References
- American Bar Association, Digital Signature Guidelines, 1996
- Baek, Bongsam., Korean Internet Environment, 'PC=MS'.'Mobile=Google'. Retrieved September 10, 2015.
- Burr, William E., Dodson, Donna F., Newton, Elaine M., Perlner, Ray A., Polk, W. Timothy., Gupta, Sarbari, & Nabbus, Emad. A., Electronic Authentication Guideline. National Institute of Standards and Technology, 2011.
- Cerna, Lucie, The Nature of Policy Change and Implementation: A Review of Different Theoretical Approaches, Organization for Economic Co-operation and Development, 2013.
- Clinton, J. William., Administration of Export Controls on Encryption Products. Executive Order, 13026, 1996.
- Chromium Blog (2013) Saying Goodbye to Our Old Friend NPAPI, Retrived from https://blog.chromium.org/2013/09/saying-goodbye-to-our-old-friend-npapi.html
- Danielle, Kehl, Wilson, Andi, & Bankston, Kevin. (2015). Doomed To Repeat History? Retrieved from https://static.newamerica.org/attachments/3407-125/LessonsFromtheCryptoWarsofthe1990s.882d6156dc194187a5fa51b14d55234f.pdf
- Department of Commerce. (2000, January 10). Revised U.S. Encryption Export Control Regulations.
- Grassi, Paul A., Garcia, Michael. E., & Fenton, James. L., NIST 800-63-3: Digital Identity Guidelines. National Institute of Standards and Technology, 2017.
- International Telecoms Union Telecommunication Standardization Sector. (1997). International TeleX. 509 : Information technology-Open Systems Interconnection-The Directory: Public-key and at tribute certificate frameworks Retreved from: https://www.itu.int/rec/T-REC-X.509
- Johnson, Chalmers., MITI and the Japanese miracle: the growth of industrial policy, 1925-1975, Stanford University Press, 1982.
- Kim, Tong-hyung. (2009, September 23). Korea Paying Price for Microsoft Monoculture. Retrieved from the Korean Times,: http://www.koreatimes.co.kr/www/news/biz/2010/05/123_52401.html
- Lee, Junghyun, The usage and problem of the authorized certificate in smart environment, Internet & Security Focus, Korea Internet Security Agency, 2013.
- Lee, Soo Hee, & Yoo, Taeyoung, "Government Policy and Trajectories of Radical Innovation in Dirigiste States: A Comparative Analysis of National Innovation Systems in France and Korea", Technology Analysis and Strategic Management, Vol. 19, No. 4, 2007, pp. 451-470. https://doi.org/10.1080/09537320701403383
- Lopez, Javier, Oppliger, Rolf, & Pernul, Gunther, "Why have public key infrastructures failed so far?" Internet Research, Vol. 15, No. 5, 2005, pp.544-556. https://doi.org/10.1108/10662240510629475
- Lui-Kwan, M. Kalama, "Recent Developments in Digital Signature Legislation and Electronic Commerce", Berkeley Technology Law Journal, Vol. 14, Iss. 1, 1999.
- Mundy, Simon. (2014, June). South Korea suffers poor cyber security controls. Retrieved from https://www.ft.com/content/7ae2b288-e29a-11e3-a829-00144feabdc0
- Muller, Milton, Rulling the root: Internet governance and the taming of cyberspace, The MIT Press, Cambridge, Massachusets London, England, 2002.
- National Cyber Security Center; National Security Research Institute, ActiveX Control Development Security Guideline, 2008.
- Organization for Economic Co-operation and Development, National Innovation System, 1997.
- Organization for Economic Co-operation and Development, Electronic Commerce. Policy Brief, 2001.
- Oh, Se-Jung, Networking between Academia, Public Research Institutes and Industry-Korean Experiences [PowerPoint slides], 2012.
- Park, Hun Myoung, "The Web Accessibility Crisis of the Korea's Electronic Government: Fatal Consequences of the Digital Signature Law and Public Key Certificate", 45th Hawaii International Conference on System Sciences, 2012.
- Park, Jihyun, Major issues and status on deregulation of the Authorized Certificate mandate in online transactions. Korea Financial Telecommunications & Clearings Institute. Korea Financial Telecommunications & Clearings Institute, 2010.
- Park, Mun Su, "An Exploratory Study for Convergence-type Technology Transfer", International Commerce and Information Review, Vol. 17 No. 1, 2015, pp.165-191. https://doi.org/10.15798/kaici.17.1.201503.165
- Park, Mun Su, & Lee, Ho-hyung, "A Study of Technical Support Policy for Innovative SMEs", International Commerce and Information Review, 14(1), 2012, pp.197-218.
- Saenuri Party, Public commitment of Saenuri party for 18th presidential election, 2012.
- Simmie, James, "Path Dependence and New Technological Path Creation in the Danish Wind Power Industry", European Planning Studies, Vol. 20, No. 5, 2012.
- Son, Yeol, "Technolgy, Institutions, Path Dependence: A compartive Study of Venture Nurturing Policies in Korea and Japan", Korean Political Science Review, Vol. 40, No. 3, 2006, pp.237-261.
- Statcounter.com. (2015). StatCounter Global Stats - Browser Market Share. Retrieved from Statcounter.: http://gs.statcounter.com/browser-market-share#monthly-201501-201501-map
- Statistics Korea. (2016). The government Research and Development Budget, Retrieved from http://www.index.go.kr/potal/main/EachDtlPageDetail.do?idx_cd=1330
- United Nations Commission on International Trade Law, Model Law on Electronic Commerce with Guide to Enactment, 1996.
- United States General Accounting Office, Information Security: Advances and Remaining Challenges to Adoption of Public Key Infrastructure Technology, 2001.
- Verizon, 2016 Data Breach Investigations Report. Verizon
- Yoon, Min-sik. (2013, July). Korea grapples with massive personal data theft, regulatory mess. Ret rieved from The Korea Harald: http://www.koreaherald.com/view.php?ud=20130719000708
- Winn, Jane K., US and EU Regulatory Competition and Authentication Standards in Electronic Commerce, 2006.