1 |
Y. Joung, "Legal Concept :Based on Analysis of Cases about Information Security," Public law journal, vol 14, no. 4, 2013, pp. 209-243.
|
2 |
J. Jeong and M. Choi, "A Study on Awareness of Information Security Influencing Trustness," Journal of the Korean Institute of Information Security and Cryptology, vol. 25, no. 5, 2015, pp. 1225-1233.
DOI
|
3 |
M. Lee, "A Development of Curriculum for Information Security Professional Manpower Training," Journal of the Institute of Electronics and Information Engineers, vol 54, no. 1, 2017, pp. 46-52.
DOI
|
4 |
K. Son, "Status and Prospects of IT Security Industry in Korea," Communications of the Korean Institute of Information Scientists and Engineers, vol 28, no. 11, 2010, pp. 72-78.
|
5 |
M. Yim, "Why Security Awareness Education is not Effective?," Journal of digital convergence, vol 12, no. 2, 2014, pp. 27-37.
DOI
|
6 |
S. Son, J. Park, and S. Moon, "A Study on Improvement Measures of Information Security Relevant Laws for IoT Service Providers," Institute of Law Studies College of Law and Political Science, Pusan National University, vol 57, no. 1, 2016, pp. 181-215.
|
7 |
S. Kim and Y. Song, "An Empirical Study on Motivational Factors Influencing Information Security Policy Compliance and Security Behavior of End-Users(Employees) in Organizations," Global e-Business Association, vol 12, no. 3, 2011, pp. 327-349.
|
8 |
J. Yun, "A Study on the Short Term Curriculum for Strengthening Information Security Capability in Public Sector," Journal of the Korean Institute of Information Security and Cryptology, vol 226 no. 3, 2016, pp. 769-776.
|
9 |
B. Cha, J. Kim ,and S. Park, "Prototype Design of Hornet Cloud using Virtual Honeypot Technique," Korea Institute of Electronic Communication Sciences, vol 10, no. 8, 2015, pp. 891-900.
DOI
|
10 |
J. Jang, C. Choi ,and D. Kim, "Design of Smart Tourism in Big Data," Korea Institute of Electronic Communication Sciences, vol 12, no. 4, 2017, pp. 637-644.
|