1 |
Kim Seungjoo, "Actual condition of cyber warfare and latest hacking trend," Korea Univ., June. 2013, available : http://www.slideshare.net/skim71/ss-23039901
|
2 |
Shin Young Jin, "A study on the improvement of technological protection measures for responding to privacy breaches," Proceeding of Autumn Annual Conference of The Korean Association for Policy Studies, pp. 465-488, Sep. 2013.
|
3 |
Young Hee Kim and Kwang Ho Kook, "A Study on the Relative Importance of the Administrative and Technical Measures for the Personal Information Protection," The Journal of Society for e-Business Studies, 19(4), pp. 135-150, Nov. 2014.
|
4 |
Young Ran Hong and Dongsoo Kim, "Analysis of the Effects of Common Criteria Certification on the Information Security Solutions," Journal of Society for e-Business Studies, 17(4), pp. 57-68, Nov. 2012
|
5 |
Personal Information Protection Act
|
6 |
Standards on Measures for Securing the Safety of Personal Information
|
7 |
Standard Personal Information Guide
|
8 |
Act on Promotion of Information and Communications Network Utilization and Information Protection, etc.
|
9 |
Enforcement Decree of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc.
|
10 |
Guidelines for Information Security Measures
|
11 |
Standards on Technical and Administrative Protection Measures for Personal Information
|
12 |
Act on the Protection, Use, Etc, of Location Information
|
13 |
Enforcement Decree of the Act on Protection & Utilization of Location Information, etc.
|
14 |
Manual on Administrative and Technical Protection Measures Recommendation of Location Information
|
15 |
Use and Protection of Credit Information Act
|
16 |
Enforcement Decree of Use and Protection of Credit Information Act
|
17 |
Rules for Regulation of Electronic Financial Supervision
|
18 |
Regulation of Credit Information Business Supervision
|
19 |
Electronic Financial Transactions Act
|
20 |
Regulation of Electronic Financial Supervision
|
21 |
National Cyber Security Center, available: http://service1.nis.go.kr/certify/convenanceSummary.jsp
|
22 |
Ji Sun Kim, "A Study of CC for Privacy Management System," Master Thesis, Sungkyunkwan Univ., June. 2011.
|
23 |
IT Security Certification Center, http://www.itscc.kr/appraisal_2.asp
|
24 |
KISIA, available: http://www.kisia.or.kr/
|