1 |
Y. C. Choung, Y. G. Bae, "m-Gov strategy and policy challenges with ICT ecosystem changes," Journal of KIICE, vol. 17, no. 7, pp. 1533, Jul. 2013.
과학기술학회마을
DOI
ScienceOn
|
2 |
G. S. Cha, "Security measures of the e-government according to analysis of trends in recent security incidents," e-Government Focus, No. 06, pp.19-23, 2008.
|
3 |
TREND MICRO, "Threat Report and Forecast," pp.1-6, Jan.2014. Available: www.trendmicro.co.kr/.../rpt-cashingin-on-digital-information-kr.pdf
|
4 |
TREND MICRO, "Became blurred boundaries," 2014 security predictions report, Available: www.trendmicro.co. kr/.../rpt-trend-micro-security-predictions-for-2014-andbeyond_1212_kr.pdf
|
5 |
Korea Financial Services Commission, "financial company corresponding status with end of Windows XP technology support," Press release, pp.2, Mar. 2014. Available: www.fsc.go.kr/info/ntc_news_view.jsp?bbsid=BBS0030&page=2&sch1=&sword=&r_url=&menu=7210100&no=29760
|
6 |
Y. C. Choung, Y. G. Bae, "The Era of Computer Understanding of Convergence," KR: Humanscience Pub., ch.10, pp.315-316, 2014.
|
7 |
oKISA, "Cyber Security Issue", pp.51, Feb. 2014. Available: http://www.dt.co.kr/contents.html?article_no=201401302019960786003
|
8 |
NIA, "National Information White Paper," pp.548-549, 2013.
|
9 |
UN E-Government Survey 2012, Printed at the United Nations, New York, ISBN : 978-92-1-123190-8, pp. 10-11, February 2012. Available: http://unpan1.un.org/intradoc/ groups/public/documents/un/unpan048065.pdf
|
10 |
H. B. Jang, S. J. Rim, "Information Security Management and Policy", KR: Kihanjae Pub., ch.1, pp.18, 2009.
|