1 |
T. Jung, "Cyber Attack & Security Technology, HONGRUNG PUBLISHING COMPANY, 2009
|
2 |
S. Kim, M. S, "The Effects of the Perception of an Online Risk and Prior Knowledge on Public's Communication Behavior", KOREAN ASSOCIATION FOR ADVERTISING AND PUBLIC RELATIONS, Vo l. 13, pp. 528-568, 2011
|
3 |
G. Moon, J. Kim, M. Hong, "A Graphical Passowrd Scheme Resistant to Shoulder Surfing Attack in Mo bile Environments", Journal of computing science and engineering, Vol. 18, pp. 90-94, 2012
|
4 |
Y. Bang, et al, "Improving information security management: An analysis of ID-password usage and a new login vulnerability measure", International Journal of Information Management, Vol. 32, pp. 409-418, 2012
DOI
ScienceOn
|
5 |
D. Kang, "The Influence of Password Selection on the Security Effectiveness", Pusan National University, 2008
|
6 |
G. Post, A. Kagan, "Evaluating information security tradeoffs: Restricting access can interfere with user tasks", Computers&Security, Vol. 26, pp. 229-237, 2007
|
7 |
C. McCoy, R. Fowler, "You are the key to security: establishing a successful security awareness program", SIGUCCS'04 Proceedings of the 32nd annual ACM SIGUCCS fall conference, pp. 346-349, 2004
|
8 |
M. Chang, D. Kang, "Factors Affecting the Informati on Security Awareness and Perceived Information Security Risk of Employees of Port Companies", Journal of Navigation and Port Research, Vol. 36, pp. 261-271, 2012
DOI
ScienceOn
|
9 |
Ministry of Information and Communication, "A white paper of Protect the National information Security ",2006
|
10 |
ISO/IEC, Guidelines for the Management of IT Security (GMITS), International Organization for Standardization/International Electrotechnical Commission, 2005
|
11 |
Y. Lee, "A Study on Factors Influencing the Preventive Efforts toward Personal Information Privacy", Sungkyunkwan University, 2009
|
12 |
G. Lee, Y. Dong, "Measure for the risk of leakage of personal information about the methods and pract ices of private companies", Korea Institute of Inform ation Security & Cryptology. Vol. 18, pp. 92-100, 2008
|
13 |
I. Jang, "Exploring the Relationship between Prevention Behavior of Privacy Leakage and Perceived Risk, Efficacy Beliefs of Internet User: Use RPA(Risk Perception Attitude) Framework, Kookmin University, 2010
|
14 |
L. Drevin, H.A. Kruger, T. Steyn, "Value-focused assessment of ICT security awareness in an academic environment", Computers & Security, Vol. 26, pp. 445-451, 2007
DOI
ScienceOn
|
15 |
J. Kim, D. Kang, "The Effects of Security Policies, Security Awareness and Individual Characteristics on Password Security Effectiveness", Korea Institute of Information Security & Cryptology, Vol. 18, pp. 123-133, 2008
과학기술학회마을
|
16 |
V. Mitchell, "Consumer perceived risk: conceptualisations and models", European Journal of Marketing, Vol. 33, pp. 163-195, 1999
DOI
ScienceOn
|
17 |
W. Lee, "The Influence of Security and Risk Perception on the Reuse of Internet Banking", Asia Pacific Journal of Information Systems, Vol. 17, pp. 77-93, 2007
|
18 |
Cohen. J, "Statistical power analysis for the behavio ral sciences(2nd ed.)", Hillsdale, NJ:Erlbaum, 1988
|
19 |
R. Baron, D. Kenny, "The Moderator-Mediator Variable Distinction in Social Psychological Research: Conceptual, Strategic, and Statistical Considerations", Journal of Personality and Social Psychology, Vo l. 51, pp1173-1182, 1986
DOI
|
20 |
M. Kumar, et. al, "Reducing shoulder-surfing by using gaze-based password entry", SOUPS' 07, pp. 13-19, 2007
|
21 |
D. Carstens, P. McCauley-Bell, "Evaluation of the Human Impact of Password Authentication practices on Information Security", Informing Science Journal, Vol. 7, pp. 67-85, 2004
|
22 |
J. Choi, "Using weak passwords is same as open the front door to the thief", http://www.coconut.co.kr/04news/secu/0712/htm/seculetter02.html
|
23 |
C. Kim, S. Lee, E. O, "The Impact of Interaction Factors of Digital Contents on Flow and Use Intention", Digital Contents Society, Vol. 11, pp.212-224, 2011
|
24 |
B. Ives, K. Walsh, H. Schneider, "The domino effect of password reuse". Communications of the ACM - Human-computer etiquette, Vol. 47, pp. 75-78, 2004
|