1 |
H. C. Kim, “A Study on the Destruction of the Personal Information,” The Journal of Comparative Private Law, Vol. 21, No. 3, pp. 1109-1138, 2014.
|
2 |
D. J. Cho, "The development of IT technology and protection of personal information," KOREAN LEGAL CENTER, The Justice 158-1, pp. 49-58, 2017.
|
3 |
S. B. Kim and B. M. Chang, “Design and Implementation of Privacy Impact Assessment Information System,” Journal of Korean Institute of Information Technology, Vol. 13, No. 6, pp. 87-104, 2015. DOI : 10.14801/jkiit.2015.13.6.87
DOI
|
4 |
D. K. Lee and J. I. Lim, “Forecast System for Security Incidents,” Journal of The Institute of Electronics and Information Engineers, Vol. 53, No. 6, pp. 69-79, 2016. DOI : 10.5573/ieie.2016.53.6.069
DOI
|
5 |
S. H. Bae, J. S. Shin, S. H. Chun and H. S. Chung, “A Study on Improving the Privacy for personal information collected for statistical processing,” Journal of Convergence Society for SMB, Vol. 6, No. 2, pp. 25-30, Jun. 2016. DOI : 10.22156/cs4smb.2016.6.2.025
|
6 |
H. J. Mun, Y. C. Hwang and H. Y Kim, “Countermeasure for Prevention and Detection against Attacks to SMB Information System – A Survey,” Journal of Convergence Society for SMB, Vol. 5, No. 2, pp. 1-6, Jun. 2015.
|
7 |
H. T. Chae and S. J. Lee, “Security Policy Proposals through PC Security Solution Log Analysis,” Journal of the Korea Institute of Information Security and Cryptology, Vol. 24, No. 5, pp. 961-968, Oct. 2014. DOI : 10.13089/jkiisc.2014.24.5.961
DOI
|
8 |
S. K. Cho and M. S. Jun, “Privacy Leakage Monitoring System Design for Privacy Protection,” Journal of the Korea Institute of Information Security and Cryptology, Vol. 22, No. 1, pp. 99-106, Feb. 2012.
|
9 |
B. J. Jeon, D. B. Yoon and S. S. Shin, “Improved Integrated Monitoring System Design and Construction,” Journal of Convergence for Information Technology, Vol. 7, No. 1, pp. 25-33, Jan. 2017. DOI : 10.22156/cs4smb.2017.7.1.025
DOI
|
10 |
B. J. Jeon, D. B. Yoon and S. S. Shin, “Integrated Monitoring System using Log Data,” Journal of Convergence for Information Technology, Vol. 7, No. 1, pp. 35-42, Jan. 2017. DOI : 10,22156/CS4SMB.2017.7.1..035
DOI
|
11 |
M. S. Kim and D. W. Kang, "Information leakage prevention system design for small business," 2008.
|
12 |
J. Y. Lee and S. Y. Kang, “Design and Verification of the Integrated Log Analysis System for Enterprise Information Security,” Journal of Digital Contents Society, Vol. 9, No. 3, pp. 491-498, Sep. 2008.
|
13 |
K. S. Yu, S. H. Im and H. B. Kim, “Technology trend and development direction of integrated log management system,” Korea Institute Of Information Security And Cryptology, Vol. 23, No. 6, pp. 90-99, 2013.
|
14 |
B. G. Seo and D. H. Park, “Development on Early Warning System about Technology Leakage of Small and Medium Enterprises,” Journal of Intelligence and Information Systems, Vol. 23, No. 1, pp. 143-159, Mar. 2017.
DOI
|
15 |
S. J. Park and J. I. Llim, “A study on the development of SRI(Security Risk Indicator)-based monitoring system to prevent the leakage of personally identifiable information,” Journal of the Korea Institute of Information Security & Cryptology, Vol. 22, No. 3, pp. 637-644, Jun. 2012.
|