1 |
Personal Information Protection Commission, Types of Personal Information. [Online]. Available: https://www.privacy.go.kr/nns/ntc/inf/personalInfo.do.
|
2 |
R. Layton, "The 10 Problems of the GDPR : The US can learn from the EU's mistakes and leapfrog its policy," United States Senate Committee on the Judiciary, 12-Mar-2019. Available: https://www.judiciary.senate.gov/download/03/12/2019/layton-testimony
|
3 |
H. E. Bae, E. Y. Lee, and H. I. Song, "A Study on the Economic Value Analysis of Personal Information Using CVM," Internet & Security Focus, May 2014.
|
4 |
Acquisti and J. Grossklags, "Privacy and rationality in individual decision making," IEEE Security and Privacy Magazine, vol. 3, no. 1, pp. 26-33, 2005.
DOI
|
5 |
A. Acquisti, L. Brandimarte, and G. Loewenstein, "Privacy and Human Behavior in the Information Age," The Cambridge Handbook of Consumer Privacy, pp. 184-197.
|
6 |
H. Purchase, K. Isaacs, T. Bueti, B. Hastings, A. Kassam, A. Kim, and S. van Hoesen, "A Classification of Infographics," Diagrammatic Representation and Inference, pp. 210-218, 2018.
|
7 |
A. Acquisti, "Nudging privacy: The behavioral economics of personal information," IEEE Security & Privacy Magazine, vol. 7, no. 6, pp. 82-85, 2009.
DOI
|
8 |
A. McDonald and L. Cranor, "The Cost of Reading Privacy Policies," A Journal of Law and Policy for the Information Society, vol. 4, no. 3, pp. 543-568, 2008.
|
9 |
G. B. Kwon, "A Study on the Scope of Personal Information and the Right to self-determination over Personal Information," Public Law Journal, vol. 18, no. 3, pp. 199-224, 2017.
DOI
|
10 |
M. Lesk, "What Is Information Worth?," IEEE Security & Privacy Magazine, vol. 9, no. 1, pp. 88-90, 2011.
DOI
|
11 |
S. B. Barnes, "A privacy paradox: Social networking in the United States," First Monday, 2006.
|
12 |
S. H. Han and S. C. Cho, "Study and Proposal for Practical Way of Privacy Self-Management Through Privacy Nudging," The Journal of Korea Society of Internet Ethics, vol. 2, no. 2, pp. 115-120, 2018.
|
13 |
K. B. Min and J. M. Kang, "Rights to Control Information and Related Security Technologies on the CyberSpace," The Journal of the Institute of Internet, Broadcasting and Communication(JIIBC), vol. 10, no. 2, pp. 135-141, Apr. 2010.
|
14 |
H. J. Kim and J. Y. Rha, "An Exploratory Study on Consumer Privacy Paradox Experience: Grounded Theory Approach," Family and Environment Research, vol. 55, no. 2, pp. 205-219, 2017.
DOI
|