1 |
Chang Hee, Han, "A Quantitative Assessment Model of Private Information Breach," The Jounal of Society for e-Business Studies, v. 16, no. 4, pp.17-31, Nov. 2011
|
2 |
Jin ho, Yoo, "Estimating Direct Costs of Enterprises by Personal Information Security Breaches," Journal of the Korea Institute of Information Security & Cryptology, v. 19, no. 4, pp. 63-75, Aug. 2009
|
3 |
Jang Ho, Yun, "FAIR-Based Loss Measurement Model for Enterprise Personal Information Breach," Advances in Computer Science and Ubiquitous Computing, Springer Singapore, pp. 825 -833, Feb. 2015
|
4 |
Hee Joo, Lee, "A study on establishing a technical safety assessment system for the Korean telemedicine system," Journal of the Korean Medical Association, v. 58, no. 12, pp. 1159-1170, Dec. 2015
DOI
|
5 |
Dong Wook, Kim, "A Study on Information Security Policy in the era of Smart Society," Journal of the Korea Institute of Information Security & Cryptology, v. 22, no. 4, pp. 883-899, Aug. 2012
|
6 |
Young Hee, Kim, "A study of Priority Rankings of Actions Providing Personal Information Security," Jouranl of Information and Security, v. 14, no. 4, pp. 9-17, Jun. 2014
|
7 |
Japan Network Security Association, "Survey Report on Information Security," 12. Aug. 2014
|
8 |
Gun Sang, Cha, "A Study on the Criteria to Estimate the Compensation from the Infringement of Personal Information," Soong Sil University, v. 22, Nov. 2011
|
9 |
Jeong Yeon, Kim, "Analyzing Effects on Firms' Market Value of Personal Information Security Breaches," The Jounal of Society for e-Business Studies, v. 18, no. 1, pp. 1-12, Feb. 2013
|
10 |
Copyright Statistics Korea, "Number of perso nal information infringements", "http://www.index.go.kr/potal/main/EachDtlPageDet ail.do?idx_cd=1366" 11. Aug. 2016
|
11 |
Korea Ministry of Government Legislation, "Personal Information Protection Act", "http://www.law.go.kr/lsSc.do?menuId=0&p1=&subMenu=1&nwYn=1§ion=&tabNo=&query=%EA%B0%9C%EC%9D%B8%EC%A0%95%EB%B3%B4%20%EB%B3%B 4%ED%98%B8%EB%B2%95#undefined"
|
12 |
Korea Internet Security Agency, "Defintion of Personal Information", "https://www.i-privacy.kr/jsp/user4/intro/define1.jsp"
|
13 |
Gordon, Lawrence A., and Martin P. Loeb., "Managing cybersecurity resources: a cost-benefit analysis," Vol. 1. New York: McGraw-Hill, 2006
|
14 |
Hae Won, Yoo, "Damages amount model caused by Information protection infringement accident," Spring Conference of Korean Institute of Industrial Engineers, pp.671-677, Jun. 2010
|
15 |
Il Yoo, Hong, "The Effect of Official Announcement about Information Security Breach on Corporate Stock Value in the Market," Entrue Journal of Information Technology, v. 14, no. 2, pp. 33-56, Aug. 2015
|
16 |
http://www.businessofsecurity.com/docs/FAIR%20-%20ISO_IEC_27005%20Cookbook.pdf
|
17 |
Ponemon Institute, "Ponemon Institute Cost of a Data Breach Study," "http://www-903.ibm.com/edm/B1508/0812_csj/2015%20Cost%20of%20Data%20Breach%20Study_Ponemon_Kor.pdf," May. 2015
|
18 |
Ponemon Institute, "Ponemon Institute Cost of Data Breach Study: Global Analysis," pp. 26, May. 2015
|
19 |
Ponemon Institute, "Fifth Annual US Cost of Data Breach," Jan. 2010
|
20 |
J. Freund; J. Jones, " Measuring and Managing Information Risk: A FAIR Approach," book, pp. 17-201, 2015
|
21 |
Ponemon Institute, "Ponemon Institute Cost of Cyber Crime Study: Global ," pp. 12, Oct. 2015
|
22 |
Yang Seo, Choi, "Hacker and Hacking Method Level Classification for Security Assessment," Journal of the Korea Institute of Information Security & Cryptology, v. 11, no. 5, pp. 63-74, May. 2001
|
23 |
Korean Online Privacy Association, "According to Personal Information Value and Breach, Analysis of Social Amount," 28. NOV. 2013
|
24 |
Saaty T. L., "The Analytic Hierarchy rocess," McGraw-Hill, New York, 1980.
|
25 |
Ponemon Institute, "Ponemon Institute Cost of Data Breach Study: Global Analysis," pp. 18, May. 2015
|