References
- S. T. K. Myo & G. H. Hwang. (2017). Effect of Mobile Devices on the Use Intention and Use of Mobile Banking Service in Myanmar. Journal of Digital Convergence, 15(6), 71-82. https://doi.org/10.14400/JDC.2017.15.6.71
- M. Heng. (2018). A study on developing the Roadmap for Strengthening Cybersecurity Focused on Cambodia. Master Thesis, Soongsil University, Seoul.
- M. Dara & D. de. Carteret. (2016). Slew of websites hacked. The Phnompenh Post, January 12.
- I. Pena-Lopez. (2015). Global Cybersecurity Index & Cyberwellness Profiles Report. WSIS Forum 2015 Geneva, 1-37.
- UMUC.(n.d.). Cyber Security Primer. DOI : http://www.umuc.edu/cybersecurity/about/cybersecurity-basics.cfm#
- L. M. Aliyeva & G. H. Hwang. (2019). The Model to Implement the Cyber Security Policy and Strategy for Azerbaijan Information System. Journal of Digital Convergence, 17(5), 23-31. https://doi.org/10.14400/jdc.2019.17.5.023
- S. H. Kim & J. S. Han. (2014). Smart Cold-Chain Monitoring Automation System Architecture based on Internet of Things. Journal of digital convergence, 12(12), 351-356. https://doi.org/10.14400/JDC.2014.12.12.351
- J. H. Cho &, H. J. Lee (2018). A Study on the Real-time Cyber Attack Intrusion Detection Method. Journal of the Korea Convergence Society, 9(7), 55-62. https://doi.org/10.15207/JKCS.2018.9.7.055
- S. H. Hong & J. A. Yu (2018). Ransomware attack analysis and countermeasures of defensive aspects. Journal of Convergence for Information Technology, 8(1), 139-145. https://doi.org/10.14801/JAITC.2018.8.2.139
- F. Wamala. (2011). The ITU National Cybersecurity Strategy Guide. ITU.
- S. H. Lee & D. W. Lee. (2014). A Study on Internet of Things in IT Convergence Period. Journal of digital convergence. 12(7), 267-272. https://doi.org/10.14400/JDC.2014.12.7.267
- Canada & Public Safety Canada. (2010). Canada's cyber security strategy: for a stronger and moreprosperous Canada. Ottawa, Ont.: Government of Canada.
- H. J. Mun, Y. C. Hwang, & H. Y Kim. (2015). Countermeasure for Prevention and Detection against Attacks to SMB Information System - A Survey. Journal of IT Convergence Society for SMB, 5(2), 1-6.
- OECD (2012). Non-governmental Perspectives on a New Generation of National Cybersecurity Strategies. OECD Digital Econmy Papers, 212.
- S. Berman (2018). How to Structure Your Organization's Cybersecurity Management: Insights from Nutter's Seth Berman. Nutter,October 3,
- ISACA. (2015). State of Cybersecurity : Implications for 2015. CyberSecurity Nexus, 22.
- L. S Kim. (2015). Convergence of Information Technology and Corporate Strategy. Journal of the Korea Convergence Society, 6(6), 17-26. https://doi.org/10.15207/JKCS.2015.6.6.017
- L. S. Kim. (2015). Convergence of Information Technology and Corporate Strategy. Journal of the Korea Convergence Society, 6(6), 17-26. https://doi.org/10.15207/JKCS.2015.6.6.017
- Z. Yunos, R. S. A. Hamid & M. Ahmad. (2016). Development of a cyber security awareness strategy using focus group discussion. SAI Computing Conference (SAI), 1063-1067.
- R. Filipek. (2007). Information security becomes a business priority. Internal Auditor, 64(1), 18.
- C. H. Yoon & G. D. Choi. (2014). The Effects of National Culture on Ethical Decision-Making in the Internet Context : An Exploratory Analysis. Journal of digital convergence, 12(12), 23-36. https://doi.org/10.14400/JDC.2014.12.12.23
- K. B. Kim & J. Y. Yun (2015). Comparison and Analysis on Mobile Payment in terms of Security : Survey. Journal of IT Convergence Society for SMB, 5(3), 15-20.
- L. Saaty. (1990). The Analytic Hierarchy Process. Publications, Pittsburgh, PA.
- H. T. Choi. (2018). Analysis of policy priorities for strengthening the capacity of local public officials. Journal of the Korea Convergence Society, 9(11), 345-351. https://doi.org/10.15207/JKCS.2018.9.11.345
- B. C. Kim. (2015). A Internet of Things(IoT) based exploration robot design for remote control and monitoring. Journal of digital convergence, 13(1), 185-190. https://doi.org/10.14400/JDC.2015.13.1.185