1 |
NATIONAL CYBER SAFETY MANAGEMENT REGULATION. Presidential directive No. 316.
|
2 |
PUBLIC RECORDS MANAGEMENT ACT. Act No16661.
|
3 |
Vital Records Identification and Protection(v 1.0). NAK 2-2:2012(v 1.0).
|
4 |
Sim, Jae-yoon & Lee, Kyung-ho (2015). A study on information access control policy based on risk level of security incidents about it human resources in financial institutions. Journal of the Korea Institute of Information Security and Cryptology, 25(2), 343-361. http://dx.doi.org/10.13089/JKIISC.2015.25.2.343
DOI
|
5 |
Eom, Jung-ho, Park, Seon-ho, & Chung, Tai M. (2010). An architecture of access control model for preventing illegal information leakage by insider. Journal of the Korea Institute of Information Security and Cryptology, 20(5), 59-67.
DOI
|
6 |
Han, Seok-sil (2010). The study on the issues about qualitative research method. The Journal for the Study of Humans and Culture, 16, 5-44.
|
7 |
Im, To Bin (2009). Qualitative methodology: Approach and application. Journal of Governmental Studies, 15(1), 155-188.
|
8 |
Jang, Sang soo (2019). Introduction to information security. Seoul: baeumteo.
|
9 |
Kim, Eui-Tak, Choe, Yong-Rak, Kim, Gi-Hyeon, & Park, Jeong-Ho (1998). Access control technology trend. Review of KIISC, 8(4), 77-96.
|
10 |
Kim, Hyung-Joo & Kim, Soo-Heon (2017). A case study on the application of requirements standard of systems for government-affiliated organizations. Journal of the Korean Biblia Society for Library and Information Science, 28(2), 35-56. https://doi.org/10.14699/kbiblia.2017.28.2.035
DOI
|
11 |
Lee, Ju Young, Lee, Goo Yeon, & Kwon, Ho Yeol (2020). Insider information leakage detection method using scenario technique. Journal of Digital Contents Society, 21(3), 617-626. https://doi.org/10.9728/dcs.2020.21.3.617
DOI
|
12 |
Kim, Yong (2007). A study on functional design of electronic management system in records centers. Journal of Korean Society of Archives and Records Management, 7(1), 61-82. https://doi.org/10.14404/JKSARM.2007.7.1.061
DOI
|
13 |
Korean Society of Archival Studies (2008). Archival terms dictionary.
|
14 |
Lee, Jeong-eun & Youn, Eun-ha (2018). A study on the major characteristics of the revised ISO 15489 in 2016. The Korean Journal of Archival Studies, 57, 75-111. https://doi.org/10.20923/kjas.2018.57.075
DOI
|
15 |
Lee, So-Yeon & Kim, Ja-Kyoung (2004). An analysis of functional requirements for electronic records management systems: Based on the records management principles extracted from ISO 15489. Journal of the Korean Society for Information Management, 21(3), 227-250. https://doi.org/10.3743/KOSIM.2004.21.3.227
DOI
|
16 |
Oh, Jin-Kwan (2019). A study on record management system design model and functional requirements. Doctoral dissertation, Major of Records and Archival Information Management, Graduate School of Records, Archives & Information Science, Myongji University.
|
17 |
Son, Sung-Keun (2008). Analysis the issues and the present situation of the Korea government standard Records Management System. Master's thesis, Archival Science The Graduate School Seoul National University.
|
18 |
Park, Minyoung (2013). Evaluation of access control function of the standard records management system. The Korean Journal of Archival Studies, 38, 3-35. https://doi.org/10.20923/kjas.2013.38.003
DOI
|
19 |
Cheon, Kwon-Ju (2008). A study on application plan of access control requirements in ERMS Standard, The Korean Journal of Archival Studies, 18, 179-220. https://doi.org/10.20923/kjas.2008.18.179
DOI
|
20 |
Choi, Eun-Bok (2009). A lattice-based role graph security model ensuring confidentiality and integrity. Journal of the Korea Society of Computer and Information, 14(6), 91-98.
|
21 |
Yang, Seong-Hoon, Oh, Jung-Hyun, Lee, Kyoung Hyo, Im, Do-Yoen & Oh, Byeong-Kyun (2005). Role hierarchy access control model using permission inheritance. Proceedings of the Korean Information Science Society Conference, 32(2), 94-96.
|
22 |
ENFORCEMENT DECREE OF THE PUBLIC RECORDS MANAGEMENT ACT. Presidential Decree No30584.
|
23 |
Yong, Maroo (2016). Research on the access control to improve records management system. Master's thesis, Major of Records and Archival Information Management, Graduate School of Records, Archives & Information Science, Myongji University.
|
24 |
ACT ON PROMOTION OF INFORMATION AND COMMUNICATIONS NETWORK UTILIZATION AND INFORMATION PROTECTION, ETC.. Act No.17358.
|
25 |
ACT ON THE PROMOTION OF INFORMATION SECURITY INDUSTRY. Act No.17344.
|
26 |
FRAMEWORK ACT ON NATIONAL INFORMATIZATION. Act No.16749.
|
27 |
Functional Requirements of Records Management Systems(v1.3). NAK 6:2020(v1.3).
|
28 |
Functional Requirements of Systems with Records Management for Government-Affiliated Organizations, etc.(v1.1). NAK 20:2020(v1.1).
|
29 |
Information and documentation - Records management - Part 2: Guidelines KS X ISO TR 15489-2.
|
30 |
Information and documentation - Records management - Part 1: Concepts and principles. KS X ISO 15489-1.
|
31 |
Information technology - Security techniques - Code of practice for information security management KS X ISOIEC27002.
|
32 |
Information technology - Security techniques - Information security management systems - Requirements. KS X ISOIEC27001.
|
33 |
Metadata Standard for Records and Archives Management(v 2.1). NAK 8:2016(v 2.1).
|