참고문헌
- Cheon, Kwon-Ju (2008). A study on application plan of access control requirements in ERMS Standard, The Korean Journal of Archival Studies, 18, 179-220. https://doi.org/10.20923/kjas.2008.18.179
- Choi, Eun-Bok (2009). A lattice-based role graph security model ensuring confidentiality and integrity. Journal of the Korea Society of Computer and Information, 14(6), 91-98.
- Eom, Jung-ho, Park, Seon-ho, & Chung, Tai M. (2010). An architecture of access control model for preventing illegal information leakage by insider. Journal of the Korea Institute of Information Security and Cryptology, 20(5), 59-67. https://doi.org/10.13089/JKIISC.2010.20.5.59
- Han, Seok-sil (2010). The study on the issues about qualitative research method. The Journal for the Study of Humans and Culture, 16, 5-44.
- Im, To Bin (2009). Qualitative methodology: Approach and application. Journal of Governmental Studies, 15(1), 155-188.
- Jang, Sang soo (2019). Introduction to information security. Seoul: baeumteo.
- Kim, Eui-Tak, Choe, Yong-Rak, Kim, Gi-Hyeon, & Park, Jeong-Ho (1998). Access control technology trend. Review of KIISC, 8(4), 77-96.
- Kim, Hyung-Joo & Kim, Soo-Heon (2017). A case study on the application of requirements standard of systems for government-affiliated organizations. Journal of the Korean Biblia Society for Library and Information Science, 28(2), 35-56. https://doi.org/10.14699/kbiblia.2017.28.2.035
- Kim, Yong (2007). A study on functional design of electronic management system in records centers. Journal of Korean Society of Archives and Records Management, 7(1), 61-82. https://doi.org/10.14404/JKSARM.2007.7.1.061
- Korean Society of Archival Studies (2008). Archival terms dictionary.
- Lee, Jeong-eun & Youn, Eun-ha (2018). A study on the major characteristics of the revised ISO 15489 in 2016. The Korean Journal of Archival Studies, 57, 75-111. https://doi.org/10.20923/kjas.2018.57.075
- Lee, Ju Young, Lee, Goo Yeon, & Kwon, Ho Yeol (2020). Insider information leakage detection method using scenario technique. Journal of Digital Contents Society, 21(3), 617-626. https://doi.org/10.9728/dcs.2020.21.3.617
- Lee, So-Yeon & Kim, Ja-Kyoung (2004). An analysis of functional requirements for electronic records management systems: Based on the records management principles extracted from ISO 15489. Journal of the Korean Society for Information Management, 21(3), 227-250. https://doi.org/10.3743/KOSIM.2004.21.3.227
- Oh, Jin-Kwan (2019). A study on record management system design model and functional requirements. Doctoral dissertation, Major of Records and Archival Information Management, Graduate School of Records, Archives & Information Science, Myongji University.
- Park, Minyoung (2013). Evaluation of access control function of the standard records management system. The Korean Journal of Archival Studies, 38, 3-35. https://doi.org/10.20923/kjas.2013.38.003
- Sim, Jae-yoon & Lee, Kyung-ho (2015). A study on information access control policy based on risk level of security incidents about it human resources in financial institutions. Journal of the Korea Institute of Information Security and Cryptology, 25(2), 343-361. http://dx.doi.org/10.13089/JKIISC.2015.25.2.343
- Son, Sung-Keun (2008). Analysis the issues and the present situation of the Korea government standard Records Management System. Master's thesis, Archival Science The Graduate School Seoul National University.
- Yang, Seong-Hoon, Oh, Jung-Hyun, Lee, Kyoung Hyo, Im, Do-Yoen & Oh, Byeong-Kyun (2005). Role hierarchy access control model using permission inheritance. Proceedings of the Korean Information Science Society Conference, 32(2), 94-96.
- Yong, Maroo (2016). Research on the access control to improve records management system. Master's thesis, Major of Records and Archival Information Management, Graduate School of Records, Archives & Information Science, Myongji University.
- ACT ON PROMOTION OF INFORMATION AND COMMUNICATIONS NETWORK UTILIZATION AND INFORMATION PROTECTION, ETC.. Act No.17358.
- ACT ON THE PROMOTION OF INFORMATION SECURITY INDUSTRY. Act No.17344.
- ENFORCEMENT DECREE OF THE PUBLIC RECORDS MANAGEMENT ACT. Presidential Decree No30584.
- FRAMEWORK ACT ON NATIONAL INFORMATIZATION. Act No.16749.
- Functional Requirements of Records Management Systems(v1.3). NAK 6:2020(v1.3).
- Functional Requirements of Systems with Records Management for Government-Affiliated Organizations, etc.(v1.1). NAK 20:2020(v1.1).
- Information and documentation - Records management - Part 1: Concepts and principles. KS X ISO 15489-1.
- Information and documentation - Records management - Part 2: Guidelines KS X ISO TR 15489-2.
- Information technology - Security techniques - Code of practice for information security management KS X ISOIEC27002.
- Information technology - Security techniques - Information security management systems - Requirements. KS X ISOIEC27001.
- Metadata Standard for Records and Archives Management(v 2.1). NAK 8:2016(v 2.1).
- NATIONAL CYBER SAFETY MANAGEMENT REGULATION. Presidential directive No. 316.
- PUBLIC RECORDS MANAGEMENT ACT. Act No16661.
- Vital Records Identification and Protection(v 1.0). NAK 2-2:2012(v 1.0).