1 |
Dong-hee Bang, "A study on the improvement of the personal information protection certification in the personal information protection legal system: Focusing on the current status, the problem, and the remedial alternative of certificate system," Public Law Journal, 15(1), pp. 263-300, 2014.
|
2 |
Geon-sang Cha, Ho-hyeon Han, and Yong-tae Shin, "An effective Personal information management system to ensure self-imposed control on personal information protection act," Journal of Korean Institute of Information Scientists and Engineers: Information networking, 39(3), pp. 276-281, 2012.
|
3 |
Eun-yeop Park, Jin-won Choi, and Tae-hee Cho, "A case study on building personal information management System Certification," Review of The Korea Institute of information Security & Cryptology, 21(5), pp. 27-36, 2011.
|
4 |
Jin-hwan Jeon and Kang-rae Cho, "The main changes in personal information management system certification by revised notification," Review of The Korea Institute of information Security & Cryptology, 23(5), pp. 20-23, 2013.
|
5 |
Dae-ha Park and Keun-hee Han, "A Study on PIMS Controls for PII outsourcing management under the cloud service environment," Jonornal of The Korea Institute of information Security & Cryptology, 23(6), pp. 1267-1276, 2013.
DOI
|
6 |
Jeong-woo Chae and Jin-hong Jeong, "Study on building security controls framework for the industrial security management system," Korean Academy of Public Safety and Criminal Justice, 22(1), pp. 300-341, 2013.
|
7 |
Jin-young Han and Su-jin Lee, "Privacy assessment model in healthcare: The case of specialty hospital," Journal of Internet Electronic Commerce Research, 14(6), pp. 27-44, 2014.
|
8 |
Dae-ha Park, Sang-nyeong Yoo, and Heung-youl Youm, "Development of information system operational audit checklist for personal information protection in public organizations," Journal of Security Engineering, 12(1), pp. 47-64, 2015.
DOI
|
9 |
K. Hone and J.H.P. Eloff, "Information security policy - what do international information security standards say?," Computers & Security, Vol. 21, No. 5, pp. 402-409, 2002.
DOI
|
10 |
M. Siponen and R. Willison, "Information security management standards: Problems and solutions," Information & Management, Vol. 46, No. 5, pp. 267-270, 2009.
DOI
|
11 |
Woon-soo Kim, Sook-young Jeong, Young-hyeon Cho, and Kyung-bae Kim, "A Study on improving scheme of environmental review aspects in urban management planning in Seoul," Seoul Studies, 8(1), pp. 107-125, 2007.
|
12 |
Korea IT Industry Promotion Agency, Report on Hw to Link a Similar Procedure for the Expansion of Digital Content Transaction Certification, 2008.
|
13 |
Hong-bin Im et al., Parsing Methodology of Korean, Hankookmunhwasa, 2002.
|
14 |
Jin-jae Choi and Sun-young Hwang, "Requirements redundancy and inconsistency analysis for use case modeling," Journal of KIISE: Software and Applications, 3(7), pp. 869-882, 2004.
|
15 |
Korean Standard Dictionary, Retrieved Nov. 2, 2015, from http://stdweb2.korean.go.kr.
|
16 |
Korea Local Information Research & Development Institute, "Countermeasure of public institution of introduction of PIPL," 2014 Local Information Issue, Vol. 2, 2014.
|
17 |
Boannews, "Visualization of integration of information security certification... What is priority?," 2014.8.11.
|
18 |
Korea Internet & Security Agency, Outline of PIMS, Retrieved Oct. 21, 2015, from http://pims.kisa.or.kr/kor/intro/pimsIntro01.jsp.
|
19 |
M. Landau, "Redundancy, rationality, and the problem of duplication and overlap," Public Administration Review, Vol. 29, pp. 346-358, 1969.
DOI
|
20 |
Jung-hai Kim, "A Study on the Reform of the overlapping regulation in the industrial safety sector," Korean Society and Public Administration, 15(1), pp. 211-233, 2004.
|
21 |
Korea Ministry of Government Legislation, A study on Status and Improvement of duplicate regulation, 2008.
|
22 |
Datanet, "ISMS, maintaining certification is more important than certification." 2013.10.7.
|
23 |
Mi-na Sim, "(A) study on the implementation methodology of the efficient PIMS certification system," Ph.D. Thesis, Korea University, 2010.
|
24 |
Heung-youl Youm, "The necessity of international standardization of personal information management system," Review of The Korea Institute of information Security & Cryptology, 23(4), pp. 65-72, 2013.
|