1 |
Korea Internet & Security Agency, "Threat information and security trend collector survey results," KISA cyber security issue report Q4 2020, Korea Internet & Security Agency, pp. 38-44, Dec. 2020.
|
2 |
A. Rutkowski, "Public international law of the international telecommunication instruments: cyber security treaty provisions since 1850," info, vol. 13 no. 1, pp. 13-31, Jan 2011.
DOI
|
3 |
L.A. Gordon, M.P. Loeb, and W. Lucyshyn. "Sharing information on computer systems security: An economic analysis," Journal of Accounting and Public Policy, vol. 22, no. 6, pp. 461-485, Dec. 2003.
DOI
|
4 |
M.D. Cavelty, Cyber-security and threat politics: US efforts to secure the information age, Routledge, Nov. 2009.
|
5 |
Ha-young Kim and Tae-sung Kim, "Factors to affect sharing cyber threat information in South Korea," Review of KIISC, 27(5), pp. 1167-1188, Oct. 2017.
|
6 |
T.L. Saaty, "Transport planning with multiple criteria: The analytic hierarchy process applications and progress review," Journal of Advanced Transportaion, vol. 29, no. 1, pp. 81-126, Apr. 1995.
DOI
|
7 |
Jin-kyu Kang and Byung-chan Min, Theory and practice of AHP, Inter-Vision, Oct. 2008.
|
8 |
Yong-sung Park, Decision Making by AHP, Kyowoo, Aug. 2009.
|
9 |
T.L. Saaty and K.P. Keams, Analytical Planning: The Organization of Systems. Pergamon Press, Inc., New York, p.32, Oct. 1985.
|
10 |
Sung-rok Kang, Mi-nam Moon, Kyu-yong Shin and Jong-kwan Lee, "A study on priority analysis of evaluation factors for cyber threats using open source intelligence (OSINT)," Convergence security journal, 20(1), pp. 49-57, Mar. 2020.
|
11 |
Byung-gil Min, Woo-geun Ahn, and Jung-taek Seo. "Vulnerability assessment by cybersecurity threat changes," Review of KIISC, 24(1), pp. 7-12, Feb. 2014.
|
12 |
W. Yoram, and T.L. Saaty. "Marketing applications of the analytic hierarchy process." Management Science, vol. 26, no. 7, pp. 641-658. Jul. 1980.
DOI
|
13 |
Hee-jung Cho, "3.4 DDoS attacks and network security," 31-9735032-0006 28-14, National Assembly Research Service, Mar. 2011.
|
14 |
Bodnara, "Cyber Threat Alliance (CTA), establishing official non-profit corporation, adding new members, and appointing the first new representative," https://www.bodnara.co.kr/bbs/article.html?num=138671, 2017. 02. 23.
|
15 |
Young-moon Kim and Su-won Chae, "The application of the analytical Hierarchy Process (AHP) to the travel destination choice," Journal of Tourism Sciences, 20(1), pp. 63-81, Jan. 1996.
|
16 |
Ae-chan Kim and Dong-Hoon Lee, "A study on the priorities of requirements for establishing effective cyber threat information sharing system," Review of KIISC, 26(1), pp. 61-67, Feb. 2016.
|
17 |
C. Johnson, L. Badger , D. Waltermire, J. Snyder and C. Skorupka, "Guide to cyber threat information sharing," NIST SP 800-150, National Institute of Standards and Technology, Oct. 2016.
|
18 |
Yu-mi Ko, Jae-won Choi and Beom-soo Kim, "Protecting individuals from secondary privacy loss using breached personal data information center," Review of KIISC, 22(2), pp. 391-400, Apr. 2012.
|
19 |
K. Hausken. "Information sharing among firms and cyber attacks," Journal of Accounting and Public Policy, vol 26, no. 6, pp. 639-688, Oct. 2007.
DOI
|
20 |
Ji-baek Park, Byung-hwan Choi and Hak-su Cho, "Measures to enable sharing of cyber threat information," The Journal of Korean Institute of Communication Sciences, 35(7), pp. 41-48, Jun. 2018.
|
21 |
KISA Internet Bohonara & KrCERT, "Cyber Threat Information Analysis Sharing (C-TAS) System," https://www.boho.or.kr/webprotect/ctas.do, 2021. 06. 13.
|
22 |
Korea Financial Telecommunications & Clearings Institute, "Korea Financial Information Sharing and Analysis Center," http://www.kftc.or.kr/kftc/business/EgovIsacInfo.do, 2021. 06. 13.
|
23 |
Jung-mihn Ahn, "Issues presented by cybersecurity information sharing act 2015," Yonsei Law Review, 28(4), pp. 259-282, Dec. 2018.
DOI
|
24 |
ITworld, "Spreading ransomware, serviceability is the main reason," http://www.itworld.co.kr/news/102463, 2016. 12. 07.
|
25 |
Joint Task Force Transformation Initiative Interagency Working Group, "Guide for conducting risk assessments," NIST SP 800-30 Rev. 1, National Institute of Standards and Technology, Sep. 2012.
|