1 |
Albrechtsen E. "A qualitative study ofusers' views on information security", Computers and Security, 26, 2007.
|
2 |
Carnegie Mellon University CyLab, Common Sense Guide to Prevention and Detection of Insider Threats, 2006.7
|
3 |
Furnell S., "Malicious or misinformed? Exploring a contributor to the insider threat", Computer Fraud and Security, 9, 2006.
|
4 |
Kruger HA, Kearney WD."A prototype for assessing information security awareness". Computers and Security, 25, 2006
|
5 |
Lee, Chang Moo, "A Study on the Historical Origin of Private Security Industry in Korea", KOREAN SEC URITY SCIENCE REVIEW, Vol. 22, pp. 91-111, 2010
|
6 |
Wol Young Lee, Chul Hwang, "Development of a Copyright Protection System for Computer Forensics", Journal of Korea Multimedia Society, Vol. 10 No. 3, pp. 365-372, 2007
|
7 |
Hang-Bae Chang, "The Design of Information Securit y Management System for SMEs Industry Technique Leakage Prevention", Journal of Korea Multimedia Society, Vol. 13 No.1, pp. 111-121, 2010.
|
8 |
Hang-Bae Chang, Tae-Hee Joe, Hyo-Jin Kim, "A Stud y on Feasibility and Establishment of a Security Grad e Certification Scheme for the New IT Services", Journal of Korea Navigation Institute, Vol. 13 No. 1, pp.1 13-119, 2009.
|
9 |
Jung, Byung-Soo; Ryu, Sang-Il; Kim, Hwa-Soo, "Analysis of Research Trends in Industrial Security - Concentrated on Academic Research Information Services (Year 2000-2011)", Journal of Korean Public Polic e and Security Studies, Vol. 9 No.2, pp195-215, 2012.
DOI
|
10 |
Jeong Woo Chae, Young Hee Ko, "Exploring Case Study on Security Factors and Strategy to Prevent Lea kage of Corporate Information for CEO: Focused on Korea Manufacturing Company Major Cases in 2010 0", The journal of professional management, Vol. 15 No. 1, pp.87-113, 2012.
|
11 |
Choi, Justin Jin-Hyuk, "A Study on the Institutional Improvement Directions of Industrial Security Progra ms: Focused upon Policies and Practices in the U.S.", KOREAN SECURITY SCIENCE REVIEW, Vol. 22, pp. 197 - 230, 2010.
|