1 |
Bae, J. K., & Kwon, D. S. (2011). Self-crystalline factors impact on the degree of acceptance microblogging service research. Vol. 24, No. 5 (XIV No. 88).
|
2 |
Gang, Y. B., Hwang, H. U., Kim, K. B., Son, G. U., & No, B. N. (2014). Physical memory analysis technology for detecting malware. Privacy Journal, 24(1), 39-44.
|
3 |
Gim, G. Y., & Nag, W. S. (2000). According to the indicators quantify information security vulnerability assessment: Information weighted assets law. The Korea Institute of Information Security Engineering, 10(1), 51-62.
|
4 |
Kim, H. D., Kim, K. H., & Ha, J. C. (2013). GOOSE protocol development environment Snort-based intrusion detection system in the. Privacy Journal, 23(6), 1181-1190.
|
5 |
Kim, H. S., & Jeong, H. C. (2000). Relationship with the organization's information security organization, information security awareness and the level of research. Journal of Information Technology and Database, 7(2), 117-134.
|
6 |
Kim, I. H., Lee, G. H., & Park, J. H. (2010). Corporate information security issues and direction. Information Security Association, 20(1), 13-18.
|
7 |
Kim, J. G. (2013). Also impact on privacy in the online environment act. the information policy. Article 20, No. 3.
|
8 |
Kim, Y. H., Moon, J. W., Hwang, S. H., & Jang, H. B. (2014). Study on the ICT outsourcing security management environment. Information Security Engineering, 24(1), 23-31.
|
9 |
Park, C. W. (2014). A Study on the Privacy act on the Internet - Focusing on the protection motivation theory. Journal of Internet Computing and Services, 15(2), 59-71.
DOI
|
10 |
Park, H. I. (2009). Research Information Security Survey Results Analysis for increased security. Journal of Integrated Conference, 1-7.
|
11 |
Park, J. H. (2009). Research on Private Security for the Psychological Stability of a Client. Journal-German Korean Security Guidelines, 18, 55-72.
|