1 |
Finne, T., 'A Conceptual Framework for Information Security Management,' Computers & Security, Vol. 17, No. 4, pp. 303-307, 1998
DOI
ScienceOn
|
2 |
David, J., 'The New Face of the Virus Threat,' Computers & Security, Vol. 15, No. 1, pp. 13-16, 1996
DOI
ScienceOn
|
3 |
Kankanhalli, A., H. Teo, B. Tan, and K. Wei, 'An Integrative Study of Information Systems Security Effectiveness,' International Journal of Information Management, Vol. 23, No. 2, pp. 139-154, 2003
DOI
ScienceOn
|
4 |
Post, G. and A. Kagan, 'Management Tradeoffs in Anti-Virus Strategies,' Information & Management, Vol. 37, No. 1, pp. 13-24, 2000
DOI
ScienceOn
|
5 |
White, S., Open Problems in Computer Virus Research, IBM Thomas J. Watson Research Center, NY USA, 1998
|
6 |
Hubbard, J. and K. Forcht, 'Computer Viruses: How Companies Can Protect Their Systems,' Industrial Management & Data Systems, Vol. 98, No. 1, pp. 12-16, 1998
DOI
ScienceOn
|
7 |
Wen, H., 'Internet Computer Virus Protection Policy,' Information Management & Computer Security, Vol. 6, No. 2, pp. 66-71, 1998
DOI
ScienceOn
|
8 |
BSI, BS7799: Code of Practices for information Security Management, United Kingdom, 1999
|
9 |
Bissett, A. and G. Shipton, 'Some Human Dimensions of Computer Virus Creation and Infection,' International Journal of Human-Computer Studies, Vol. 52, pp. 899-913, 2000
DOI
ScienceOn
|
10 |
Wack, J. and L. Carnahan, Computer Viruses and Related Treats: A Management Guide, NIST SP 500-166, National Institute of Standards and Technology, 1989
|
11 |
Gordon, S., 'Application Program Security Fighting Spyware and Adware in the Enterprise,' Information systems security, Vol. 14, No. 3, pp. 14-17, 2005
DOI
ScienceOn
|
12 |
Cannon, C., 'The Real Computer Virus,' American journalism review, pp. 28-35. Apr., 2001
|
13 |
Mtembu, K. and Y. Cairns, 'How to Manage and Reduce Computer Crime,' IS Audit & Control Journal, Vol. 6, pp. 27-31, 1997
|
14 |
Agarwal, R. and J. Prasad, 'The Antecedents and Consequents of User Perceptions in Information Technology Adoption,' Decision Support Systems, Vol. 22, No. 1, pp. 15-29, 1998
DOI
ScienceOn
|
15 |
Coursen, S., 'Financial Impact of Viruses,' Information Systems Security, Vol. 6, No. 1, pp. 64-70, 1997
DOI
|
16 |
Goodhue, D. and D. Straub, 'Security Concerns of System Users: A Study of Perception of the Adequacy of Security,' Information & Management, Vol. 20, No. 1, pp. 13-27, 1991
DOI
ScienceOn
|
17 |
Szor, P., The Art of Computer Virus Research and Defense, Addison-Wesley, 2005
|
18 |
Tedeschi, B., 'Protect Your Identity,' PCWORLD, pp. 107-112, Dec. 2004
|
19 |
CMU/SEI, Operationally Critical Threat, Asset, Vulnerability Evaluation (OCTAVE) Framework, Ver. 1.0, CMU/SEI-99-TR- 017, June 1999
|
20 |
Straub, D., 'Effective IS Security: An Empirical Study,' Information System Research, Vol. 1, No. 3, pp. 255-276, 1990
DOI
|
21 |
Gasser, M., Building a Secure Computer Systems, Van Nostrand Rienhold Company, 1988
|
22 |
Loch, K., H. Carr, and M. Warkentin, 'Threats to Information Systems: Today's Reality, Yesterday's Understanding,' MIS Quarterly, Vol. 16, No. 2, pp. 173-186, 1992
DOI
ScienceOn
|
23 |
김세헌, 정보보호 관리 및 정책, 생능, 2002
|
24 |
CSE, Guide to Security Risk Management for IT Systems, Communications Security Establishment, Government of Canada, 1996
|
25 |
Lee, S., S. Lee, and S. Yoo, 'An Integrative Model of Computer Abuse Based on Social Control and General Deterrence Theories,' Information & Management, Vol. 41, No. 6, pp. 707-718, 2004
DOI
ScienceOn
|
26 |
Jung, B., I. Han, and S. Lee, 'Security Threats to Internet: A Korean Multi-Industry Investigation,' Information & Management, Vol. 38, No. 8, pp. 487-498, 2001
DOI
ScienceOn
|
27 |
Lee, J. and Y. Lee, 'A Holistic Model of Computer Abuse within Organizations,' Information Management & Computer Security, Vol. 10, No. 2, pp. 57-63, 2002
DOI
ScienceOn
|
28 |
한국정보보호진흥원, 새로운 사이버 위협: 피싱 - 피싱에 따른 기술, 사회, 법제적 대응 및 시사점, 정책기획 05-6K, 한국정보보호진흥원, 2005
|
29 |
Stonburner, G., A. Goguen, and A. Feringa, Risk Management Guide for Information Technology Systems, NIST SP 800-30, National Institute of Standard and Technology, 2001
|
30 |
CSI, Eighth Annual CSI/FBI Computer Crime and Security Survey, Computer Security Institute, 2005
|
31 |
Peltier, T., Information Security Risk Analysis, Auerbach, 2001
|
32 |
Whitman, M., 'In Defense of the Realm: Understanding the Threats to Information Security,' International Journal of Information Management, Vol. 24, No. 1, pp. 43-57, 2004
DOI
ScienceOn
|
33 |
Gogan, J., 'Should 'Personal' Computers Be Personally Allocated?', Journal of Management Information Systems, Vol. 7, No. 4, pp. 91-106, 1991
DOI
|
34 |
Straub, D. and W. Nance, 'Discovering and Disciplining Computer Abuse in Organizations: A Field Study,' MIS Quarterly, Vol. 14, No. 1, pp. 45-60, 1990
DOI
ScienceOn
|
35 |
Nachenberg, C., 'Computer Virus-Anti Virus Coevolution,' Communications of the ACM, Vol. 40, No. 1, pp. 46-51, 1997
DOI
ScienceOn
|
36 |
Russell, D. and G. Gangemi, Computer Security Basics, O'Reilly & Associates, 1991
|
37 |
McGraw, G. and G. Morrisett, 'Attacking Malicious Code: A Report to the Infosec Research Council,' IEEE Software, Vol. 17, No. 5, pp. 33-41, 2000
|
38 |
ISO/IEC, Guidelines for the management of IT security (GMITS)-Part 1: Concepts and models of IT security, ISO/IEC JTC1 SC27 TR 13335-1, 2000
|
39 |
CSI, IPAK: Information Protection Assessment Kit, Computer Security Institute, 1997
|
40 |
Gordineer, J., 'Blended Threats: A New Era in Anti-Virus Protection,' Information Systems Security, Vol. 12, No. 3, pp. 45-47, 2003
DOI
|
41 |
Sherif, J. and D. Gilliam, 'Deployment of Anti-Virus Software: A Case Study,' Information Management & Computer Security, Vol. 11, No. 1, pp. 5-10, 2003
DOI
ScienceOn
|
42 |
Hoffer, J. and D. Straub, 'The 9 to 5 Underground: Are You Policing Computer Crimes?,' Sloan Management Review, Vol. 30, No. 4, pp. 35-43, 1989
|
43 |
Skoudis, E. and Zeltser, L., Malware: Fighting Malicious Code, Prentice Hall, 2003
|
44 |
Frank, J., B. Shamir, and W. Briggs, 'Security-related Behavior of PC Users in Organizations,' Information & Management, Vol. 21, No. 3, pp. 127-135, 1991
DOI
ScienceOn
|
45 |
채서일, 사회과학조사방법론, 학현사, 2003
|
46 |
Lee, Y. and K. Kozar, 'Investigating Factors Affecting the Adoption of Anti-Spyware Systems,' Communications of the ACM, Vol. 48, No. 8, pp. 72-77, 2005
|
47 |
Thatcher, J. and P. Perrewe, 'An Empirical Examination of Individual Traits as Antecedents to Computer Anxiety and Computer Self-Efficiency,' MIS Quarterly, Vol. 26, No. 4, pp. 381-396, 2002
DOI
ScienceOn
|
48 |
Venkatesh, V. and M. Morris, 'Why Don't Men Ever Stop to Ask For Direction? Gender, Social Influence, ad Their Role in Technology Acceptance and Usage Behavior,' MIS Quarterly, Vol. 24, No. 1, pp. 115-139, 2000
DOI
ScienceOn
|
49 |
Barsanti, C., 'Modern Network Complexity Needs Comprehensive Security,' Security, Vol. 36, No. 7, pp. 65, 1999
|
50 |
Highland, H., 'A History of Computer Viruses: The Famous Trio,' Computer & Security, Vol. 16, No. 5, pp. 416-429, 1997
DOI
ScienceOn
|
51 |
김종기, 이동호, 서창갑, '전자상거래환경에서 위험분석방법론의 타당성에 대한 연구,' 정보보호학회논문지, 제14권, 제4호, pp. 61-74, 2004
|
52 |
Poston, R., F. Stafford, and A. Hennington, 'Spyware: A View from the (Online) Street,' Communications of the ACM, Vol.48, No. 8, pp. 96-99, 2005
DOI
ScienceOn
|
53 |
최운호, 전영태, '대규모 컴퓨터 바이러스/웜의 공격시 종합침해사고대응시스템에서의 자동화된 역추적 절차,' 정보보호학회논문지, 제15권, 제1호, pp. 50-60, 2005
|
54 |
Pipkin, D., Information Security - Protecting the Global Enterprise, Hewlett-Packard Professional Books, 2000
|