References
- Choi, M. and Park, E., "The Influences of Enterprise Management Strategy on Information Security Effectiveness", International Journal of Applied Engineering Research, Vol. 11, No. 15, 2016, pp. 8686-8694.
- Choi, M., "An Evaluation Methodology of Information Systems in Business Contingency Planning", Journal of Information Technology Application and Management, Vol. 23, No. 1, 2016, pp. 119-128. https://doi.org/10.21219/jitam.2016.23.1.119
- Choi, M., "Leadership of Information Security Manager on the Effectiveness of Information Systems Security for Secure Sustainable Computing", Substantiality, Vol. 8, No. 7, 2016, pp. 1-21.
- Department of Homeland Security, Continuous Asset Evaluation, Situational Awareness, and Risk Scoring Reference Architecture Report (CAESARS), 2010.
- Gilbert, G. A. and Gips, M. A., "SUPPLYSIDE CONTINGENCY PLANNING Contingency Planners Often Forget to Consider Key Elements of the Supply Chain", Security Management, Vol. 44, No. 3, 2000, pp. 70-75.
- Jo, S., Lee, Y., and Choi, M., "A Study on Factors Influencing Telecommunications Fraud : In the Case of Voice Phishing", Journal of Information Technology Service, Vol. 15, No. 2, 2016, pp. 35-49.
- NIST SP 800-37, Rev. 1, Guide for Applying the Risk Management Framework to Federal Information Systems : A System Life Cycle Approach, 2010.
- NIST SP 800-64, Rev. 2, Security Considerations in the System Development Life Cycle, 2008.
- NIST SP 800-64, Revision 2, Security Considerations in the System Development Life Cycle, 2008.
- Shaw, G. L. and Harrald, J. R., "Identification of the Core Competencies Required of Executive Level Business Crisis and Continuity Managers", Journal of Homeland Security and Emergency Management, Vol. 1, No. 1, 2004.