1 |
L. Saaty. (1990). The Analytic Hierarchy Process. Publications, Pittsburgh, PA.
|
2 |
H. T. Choi. (2018). Analysis of policy priorities for strengthening the capacity of local public officials. Journal of the Korea Convergence Society, 9(11), 345-351.
DOI
|
3 |
B. C. Kim. (2015). A Internet of Things(IoT) based exploration robot design for remote control and monitoring. Journal of digital convergence, 13(1), 185-190.
DOI
|
4 |
K. B. Kim & J. Y. Yun (2015). Comparison and Analysis on Mobile Payment in terms of Security : Survey. Journal of IT Convergence Society for SMB, 5(3), 15-20.
|
5 |
S. T. K. Myo & G. H. Hwang. (2017). Effect of Mobile Devices on the Use Intention and Use of Mobile Banking Service in Myanmar. Journal of Digital Convergence, 15(6), 71-82.
DOI
|
6 |
M. Heng. (2018). A study on developing the Roadmap for Strengthening Cybersecurity Focused on Cambodia. Master Thesis, Soongsil University, Seoul.
|
7 |
M. Dara & D. de. Carteret. (2016). Slew of websites hacked. The Phnompenh Post, January 12.
|
8 |
I. Pena-Lopez. (2015). Global Cybersecurity Index & Cyberwellness Profiles Report. WSIS Forum 2015 Geneva, 1-37.
|
9 |
UMUC.(n.d.). Cyber Security Primer. DOI : http://www.umuc.edu/cybersecurity/about/cybersecurity-basics.cfm#
|
10 |
L. M. Aliyeva & G. H. Hwang. (2019). The Model to Implement the Cyber Security Policy and Strategy for Azerbaijan Information System. Journal of Digital Convergence, 17(5), 23-31.
DOI
|
11 |
S. H. Kim & J. S. Han. (2014). Smart Cold-Chain Monitoring Automation System Architecture based on Internet of Things. Journal of digital convergence, 12(12), 351-356.
DOI
|
12 |
J. H. Cho &, H. J. Lee (2018). A Study on the Real-time Cyber Attack Intrusion Detection Method. Journal of the Korea Convergence Society, 9(7), 55-62.
DOI
|
13 |
S. H. Hong & J. A. Yu (2018). Ransomware attack analysis and countermeasures of defensive aspects. Journal of Convergence for Information Technology, 8(1), 139-145.
DOI
|
14 |
F. Wamala. (2011). The ITU National Cybersecurity Strategy Guide. ITU.
|
15 |
S. H. Lee & D. W. Lee. (2014). A Study on Internet of Things in IT Convergence Period. Journal of digital convergence. 12(7), 267-272.
DOI
|
16 |
Canada & Public Safety Canada. (2010). Canada's cyber security strategy: for a stronger and moreprosperous Canada. Ottawa, Ont.: Government of Canada.
|
17 |
H. J. Mun, Y. C. Hwang, & H. Y Kim. (2015). Countermeasure for Prevention and Detection against Attacks to SMB Information System - A Survey. Journal of IT Convergence Society for SMB, 5(2), 1-6.
|
18 |
OECD (2012). Non-governmental Perspectives on a New Generation of National Cybersecurity Strategies. OECD Digital Econmy Papers, 212.
|
19 |
S. Berman (2018). How to Structure Your Organization's Cybersecurity Management: Insights from Nutter's Seth Berman. Nutter,October 3,
|
20 |
ISACA. (2015). State of Cybersecurity : Implications for 2015. CyberSecurity Nexus, 22.
|
21 |
L. S Kim. (2015). Convergence of Information Technology and Corporate Strategy. Journal of the Korea Convergence Society, 6(6), 17-26.
DOI
|
22 |
L. S. Kim. (2015). Convergence of Information Technology and Corporate Strategy. Journal of the Korea Convergence Society, 6(6), 17-26.
DOI
|
23 |
Z. Yunos, R. S. A. Hamid & M. Ahmad. (2016). Development of a cyber security awareness strategy using focus group discussion. SAI Computing Conference (SAI), 1063-1067.
|
24 |
R. Filipek. (2007). Information security becomes a business priority. Internal Auditor, 64(1), 18.
|
25 |
C. H. Yoon & G. D. Choi. (2014). The Effects of National Culture on Ethical Decision-Making in the Internet Context : An Exploratory Analysis. Journal of digital convergence, 12(12), 23-36.
DOI
|