1 |
김성근, "정보시스템 보안강화체계 적용을 위한 제도화 방안 개발," 한국인터넷진흥원, 2009.
|
2 |
김성근, "정보시스템 소프트웨어 보안성강화체계 제도화 및 활성화 방안 개발," 한국인터넷진흥원, 2010.
|
3 |
김성근, 안남규, 이진실, "정보자원관리 관련 법체계 분석: 미국과의 비교 분석을 중심으로," Information Systems Review, 7(1), pp. 21-40. 2005.
|
4 |
이규정, 김현경, "신정부의 정보화 법체계 개편방향과 과제," 한국정보사회진흥원 IT정책연구시리즈 2, 2008.
|
5 |
이연수, 이수연, 윤석구, 전재성, "주요국의 사이버 안전 관련 법․조직체계 비교 및 발전방안 연구," 국가정보연구, 1(2), pp. 35-116, 2009.
|
6 |
이창범, "미국, 영국, 독일의 기반보호법 체계에 관한 연구," 한국인터넷진흥원, 2010.
|
7 |
조성훈, "행안부, SW개발시 보안기법 적용 의무 화," 중앙일보, May 17 2012.
|
8 |
C. Tian, B. Ray, J. Lee, R. Cao, and W. Ding, "BEAM: A Framework for business ecosystem analysis and modeling," IBM Systems Journal, vol. 47, no. 1, 2008.
|
9 |
E. Erdelyi, "Graph theory application for investigating agro-ecosystems effected by extreme weather conditions," Applied Ecology and Environmental Research, vol. 4, no. 2, pp. 181-187, 2006.
DOI
|
10 |
F. Capra, The web of life, Doubleday Anchor Books, 1996.
|
11 |
F. M. James, "Predators and Prey: A New Ecology of Competition," Harvard Business Review, May-June, pp. 75-86, 1993.
|
12 |
G. Wardle, "A Graph Theory Approach To Demographic Loop Analysis," Ecology, vol. 79, pp. 2539-2549, 1998.
DOI
ScienceOn
|
13 |
J. Bauer and M. van Eeten, "Cybersecurity: Stakeholder incentives, externalities, and policy options," Telecommunication Policy, vol. 33, no. 10, pp. 706-719, 2009.
DOI
|
14 |
J. Colley, N. Pohlmann, H. Reimer and W. Schneider, "Why secure coding is not enough: Professionals' perspective," (Editors), ISSE 2009 Securing Electronic Business Processes, Viewegg + Teubner, pp. 302-311, 2010.
|
15 |
K. Higgins, "SQL Injection hack infects 1 million web pages," InformationWeek, August 10, 2012.
|
16 |
M. Baqir, P. Palvia, and H. Nemati, "Evaluating Government ICT Policies: An Extended Design-Actuality Gaps Framework," Proceedings of Seconds Annual SIG GlobDev Workshop, Phoenix, USA, Dec. 14, 2009.
|
17 |
N. Davis, "Processes for producing secure software," Security & Privacy, vol. 2, no. 3, May-June, 2004.
|
18 |
OECD, "Information Technology Policies: Organizational Structure in Member Countries," OECD, 1995.
|
19 |
P. Black, "SAMATE and Evaluating Static Analysis Tools," Ada User Journal, vol. 28, Number 3, 2007.
|
20 |
P. Bowen, E. Chew, and J. Hash, "Information Security Guide for Government Executives," NIST, 2007.
|
21 |
S. Allesina, A. Bodini and C. Bondavalli, "Ecological subsystems via graph theory: the role of strongly connected components," OIKOS, vol. 110, pp. 164-176, 2005.
DOI
ScienceOn
|
22 |
P. Ulrich and J. Chacko, "Overview of ICT Policies and E-Strategies: An Assessment on the Role of Governments," Information Technology for Development, vol. 11, no. 2, pp. 195-197, 2005.
DOI
ScienceOn
|
23 |
R. Basole and J. Karla, "On the Evolution of Mobile Platform Ecosystem Structure and Strategy," Business & Information Systems Engineering, pp. 313-322, 2011.
|