References
- International Telecommunication Union. (2021). Global Cybersecurity Index 2020. Geneva : ITU.
- University of Oxford Global Cyber Security Capacity Centre. (2016). Cybersecurity Capacity Maturity Model for Nations (CMM) Revised Edition. Oxford : University of Oxford.
- M. Hathaway, C. Demchak, J. Kerben, J. McArdle & F. Spidalieri. (2015) Cyber Readiness Index 2.0 - A plan for cyber readiness : A baseline and an index, Arlington Country : Photomac Institute for Policy Studies.
- Australian Strategic Policy Institute. (2017). Cyber maturity in the Asia-Pacific region 2017. Barton : ASPI
- Harvard Kennedy School Belfer Center. (2020). National Cyber Power Index 2020-Methodology and Analytical Considerations. Cambridge.
- A. Schwerzennach, J. Voo, I. Hemani, S. Jones, W. DeSombre & D. Cassidy. (2020). Codebook_NCPI_2020. Cambridge : Harvard Kennedy School Belfer Center for Science and International Affairs. DOI : 10.7910.DVN.LT55JY
- S. E. Min. (2016). Understanding Matrix Analysis As a Qualitative Analysis Methods. Journal of Qualitative Inquiry, 2(2). 161-191.
- D. Y. Lee & K. H. Kim. (2021). Information Analysis Framework for Supporting Evidence-based Research and Development Policy: Practical Considerations for Rationality in the Policy Process. Information Policy, 28(1). 77-93.
- J. A. Martilla & J. C. James. (1977) Importance-Performance Analysis. Journal of Marketing, 31. 77-79.
- C. O. Jones. (1984). An Introduction to the Study of Public Policy. Monterey, CA : Brooks/Cole.
- K. H. Park. (2021). Cybersecurity manpower shortage.. Need to secure AI convergence security technology. Information Telecommunication News(Online), https://www.koit/co.kr/news/articleView.html?dxno=83972
- S. Hong. (2018). A Study on the Framework of Comparing New Cybersecurity Wrokforce Development Policy Basled on the ATE Programs of U.S.. Journal of The Korea Institute of Information Security & Cryptology, 28(1). 249-267. DOI : 10.13089/JKIISC.2018.28.1.249
- S. Hong & J. Kim. (2020). A Study on the Laws and Regulations in Korea through the Analysis of Cybersecurity Workforce Developing Laws and Regulations in U.S.. Journal of The Korea Institute of Information Security & Cryptology, 30(1), 123-139. DOI : 10.13089/JKIISC.2020.30.1.123
- J. Ji, S. Park, H. Yu & H. Chang. (2018). A Study on the Design of Re-training Courses for Nurturing Cybersecurity Professionals from Other Occupational Groups. Convergence security journal, 18(1), 43-60.
- K. H. Lee & H. T. Kim. (2017). Measures for Training Military Information Security Professional Personnel for Cyber Security. Convergence security journal, 17(2). 145-151. DOI : 10.22693/NIAIP.2021.28.1.077
- N. S. Chang & S. K. Cho. (2010). Concept of Intelligence and the Role of Intelligence Agency. National Security and Strategy, 10(4). 33-76.
- National Institute of Standards and Technology(NIST). (2017). National Initiative for Cybersecurity Education(NICE) Cybersecurity Workforce Framework. DOI : 10.6028/NIST.SP.800-181
- Executive Office of the President of U.S. (2019). America's Cybersecurity Workforce (Executive Order 13870 of May 2, 2019).
- Y. H. Jeon. (2017). A Study on the Security Modeling of Internet of Things(IoT). Journal of Korean Institute of Information Technology, 15(2). 7-27. DOI : 10.14801/jkiit.2017.15.12.17
- D. Lee & N. Park. (2017). Proposal of Technology and Policy Post-Security Management Framework for Secure IoT Environment. The Journal of Korean Institute of Information Technology, 15(4). 127-138. DOI : 10.14801/JKIIT.2017.15.4.127
- D. Lee & N. Park. (2017). Institutional Improvements for Security of IoT Devices. Journal of the Korea Institute of Information Security & Cryptology, 27(3), 607-615. DOI : 10.13089/JKIISC.2017.27.3.607
- S. B. Kim. (2017). Cybersecurity Strategies of Major Powers in World Politics: From the Comparative Perspective of National Strategies. Journal of International Area Studes, 26(3), 67-108.
- Department of Defense(DoD). (2011). Department of Defense Strategy for Operating in Cyberspace. https://csrc.nist.gov/CSRC/media/Projects/ISPAB.documents/COC-Strategy-for-Operating-in-Cyberspace.pdf.
- Joint Chiefs of Staff. (2013). JP 3-12 Cyberspace Operations. https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_12.pdf
- The department of defense(DoD). (2015). DoD Cyber Strategy. https://archive.defense.gov/home/features/2015/0415_cyber-strategy/final_2015_dod_cyber_strategy_for_web.pdf
- The department of defense(DoD). (2018). Department of defense cyber strategy 2018, https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FIANL.PDF
- Cabinet office. (2016). National cyber security strategy 2016 to 2021, https://www.gov/uk/goverment/publications/national-cyber-security-strategy-2016-to-2021
- Ministry of Defence. (2021). Defence in a Competitive age. https://www.gov/uk/government/publications/defence-in-a-competitive-age
- Net Politics & Digital and Cyberspace Policy Program. (2018). Germany develops offensive cyber capabilities without a coherent strategy of what to do with them. Councile Foreign Relations(CFR, Online), https://www.cfr.org/blog/germany-develops-offensive-cyber-capabilities-without-coherent-strategy-what-do-them
- A. Laudrain. (2019). France's new offensive cyber doctrine. LAWFARE(Online), https://www.lawfareblog.com/frances-new-offensivecyber-doctrine
- Atlantic Council. (2012). Germany reveals offensive cyberwarfare capability. https://www.atlanticcouncil/orgblogs/natosource/germany-reveals-offensive-cyberwarfare-capability/
- H. Kim & M. Kim. (2017). The Act on Anti-Terrorism in the Age of Big Data and Mass Surveillance. Journal of Cybercommunication Academic Society, 34(3). 41-89.
- S. G. Hwang. (2019). A Proposal for Reform and Problems of Cybersecurity-related Legal System. Journal of Law & Economic Regulation, 12(1). 44-61. DOI : 10.22732/CeLPU.2019.12.144
- J. Lee. (2020). Digital Surveillance 2020. 2020 KISA REPORT, 12. 1-15.
- H. D. Kwon. (2020). Protection the rights of the people against the secret service activities -Focusing on German Legislation-. Chung-Ang Journal of Legal Studies, 44(1). 5-37.
- J. M. Kang, H. U. Hwang, J. M. Lee, Y. T. Yun, B. C. Bae & S. Y. Jung. (2012). A Study on National Cyber Capability Assessment Methodology. Journal of the Korea Institute of Information Security and Cryptology, 22(5), 1039-1055. https://doi.org/10.13089/JKIISC.2012.22.5.1039
- S. Bae, S. Park & S. J. Kim. (2015). A study on the development for the national cybersecurity capability assessment criteria. Journal of the Korea Institute of Information Security & Cryptology, 25(5), 1293-1314. https://doi.org/10.13089/JKIISC.2015.25.5.1293