1 |
eshwang, Mobile learning management systems utilize integrated information, Graduate School of Korea University, 2011.
|
2 |
bckim, "A study on Utilization of Big Data Based on the Personal Information Protection Act", The Society of Digital Policy & Management, 12(12), pp. 87-92, Dec. 2014.
|
3 |
sjkang, "Bigdata Ethics", Hanbit Media e-book, 2013.
|
4 |
Protect Privacy of the Bigdata era, http://lugenzhe.blog.me/90159790578
|
5 |
National Legal Information Center, http://www.law.go.kr
|
6 |
NaverWikipedia, http://terms.naver.com/entry.nhn?docId=1691554&cid=42171&categoryId=42183
|
7 |
Computer World, http://www.comworld.co.kr/news/articleView.html?idxno=45899
|
8 |
IT DAILY, http://www.itdaily.kr/news/articleView.html?idxno=62928
|
9 |
Information Communication Ethics, "Security Ethics", Seoul:Ehanmedia, 2015.
|
10 |
hjpark, dylee, A Study on Information Sharing Behavior and Utility of Internet Users, Korea Society for Information Management Conference, pp. 151-156, 2005.
|
11 |
jhkim, Golobal social media trends deployment, national Industry Promotion Agency IT Report, 2013.
|
12 |
Weitzner. Daniel J., Yelling "Filter" on the Crowded Net: The Implications of User Control Technologies. in Price. Monrce E(ed.) The V-Chip Debate: Content Filtering from Television to the Internet. Lawrence Elbaum Associates. Inc, 1998.
|
13 |
Korea Internet Safety Commission, "Security Code", Ehanmedia, 2015.
|
14 |
wychoi, Study on the User Empowerment of the Information and Technological Regulation of the Internet : Political Implications of the Technological Principle and Structure of the ICRS(Internet Content Rating System), 10(1), pp. 189-199, 2005.
|
15 |
sychoi, trends and countermeasures for the mobile malicious code disseminate, Korean Society of Computer Information Semiannual, 22(1), 2014.
|
16 |
jykim, IoT Activation Plan, Korean Society of Computer Information Semiannual, 23(1), 2015.
|
17 |
NIA, BigData World Report, http://nia.or.kr.
|