1 |
Sohn Yu-Seung, Nam Kil-Hyun, and Goh Sung-Cheol, "On the administrative security approaches against spear phishing attacks", J. Korea Inst. Inf. Commun, Vol.17, No.12, pp. 2753-2762, 2013.
|
2 |
Yoon Duck-sang, Lee Kyung-ho, and Lim Jong-in, "A Study on the Change of Capability and Behavior against Phishing Attack by Continuous Practical Simulation Training," Vol.27, No.2, pp. 267-279, Apr. 2017.
DOI
|
3 |
Alejandra Diaz, Alan T. Sherman, and Anupam Joshi, "Phishing in an Academic Community: A Study of User Susceptibility and Behavior," cornel univ, arXiv:1811.06078, Nov. 2018.
|
4 |
S. Sheng, M. Holbrook, P. Kumaraguru, L.F. Cranor, and J. Downs, "Who Falls for Phish? A Demographic Analysis of Phishing Susceptibility and Effectiveness of Interventions," Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 373-382, Apr. 2010.
|
5 |
Jamshaid G. Mohebzada, Ahmed El Zarka, Arsalan H. Bhojani, and Ali Darwish, "Phishing in a university community: Two large scale phishing experiments," 2012 International Conference on Innovations in Information Technology (IIT), Mar. 2012.
|
6 |
Arun Vishwanath, Tejaswini Herath, Rui Chen, Jingguo Wang, and H.R. Rao "Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model," Decision Support Systems archive, Vol. 51, no.3, pp. 576-586, June, 2011.
DOI
|
7 |
KISA, "Cyber Security Issue Report 1Q", Apr. 2019.
|
8 |
Tom N. Jagatic, Nathaniel A. Johnson, Markus Jakobsson, and Filippo Menczer, "social phishing," Communications of the ACM, Vol. 50, No. 10, pp 94-100, Oct. 2007.
DOI
|
9 |
Jingguo Wang, Tejaswini Herath, Rui Chen, Arun Vishwanath, and H.R. Rao, "Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email," IEEE Transactions on Professional Communication, Vol.55, no.4, pp. 345-362, Aug. 2012.
DOI
|
10 |
NIS, government etc. "National Information security white paper", 2018.
|
11 |
NIS, "National Information Security Basic Guidelines", 2018.
|
12 |
Korea Communications Commission, "Information Networking Guide for Anti-Spam Protection," Sep. 2015.
|
13 |
Lee doyeon, "The Effect of Punishment and Training on Information Security Policy Compliance Behavior: The Empirical Analysis through Field Experiments," master dissertation, yonsei university, Dec. 2017.
|
14 |
proofpoint, "understanding email fraud," https://cdw-prod.adobecqms.net/content/dam/cdw/on-domain-cdw/brands/proofpoint/survey-of-understanding-email-fraud.pdf, Jan. 2018.
|
15 |
Ahnlab, "How to avoid persistent spear phishing!,"https://www.ahnlab.com/kr/site/securityinfo/secunews/secuNewsView.do?curPage=1&menu_dist=2&seq=21905&dir_group_dist=0,Dec. 2013.
|
16 |
Kim kyoungah, "The beginning of APT attack Knowing Spear Phishing," https://www.boannews.com/media/view.asp?idx=38916, Dec. 2013.
|
17 |
Moon gunwoong, "Relationship between information security activities of enterprise and infringe : the center of effects of information security awareness," master dissertation, korea university, Jun. 2017.
|
18 |
Burcu Bulgurcu, Hasan Cavusoglu, and Izak Benbasat "Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness," MIS Quarterly Vol.34 , no. 3, pp. 523-548, Sep. 2010.
DOI
|
19 |
Lim chaeho, " Effective information protection awareness plan", Journal of Information Security, 16(2), pp. 30-36, Apr. 2006.
|