References
- 고형석, 이홍제, 임화연, 한정석 2018. "4차 산업혁명시대의 빅데이터 정보자원 관리전략에 관한 연구," 정보화연구 (15:2), pp.119-131. https://doi.org/10.22865/JITA.2018.15.2.119
- 김경규, 신호경, 박성식, 김범수 2009. "정보자산보호 성과가 조직성과에 미치는 영향에 관한 연구: 관리활동과 통제활동을 중심으로," 정보관리연구 (40:3), pp.61-77. https://doi.org/10.1633/JIM.2009.40.3.061
- 김승래 2017. "AI 시대의 지식재산권 보호전략과 대책," 지식재산연구 (12:2), pp.145-176.
- 백민정, 손승희 2011. "중소규모 조직구성원의 정보보안인식과 행동이 정보보안성과에 미치는 영향에 관한 연구," 중소기업연구 (33:2), pp.113-132.
- 서성웅, 박병규, 지대환 2017. "인공지능(AI) 융합기술 기반의 기업형 챗봇(Chatting Robot) 개발을 통한 일반업무 디지털트랜스포메이션 효과에 관한 연구," 2017년 경영정보관련 추계학술대회 논문집, pp.284-289.
- 손인수, 김대길 2017. "클라우드 컴퓨팅 도입이 기업의 시장가치에 미치는 영향: 이벤트 스터디를 활용한 분석," 인터넷전자상거래연구 (17:1), pp.1-21.
- 심혜정, 김건우 2018. "우리 기업의 인공지능(AI)을 활용한 비즈니스 모델," Trade Focus, 국제무역연구원, pp.1-26
- 유성민 2014. "ICBM 산업육성 방안 및 기술도입 전략," 한국정보기술학회지 (12:2), pp.9-16.
- 이강백, 김태환, 이상용 2015. "기업보안투자가 기업성과에 끼치는 영향," 2015년 한국경영정보학회춘계학술대회 논문집, pp.354-359
- 이종화, 이현규 2018. "빅테이터 분석을 위한 비용효과적 오픈 소스 시스템 설계," 지식경영연구 (19:1), pp.119-132 https://doi.org/10.15813/kmr.2018.19.1.007
- 임재수, 오재인 2017. "클라우드 컴퓨팅 서비스의 도입특성이 기업의 인지된 기대성과에 미치는 영향," Information Systems Review (19:1), pp. 75-100. https://doi.org/10.14329/isr.2017.19.1.075
- 정현준, 신우철, 홍정민, 이운호, 이용희, 변종석, 박민규 2018. "ICT부문 분석용 마이크로데이터 구축", 정책연구, pp. 18-76, 정보통신정책연구원.
- 조일형, 김진, 유진호 2019. "개인정보보호 관련 공공사업의 타당성 조사를 위한 비용효과분석 사례 연구," 지식경영연구 (20:3), pp.91-104. https://doi.org/10.15813/kmr.2019.20.3.006
- 최병구 2016. "정보기술 개발 유형과 기업성과 간의 관계에 대한 실증적 고찰: 자원준거 이론 관점에서," 지식경영연구 (17:4), pp.163-189. https://doi.org/10.15813/kmr.2016.17.4.008
- 최은수, 이윤철 2009. "정보기술이 지식경영활동과 성과에 미치는 효과에 대한 실증분석," 지식경영연구 (10:3), pp.51-80.
- 편용범, 강수경, 김광복, 김종진, 차형기, 이형준 2019. "딥러닝 기업을 이용한 정량적 어획물 분류를 위한 기반 연구," 한국수산과학회 양식분과 학술대회, p.120.
- 현정훈 2018. "4차산업혁명과 기업보안의 현시점," 한국멀티미디어학회지 (22:2), pp.6-12.
- Anat Hovav, 한진영 2013. "정보보안 사고가 기업의 주식가치에 미치는 영향: 한국기업 중심으로," 인터넷전자상거래연구 (13:3), pp.43-67.
- MiHye Yang, Wonho Nam, Taegon Kim and Yonghwa Kim. 2019. "Machine learning application for predicting the strawberry harvesting time," Korean Journal of Agriculture Science (46:2), pp.381-393
- Ahuja G. and Katila R. 2001. "Technological Acquisitions and the Innovation Performance of Acquiring Firms: A Longitudinal Study," Strategic Management Journal (22:3), pp.197-220. https://doi.org/10.1002/smj.157
- Ashford W. 2012. Many UK Firms Underestimate Cost of Data Breaches, Study Finds.
- Barney J. 1986. "Strategic Factor Markets: Expectations, Luck, and Business Strategy," Management Science (32:10), pp.1231-1241. https://doi.org/10.1287/mnsc.32.10.1231
- Barney J. 1991. "Firm Resources and Sustained Competitive Advantage," Journal of Management (17:1), pp.99-120. https://doi.org/10.1177/014920639101700108
- Belissent J. 2010. "Getting Clever About Smart Cities: New Opportunities Require New Business Models," Cambridge, Massachusetts, USA.
- Berchicci L. 2013. "Towards an Open R&D System: Internal R&D Investment, External Knowledge Acquisition and Innovative Performance," Research Policy (42:1), pp.117-127. https://doi.org/10.1016/j.respol.2012.04.017
- Bharadwaj A. S., Bharadwaj S. G. and Konsynski B. R. 1999. "Information Technology Effects on Firm Performance as Measured by Tobin's Q," Management Science (45:7), pp.1008-1024. https://doi.org/10.1287/mnsc.45.7.1008
- Chang S. E. and Ho C. B. 2006. "Organizational Factors to the Effectiveness of Implementing Information Security Management," Industrial Management & Data Systems (106:3), pp.345-361. https://doi.org/10.1108/02635570610653498
- Dutot V., Bergeron F. and Raymond L. 2014. "Information Management for the Internationalization of Smes: An Exploratory Study Based on a Strategic A lignment Perspective," International Journal of Information Management (34:5), pp.672-681. https://doi.org/10.1016/j.ijinfomgt.2014.06.006
- Candelin-Palmqvist H., Sandberg, B., and Mylly U. M. 2012. "Intellectual Property Rights in Innovation Management Research: A Review," Technovation (32:9-10), pp.502-512 https://doi.org/10.1016/j.technovation.2012.01.005
- Im K. S., Dow K. E. and Grover V. 2001. "Research Report: A Reexamination of IT Investment and the Market Value of the Firm-an Event Study Methodology," Information Systems Research (12:1), pp.103-117. https://doi.org/10.1287/isre.12.1.103.9718
- Jones G. K., Lanctot A. and Teegen H. J. 2001. "Determinants and Performance Impacts of External Technology Acquisition," Journal of Business Venturing (16:3), pp.255-283. https://doi.org/10.1016/S0883-9026(99)00048-8
- Kayworth T. and Whitten D. 2010. "Effective Information Security Requires a Balance of Social and Technology Factors," MIS Quarterly executive (9:3), pp.2012-2052.
- Nord W. R. and Tucker S. 1987. Implementing Routine and Radical Innovations. Lexington Books: Lexington, MA.
- Penrose R. 1959. The Theory of the Growth of the Firm. Oxford University Press: Oxford.
- Piccoli G. and Ives B. 2005. "It-Dependent Strategic Initiatives and Sustained Competitive Advantage: A Review and Synthesis of the Literature," MIS quarterly (29:4), pp.747-776. https://doi.org/10.2307/25148708
- Piccoli G. and Lui T-W. 2014 "The Competitive Impact of Information Technology: Can Commodity IT Contribute to Competitive Performance?" European Journal of Information Systems (23:6), pp.616-628 https://doi.org/10.1057/ejis.2013.20
- Plummer D. C. 2008. Cloud Computing: Definition and Describing an Emerging Phenomenon, Gartner Group: Stamford, CT.
- Prahlad, K. and Hamel, G. 1990. "The core competence of the corporation," Harvard Business Review (90), pp.79-91.
- Richardson V. J. and Zmud R. W. 2002. "The Value Relevance of Information Technology Investment Announcements: Incorporating Industry Strategic IT Role," in Proceedings of the Proceedings of the 35th Annual Hawaii International Conference on System Sciences, Big Island, Hwaii, USA.
- Ring T. 2013. "A Breach Too Far?," Computer Fraud & Security (2013:6), pp.5-9. https://doi.org/10.1016/S1361-3723(13)70052-6
- Root F. R. 1994. Entry Strategies for International Markets. Lexington books New York.
- Roth K. 1995. "Managing International Interdependence: CEO Characteristics in a Resource-Based Framework," Academy of Management Journal (38:1), pp.200-231. https://doi.org/10.2307/256733
- Rumelt R. P. 1991. "How Much Does Industry Matter?," Strategic Management Journal (12:3), pp.167-185. https://doi.org/10.1002/smj.4250120302
- Soomro Z. A., Shah M. H. and Ahmed J. 2016. "Information Security Management Needs More Holistic Approach: A Literature Review," International Journal of Information Management (36:2), pp.215-225. https://doi.org/10.1016/j.ijinfomgt.2015.11.009
- Teece D. J. 1986. "Profiting from Technological Innovation: Implications for Integration, Collaboration, Licensing and Public Policy," Research Policy (15:6), pp.285-305. https://doi.org/10.1016/0048-7333(86)90027-2
- Teece D. J. 2000. "Strategies for Managing Knowledge Assets: The Role of Firm Structure and Industrial Context," Long Range Planning (33:1), pp.35-54. https://doi.org/10.1016/S0024-6301(99)00117-X
- Tippins M. J. and Sohi R. S. 2003. "It Competency and Firm Performance: Is Organizational Learning a Missing Link?" Strategic Management Journal (24:8), pp.745-761. https://doi.org/10.1002/smj.337
- Tsai K. H. and Wang J. C. 2007. "Inward Technology Licensing and Firm Performance: A Longitudinal Study," R&D Management (37:2), pp.151-160. https://doi.org/10.1111/j.1467-9310.2007.00464.x
- Wernerfelt B. 1984. "A Resource-Based View of the Firm," Strategic M anagement Journal (5:2), pp.171-180. https://doi.org/10.1002/smj.4250050207
- Wiseman C. 1985. Strategy and Computer. Dow Jones Irwin: New York.
Cited by
- 정보보호 공시제도의 운영실태와 효과성 분석 vol.22, pp.1, 2021, https://doi.org/10.15813/kmr.2021.22.1.015