1 |
Tae-Sung Kim, Min-Jeong Kim, and Jong-Ha Kim, "A study on fostering information security personnel through regular educational institution," Journal of The Korea Institute of Information Security & Cryptology, 14(4), pp. 78-91, Aug. 2004
|
2 |
Ryu Haneul, et al. "Implementation of Flexible Test Bed for Cyber Attack Prediction and Countermeasure," The Journal of Korean Institute of Communications and Information Sciences, 44(9), pp. 1723-1729, Sep. 2019
DOI
|
3 |
Seongjin Ahn and KyungSun Oh, "Domestic and Foreign Comparative Analysis of The Information Security Curriculum," In Proceedings of Korean Association of Computer Education, 17(2), pp. 15-20, Aug. 2013
|
4 |
Internet Trend Research, KISA Report, Feb. 2012
|
5 |
Lim, Wongyu, and Seongjin Ahn. "A Study on Improvements of the Information Security Department via the Curriculum Analysis," The Journal of Korean Association of Computer Education 17(6), pp. 71-80, Nov. 2014
DOI
|
6 |
Johnston, Allen C., and Merrill Warkentin. "Fear appeals and information security behaviors: An empirical study," MIS quarterly, vol. 34, no.3, pp. 549-566, Sep. 2010
DOI
|
7 |
Herath, Tejaswini, and H. Raghav Rao. "Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness," Decision Support Systems, vol. 47, no.2, pp. 154-165, May. 2009
DOI
|
8 |
Eun-ju Lee et al. "Development of Information Security Education Framework for Information Security Employees: A Case of Educational Institutions," The Journal of the Korea Contents Association 14(1), pp. 386-399, Jan. 2014
DOI
|
9 |
Nerantzi, Chrissi. "The use of peer instruction and flipped learning to support flexible blended learning during and after the COVID-19 Pandemic," International Journal of Management and Applied Research 7(2), pp. 184-195, vol. 7, no.2, July. 2020
DOI
|
10 |
Pemble, Matthew. "Balancing the security budget," Computer fraud & security, vol.10, pp. 8-11, Oct. 2003
DOI
|
11 |
Ogutcu, Gizem, Ozlem Muge Testik, and Oumout Chouseinoglou. "Analysis of personal information security behavior and awareness," Computers & Security, vol. 56, pp. 83-93, Feb. 2016
DOI
|
12 |
Yim, Myung-Seong. "Why Security Awareness Education is not Effective?," Journal of digital convergence, 12(2), pp. 27-37, Feb. 2014
DOI
|
13 |
Bulgurcu, Burcu, Hasan Cavusoglu, and Izak Benbasat. "Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness," MIS quarterly, vol. 34, no.3, pp, 523-548, Sep. 2010
DOI
|
14 |
Minjung Park and Sangmi Chai, "Internalization of information security policy and information security practice: A comparison with compliance," In Proceedings of the 51st Hawaii International Conference on System Sciences. pp. 4723-4731, Jan. 2018
|
15 |
Newhouse, William, et al. "National initiative for cybersecurity education (NICE) cybersecurity workforce framework," NIST special publication 800, pp. 181, Aug. 2017
|
16 |
Jung, Jinhyo, and Chang-Moo Lee. "An Analysis of Industrial Security Curriculums in Colleges," Journal of Society for e-Business Studies 24(2), pp. 29-53, May. 2020
|
17 |
Chul Kim, "Research on the development of information security curriculum in universities," Review of KIISC, 11(3), pp. 75-89, June. 2001
|
18 |
Safa, Nader Sohrabi, and Rossouw Von Solms. "An information security knowledge sharing model in organizations," Computers in Human Behavior, vol. 100, no.57, pp. 442-451, April, 2016
|
19 |
Kim, Min-Jeong, et al. "A Study on the Curriculum of Department of Information Security in Domestic Universities and Graduate Schools and Comparison with the Needs of Industry Knowledge." Journal of The Korea Institute of Information Security & Cryptology, 24(1), pp. 195-205, Feb. 2014
DOI
|
20 |
Ahn, Byunggoo, Harang Yu, and Hangbae Chang. "A Research on Activating Factor for Cultivating a Proactive Organizational Security Culture," Convergence Security Journal 20(2), pp. 3-13, June. 2020
|
21 |
Jung-Yoon Yum and Se Hoon Jeong, "Effect of privacy protection intervention effect targeting early teenagers: Focusing on parent-mediated intervention," Journal of Cybercommunication Academic Society, 36(2), pp. 43-80, June. 2019
DOI
|
22 |
Kim, Bo-ra, Jong-Won Lee, and Beom-Soo Kim. "Effect of Information Security Training and Services on Employees' Compliance to Security Policies," Informatization Policy, 25(1), pp. 99-114, Dec. 2018
DOI
|
23 |
Bahasoan, Awal Nopriyanto, et al. "Effectiveness of online learning in pandemic COVID-19," International journal of science, technology & management, vol. 1, no.2, pp. 100-106, July. 2020
DOI
|
24 |
Yang, Jeongmo. "A Study on Development of Standard Modeling Education Program in Information Security: Focusing on Domestic University Cases." Convergence Security Journal, 18(5_1), pp. 99-104, Dec. 2018
|
25 |
Hina, Sadaf, and P. Dhanapal Durai Dominic. "Information security policies' compliance: a perspective for higher education institutions," Journal of Computer Information Systems. vol. 60, no.3, pp. 1-18, Mar. 2018
|
26 |
Best of Best (BoB), "BoB" https://www.kitribob.kr/learn/curriculum, Accessed: Aug. 2021. [Online].
|
27 |
Kim, Dong-woo, Seung-woan Chai, and Jae-cheol Ryou. "A Study on Domestic Information Security Education System," Journal of The Korea Institute of Information Security & Cryptology, 23(3), pp. 545-559, June. 2013
DOI
|
28 |
Yang, J. M., et al. "A study on analysis and development of education program in information security major." Journal of the Korea Institute of Information Security and Cryptology, 13(3), pp. 17-26, Feb. 2003
DOI
|
29 |
Minjung Park and Sangmi Chai, "Comparing the effects of two methods of education (online versus offline) and gender on information security behaviors," Asia Pacific Journal of Information Systems, vol. 30, no.2, pp. 308-327, June. 2020
DOI
|
30 |
Hwang, Gwo-Jen, Chiu-Lin Lai, and Siang-Yi Wang. "Seamless flipped learning: a mobile technology-enhanced flipped classroom with effective learning strategies," Journal of computers in education, vol. 2, no.4, pp. 449-473, Aug. 2015
DOI
|
31 |
Jae-yong Park, "An analysis on training curriculum for educating information security experts," Management & Information Systems Review 31(1), pp 149-165, Mar. 2012
DOI
|
32 |
Ki-Yoon Kim and Ken Surendran. "Information security management curriculum design: A joint industry and academic effort," Journal of Information Systems Education, vol. 13, no.3, pp. 227-237, Sep. 2002
|
33 |
K-shield, "K-shield" http://kshieldjr.org/hr/home?custom=&year=2021&lastLoginTime=&isCmpt=false, Accessed: Aug. 2021. [Online].
|
34 |
Seo, Hyun-Jeong, and Seong-Sik Kim. "The Effect on Information Communication Ethics of Experience Type Smart Learning Contents Application for High School Information Security Education," The Journal of Korean Association of Computer Education, 19(6), pp. 81-89, Nov. 2016
DOI
|
35 |
Liu, Taikang, and Yongmei Li. "Standard Study of Electromagnetic Information Leakage and Countermeasures," Electromagnetic Information Leakage and Countermeasure Technique. Springer, Singapore, pp. 217-230, May. 2019
|
36 |
Ministry of Science and Technology Information and Communication and National Information Society Agency, "2020 yearbook of Information Society Statistics," Mar. 2020
|
37 |
Park, Wonhyung, and Seongjin Ahn. "Enhancing education curriculum of cyber security based on NICE," KIPS Transactions on Computer and Communication Systems, 6(7), pp. 321-328, June. 2017
DOI
|
38 |
Kim, Choungbae. "An Analysis of Information Security Curriculum in Elementary School practical arts, Secondary School Informatics Teaching and Suggestions for Improvement," Journal of the Korea Society of Computer and Information, 25(10), pp. 69-75, Oct. 2020
DOI
|
39 |
Lee, Chi-Seok, and Yanghoon Kim. "An analysis of relationship between industry security education and capability: Case centric on insider leakage," Journal of Society for e-Business Studies 20(2), pp. 27-36, May. 2015
DOI
|
40 |
Khan, Navid Ali, Sarfraz Nawaz Brohi, and Noor Zaman. "Ten deadly cyber security threats amid COVID-19 pandemic," Dec. 2020
|