참고문헌
- J. H. Jeon and K. R. Cho, "Major changes in the PIMS certification in accordance with the amended public notification," Review of KIISC, Vol.23, No.5, pp.20-23, 2013.
- http://isms.kisa.or.kr
- Ministry of Government Legistration, Act on Promotion of Information and Communications Network Utilization and Information Protection, 2015.
- Korea Communications Commission, Enacted Public Notification for Certification of Personal Information Management System(PIMS), 2013.
- D. H. Park, S. N. Yoo, and H. Y. Youm, "Development of Information System Operational Audit Checklist for Personal Information Protection in Public Organizations," Journal of Security Engineering, Vol.12, No.1, pp.47-64, 2015. https://doi.org/10.14257/jse.2015.02.02
- K. T. Park and S. H. Kim, "A Study on the Preference Analysis of Personal Information Security Certification Systems: Focused on SMEs and SBs," Korea Institute of Information Security and Cryptology, Vol.24, No.5, pp.911-918, 2014. https://doi.org/10.13089/JKIISC.2014.24.5.911
- D. H. Park and K. H. Han, "A Study on PIMS Controls for Pll Outsourcing Management under the Cloud Service Environment," Korea Institute of Information Security and Cryptology, Vol.23, No.6, pp.1267-1276, 2013. https://doi.org/10.13089/JKIISC.2013.23.6.1267
- G. S. Cha, H. H. Han, and Y. T. Shin, "An Effective Personal Information Management System to Ensure Self-imposed Control on Personal Information Protection Act," Journal of KISS: Information networkings, Vol.39, No.3, pp.276-281, 2012.
- K. Hone and J. H. P. Eloff, "Information security policy-what dointernational information security standards say?," Computers & Security, Vol.21, No.5, pp.402-409, 2002. https://doi.org/10.1016/S0167-4048(02)00504-7
- M. Siponen and R. Willison, "Information security management standards: Problems and solutions," Information & Management, Vol.46, No.5, pp.267-270, 2009. https://doi.org/10.1016/j.im.2008.12.007
- 신동석, "분산 콘텐츠 기반의 머천트: 개인정보 통합콘텐츠관리 시스템 개발," 한국콘텐츠학회논문지, 제6권, 제5호, pp.113-121, 2006.
- 김희완, 유재성, 김동수, "정보시스템 감리에서 개인정보 영향평가를 통한 개인 정보보 보호," 한국콘텐츠학회논문지, 제11권, 제3호, pp.84-99, 2011. https://doi.org/10.5392/JKCA.2011.11.3.084
- T. L. Saaty, "How to make a decision: The analytic hierarchy process," European Journal of Operation Research, Vol.48, No.1, pp.9-26, 1990. https://doi.org/10.1016/0377-2217(90)90057-I
- O. S. Vaidya and S. S. Kumar, "Analytic hierarchy process: An overview of applications," European Journal of Operational Research, Vol.169, pp.1-29, 2004.
- G. T. Cho, Y. G. Cho, and H. S. Kang, Leading the lader's hierarchy decision making, Dong-Hyun Publish, Seoul, 2003.
- KISA, 개인정보보호 관리체계(PIMS) 인증의 주요 결함 사례, Privacy Global Edge 2014-CPO 포럼, 2014.
- J. G. Yoon, "A Comparison of 3 Statistical Technique for Evaluation MIS Sucess Factor = Application Efeects and Limitations of AHP as a Research Methodology," Journal of the Korean Operations Research and Management Science Society, Vol.21, No.3, pp.109-124, 1996.