References
- Eunjoo Kim. "Public sector cloud application examples and performance analysis". Journal of Korean Communication Sciences (Information and Communication), 36 (2), 23-27. 2019.
- Thomas Erl, Zaigham Mahmood and Ricardo Puttini, "Cloud Computing: Concepts, Technology & Architecture"
- Dongho Kim, Junghoon Lee, and Yangpyo Park, "A Study on the Factors of Cloud Computing Characteristics Influencing Enterprise's Intention to Adopt Cloud Computing Services," The Jounal of Society for e-Business Studies, vol. 17, no. 1, pp. 111-136, 2012. https://doi.org/10.7838/jsebs.2012.17.1.111
- S. Kim and H. Park, "The Relationship between Vender Dependency and Expected Benefits of Cloud Computing: The Moderating Effects of Vendor Trust and Organizational Supports," korean management review, vol. 47, no. 5, pp. 1021-1047, 2018, doi: 10.17287/kmr.2018.47.5.1021.
- Saeha Jeon, Narae Park, and Jung Jung Lee, "Study on the Factors Affecting the Intention to Adopt Public Cloud Computing Service," Entrue Journal of Information Technology, vol. 10, no. 2, pp. 97-112, 2011.
- Woojin Jeon and Kiwoong Park, "Container-friendly File System Event Detection System for PaaS Cloud Computing," The Korea Next Generation Computing Society, vol. 15, no. 1, pp. 86-98, 2019.
- Ilhoon Jung, Junghun Oh, Jungheum Park, and Sangjin Lee, "A Digital Forensic Study on IaaS Type Cloud Computing Services," Journal of the Korea Institute of Information Security & Cryptology, vol. 21, no. 9, pp. 55-65, 2011.
- Sangyong Choi and Kimoon Jung, "Security Architecture for a Secure Cloud Computing Environment," Journal of the Korea Society of Computer and Information, vol. 23, no. 12, pp. 81-87, 2018, doi: 10.9708/jksci.2018.23.12.081.
- Roh Hyun-suk, "A Study on the Concept of Moving Personal Information Overseas in Cloud Service" Ancient Law No. 79 2015.
- Changjae Lee, "A Study on the Risk Assessment Plan for Persons Handling Personal Information," Dongguk University Master's Thesis, 2016.
- Lee Myung-ryul, "A Study on Information Security Risk Analysis Method Reflecting Information Security Governance and External Threats" Master's Thesis, Soongsil University, 2017.
- Lee Cheong-hee, "Information Flow-Based Risk Analysis Methodology _ Focusing on Photomask Process Flow" Master's Thesis, Kyungwon University, 2009.
- http://www.ahnlab.com
- https://www.hangrp.com/consulting/consulting_03_01.php
- http://www.kaits.or.kr/sub/?p=sub14
- https://cve.mitre.org/cve/update_cve_records.html
- http://www.zinion.co.kr/index.php?mid=service04
- http://cwe.mitre.org,
- https://nvd.nist.gov/vuln-metrics/cvss
- https://owasp.org/
- http://aws,amazon.com/ko/agreement/, Security Handoff Point
- Shin Kyung-ah and Lee Sang-jin, "Information Security Management System for Cloud Computing Services," Journal of the Korea Institute of Information Security & Cryptology 21(6), vol. 22, no. 1, pp. 155-167, 2012. https://doi.org/10.13089/JKIISC.2012.22.1.155
- Morgan, D. L. (1996). Focus groups as qualitative research (Vol. 16). Sage publications.
- Cabrera, D., Mandel, J. T., Andras, J. P., & Nydam, M. L. (2008). What is the crisis? Defining and prioritizing the world's most pressing problems. Frontiers in Ecology and the Environment, 6(9), 469-475. https://doi.org/10.1890/070185