1 |
Lee, H.J., The Legislation on the Personal Medical Information Protection Law. Korean Journal of Medicine and Law 2014. 22(1): p. 177-208.
DOI
|
2 |
Jeong, G.W., Use and protection of medical information. Journal of Korea Association For Informedia Law, 2002. 6(1): p. 3-4.
|
3 |
Jang, S.C., The Lgislation on the Protection of Medical Information. The Journal of Law, 2013. 24(2): p. 425-446.
|
4 |
Jeong, B.G., Issues on the Patient's Information Protection. THE KOREAN SOCIETY OF LAW AND MEDICINE, 2008. 9(2): p. 339-382.
|
5 |
Lee, H.J., The Legislation on the Personal Medical Information Protection Law. Korean Journal of Medicine and Law, 2014. 22(1): p. 177-208.
DOI
|
6 |
Cho, H.S., Protection of Individual Medical Information in Risksociety. Hanyang law review, 2013. 24(4): p. 171-191.
|
7 |
Park, J.H., Impact of Personal Health Information Security Awareness on Convenience. The Journal of the Korea Contents Association, 2017. 17(6): p. 600-612.
DOI
|
8 |
Baek, Y.C., Medical Service Information and Individual Information Protection in Korea. Constitutional Law, 2005. 11(1): p. 395-442.
|
9 |
Care at a hospital medical institution Personal information protection. boannews, 2013. 6. 27.
|
10 |
Jeong, H.J., Kim, N.H., A Study on the institution of a Personal Health Information Protection Law - With the focus on the Personal Information Control Right -. The Journal of Korea Association of Medical Law, 2008. 16(2): p. 99-121.
|
11 |
Von Solms, B., Information security-the fourth wave. Computers & security, 2006. 25(3): p. 165-168.
DOI
|
12 |
"Online Defamation Attendance" Medical Ransomware Red Alarm. MedicalTimes, 2019-02-26.
|
13 |
Wei, H., Frincke, D., Carter, O., and Ritter, C., Cost-benefit analysis for network intrusion detection systems. CSI 28th Annual Computer Security Conference, October, Washington DC, USA,, 2001: p. 29-31.
|
14 |
Aron, J.L., Gove, R. A., Azadegan, S., and Schneider, M. C., The Benefits of a Notification Process in Addressing the Worsening Computer Virus Problem : Results of a Survey and a Simulation Model. Computers and Security, 2001. 20(8): p. 693-714.
DOI
|
15 |
Dhillon, G.a.J.B., Information System Security Management in the New Millennium. Communications if the ACM, 2000. 43: p. 125-128.
DOI
|
16 |
Kim, H.N., In the era of personal information leakage, protection of personal medical information. Research Institute for Healthcare Policy Korea Medical Association, 2014. 12(1): p. 71-77.
|
17 |
Confession to leave EMR unauthorized visit Seoul National Univ. Medical Today News, 2019.1.21.
|
18 |
GoodHue, D.L.a.D.W.S., Security Concerns if System Users: A Study of Perceptions of the Adequacy of Security Measures. Information & Management, 1991. 20: p. 13-27.
DOI
|
19 |
Lim, C.H., Effective information protection awareness improvement plan. Journal of the Korea Institute of Information Security, 2006. 16(2): p. 30-36.
|
20 |
Agency, K.I.S., 2017 Survey on Information Security Businiess. Korea Internet & Security Agency, 2017.
|
21 |
Jung, Y.C., Lee, K.H., Lee, Y.R., A Study on Current Privacy Policies of Medical Institutes and Suggestions. Korea Institute for Health and Social Affairs, 2013. 29.
|
22 |
Lee, C.S., Information security auditing framework in industrial control system. Journal of the Korea Institute of Information Security & Cryptology, 2008. 18(1): p. 139-148.
DOI
|
23 |
Straub, D.W., Effective IS Security: An Empirical Study. Information Systems Research, 1990. 1: p. 255-276.
DOI
|
24 |
Moon, K.W., Kim, S.G., Relationship between Information Security Activities of Enterprise and Its Infringement : Mainly on the Effects of Information Security Awareness. Journal of the Korea Institute of Information Security & Cryptology, 2017. 27(4): p. 897-912.
DOI
|
25 |
Chu, J.H., Wang, S.H., Cho, Y.W., Park, M., Lee, B.R., A Study on the Improvement of Legal System for Activation of Medical Information Industry. Korea Information Society Development Institute, 2003: p. 99-100.
|
26 |
Ministry of Public Administration and Security, Notice No. 2017-1(2017.7.26).
|
27 |
Amitava, D.a.K.M., Manangement's Role in Information Security in a Cyber Economy. California Management Review, 2002. 45: p. 67-87.
DOI
|
28 |
Choi, D.K., Song, M.S. , Im, J.I. , Lee, K.H., Study the role of information security personnel have on an organization's information security level. Journal of The Korea Institute of Information Security & Cryptology, 2015. 25(1): p. 197-209.
DOI
|
29 |
Park, J.K., Kim, B.S., Cho, S.W. , Primary Factors Affecting Corporate Employees' Attitudes Toward Information Security. Korea Business Review, 2011. 40(4): p. 955-985.
|
30 |
Yoo, J.H., Comparison of Information Security Controls by Leadership of Top Management. Journal of Korea Society of Electronic Commerce, 2014. 19(1): p. 63-78.
|
31 |
Song, J.S., Jeon, M. J., and Choi, M. G., A Study on Factors Affecting the Level of Information Security Governance in Korea Government Institutions and Agencies. The Journal of Society for e-Business Studies, 2011. 16(1): p. 133-151.
|
32 |
Joshi, K., The measurement of fairness or equity perceptions of management information systems users. MIS Quarterly, 1989. 13: p. 343-358.
DOI
|
33 |
Lee, G.G., [Future society hopes for technology] We need social security strategy. Naeilnews, 2009.11.15.
|
34 |
Choi, M.G., An Exploring Study on Relation Between Maturity Levels of Organizations and Factors Affecting Information Security Policy. Journal of Korean Academic Association of Business Administration, 2009. 22(3): p. 1729-1748.
|