1 |
G. B. Kwon, H. J. Lee & I. Kim. (2018). The Study on Legislation Process of GDPR(General Data Protection Regulation) and Subsequent Trend in EU System, Studies on American Constitution, 29(1), 1-38.
|
2 |
T. Oh & J. Yu. (2011). Change of privacy concept in social network service (SNS) environment, KISDI, 23(4), 26-42.
|
3 |
J. L. Yu. (2011). Personal Information Protection in Digital Era - Reviewing Personal information protection Act, Journal of Digital Convergence, 9(6), 81-90. UCI : G704-002010.2011.9.6.022
DOI
|
4 |
K. Lee. (2014). Privacy Protection in the Big Data Age, Company Ethics Briefs, 11, 1-26.
|
5 |
M. Park. (2018). GDPR, Microsoft's commitment to privacy and customer data management, Microsoft, https://news.microsoft.com/ko-kr
|
6 |
Y. Jung. (2001). Review of the Theory of Privacy in Modern Constitutional Law, Journal of Cybercommunication Academic Society, 7, 214-267.
|
7 |
S. D. Warren & L. D. Brandeis (1890). The right to privacy, Harvard Law Review, 4(5), 193-220.
DOI
|
8 |
A. F. Westin. (1967). Privacy and Freedom, Atheneum. York: Ig Publishing.
|
9 |
E. J. Bloustein. (1964). Privacy as an Aspect of Human Dignity: An answer to Dean Prosser, New York University Law Review, 39, 962-1007.
|
10 |
Y. H. Son. (2014). The Protection of Personal Information in the Era of Big Data, Business Law Review, 28(3), 355-393. UCI : G704-001299.2014.28.3.003
|
11 |
G. Moon. (2019). Survive the privacy of the Internet, Security News, https://www.boannews.com
|
12 |
S. Sung. (2004). Cyber space and privacy, KISDI.
|
13 |
Supreme Court. (1998.7.24.). Sentence, 96Na42789 Judgement.
|
14 |
T. M. Cooley. (1888). A Treatise on the Law of Torts or the Wrongs Which Arise Independently of Contract, Chicago : Callaghan and Company.
|
15 |
K. Cho. (2005). Statutory Development of Privacy in the United States, Sungkyunkwan Law Review, 17(3), 75-113. UCI : G704-001437.2005.17.3.013
|
16 |
A. Westin. (1970). Privacy and Freedom. (first edition 1967). Atheneum, New York.
|
17 |
ITWorld. (2018). Chinese data confidentiality protection law came into effect similar to China's GDPR in May, http://www.itworld.co.kr
|
18 |
J. Kim & S. Kim. (2015). A Study on Privacy Paradox from the Behavioral Economics Perspective, Informatization Policy, 22(3), 16-35. DOI : 10.22693/NIAIP.2015.22.3.016
DOI
|
19 |
J. B. Young. (1978). Privacy. Wiley, Chichester, UK, Cambridge University. DOI : https://doi.org/10.1017/S0047279400009223
|
20 |
I. S. Ham. (2016). The Enactment of 2016 General Data Protection Regulation(GDPR) in the EU and its Implications, Chonnam Law Review, 36(3), 411-453. UCI : G704-002100.2016.36.3.018
|
21 |
M. Cho & H. Lee. (2017). Improvement Issues of Personal Information Protection Laws through Meta-Analysis, Journal of Digital Convergence, 15(9), 1-14. DOI : https://doi.org/10.14400/JDC.2017.15.9.1
DOI
|
22 |
C. W. Park & J. W. Kim. (2015). An Empirical Research on Information Privacy and Trust Model in the Convergence Era, Journal of Digital Convergence, 13(4), 219-225. DOI : http://dx.doi.org/10.14400/JDC.2015.13.4.219
DOI
|
23 |
H. Jung. (2016). A Study on a Unique and Distinctive Culture(Law and Understanding) Regarding the Protections for Privacy in the U.S., Ilkam Law Review, 35, 277. DOI : 10.35148/ilsilr.2016..35.271
DOI
|
24 |
B. C. Kim. (2014). A study on Utilization of Big Data Based on the Personal Information Protection Act, Journal of Digital Convergence, 12(12), 87-92. DOI : 10.14400/JDC.2014.12.12.87
DOI
|
25 |
C. Chang. (2016). An Argument for Making Privacy a Working Constitutional Right - Referring to Daniel Solove's Pragmatic Theory -, Journal of Media Law, Ethics and Policy Research, 15(3), 1-30. UCI : G704-001997.2016.15.3.005
|
26 |
S. Petronio. (2007). Translational research endeavors and the practices of communication privacy management. Journal of Applied Communication Research, 35(3), 218-222. DOI : https://doi.org/10.1080/00909880701422443
DOI
|
27 |
J. Kim & S. Kim. (2014). A Study on Privacy Paradox between Privacy Concern and Information Disclosure behavior: Focus on Privacy Calculus Theory, Entrue Journal of Information Technology, 13(3), 139-152. UCI : G704-001673.2014.13.3.007
|
28 |
H. J. Smith, T. Dinev & H. Xu. (2011). Information privacy research: an interdisciplinary review. MIS Quarterly, 35(4), 989-1016. DOI : 10.2307/41409970
DOI
|
29 |
I. Altman. (1975). The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding, Brooks/Cole Publishing Company, Monterey, California.
|
30 |
W. Zhou & S. Piramuthu. (2015). Information Relevance Model of Customized Privacy for IoT. Journal of Business Ethics, 131(1), 19-30. DOI : 10.1007/s10551-014-2248-y
DOI
|
31 |
H. S. Lee. (2016). Personal Characteristics and Information Privacy Concerns. Asia-pacific Journal of Multimedia Service Convergent with Art, Humanities, and Sociology, 6(9), 267-276. http://dx.doi.org/10.14257/AJMAHS.2016.09.46
|
32 |
K. Lee. (2009). Increased Internet privacy violation. The Science Times, https://www.sciencetimes.co.kr
|
33 |
A. Hotho, A. Nurnberger & G. Paass. (2005). A brief survey of text mining. In Ldv Forum, 20(1), 19-62.
|
34 |
H. K. Kong & H. J. Jun & S. U. Yoon. (2018). A Study on the Privacy Policy of Behavioral Advertising, Journal of the Korea Convergence Society, 9(3), 231-240. https://doi.org/10.15207/JKCS.2018.9.3.231
DOI
|
35 |
Y. S. Jeong. (2014). Tracking Analysis of User Privacy Damage using Smartphone, Journal of Convergence for Information Technology, 4(4), 13-18. https://doi.org/10.22156/CS4SMB.2014.4.4.013
DOI
|
36 |
D. Lee. (2019). One year of GDPR implementation, a different change than expected, ITWorld, http://www.itworld.co.kr
|
37 |
N. H. Sung, (2010). The Future of Digital Privacy. LG Economy Research Institute, http://www.lgeri.com/report/view.do?idx=16658
|
38 |
K. A. Kim. (2018). A Rise on the Privacy Protection based on Secret Code : Focus on Homomorphic Encryption. Boannews, https://www.boannews.com/media/view.asp?idx=74664
|
39 |
J. W. Mun. (2013). Protection of Privacy : From myth to norm. A Policy Reports for the Improvement of Legal Protection System in Personal Information.
|