1 |
A. Aviram and A. Tor, "Overcoming impediments to information sharing," Alabama Law Review, 55, 231, 2004.
|
2 |
Boannews, "Truth and falsity of information sharing for malicious code and security vulnerability," 25 Apr. 2015.
|
3 |
Oh-jun Yoon, Chang-seob Cho, Jeong-keun Park, Hyung-jun Seo and Yong-tae Shin, "A study on the improvement model for invigorating cyber threat information sharing," Convergence Security Journal, 16(4), 25-34, 2016.
|
4 |
Ae-chan Kim and Dong-hoon Lee, "A study on the priority of requirements for establishing effective cyber-threat information sharing system," Review of Korea Institute of Information Security and Cryptology, 26(1), 61-67. 2016.
|
5 |
Hong-jong Jang, In-jae Park and Jung-hyun Lee, "A study on implementation of information sharing and analysis center for e-government," Proceeding of The 2001 Fall Conference of the Korea Information Processing Society, 2001.
|
6 |
Seong-hun Go, "A study on factors motivating cyber security information sharing for responding preemptively to cyber terror threat of national organizations," Doctoral Dissertation, Soongsil University, 2015.
|
7 |
You-joong Kwon, "Study on North Korea's cyber warfare capability and response strategy of South Korea," Master Dissertation, Korea University, 2014.
|
8 |
L. Dandurand and O.S. Serrano, "Towards improved cyber security information sharing," Proceedings of International Conference on Cyber Conflict, IEEE, 2013.
|
9 |
D. Tosh, S. Sengupta, C. Kamhoua, K. Kwiat and A. Martin, "An evolutionary game-theoretic framework for cyber-threat information sharing," Proceedings of IEEE International Conference on Communications, 2015.
|
10 |
Boannews, "Sharing Security Threat Information ISAC, What is the most urgent reason for the medical field?", 11 Sep. 2016.
|
11 |
Dong-wook Kim and Kun Yoon, "A study on information sharing: focusing on creative commons license," Journal of Koran Association for Regional information Society, 13(4), 53-74, 2010.
|
12 |
Duke-hoon Jeong and Hyoung-seop Shim, "A study on information sharing system for information application on the public institutions," Journal of Finance & Knowledge Studies, 3(1), 223-235, 2005.
|
13 |
Gu Kim, "A study on weights of intentions to share information among officials by AHP," Korean Society of Public Administration, 15(3), 207-228, 2004.
|
14 |
Sang-yun Han and Hyun-min Kang, "Enhancing information sharing activities in local government," The Korea Local Administration Review, 21(1), 97-122, 2007.
|
15 |
L. Caffrey, Information Sharing between & within Governments, The International Council for Technology in Government Administration, London, 1998.
|
16 |
S.S. Dawes and L. Prefontaine, "Understanding new models of collaboration for delivering government services," Communications of the ACM, 46(1), 40-42, 2003.
|
17 |
HelloT Advanced News, "Pay attention to the fourth industrial revolution platform, 'security'", 30 Sep. 2016.
|
18 |
Information Sharing Analysis Center, http://www.isac.or.kr/.
|
19 |
KISA(Korea Internet & Security Agency), "Conference on information sharing of cyber incidents," 2014.
|
20 |
KISA(Korea Internet & Security Agency), "Conference on information sharing of cyber incidents," 2015.
|
21 |
ISMS / PIMS / G-ISMS certification, http://isms.kisa.or.kr/.
|
22 |
Ministry of Science, ICT and Future Planning, Key Policies for Information Protection, 2016.
|
23 |
Jae-eun Lee and Gyum-hun Kim, "An analysis of the information sharing determinants in the NDMS," Modern Society and Administration, 17(1), 155-185, 2007.
|
24 |
J.R. Gil-Garcia, C. Schneider, T.A. Pardo and A.M. Cresswell, "Interorganizational information integration in the criminal justice enterprise: preliminary lessons from state and county initiatives," Proceedings of Hawaii International Conference on System Sciences, IEEE, 2005.
|
25 |
R.M. Grant, "Toward a knowledge-based theory of the firm," Strategic Management Review, 17(52), 109-122, 1996.
|
26 |
Cheol-u Lee, Proposal for Cyber Threat Information Sharing Act, 2015.
|
27 |
R-CISC, https://r-cisc.org/.
|
28 |
Ministry of Government Administration and Home Affairs, Understanding the Personal Information Protection Act: Focusing on What is Different from the Present, 2011.
|
29 |
National Council of ISACs, http://www.nationalisacs.org/.
|
30 |
US-CERT(AIS), http://www.us-cert.gov/ais/.
|
31 |
Telecom-ISAC Japan, https://www.telecom-isac.jp/.
|
32 |
IPA, Cyber Information Sharing Initiative (J-CSIP) FY 2012 Activity Report, 2013.
|
33 |
IPA, Cyber Information Sharing Initiative (J-CSIP) Operational Status [July-September 2016], 2016.
|
34 |
Jung-wook Moon, "Factors of success and failure of information sharing in the public sector: Focused on cognition survey of public officials," Korea Information Society Development Institute, 19(6), 1-17, 2007.
|
35 |
Eun-jeong Kim, "Analyzing the determining factors of electronic information sharing in korean government using the structural equation model," Korean Public Administration Review, 38(4), 125-145, 2004.
|
36 |
S. Ransbotham, S. Mitra and J. Ramsey, "Are markets for vulnerabilities effective?," MIS Quarterly, 36(1), 43-64, 2012.
|
37 |
NIST, Guide to Cyber Threat Information Sharing, 2014.
|
38 |
HSAC, Info-sharing Final Report, 2005.
|
39 |
Min-ho Kim, "A study on entrusting public service to private sector and privatization of public corporations," Korean Public Land Law Association, 25(1), 267-285, 2005.
|
40 |
W. Zhao and G. White, "Designing a formal model facilitating collaborative information sharing for community cyber security," Proceedings of Hawaii International Conference on System Sciences. IEEE, 2014.
|
41 |
ENISA(European Network and Information Security Agency), Cyber Security Information Sharing: An Overview of Regulatory and Non-regulatory Approaches," 2015.
|
42 |
I. Ajzen, "The theory of planned behavior," Organizational Behavior and Human Decision Processes, 50(2), 179-211, 1991.
DOI
|
43 |
MNE7(Multi-national Experiment 7), "Information sharing framework outcome 3," Cyber Domain Objective, 2013.
|
44 |
S. Li and B. Lin, "Accessing information sharing and information quality in supply chain management," Decision Support Systems, 42(3), 1641-1656, 2006.
DOI
|
45 |
R.E. Walton, Up and Running: Integrating Information Technology and the Organization, Boston, MA: Harvard Business School Press, 1989.
|
46 |
I. Ajzen, From Intentions to Actions: A theory of Planned Behavior, Berlin Heidelberg: Springer, 1985.
|
47 |
Byeong-seon Choi, "Government-led economic and social administration and administrative ethics," Korean Journal of Public Administration, 39(4), 81-111, 2001.
|
48 |
Etnews, "Cyber threat information 'Need to secure reliability''," 30 Nov. 2015.
|
49 |
W.W. Chin, "The partial least squares approach to structural equation modeling," Modern Methods for Business Research, 295(2), 295-336, 1998.
|
50 |
Pal-sul Kim, Kwan-soo Hong and Byoung-chan Lee, "Antecedents and relationship effectiveness of information sharing within supply chains," Journal of Business Research, 19(4), 273-307, 2004.
|
51 |
C. Fornell and D.F. Larcker, "Evaluating structural equation models with unobservable variables and measurement error," Journal of Marketing Research, 18(1), 39-50, 1981.
DOI
|
52 |
Jin-chun Lee, "Structural equation modelling for small samples: component- based SEM vs. covariance-based SEM," Journal of Decision Science, 16(1), 77-95, 2008.
|
53 |
D. Gefen, D.W. Straub and M.C. Boudreau, "Structural equation modeling and regression : Guidelines for research practice," Communications of the AIS, 4(7), 1-79, 2000.
|
54 |
C. Fornell and F.L. Bookstein, "Two structural equation models: LISREL and PLS applied to consumer exit-voice theory," Journal of Marketing Research, 19(4), 440-452, 1982.
DOI
|
55 |
D. Barclay, C. Higgins and R. Thompson, "The Partial Least Squares (PLS) approach to causal modeling: Personal computer adoption and use as an illustration," Technology Studies, 2(2), 285-309, 1995.
|
56 |
I.H. Bernstein and J.C. Nunnally, Psychometric Theory, New York: McGraw-Hill, 1994.
|
57 |
Seo-il Chae, Social Science Research Methodology, B&M Books, 2005.
|
58 |
ITWorld Korea, "CSO wants to share cyber threat information, but does not want law," 24 Sep. 2015.
|
59 |
W.W. Chin and A. Gopal, "Adoption intention in GSS: Relative importance of beliefs," ACM SigMIS Database, 26(2-3), 42-64, 1995.
DOI
|
60 |
R.F. Falk and N.B. Miller, A Primer for Soft Modeling, University of Akron Press, 1992.
|
61 |
G.W. Bock, R.W. Zmud, Y.G. Kim and J.N. Lee, "Behavioral intention formation in knowledge sharing: examining the roles of extrinsic motivators, social-psychological forces, and organizational climate," MIS Quarterly, 29(1), 87-111, 2005.
DOI
|
62 |
Tong-hee Park and Young-ran Hyun, "Sharing and utilization of knowledge and information among nonprofit organizations through public web portal: case study of culture portal of national knowledge information system," Modern Society and Administration, 21(3), 1-33, 2011.
|
63 |
D. Liu, Y. Ji and V. Mookerjee, "Knowledge sharing and investment decisions in information security," Decision Support Systems, 52(1), 95-107, 2011.
DOI
|
64 |
G.W. Bock and Y.G. Kim, "Breaking the myths of rewards: An exploratory study of attitudes about knowledge sharing," Proceedings of Pacific Asia Conference on Information Systems, 2001.
|
65 |
H.F. Lin, "Effects of extrinsic and intrinsic motivation on employee knowledge sharing intentions," Journal of Information Science, 33(2), 135-149, 2007.
DOI
|
66 |
S.S. Chen, Y.W. Chuang and P.Y. Chen, "Behavioral intention formation in knowledge sharing: examining the roles of KMS quality, KMS self-efficacy, and organizational climate," Knowledge-Based Systems, 31(1), 106-118, 2012.
DOI
|
67 |
H.F. Lin, "Knowledge sharing and firm innovation capability: an empirical study," International Journal of Manpower, 28(3/4), 315-332, 2007.
DOI
|
68 |
K.M. Bartol and A. Srivastava, "Encouraging knowledge sharing: The role of organizational reward systems," Journal of Leadership & Organizational Studies, 9(1), 64-76, 2002.
DOI
|
69 |
L.A. Gordon, M.P. Loeb and W. Lucyshyn, "Sharing information on computer systems security: An economic analysis," Journal of Accounting and Public Policy, 22(6), 461-485, 2003.
DOI
|
70 |
G.B. White and D.J. DiCenso, "Information sharing needs for national security," Proceedings of Hawaii International Conference on System Sciences, IEEE, 2005.
|
71 |
E. Gal-Or and A. Ghose, "The economic consequences of sharing security information," In Economics of Information Security, 95-104, Springer US, 2004.
|
72 |
E. Gal-Or and A. Ghose, "The economic incentives for sharing security information," Information Systems Research, 16(2), 186-208, 2005.
DOI
|
73 |
Chul-soo Lee, "National security system for countering information incidents," Review of Korea Institute of Information Security and Cryptology, 15(1), 33-40, 2005.
|
74 |
Dong-jin Kim and Sung-je Cho, "An analysis of domestic and foreign security vulnerability management systems based on a national vulnerability databases," Internet and Information Security, 1(2), 130-147, 2010.
|
75 |
Oh-jun Yoon, Kwang-yong Bae, Jae-hong Kim, Hyung-jun Seo and Yong-tae Shin, "A study on measures for strengthening cybersecurity through analysis of cyberattack response," Convergence Security Journal, 15(4), 71-78, 2015.
|
76 |
Sang-oh Kim and Sun-hee Youn, "A study on the effects of preceding factor of information sharing, information sharing and risk information sharing on supply chain performance," Journal of The Korean Production and Operations Management Society, 18(4), 117-146, 2007.
|
77 |
Jae-sun Wang and Jung-wook Moon, "The attitude on information sharing between public agencies: Focusing on the perception of civil servants in central government," Journal of Korean Association for Regional Information Society, 16(1), 1-34, 2013.
|
78 |
D.F. Vazquez, O.P. Acosta, C. Spirito, S. Brown, and E. Reid, "Conceptual framework for cyber defense information sharing within trust relationships," Proceedings of International Conference on Cyber Conflict, IEEE, 2012.
|
79 |
Boannews, "Just talk about a lot of information, why it is not working properly", 20 June 2016.
|
80 |
Dong-man Lee and Hyun-sun Park, "The effects of individual psychological and social motivation factors on information sharing intention through social media," The Journal of Internet Electronic Commerce Research, 11(2), 1-21, 2011.
DOI
|
81 |
Jang-gwen Song and Gwang-suk Kim, "The performance formation model through information sharing: The effect of asset specificity and information sharing on SCM(Supply Chain Management) performance," Journal of The Korean Production and Operations Management Society, 21(1), 101-121, 2010.
|
82 |
Moon-jung Kim and Gee-Hwan Kwon, "The effect of transactive memory system, knowledge sharing and knowledge application on performance," Korean Corporation Management Review, 63(1), 249-267, 2015.
|
83 |
M.H.M. Javadi, N.D. Zadeh, M. Zandi and J. Yavarian, "Effect of motivation and trust on knowledge sharing and effect of knowledge sharing on employee's performance," International Journal of Human Resource Studies, 2(1), 210-221. 2012.
DOI
|