1 |
Von Solms, S. H., "Information Security- The fourth wave, Computers and Security," Vol. 25, pp. 165-168, 2006.
DOI
ScienceOn
|
2 |
Martins, A. and Eloff, J. H. P., "Information Security Culture, In Security in the information society," Boston : Kluwer Academic Publishers, IFIP/SEC, pp. 203-214, 2002.
|
3 |
Oh, N. S., Han, Y. S., Eom, C. W. Oh, K. S., Lee, B. G., "Developing the Assessment Method for Information Security Level," Journal of the Society for e- Business Studies, Vol. 16, No. 2, pp. 159-169, 2011.
|
4 |
Lee, H. M., Lim, J. I., "A Study on the Development of Corporate Information Security Level Assessment Models," Korea Institute of Information Security and Cryptology, Vol. 18, No. 5, pp. 161-170, 2011.
|
5 |
Lee, Y. K., Kim, S. H., "A Development of Evaluation Indicators for Information Security by means of the Coincidence Analysis," Korea Society of IT Services, Vol. 7, No. 3, pp. 175-198, 2008.
|
6 |
Ko, M. H., Kong, H. K., Kim, T. S., "Using a Balanced Scorecard Framework to Evaluate Corporate Information Security Level," Telecommunication Review, Vol. 19, No. 6, pp. 925-935, 2009.
|
7 |
ISO/IEC 17799(BS 7799-1), "Information technology, Security techniques, Code of practice for information security," 2005.
|
8 |
Eloff, j. H. P. and Eloff, M., "Integrated Information Security Architecture," Computer Fraud and Security, pp. 10-16, 2005.
|
9 |
McCarthy, M. P. and Campbell, "Security Transformation," McGraw-Hill : New York, 2001.
|
10 |
Tudor, J. K., "Information Security Architec ture-An integrated approach to security in an organization," Boca Raton, FL : Auerbach, 2000.
|
11 |
KISA, MSIP, "Korea Information Security Management System Guideline(ISMS)," March, 2013.
|
12 |
NISTIR 7628, "Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security," sep. 2010.
|
13 |
Park, C. S., "Study on Security Considerations in the Cloud Computing," Journal of academia-industrial technology, Vol. 12, No. 3, pp. 1408-1416, 2011.
|
14 |
Shin, K. A., Lee. S. J., "Information Security Management System on Cloud Computing Service," Journal of The Korea Institute of Information Security and Cryptology, Vol. 22, No. 1, pp. 155-167, 2012.
과학기술학회마을
|
15 |
Jang, E. Y., Kim, H. J., Park, C. S., Kim, J. Y., Lee. J. I., "The study on a threat countermeasure of mobile Cloud services," Journal of The Korea Institute of Information Security and Cryptology, Vol. 21, No. 1, pp. 177-186, 2011.
과학기술학회마을
|
16 |
Noh, B. N., Choi, J. G., "Security Technology Research in Cloud Computing Environment," Journal of Security Engineering, Vol. 8, No. 3, pp. 371-383, 2011.
|
17 |
National Information Society Agency (NIA), "Big Data era opening a new future," 2013.
|
18 |
"CSA Big Data Working Group Releases Top 10 Big Data Security and Privacy Challenges Report," Cloud Security Alliance, 2012.
|
19 |
Da Veiga, J. H. P. Eloff, "An Information Security Governance Framework," Information Systems Management, Vol. 24, pp. 361-372, 2007.
DOI
ScienceOn
|
20 |
Saaty, T. L. and Luis, G. V., "Diagnosis with Dependent Symptoms : Bayes Theorem and the Analytic Hierarchy Process," Operations Research, Vol. 46, No. 4, pp. 491-502, 1998.
DOI
ScienceOn
|
21 |
Kim, H. S., "A Study on the Quantification of Information Security Level," The Korea Society of Management information Systems, Vol. 9, No. 4, pp. 182-201, 1999.
과학기술학회마을
DOI
|
22 |
SOPHOS, "New platform and Changing threats," Security Threat Report, 2013.
|