowledge. The Journal of Korea Institute of Information Security & Cryptology, 24(1), 195-205. https://doi.org/10.13089/JKIISC.2014.24.1.195
- Ko Y. M. & Choi J. W. & Kim B. S. (2014). The Impact of Privacy Policy Layout on Users" Information Recognition. Journal of the Korea Institute of Information Security and Cryptology 24(1), 183-193. https://doi.org/10.13089/JKIISC.2014.24.1.183
- Ku H. G. & Na J. Y. (2014). An Exploratory Study on Consumers' Perception of Personal Information Provision to the Third Party. Journal of Digital Convergence, 12(8), 187-196. https://doi.org/10.14400/JDC.2014.12.8.187
- Lee D. H. & Jo K. H. (2011). A Case based Multiplex Teaching and Learning Model to Improve the Educational Level of Information and Communication Ethics in Elementary School. The Journal of Korean Association of Computer Education, 14(6), 31-39.
- Lee H. Y. (2006). The Current Status of Youth Education for ICT Ethics and Activation Plan. Korea Information Processing Society, 13(1), 34-44.
- Lee K. C. (2015). Analysis of Education Status for Personal Information Security in Korea. The Society of e-learning Workshop Presentation File, 6(1), 91-96.
- Lee Y. S. (2009). A Study on Factors Influencing the Preventive Efforts toward Personal Information Privacy. Master's dissertation, Graduate School of SungKyunKwan University.
- Lym W. G. & An S. J. (2014). A Study on Improvements of the Information Security Department via the Curriculum Analysis. The Journal of Korean Association of Computer Education, 17(6), 71-80.
- Ministry of Public Administration and Security (2012). '12-'14 Basic plan for Personal information protection .
- Park C. U. & Lee S. U. (2014). A study of the User Privacy Protection Behavior in Online Environment - Based on Protection Motivation Theory. The Journal of Korean Society For Internet Information, 15(2), 59-71.
- Personal Information Protection Committee (2014). 2014 Annual report of Personal Information Protection, Korea Culture Association for the Disabled.
- Personal Information Protection Law No.28 (Enactment 2011-09-30).
- Personal Information Protection Law, Chapter 1 (Enactment 2011-09-30).
- Personal Information Protection Law, Chapter 3, Chapter 5 (Enactment 2011-09-30).
- Peter W. Low/John C. Jeferies, Jr./Curtis A. Bradley (2011). Federal Courts and the Law of Federal-State Relations. 7th Ed., Foundation Press.
- Salomon, G. (1984). Television is "easy" and print is "tough": The differential investment of mental effort in learning as a function of perceptions and attributions. Journal of Educational Psychology, 76(4), 647-658. https://doi.org/10.1037/0022-0663.76.4.647
- Shin H. S. (2007). Reality analysis on elementary school student's private information Management Conditon. Master's dissertation, Graduate School of DaeJeon University.
- Son T. H. & Park J. S. (2013). A Study on Privacy Compliance Indicators Based on Privacy Act's Penalty Provisions, Korea Safety Management & Science. 2013년 Autume Academic Conference, 569-578.
- Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research, 13(1), 36-49. https://doi.org/10.1287/isre.13.1.36.97
- Vealey, R. S. (1986). Conceptualization of sport-confidence and competitive orientation: Preliminary investigation and instrumentation development. Journal of Sport Psychology, 8(3), 221-246. https://doi.org/10.1123/jsp.8.3.221
- Wi J. U. (2007). Design and implementation of a web courseware for educating personal information protection. Master's dissertation, Graduate School of Korea National University of Education.
- Yang S. J. (2009). Reality analysis on elementary school student's private information safeguard awareness. Master's dissertation, Graduate School of ChinJu National University of Education.