1 |
L.D. Bodin, L.A. Gordon and M.P. Loeb, "Evaluating Information Security Investments Using the Analytic Hierarchy Process," Communications of the ACM, vol 48, pp. 79-83, Feb, 2005.
|
2 |
Korea Communication Commission and Korea Internet & Security Agency, "Information Security Check Service Manual," 2012.
|
3 |
Rainer Falk and Steffen Fries, "Security Governance for Enterprise VoIP Communication," Emerging Security Information, Systems and Technologies (SECURWARE), pp 279-286, 2008.
|
4 |
A.B., Cisco IP Telephony Security Framework, Cisco Press, 2012.
|
5 |
T.L. Saaty, The Analytic Hierarchy Process, McGraw Hill, New York, 1980
|
6 |
H. Jung, "A study on importance on Evaluation Index of Personal Information security using AHP," J Korean Data Anal Soc vol.12 no.3 (B) (Jun. 2010) pp.1499-1510, 2010.
|
7 |
T.L. Saaty and G.V. Luis, "Diagnosis with Dependent Symptoms: Bayes Theorem and the Analytic Hierarchy Process," Operation Research, Vol. 46, No. 4, pp491-502, 1998.
DOI
ScienceOn
|
8 |
Fornell, C., Larcker, D.F., Journal of Marketing Research, VOL.18 NO.1 pp39-50, 1981.
DOI
ScienceOn
|
9 |
H. Kong, T. Kim, J. Kim, "An analysis on effects of information security investments: a BSC perspective," Journal of Intelligent Manufacturing, Vol. 23, No. 4, pp.941-953, 2010.
|
10 |
D. Kim, "Analysis of Game Theoretical Effect of Internet Telephone (VoIP) Quality Assurance Policy and Number Transfer Policy," Business Research, Vol. 38, No. 1, pp. 35-49, 2009.
|
11 |
IDC Korea, http://www.idckorea.com/product/Getdoc.asp?idx=544&field=PressRelease.
|
12 |
Korea Communication Commission and Korea Internet & Security Agency, "VoIP Security Guideline," 2007.
|
13 |
Turoff, M. "The policy delphi. In the delphi method: Techniques and applications," 2002.
|
14 |
S. Yoon, H. Park, and H. Yoo, "Factor Analysis of VoIP Security Checklists using AHP," Journal of the Korea Institute of Information Security & Cryptology, Vol. 22, No. 5, pp.1115-1122, 2012.
|
15 |
P. Samarati and S. Vimercati, "Access control: Policies, Models, Mechanisms", Lecture Notes in Computer Science, vol. 2171, no. 137, 2001.
|
16 |
L.A. Gordon and M.P. Loeb, "The economics of Information Security Investment," ACM Transactions on Information and System Security, vol. 5, no. 4, pp.438-457, Nov. 2002.
DOI
|
17 |
D. Richard Kuhn, Thomas J. Walsh, Steffen Fries, "Special Publication 800-58: Security Considerations for Voice Over IP Systems," National Institute of Standards and Technology, Jan 2005
|