1 |
Jooy-young Kim, Chan-Hyung Cho, and Jung-Hun Lee, You-Jin Lee, "2015 Survery on information security(business)," KISA, 34205, pp. 27-28, 30, Dec. 2015.
|
2 |
ISO(International Organization for Standardization)/IEC(International Electronical Commission), "ISO/IEC 27000:2009 - information security - Security techniques - information security management systems - overview and vocabulary," ISO/IEC, 2009.
|
3 |
CNSS(Committee on National Security System), "National information assurance (IA) glossary, CNSS instruction," 4009, Apr. 2010.
|
4 |
ISACA(Information Systeam Audit and Control Association), "Glossary of terms 2008," ISACA, p. 10, p. 25, p. 51, 2008.
|
5 |
Behrouz A. Forouzan, "Cryptography and network security," Mcgraw Hill Korea, 2, pp. 2-3, Dec. 2010.
|
6 |
Uh-han Kim, Jung-Sup Cho, and Kwan-Hee Hong, "Present condition of infringement accident of information technology and response system," Journal of The Korean Institute of Communications and Information Science, 21(9), pp. 38-47, Sep. 2004.
|
7 |
Chul-Soo Lee, "Information security auditing framework in industrial control system," Journal of the Korea Institute of Information Security & Cryptology, 18(1), pp. 139-148, Feb. 2008.
|
8 |
Jung-ho Lee, "Prevention of infringement of electronic finance and reinforcement for action," Journal of the Korea Institute of Information Security & Cryptology, 18(5), pp. 1-20, Oct. 2008.
|
9 |
Mean-Sun Noh and Sam-Youl Lee, "Explaining industrial security of SMEs in Korea: An Ordered Logit Analysis," Korean Public Administration Review, 44(3), pp. 239-259, Aug. 2010.
|
10 |
Hang-Bae Chang, "The design of information security management system for SMEs industry technique leakage prevention," Journal of Korea Multimedia Society. 13(1), pp. 111-121, Jan. 2010.
|
11 |
Pan-Am Choi, "The effects of corporate information protection activities on industrial secrets leakage prevention," Graduate School, Kyonggi University, Jun. 2012.
|
12 |
Sang-hyun Kim and Geuna Kim, "A firm's environmental determinants impacting the information security management and the moderating effects of regulatory influence," Korean Operations Research And Management Society, 37(3), pp. 79-94, Sep. 2012.
DOI
|
13 |
Il-soon Shin, Won-chang Jang and Heeyoung Park, "Information security investment and security breach: empirical study on the reverse causality," Journal of the Korea Institute of Information Security & Cryptology, 23(6), pp. 1207-1217, Dec. 2013.
DOI
|
14 |
Cho-Ho Lim, "Effective way of awareness-raising of information security," Journal of the Korea Institute of Information Security & Cryptology, 16(2), pp. 30-36, Apr. 2006.
|
15 |
Sung-Bae Cho, Do-Soon Kwon and Mi-Young Lee, "A study on the information security behavior of corporations using health belief model," Asia Pacific Journal of Small Business, 36(2), pp. 241-263, Jun. 2014.
|
16 |
Tae-Hyun Son, "The effects of corporate information security activities on the performance of information security and information management," Graduate School, Myongji University, Feb. 2015.
|
17 |
OhJ-un Yoon, Bok-Dong Han, Jeong-Keun Park, Hyung-Jun Seo and Yong-Tae Shin, "A study on models for strengthening infrastructure protection through analysis of cyber intrusions," Convergence security journal, 15(6), pp. 29-36, Oct. 2015.
|
18 |
Jong-ki Kim and Day-eon Kang, "The effects of security policies, security awareness and individual characteristics on password security effectiveness," Journal of the Korea Institute of Information Security & Cryptology, 18(4), pp. 123-133, Aug. 2008.
|
19 |
Choong-Hee Lee and Min-soo Shin, "A study about a relationship between internal & external motivation and security action and influence of security recognition," Journal of Korea society of management information system, pp. 437-442, Aug. 2010.
|
20 |
Min-Jung Baek and Seyung-Hee Sohn, "A study on the effect of information security awareness and behavior on the information security performance in small and medium sized organization," Asia Pacific Journal of Small Business, 33(2), pp. 113-132, Jun. 2011.
|
21 |
Myung-Hee Chang and Da-Yeon Kang, "Factors affecting the information security awareness and perceived information security risk of employees of port companies," Journal of Korean Navigation and Port Research, 36(3), pp. 261-271, Apr. 2012.
DOI
|
22 |
Von Solms, B, "Information security-the fourth wave," Computers & security, vol. 25, no. 3, pp. 165-168, Mar. 2006.
DOI
|
23 |
Young-su Son, "A study on the relationship between cognition of personal information protection and following protection activities," Sang Myung University, Feb. 2015.
|
24 |
Un-kyung Kwon, Han-sol Lee, Sang-mi Chae and Kyung-won Lyu, "An empirical study of relationship between information security education and information security incidents," Journal of Korea society management information system, pp. 342-348, Aug. 2016.
|
25 |
Sung-Uk Park and Sang-Ho Lee, "An analysis on information security industry in Korea," Study of industry innovation, 24(2), pp. 1-22, Sep. 2008.
|
26 |
Baron, R. M. and Kenny, D. A, "The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations," Journal of personality and social psychology, vol. 51, no. 6, p. 1173, Dec. 1986.
DOI
|
27 |
Fornell and Larcker, "Factor analysis and discriminant validity: a brief review of some practical issues," Aston Business School, May. 1981.
|
28 |
Il-soon Shin, "Effects and causality of measures for personal information : empirical studies on firm and individual behaviors and their implications," Journal of the Korea Institute of Information Security & Cryptology, 26(2), pp. 523-531, Mar. 2016.
DOI
|
29 |
Suk-Hun Shin, "Issues and tasks of exemplary damages and class action system," Korea economic research institute, p. 16, Oct. 2016.
|