1 |
Ki-Hyo Nam․Hyung-Suk Kang․Ji-Ho Gil․Sung-In Kim(2009). "Internal information leakage prevention (DLP) technology trends". Week Technology Trends. No. 1413.
|
2 |
Min-Sun No․Sam-Yeol Lee(2010). "Factors assessment of the security capabilities of the SME industry". Korea Public Administration Review. Vol44, No. 3.
|
3 |
Sung-Uk Park․Sang-Ho Lee(2008). "An Analysis on Information Security Industry in Korea : An Input-Output Analysis". Industrial Innovation. Vol24, No. 3.
|
4 |
Tae-Wan Park(1997). Information Systems Security Supervision. Korea Computerization Agency.
|
5 |
Min-Hyeong Lee(2013), A Study on the Developmental Activation Plan of Local Medium and Small Firms - Focussed on Industrial Security . Korea Local Government Studies, Vol.15, No. 2, pp141-159.
|
6 |
Sang-Jun Lee(2008). Assessing the accounting errors of the job relevance of skills. HoSeo University Graduate School.
|
7 |
Gu-Hun Jung(2011). "Effect of Information Security Management and Control Activities for Proprietary Information Leakage Prevention on Information Asset Protection Performance". Ph.D. Diissertation, KookMin University Business IT Graduate School.
|
8 |
Hae-Chul Jung․Hyun-Soo Kim(2000). "Relationship between consciousness and organization of information security and information security level of the organization". Journal of Information Technology Applications & Management. Vol7, No. 2.
|
9 |
Korea Information Society Development Institute(2008). National Informatization White Paper. Korea Information Society Development Institute.
|
10 |
MOPAS(2008). Privacy medium-term Master Plan. MOPAS.
|
11 |
New Daily News. 'Industrial espionage damage 年60 80% an inside job jo bomb technology delivered' Aug 25th, 2014.
|
12 |
Daily TR, 'Hyundai Kia's design leaked a bunch of drawings China'. July 22th, 2015
|
13 |
E-Daily. 'Group opposing nuclear power, nuclear power figures released ... "I sell in other countries," Cash requirements ". Aug 3th, 2015.
|
14 |
Ariss, S. S. (2002). Computer Monitoring: Benefits and Pitfalls Facing Management. Information & Management, Vol39, No.7, pp. 553-558.
DOI
|
15 |
Brian, E. B. (2005). Worldwide Outbound Content Compliance 2005-2009 Forecast and Analysis: IT Security Turns Inside Out. Internet Data Center(IDC).
|
16 |
Dan, Y. (2005). InfoWatch: A Multi-layered Approach for Information Leakage Detection and Prevention. Internet Data Center(IDC).
|
17 |
Forte, S. (2002). Vulnerability Management: One Problem, Several Potential Approaches. Network Security, Vol5, pp. 11-13.
|
18 |
Gerber, M., Solms, R., Overbeek, P. (2001). Formalizing Information Security Requirements. Information Management and Computer Security, Vol9, No.1, pp. 32-37.
DOI
|
19 |
Holmes, D. (2001). E-Gov: e-Business Strategy for Government. London: Nicholas Brealey Publishing.
|
20 |
Kevin, S. H. (2002). The Digital Security Debate: How to Manage Risk?, Secure Business Quarterly, First Quarter.
|
21 |
Post, G. & Kagan, A. (2000). Management Tradeoffs in Anti-virus Strategies. Information & Management, Vol37, No.1, pp. 13-24.
DOI
|
22 |
Raul, E. P. & Rich, M. (2006). Magic Quadrant for Content Monitoring and Filtering and Data Loss Prevention. Gartner RAS Core Research Note.
|
23 |
Solms, B. (1996). Information Security Management: The Second Generation. Computer and Security, Vol15, No.4, pp. 281-288.
DOI
|
24 |
Kwon, Y. T., Yoon, M. O., Choi, H. C., The Comparative Study on the Perception of Business Activities about Disaster Preparedness between Korea and Japan, Journal of The Korean Society of Disaster Information, Vol 9, No.4
|
25 |
Solms, B. (2001). Corporate Governance and Information Security. Computers and Security, Vol20, No.3, pp. 215-218.
DOI
|