1 |
Arnott, David C, "Trust - current thinking and future research," 2007
|
2 |
Fukuyama, Fancis, "Trust, Free Press," 1995
|
3 |
Robert. D. Putnam, "The Strange Disappearance of Social Capital in America," 1995
|
4 |
Joint Task Force Transformation Initiative, "NIST 800-53r4, Security and Privacy Controls for Federal Information Systems and Organizations," 2013
|
5 |
Joint Task Force Transformation Initiative, "NIST 800-53Ar4, Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans," 2014
|
6 |
Department of Homeland Security Integrated Task Force, "Executive Order 13636, Improving Critical Infrastructure Cybersecurity," 2013
|
7 |
NIST, "Framework for Improving Critical Infrastructure Cybersecurity, " 2014
|
8 |
Keun-hee Han, "Adaptation Policy of ISO 27001 ISMS (Information Security Management System) for e-Government," 2009
|
9 |
Kuk-Hie Lee, "Ex Ante Evaluation Methodology for IT Investment Decision Making: Integrating the Current Best Practice Methods and Applications," 2008
|
10 |
Michael E. Porter, "Competitive Advantage of Nationson," 1990
|
11 |
Sangmi Cho, "Rethinking Competencies of Social Enterprises as a Way to Create Shared Value : Policy Analyses from a Perspective of Competitive Advantage", 2014
|
12 |
Jongsung Won, "An Analysis of the Information Protection Industry of Korea and the U.S. Information Protection Industry," 2012
|
13 |
Jim Myun Park, "A Diamond Model Approach to the Analysis of Leadership: Case Studies on Chung, Ju-yung of Hyundai Group and Lee, Byung-chull of Samsung Group,", 2012
|
14 |
Fainshmidt, S, "National Competitiveness and Porter's Diamond Model : The Role of MNE Penetration and Governance Quality," 2016
|
15 |
Moon-Haeng Lee, "Production Environment Factors on Korean competitiveness of Korean Drama," 2006
|
16 |
Saaty T. L. "The Analytic Hierarchy Process," McGraw-Hill, New York, 1980.
|
17 |
Sang-Pil Shin, "An analytic hierarchy process (AHP) approach to selection of implementation mode of mobile office system," Seoul National University of Science and Technology, July. 2013.
|
18 |
Dongwook Kim, "A Study on Information Security Policy in the era of Smart Society," Seoul National University of Science of Public Administration, Aug. 2012.
|
19 |
Suk-Won Lee, "Decision Making Model for Selecting Financial Company Server Privilege Account Operations," Korea University of Information Security, Dec. 2015
|
20 |
Kihoon Sung, "A Study on Threat fators of Information Security in Social Network Service by Analytic Hierarchy Process," Journal of The Korea Institute of Information Security & Cryptology, v.20. no.6. pp.261-270, Dec. 2010
|