References
- B. W. Kim. (2015). A Study on the Activation of Domestic Fintech Industry. The Business Education Journal 26(1), 47-73.
- Vance, Anthony & Lowry, Paul & Eggett, Dennis. (2013). Using Accountability to Reduce Access Policy Violations in Information Systems. Journal of Management Information Systems. 29. 263-289. 10.2753/MIS0742-1222290410.
- Gewald, Heiko & Dibbern, Jens. (2009). Risks and benefits of business process outsourcing: A study of transaction services in the German banking industry. Information & Management. 46. 249-257. 10.1016/j.im.2009.03.002.
- Lee, Jun-taek and Cha In-hwan. (2013). Trends in information security technology in the financial sector. The Magazine of the IEIE, 40 (8), 16-29.
- Lee, Gangshin. (2015). A Study on Improving Security Controls in the Electronic Financial Transaction. Korea Institute Of Information Security And Cryptology, 25(4), 881-888. https://doi.org/10.13089/JKIISC.2015.25.4.881
- Junng, Ha-Gyo, Whang, Kyu-Seung. (2008). The Technological Competitiveness Analysis of Aircraft-based Industries using Patent Information. Korean Management Science Review, 25(2), 111-127.
- Kim, Hong-gyun. (2004). Characteristics of patent information. The Polymer Society Of Korea, 15(6), 743-749.
- Gu, Ja-Wook, Lee, Jong-Ho, Chung, Myoung-Sug, & Lee, Joo-yeoun. (2017). Electric Vehicle Technology Trends Forecast Research Using the Paper and Patent Data. Journal of Digital Convergence, 15(2), 165-172. https://doi.org/10.14400/JDC.2017.15.2.165
- Chung, M. S., Jeong, S.-H., & Lee, J. Y. (2018). Analysis of major research trends in artificial intelligence based on domestic/international patent data. Journal of Digital Convergence, 16(6), 187-195. https://doi.org/10.14400/JDC.2018.16.6.187
- Kim, D., Cho, S. H., Lee, J., KIM, M. S., & Kim, N.-H. (2018). A Study on the Competitive Analysis of Digital Healthcare in Korea through Patent Analysis. Journal of Digital Convergence, 16(9), 229-237. https://doi.org/10.14400/JDC.2018.16.9.229
- Y. H. Byun. (2017). Technology Trend Analysis of Energy Storage System. The Korean Institute of Power Electronics, (), 87-87.
- S. H. Park, J. Y. Kim & Y. H. Lee. (2016). Mobile Biometric Technical Trend Analysis. Journal of the IEIE conference, 812-814.
- S. H. Park, J. K. Park, Y. S. Hong & J. Y. Kim. (2016). Next Generation Near Field Wireless Communication Technology Trend Analysis - focusing the Li-Fi Technology -, Journal of the IEIE conference, 1782-1785.
- T. M. Han, S. I. Cho, H. S. Jeon & J. D. Heo. (2015). Analysis of Technology Trends in the Smart Cars and the IoV. Electronics and Telecommunications Trends, 30(5), 11-21. (DOI: 10.22648/ETRI.2015.J.300502)
- D. G. Kim. (2015). Analysis of Ground Penetration Radar Technology Trend, Electronics and Telecommunications Trends, 30(5), 22-27. (DOI: 10.22648/ETRI.2015.J.300503)
- Y. C. Yoon, H. J. Kim, K. H. Jang, J. W. Lee, H. W. Jo & H. K. Kim. (2015). Trends of Mobile Application Market Analysis Technology. Electronics and Telecommunications Trends, 30(4), 82-91.
- J. S. Hyun, K. D. Kim, H. J. Jung, Y. H. Kim, J. S. So & J. W. Kim. (2015). Technical Trend Analysis of Railway Axle box bearing, Journal of the Korean Society for Railway Conference, 598-603.
- C. J. Chung, Chan-Joo, Kim, Seung-Joo, Won, Dong-Ho. (2008). A study on online identification method using financial security OTP. Journal of Information Security & Cryptology, 18(5), 73-83.
- J. O. Kwon. (2009). Secure Key Exchange Protocols against Leakage of Long-tenn Private Keys for Financial Security Servers. Journal of the Korea Institute of Information Security & Cryptology, 19(3), 119-131.
- Y. S. Sohn, A. B. Kang & S. C. Park. (2008). A study. The Journal of Korean Institute of Communications and Information Sciences, (), 686-690.
- H. Y. Kim. (2018). Analysis of Security Threats and Countermeasures on Blockchain Platforms. The Journal of Korean Institute of Information Technology, 16(5), 103-112. https://doi.org/10.14801/jkiit.2018.16.5.103
- J. H. Nah. (2019). Guidelines for safe fintech services. Korea Institute of Information Security and Cryptology, 29(4), 19-24.
- J. H. Lee & S. Y. T. Lee. (2015). A Study on the Factors for Violation of Information Security Policy in Financial Companies : Moderating Effects of Perceived Customer Information Sensitivity. Journal of Information Technology Applications and Management, 22(4), 225-251. https://doi.org/10.21219/JITAM.2015.22.4.225
- G. Kim, S. Kim & K. Park. (2013). The Study on Financial Firm's Performance Resulting from Security Countermeasures and the Moderating Effect of Transformational Leadership. Journal of the Korean Operations Research and Management Science Society, 38(4), 95-112. https://doi.org/10.7737/jkorms.2013.38.4.095
- H. K. Lee. (2017). A Study on Regulations, Current Status and Implications of Electronic Finance and Financial Security in the U.S. Korea Business law association, 31(3), 491-529.
- J. T. Lee & I. H. Cha. (2013). Trends in information security technology in the financial sector. The Institute of Electronics and Information Engineers, 40(8), 16-29.
- Y. S. Kim, S. M. Rue & Y. K. Park. (2015). IoT Convergence on Finance: Fintech Trend Analysis. JOURNAL OF ADVANCED INFORMATION TECHNOLOGY AND CONVERGENCE, 13(2), 45-50.
- S. S. Lee, "Network analysis methods", Nonhyeong, 2013.
- Y. G. Hyun, J. H. Han, U. R. Chae, G. H. Lee & J. Y. Lee. (2020). A Study On Technical Trend Analysis Related to Semantic Analysis of NLP Through Domestic/Foreign Patent Data. Journal of Digital Convergence, 18(1), 137-146. https://doi.org/10.14400/JDC.2020.18.1.137