1 |
Channel A. "A voice phisher who pretends to be an investigator for 20s....Different Voice Phishing Techniques According to Age." http://v.media.daum.net/v/20180205195641695
|
2 |
Clifford Geertz. The Interpretation of Cultures. Basic Books. 1973.. .
|
3 |
John Creswell. Qualitative Inquiry and Research Design 2nd Ediditon. Sage Publication. 2007. In this paper, Korean translation(2010, p.112) is used..
|
4 |
Mark Goulston. JUST LISTEN: Discover the Secret to Getting Through to Absolutely Anyone. New York: AMACOM. 2009. In this paper, Korean translation, published in 2010, is used.
|
5 |
Kihoilbo. "The post office staff blocked voice phishing damage by using her wisdom." http://www.kihoilbo.co.kr/?mod=news&act=articleView&idxno=736083
|
6 |
Daily Today. "West police passes a certificate of appreciation to a banker because of preventing voice phishing victim." http://www.dtoday.co.kr/news/articleView.html?idxno=261364
|
7 |
Amanda Ripley, The Unthinkable: Who survives when disaster strikes and why. Three Rivers Press: New York. 2008.
|
8 |
J. Y. Shin and S. W. Kim, "A Study on Mobil e Crime Prevention.".Journal of Police Science, V ol. 9, No. 2, pp.123-144, 2014.
|
9 |
Jaeyeon. Moon and Younghyun Chang,,"Ransomeware Analysis and Method for MInimize the Damage," The Journal of the Convergence Culture Technology (JCCT), Vol. 2, No. 1, pp.79-85, February 2016.
DOI
|
10 |
Ji-Ho Shin, "A Study on the Initial Action for the Non-Proliferation of Damage Caused by Smishing." Journal of Digital Forensics, Vol. 9, No. 1, pp.33-46, 2015.
|
11 |
Sei-Yeon OH, "The application of digital foren sic investigation for response of cyber-crimes." The Journal of Digital Convergence, Vol. 13, N o. 4, pp.81-87, 2015.
DOI
|
12 |
Nocut News "From the doctor to the broker ... voice phishing targeting Professional" http://www.nocutnews.co.kr/news/4783255
|
13 |
Y-B Cha, W-Y Choi and G-S Lee, "Proactive Response Against Smishing Using Shorten URL." Journal of Digital Forensics, Vol. 9, No. 1, pp.19-31, 2015.
|
14 |
Yeon-Gi Jung, "A Study on Blocking Criminal Websites Based on Internet Domain Registration Data of Phishing Sites." Journal of Digital Forensics, Vol. 9, No. 2, pp.79-96, 2015.
|
15 |
G. C. Lim, the 21th Century Internet Policy and Law. Seoul: Bookforyou. pp.274-278. 2013.
|