1 |
Choi, M. and Song, J., "Social Control through Deterrence on the Compliance with Information Security Policy", Soft Computing, Vol. 22, 2018, pp. 6765-6772.
DOI
|
2 |
Choi, M., "Information Security Management as a Bridge in Cloud Systems from Private to Public Organizations", Sustainability, Vol. 7, No. 9, 2015, pp. 12031-12051.
|
3 |
Cloud Security Alliance(CSA), The Security, Trust & Assurance Registry (STAR), 2011. Available online: https://cloudsecurityalliance.org/star
|
4 |
Hwang, K. J. and Choi, M., "Effects of Innovation-Supportive Culture and Organizational Citizenship Behavior on E-government Information System Security Stemming from Mimetic Isomorphism", Government Information Quarterly, Vol. 34, 2017, pp. 183-198.
DOI
|
5 |
Kim, J. and Choi, M., "A Study of Personal Characteristics Influencing Cloud Intention", Journal of Information Technology and Management, Vol. 26, No. 3, pp. 135-157.
|
6 |
Kim, Y. and Choi, M., "A Study of Personal Characteristics Influencing Platform Business", Journal of Information Technology and Management, Vol. 27, No. 2, 2020, pp. 61-72.
|
7 |
Moon, Y., Choi, M., and Amstrong, D. J., "The Impact of Relational Leadership and Social Alignment on Information Security System Effectiveness in Korean Governmental Organizations", International Journal of Information Management, Vol. 40, 2018, pp. 54-66.
DOI
|
8 |
NIST SP 800-56c, Recommendation for Key Derivation through Extraction-then-Expansion, 2011.
|