1 |
D.M. Boyd and N.B. Ellison, "Social Network Sites : Definition, History, and Scholarship," Journal of Computer-Mediated Communication, vol. 13, no. 1, pp.210-230, Dec. 2007.
DOI
|
2 |
K.J. Soo Hoo, How much is enough? A Risk-Management Approach to Computer Security, Stanford University, 2000.
|
3 |
L.A. Gordon and M.P. Loeb, "The Economics of Information Security Investment," ACM Transactions on Information and System Security, vol. 5, no. 4, pp.438-457, Nov. 2002.
DOI
|
4 |
C. Blatchford, "Information Security Controls - Are They Cost-effective," Computer Audit Journal, vol 3, pp.11-19. 1995.
|
5 |
A. Davis, "Return on Security Investment- Proving It's Worth It," Network Security, vol 2, pp.8-10, Nov. 2005.
|
6 |
H. Cavusoglu, B. Mishra and S. Raghunathan, "A Model for Evaluating IT Security Investments," Communications of the ACM, vol 47, no. 7, pp.87-92, Jul.. 2004.
DOI
ScienceOn
|
7 |
NIST, An Introduction to Computer Security, NIST Special Publication 800-12, 1996.
|
8 |
Vincent C.S. Lee, "A Fuzzy Multi-criteria Decision Model for Information System Security Investment," LNCS 2690, pp.436-441, Mar. 2003.
|
9 |
L.D. Bodin, L.A. Gordon and M.P. Loeb, "Evaluating Information Security Investments Using the Analytic Hierarchy Process," Communications of the ACM, vol 48, pp.79-83, Feb. 2005.
|
10 |
조찬식, "정보사회에서의 정보보안에 관한 연구," 한국문헌정보학회지, 34(1), pp.155-180, 2000년 3월.
|
11 |
ENISA, Security Issues and Recommendations for Online Social Networks, ENISA Position Paper No.1, Oct. 2007.
|
12 |
이기식, "인터넷시대 사이버보안의 인식양태 및 정책대안," 한국공공관리학보, 22(4), pp.99-127, 2008년 12월.
|
13 |
Martin Olausson, The People's Revolutio n: Implications of Web 2.0 and Social Media Applications, Strategy Analytics, Report, Dec. 2007.
|
14 |
한국인터넷진흥원, 인터넷이용자의 SNS이용실태조사, 연구보고서, 2009년 7월.
|
15 |
comScore, The comScore Data Passport - First Half 2010, Data Passport, Feb. 2010.
|
16 |
Compete, http://siteanalytics.compete. com
|
17 |
eMarketer, http://www.emarketer.com /blog/index.php/future-social-media/
|
18 |
T.L. Saaty, The Analytic Hierarchy Process, McGraw Hill, New York, 1980.
|
19 |
T.L. Saaty, "How to Make a Decision: The Analytic Hierarchy Process," European Journal of Operation Research, vol. 48, pp.9-26, 1990.
DOI
ScienceOn
|
20 |
공희경, 전효정, 김태성, "AHP를 이용한 정보보호 투자 의사결정에 대한 연구," Journal of Information Technology Applications & Management, 15(1), pp.139-152, 2008년 4월.
과학기술학회마을
|
21 |
T.L. Saaty and G.V. Luis, "Diagnosis with Dependent Symptoms: Bayes Theorem and the Analytic Hierarchy Process," Operations Research, vol 46, no. 4, pp.491-502, 1998.
DOI
ScienceOn
|