References
- S. E. Kim & Y. J. Yang. (2008). The Evolution of Tele-financial Fraud: An Analysis of Offender-Victim Interaction Structures and Respondence to 'Voice Phising'. Korean Academy of Public Safety and Criminal Justice, 17(3), 101-149.
- KISA. (2008). Changes in Social Engineering Hacking. Seoul: Korea Internet & Security Agency.
- E. J. Kim & E. M. Kim. (2014). The Types of the Financial Fraud and Characteristics of Victims Focused on the Middle-aged and Elderly Consumers. Journal of Consumer Policy Studies, 45(2), 23-46. https://doi.org/10.15723/jcps.45.2.201408.23
- D. Y. Jeong, G. Kim & S. Lee. (2017). A Study on Risk Analysis and Countermeasures of Electronic Financial Fraud. Journal of the Korea Institute of Information Security & Cryptology, 27(1), 115-128. https://doi.org/10.13089/JKIISC.2017.27.1.115
- H. G. Koo & J. Y. Rha. (2015). Which Factors Cloud Affect Financial Consumer Problems Experience? - Convergence Approach of both Technical Information and Subjective Competency. Journal of Digital Convergence, 13(5), 31-39. https://doi.org/10.14400/JDC.2015.13.5.31
- C. S. Park, J. T. Hwang & S. D. Yang. (2011). An Empirical Study on the Types of the Investment Fraud. Korean Criminpological Review, 88, 287-314.
- J. Lee. (2011). An Empirical Study on the Types of the Investment Fraud. Korean Criminpological Review, 90, 280-304.
- H. J. Lee. (2009). A Study on Voice Phishing Victims and Counterm easures of the police. Korean Association of Victimology, 17(2), 217-244.
- S. E. Kim & Y. J. Yang. (2008). The Evolution of Tele-financial Fraud: An Analysis of Offender-Victim Interaction Structures and Respondence to 'Voice Phishing'. Korean Association Of Public Safety And Criminal Justice, 17(3), 102-149.
- B. H. Lee. (2008). A Study on Victimization Factors of Internet Fraud. Korean Association of Public Safety and Criminal Justice Review, 17(1), 112-137.
- Y. M. Cha. (2014). A Study on Recovery of Voice Phishing Crime. The Legal Studies Institute of Chosun University, 21(2), 535-559.
- Ransomware Computer Emergency Response Team Coordination Center. (2007). Ransomware Infringement Analysis Report. Seoul: RanCERT.
- Y. J. Choi. (2005). Research About the Individual Information Infringement Which Uses the Society Engineering. Master's Thesis, Konkuk University, Seoul.
- M. Q. Patton. (2002). Qualitative Research and Evaluation Methods (3rd ed.). Newbury Park, CA: Sage Publications.
- J. W. Creswell. (2017). Qualitative Inquiry and Research Design: Choosing among Five Traditions (3rd ed.). Newbury Park, CA: Sage Publications.
- H. J. Lee, Y. H. Lee, S. R. Park & I. J. Park. (2017). Improvement of ICT SMEs Technology Support Programs using Exploratory FGI and Delphi techniques. Journal of Digital Convergence, 15(9), 35-46. https://doi.org/10.14400/JDC.2017.15.9.35
- K. J. Song & G. T. Yeo. (2017). A Study on Extraction of International Freight Forwarders' Service Quality Factors : the Case of South Korea. Journal of Digital Convergence, 15(8), 45-58. https://doi.org/10.14400/JDC.2017.15.1.45
- M. J, Hindelang, M. R. Gottfredson & J. Garofalo. (1978). Victims of personal crime: An empirical foundation for a theory of personal victimization. Cambridge, MA: Ballinger.
- T. C. Pratt, K. Holtfreter & M. D. Reisig. (2010). Routine online activity and internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47(3), 267-296. https://doi.org/10.1177/0022427810365903
- D. H. Ko & Y. A. Won. (2016). A Study of Effect on Media Exposure and Cybercrime Perception. Journal of Digital Convergence, 14(5), 67-75. https://doi.org/10.14400/JDC.2016.14.5.67
- H. A. Simon. (1957). Models of Man, New York: John Wiley & Sons.
- J. P. Park. (2015). Users' Security Protection through Fear Appeals: A Behavioral Economics Approach, Doctoral dissertation. Yonsei University, Korea.
- C. T. Kein & M. Helweg-Larsen. (2002). Perceived Control and the Optimistic Bias: A Meta-analytic Review. Psychology and Health, 17(4), 437-446. https://doi.org/10.1080/0887044022000004920
- J. R. Chapin. (2000). Third-person Perception and Optimistic Bias among Urban Minority at- Risk Youth. Communication Research, 27(1), 51-81. https://doi.org/10.1177/009365000027001003
- H. S. Rhee, Y. U. Ryu & C. T. Kim. (2005). I Am Fine But You Are Not: Optimistic Bias and Illusion of Control on Information Security. International Conference on Information Systems, Las Vegas, NV.
- H. S. Rhee, Y. U. Ryu & C. T. Kim. (2012). Unrealistic Optimism on Information Security Management, Computers & Security, 31(2), 221-232. https://doi.org/10.1016/j.cose.2011.12.001