1 |
KISA, "Personal Information Protection and Management System (PIMS) certification by bulletin (Broadcasting Communications Commission Notice No. 2013-17), http://isms.kisa.or.kr/kor/notice/dataView.jsp ?p_No=132&b_No=132&d_No=12, Mar.12. 2014"
|
2 |
Anonymous attack http://www.datanews.co.kr/news/article.html?no=90099
|
3 |
Dae-Young Lee, "A Study on Personal Data Hacking Case to build Corporate Security and Counter Strategy: Focused on HYUNDAI CAPITAL hacking case(2011)", Journal of Security Engineering, v.10, n.4, 2013. 08.
|
4 |
Dae-Young Lee, Jin-Hong Jeong, "A Case Study of Employee Privacy leaks and Fraud during B2B transaction -Focused on Man in the Middle attack case-", Journal of Security Engineering, V.12, N.5, pp.501-514, 2015.
DOI
|
5 |
The industrial espionage technology leakage situation of the domestic industry: http://m.blog.daum.net/torabora/13653348
|
6 |
Shipbuilding technology leaks: http://www.boannews.com/media/view.asp?idx=8511
|
7 |
March 1st Cyber attacks http://www.dt.co.kr/contents.html?article_no=2010030202010251739002
|
8 |
NIST, Computer Security Incident Handling Guide.
|
9 |
NIST, Cyber Security Framework, Cyber Security Issue, 2013.10.
|
10 |
Jungduk Kim, "The Management System and Governance for Personal Information", Journal of the Korean Institute of Information Security and Cryptology, v.18, n.6, pp 1-5, 2008.12.
|
11 |
Yoo, Jin-Ho ; Jie, Sang-Ho ; Lim, Jong-In, "Estimating Direct Costs of Enterprises by Personal Information Security Breaches", Journal of the Korean Institute of Information Security and Cryptology, v.19 no.4, pp.63-75, 2009.
|
12 |
You, Seung Dong ; Yoo, Jinho, "Determinants of Willingness To Pay for Personal Information Protection." Journal of the Korean Institute of Information Security and Cryptology, v.24 no.4, pp 695-703, 2014.
DOI
|
13 |
ISO, "ISO/IEC 27001-information security management", 2013: The ISO 27000 family of standards helps organizations keep information assets secure.
|