1 |
D. Lenton, "The small screen [TV to Mobile Devices]," IEE Rev., vol. 49, no. 10, pp. 38-41, Oct. 2003.
DOI
ScienceOn
|
2 |
Albert, Christopher & Dorofee, Audrey. "Managing Information Security Risks: The OCTAVE Approach.", Addison Wesley, July 2002
|
3 |
Carey, Mark. "Enterprise Risk Management: How To Jumpstart Your Implementation Efforts." International Risk Management Institute, 2005
|
4 |
Control Objectives for Information and related Technology COBIT 4.1. "Information Systems Audit and Control Association." www.isaca.org
|
5 |
Corporate Governance Task Force. "Information Security Governance: A Call to Action." National Cyber Security Partnership, 2004.04
|
6 |
David A Chapin and Steven Akridge. "How Can Security Be Measured? Information Systems Audit and Control Association." www.isaca.org 2005
|
7 |
ISO(International Standard organization), ISO 27001, 2005.10
|
8 |
John Sherwood, Andrew Clark and David Lynas. "Enterprise Security Architecture: A Business-Driven Approach", CPM Books 2005
|
9 |
Schneier, Bruce. "Hacking the Business Climate for Network Security." Computer, IEEE, April 2004
|
10 |
ISO(International Standard organization), ISO 27001, 2005.10
|
11 |
한국인터넷진흥원, ISMS(정보보호관리체계), 2008.05
|
12 |
한국인터넷진흥원, PIMS(개인정보보호관리체계), 2010.11
|
13 |
한국인터넷진흥원, 개인정보보호관리체계 인증준비 안내서(사업자용), 2010.12
|
14 |
행정안전부, G-ISMS(전자정부정보보호관리체계), 2009.12
|
15 |
한국정보보호학회, 전자정부 정보보호관리체계(G-ISMS) 적용 정책, 2009.10
|