1 |
D. K. Choi, M. S. Song, J. I. Im, K. H. Lee, "Study the role of information security personnel have on an organization's information security level," Journal of the Korea Institute of Information Security and Cryptology, vol. 25, no. 1, pp. 197-362, Feb. 2015.
DOI
|
2 |
S. S. Jang, S. J. Lee, B. N. Noh, "The effects of the operation of an information security management system on the performance of information security," Journal of the Korea Institute of Information Security and Cryptology, vol. 22, no. 5, pp. 1123-1132, Oct. 2012.
|
3 |
TTAS.KO-10.0089/R1, GUIDELINES ON IT SECURITY POLICY FOR PUBLIC INSTITUTIONS AND ORGANIZATIONS, TTA(Telecommunications Technology Association), 1999.
|
4 |
J. S. Song, M. J. Jeon, M. G. Choi, "A Study on Factors Affecting the Level of Information Security Governance in Korea Government Institutions and Agencies," The Journal of Society for e-Business Studies, vol. 16, no. 1, pp. 133-151, Feb. 2011.
|
5 |
J. S. Kim, S. Y. Lee, J. I. Lim, "Comparison of The ISMS Difference for Private and Public Sector," Journal of the Korea Institute of Information Security and Cryptology, vol. 20, no. 2, pp. 117-129, Apr. 2010.
|
6 |
S. H. Ryu, D. R. Jeong, H. K. Jung, "Ways to establish public authorities information security governance utilizing E-government information security management system (G-ISMS)," Journal of the Korea Institute of Information and Communication Engineering, vol. 17, no. 4, pp. 769-774, Apr. 2013.
DOI
|