1 |
Min-gyu, Park, "Design and implementation of mobile office security system using mobile device control function and location based information," Gachon University, Jul. 2013
|
2 |
Dae Hyung Lee, Seung Yeon Cho, and Hee-Woong Kim, "A study on the improvement of smart work satisfaction and productivity," 21(2), pp. 24-48, Jun. 2014
DOI
|
3 |
ITWorld, "Korea enterprise mobility market forecast 2016-2020," IDC Korea, 2015
|
4 |
Jae-Sung Lee and Heung-Sick Kim, "Study on smart work status and activation plan," Journal of Korean Association for Regional Information Society, 13(4), pp. 75-96, Jun. 2010
|
5 |
J. Shim, D. Mittleman, R. Welke, A. French, and J. Guo, "Bring Your Own Device (BYOD): current status, issues, and future directions," Proceeding of the Nineteenth Americas Conference on Information Systems, pp. 1-20, 2013
|
6 |
Dongwan Kang and Chaetae Imm, "A study on security requirement and response for corporate assets in BYOD environments," Korea Information Science Society, pp. 747-749, 2014
|
7 |
Keun-Young Lee, Tae-Hyoung Park, and Jong-In Lim, "A study on roles of CERT and ISAC for enhancing the security of smart mobile office," Korea Institute Of Information Security And Cryptology, 21(5), pp. 109-127, Oct. 2011
|
8 |
Jae-Ho Lee, Dong-Hoon Lee, and Huy Kang Kim, "Decision support system to detect unauthorized access in smart work environment," Korea Institute Of Information Security And Cryptology, 22(4), pp. 797-808, Aug. 2012
|
9 |
Young-Hee Kim and Kwang-Ho Kook, "A study on priority rankings of actions providing personal information security," Convergence Security Journal, vol. 14, no. 4, pp. 9-17, 2014
|
10 |
Hyun-mi Jang and Seng-Phil Hong, "A framework for personal information handler in smart device environment," Journal of Security Engineering, 11(1), pp. 13-24, Feb. 2014
DOI
|
11 |
J. Anderson and D. W. Gerbing, "Structure equation modelling in practive: A review and recommended two-step approach," Psychological Bulletin, vol. 103, no. 3, pp. 411-423, Aug. 1988
DOI
|
12 |
Z. Ahmed, H. Jamal, R. Mehboob, S. Khan, and M. Shahbaz, "Secure cognitive mobile hotspot," IEEE Transactions on Consumer Electronics, vol. 56, no. 2, pp. 606-612, May. 2010
DOI
|
13 |
Ji-Hyung Park and Gun-Kwon Shin, "Effects of smartphones usability on user's satisfaction and loyalty: Focusing on moderating effect of terms of use," Korean Journal of Business Administration, 25(2), pp. 811-831, Apr. 2012
|
14 |
S.Sharma, S.Durand, and M. Gur-Arie, "Identification and analysis of moderator variable," Journal of Marketing Research, vol. 18, no. 3, pp. 291-300, Aug. 1981
DOI
|
15 |
Song Ji-joon, "SPSS / AMOS statistical analysis method for writing paper," 21century-company, 2017
|