References
- Acquisti, A. (2004). Privacy and security of personal information. Economics of Information Security, 179-186.
- Bansal, G., Zahedi, F. M., and Gefen, D. (2016). Do context and personality matter? Trust and privacy concerns in disclosing private information online. Information & Management, 53(1), 1-21. https://doi.org/10.1016/j.im.2015.08.001
- Byun, D. H. (1999). AHP Model for Evaluating EIS Software Packages. Asia Pacific Journal of Information Systems, 9(3), 75-92.
- Chiu, W., Lee, Y., and Lin, T. (2010). Performance evaluation criteria for personal trainers: An analytical hierarchy process approach. Social Behavior and Personality: An International Journal, 38(7), 895-905. https://doi.org/10.2224/sbp.2010.38.7.895
- Cranor, L. F., Reagle, J., and Ackerman, M. S. (2000). Beyond concern: Understanding net users' attitudes about online privacy. The Internet Upheaval: Raising Questions, Seeking Answers in Communications Policy, 47-70.
- Han, J., Kang, S. B., and Moon, T. S. (2013). An empirical study on perceived value and continuous intention to use of smart phone, and the moderating effect of personal innovativeness. Asia Pacific Journal of Information Systems, 23(4), 53-84. https://doi.org/10.14329/apjis.2013.23.4.053
- Ham, S., and Park, D. (2017). Study on policies for national cybersecurity. Journal of the Korea Institute of Information and Communication Engineering, 21(9), 1666-1673. https://doi.org/10.6109/JKIICE.2017.21.9.1666
- Ishizaka, A., and Lusti, M. (2006). How to derive priorities in AHP: A comparative study. Central European Journal of Operations Research, 14(4), 387-400. https://doi.org/10.1007/s10100-006-0012-9
- IGP, C., and CIPP, C. (2016). EU privacy regulations' impact on information governance. Information Management, 50(1), 20.
- Janczewski, L., and Shi, F. X. (2002). Development of information security baselines for healthcare information systems in new zealand. Computers & Security, 21(2), 172-192. https://doi.org/10.1016/S0167-4048(02)00212-2
- Jung, W., and Lee, S. T. (2015). What affects the value of information privacy on SNS? Asia Pacific Journal of Information Systems, 25(2), 289-305. https://doi.org/10.14329/apjis.2015.25.2.289
- Kashyap, R., and Bojanic, D. C. (2000). A structural analysis of value, quality, and price perceptions of business and leisure travelers. Journal of travel research, 39(1), 45-51. https://doi.org/10.1177/004728750003900106
- Ko, K., and Ha, H. (2008). Meta analysis of the utilization of analytic hierarchy process for policy studies in korea. Korean Policy Studies Review, 17(1), 287-313.
- Krishnamurthy, B., and Wills, C. E. (2009). On the leakage of personally identifiable information via online social networks. Proceedings of the 2nd ACM Workshop on Online Social Networks, 7-12.
- Kwon, H., Lee, E., Kim, T., and Jun, H. (2012). Estimating compensation for personal information infringement in korea using contingent valuation methods. Journal of the Korea Institute of Information Security and Cryptology, 22(2), 367-377. https://doi.org/10.13089/JKIISC.2012.22.2.367
- Lipovetsky, S., and Conklin, W. (2015). AHP priorities and the markov-chapman-kolmogorov steady-states probabilities. International Journal of the Analytic Hierarchy Process, 7(2), 349-363. https://doi.org/10.13033/ijahp.v7i2.243
- Liu, C., Ang, R. P., and Lwin, M. O. (2016). Influences of narcissism and parental mediation on adolescents' textual and visual personal information disclosure in Facebook. Computers in Human Behavior, 58, 82-88. https://doi.org/10.1016/j.chb.2015.12.060
- McCallister, E., Grance, T., and Scarfone, K.A. (2010). SP 800-122-Guide to protecting the confidentiality of personally identifiable information, Technical Report.
- Montes, R., Sand-Zantman, W., and Valletti, T. (2015). The value of personal information in markets with endogenous privacy (No. 851). Institut d'Economie Industrielle (IDEI), Toulouse.
- Nowak, G. J., and Phelps, J. (1995). Direct marketing and the use of individual-level consumer information: Determining how and when "privacy" matters. Journal of Direct Marketing, 9(3), 46-60. https://doi.org/10.1002/dir.4000090307
- Park, K. A., Lee, D. Y., and Koo, C. (2014). A Study on the Effect of Location-based Service Users' Perceived Value and Risk on their Intention for Security Enhancement and Continuous Use: With an Emphasis on Perceived Benefits and Risks. Asia Pacific Journal of Information Systems, 24(3), 299-323. https://doi.org/10.14329/apjis.2014.24.3.299
- Park, J., Kewon, E., Park., M, and Chai, S. (2017). The Value of Private Information based on Cost-Benefit Analysis Framework: Focusing on Individual Attributes, Dealer Traits, and Circumstantial Properties. Information Systems Review, 19(3), 155-177. https://doi.org/10.14329/isr.2017.19.3.155
- Phelps, J., Nowak, G., and Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), 27-41. https://doi.org/10.1509/jppm.19.1.27.16941
- Saaty, T. L. (1977). A scaling method for priorities in hierarchical structures. Journal of Mathematical Psychology, 15(3), 234-281. https://doi.org/10.1016/0022-2496(77)90033-5
- Saaty, T. L. (1994). How to make a decision: The analytic hierarchy process. Interfaces, 24(6), 19-43. https://doi.org/10.1287/inte.24.6.19
- Saaty, T. L. (2003). Decision-making with the AHP: Why is the principal eigenvector necessary. European Journal of Operational Research, 145(1), 85-91. https://doi.org/10.1016/S0377-2217(02)00227-8
- Schoch, T. P. (2016). EU privacy regulations' impact on information governance. Information Management Journal, 50(1), 20-25.
- Shinyoung Park, "Financial related personal information Commercial transactions must be allowed", 2018.03.30, Retrieved from http://news.hankyung.com/article/201803308
- Simoens, K., Bringer, J., Chabanne, H., and Seys, S. (2012). A framework for analyzing template security and privacy in biometric authentication systems. IEEE Transactions on Information Forensics and Security, 7(2), 833-841. https://doi.org/10.1109/TIFS.2012.2184092
- TAHAOGLU, O. O. (2009). Personal data protection in Turkey: An information technology framework indented for privacy risk management (Doctoral dissertation, DEu Fen Bilimleri Enstitusu).
- Tasidou, A., Efraimidis, P. S., and Katos, V. (2009). Economics of personal data management: Fair personal information trades. International Conference on E-Democracy, 151-160.
- Terzi, D. S., Terzi, R., and Sagiroglu, S. (2015). A survey on security and privacy issues in big data. In Internet Technology and Secured Transactions (ICITST), 2015 10th International Conference (pp. 202-207). IEEE.
- Van Zoonen, L. (2016). Privacy concerns in smart cities. Government Information Quarterly, 33(3), 472-480. https://doi.org/10.1016/j.giq.2016.06.004
- Wind, Y., and Saaty, T. L. (1980). Marketing applications of the analytic hierarchy process. Management Science, 26(7), 641-658. https://doi.org/10.1287/mnsc.26.7.641
- Yoo, J., Jie, S. H., and Lim, J. (2009). Estimating Direct Costs of Enterprises by Personal Information Security Breaches. Journal of the Korea Institute of Information Security and Cryptology, 19(4), 63-75. https://doi.org/10.13089/JKIISC.2009.19.4.63
- Yu, M. M., Ting, S. C., and Chen, M. C. (2010). Evaluating the cross-efficiency of information sharing in supply chains. Expert Systems with Applications, 37(4), 2891-2897. https://doi.org/10.1016/j.eswa.2009.09.048
- Personal Information Definition. Retrieved February 21, 2018, from www.PrivacySense.net
- Chosunbiz, 2018.02.17 Retrieved from http://biz.chosun.com/site/data/html_dir/2017/02/17/2017021701092.html?rsMobile=false
- Yonhapnews, 2016.07.28 Retrieved from http://www.yonhapnews.co.kr/bulletin/2016/07/27/0200000000AKR20160727136900002.HTML