References
- Cha, I. H., "A study on the development of personnel security management for protection against insider threat," The Journal of the Korea Institute of Electronic Communication Sciences, Vol. 3, No. 4, pp. 210-220, 2008.
- Education Research Institute Seoul National University, Dictionary of the Terms of Education, 1994.
- Gartner, "Maverick research: Kill off security controls to reduce risk," Sep. 2012.
- Hackman, J. R. and Oldham, G. R., “Development of the job diagnostic survey,” Journal of Applied Psychology, Vol. 60, No. 2, pp. 159-170, 1975. https://doi.org/10.1037/h0076546
- Huumonen, J., “Conceptualizing agility of enterprises,” Human Factors and Ergonomics in Manufacturing & Service Industries, Vol. 21, No. 2, pp. 132-149, 2011. https://doi.org/10.1002/hfm.20255
- ISO/IEC 27001:2013, Information security-Security techniques-Information Security Management Systems-Requirements, ISO, 2013
- Jeffrey, D. W. and Paul, B. L., "Control-related motivations and information security policy compliance: The role of autonomy and efficacy," Journal of Information Privacy and Security, Vol. 9, No. 4, 2013.
- Kang, H. S. and Kim, J. D., "A study on information security departmentalization model," The Journal of Society for e-Business Studies, Vol. 20, No. 2, pp. 167-174, 2015. https://doi.org/10.7838/jsebs.2015.20.2.167
- Kim, J. D., “Major issues and future strategies for information protection management paradigm shift,” Review of KIISC, Vol. 23, No. 5, pp. 5-8, 2013.
- Kim, J. D., Kim, B. K., Park, S. H., and Kim, K. W., "Considerations for information protection innovation in a self-regulated environment," Review of KIISC, Vol. 25, No. 4, pp. 63-68, 2015.
- Kim, J. S., Kim, J. B., and Shin, Y. T., "A study on the effect of CISO's recognition of the role to the information security performance," Korean Management Consulting Review, Vol. 12, No. 4, pp. 21-34, 2012.
- Kim, K. W. and Kim, J. D., “A study on effects of implementing information security governance by information security committee activities,” Journal of the Korea Institute of Information Security & Cryptology, Vol. 25, No. 4, pp. 915-920, 2015. https://doi.org/10.13089/JKIISC.2015.25.4.915
- Kim, S., “Internet business environment,” e-Business Review, Vol. 3, No. 1, pp. 247-272, 2002.
- KISA, A Research on ISMS Maturity Level and Evaluation Methodology, 2010.
- Ko, E. J., Lee, S. J., and Kim, S. S., “Effects of job autonomy and self-efficacy on creative behavior: Focusing on the mediation effect of knowledge sharing in smart work environment,” Knowledge Management Research, Vol. 19, No. 2, pp. 163-185, 2018. https://doi.org/10.15813/kmr.2018.19.2.009
- Lee, C. S., “A research on the revenue structure model for internet business,” The Journal of Internet Electronic Commerce Research, Vol. 9, No. 3, pp. 93-113, 2009.
- Lee, J. K., Na, O. K., and Chang, H. B., “A study on the research security system of the researcher-centric,” The Journal of Society for e-Business Studies, Vol. 23, No. 3, pp. 65-84, 2018. https://doi.org/10.7838/JSEBS.2018.23.3.065
- Lee, M. R. and Ju, S. H., “Policy suggestions for autonomy of university,” CNU Journal of Educational Studies, Vol. 27, No. 1, pp. 69-93, 2006.
- McClure, M. L., "Managing the professional nurse: Part II. Applying management theory to the challenges," JONA: The Journal of Nursing Administration, Vol. 14, No. 3, 1984.
- Ministry of Science and ICT, Korea Internet & Security Agency, "Critical information infrastructure protection technical vulnerability & analysis assessment detailed guides," 2017.
- Ministry of Science and ICT, Ministry of the Interior and Safety, Korea Communications Commission and Korea Internet & Security Agency, Information & Personal Information management System Guidebook, 2019.
- Ministry of SMEs and startup and Korea Foundation for Corporation of Large Small Business, Rural Affairs, "SMEs Technical Protection Guide," 2018.
- Ministry of Trade, Industry and Energy, "White paper of trade, industry and energy(part of industry)," 2018.
- National Information Society Agency, "2017 Smart work survey report," 2017.
- Netflix Culture, Https://jobs.netflix.com/culture.
- NIST, "Security and Privacy Controls for Federal Information Systems and Organizations (NIST SP 800-53 R4)," 2013.
- Pfeffer, J., "The human equation: Building profits by putting people first," Harvard Business School Press, 1998.
- Rha, H. D., "A theoretical comparative study of human resource security based on Korean and int'l information security management systems," Journal of Convergence for Information Technology, Vol. 6, No. 3, pp. 13-19, 2016. https://doi.org/10.14801/jaitc.2016.6.1.13