1 |
Hankyoreh News, Jan. 23. 2014. http://www.hani.co.kr/arti/politics/assembly/621197.html
|
2 |
KISA, "2014 National Information Security White Paper," Apr. 2014.
|
3 |
Ministry of Science, "Information Security industrial development agenda of comprehensive plan," ICT Future Planning, Jul. 2013.
|
4 |
KISA, "Information Security Survey 2013," Dec. 2013.
|
5 |
Roper, C.A., "Risk Management for Security Professionals", Butterworth- Heinemann, Boston, MA, pp.83-96, 1999.
|
6 |
Blakley, B., "Returns on Security Investment: an Imprecise but Necessary Calculation," Secure Business Quarterly, Vol. 1, No. 2, 2001.
|
7 |
Harris, S., CISSP All-in-One Exam Guide, McGraw-Hill, New York, NY, 2001.
|
8 |
Witty R.J, et al., "The Price of Information Security," Gartner Inc., Stamford, CT, 2001.
|
9 |
Jeong-deok Kim and Jeong-Eun Park, "Based on information security ROI TCO (ROSI) study," The Society of Digital Policy & Management, Founding Conference, pp.251-261, Dec. 2003.
|
10 |
Jong-seon Lee and Hui-Ho Lee, "Using the TCO-based Security ROI information security investment performance and evaluation method", Korea Information Processing Society, Conference, pp.1125-1128, Aug. 2007.
|
11 |
Young-Tek Jo, "Study on Improving the information protection level by Integrated Evaluation Items(IEI)" pp.53-63, Aug. 2004.
|
12 |
Gordon, L.A. and Loeb, M.P., "The Economics of Information Security Investment," ACM Transactions on Information and System Security, Vol.5, No.4, pp.438-457, Nov. 2002.
DOI
|
13 |
Cavusoglu, H.(Hasan), Cavusoglu, H.(Huseyin) and Raghunathan S., "Economics of IT Security Management: Four Improvements to Current Security Practices," Communications of the Association for Information System, Vol.14, pp.65-75, 2004.
|
14 |
Cavusoglu, H., Mishara, B. and Raghunathan, S., "A Model for Evaluating IT Security Investments," Communications of the ACM, Vol.47, No.7, pp.87-92, Jul. 2004.
|
15 |
Jin Kim, "Study on the Differences of Priority between Information Protection Importance and Security Investment," pp.34-43, Feb. 2014.
|
16 |
Chul-hwan Jang, "Factors that Affect Selection of Information Security Countermeasures," pp.28-30, Feb. 2014.
|
17 |
Scott, D., Security Investment Justification and Success Factors, Gartner Inc., Stamford, CT, 1998.
|
18 |
Han-kil Seon, "Study on the effect of information security policy and organization on the performance of information security," Korea Institute of Information Management, Conference pp.1087-1095, Aug. 2005.
|
19 |
Leem, C.S. and Kim, S. "Introduction to an Integrated Methodology for Development and Implementation of Enterprise Information Systems," Journal of Systems and Software, Vol. 60 No. 3, pp.249-261, Feb. 2002.
DOI
ScienceOn
|
20 |
Davis, A., "Return on Security Investment-Proving It's Worth It," Network Security, Vol. 2, pp. 8-10, 2005.
|
21 |
Blatchford, C., "Information Security Controls-Are They Cost-effective," Computer Audit Journal, Vol. 3, pp. 11-19, 1995.
|
22 |
Young-ok Kwon and Byung-do Kim, "The Effect of Information Security Breach and Security Investment Announcement on the Market Value of Korean Firms," Information Systems Review, 9(1), 1, pp.105-120, Apr. 2007.
|
23 |
Ki-hyang Hong, "Study on the Effect of Information Security Controls and Processes on the Performance of Information Security," kookmin University Ph.D. paper, pp. 138-141, Feb. 2004.
|
24 |
Sang-hoon Nam, "Empirical Study on the Impact of Security events to the Stock Price in the Analysis method of Enterprise Security Investment Effect," Korea University Ph.D. paper, pp. 80-102, Feb. 2006.
|
25 |
Young-ok Kwon, "The Effect of Information Security Breach and Security Investment Announcement on the Market Value of Korean Firms," Seoul University, paper of masters degree, pp.44-46, Aug. 2005.
|