1 |
Choi, S. U., "Implementation of Nonparametric Statistics in the Non-Normal Process," Journal of the Korea Safety Management and Science, pp. 573-577, 2012.
|
2 |
Gibbons, J. D. and Chakraborti, S., Nonparametric Statistical Inference, 5 Edition, Chapman and Hall/CRC, 2010.
|
3 |
Implement the OECD 'Privacy Guidelines' in the Electronic Environment : Focus the internet 1998, .
|
4 |
Kim, J. Y., "Analyzing Effects on Firms' Market Value of Personal Information Security Breaches," The Journal of Society for e-Business Studies, Vol, 18, No. 1, pp. 1-12, 2013.
|
5 |
Kim, B. S., "The Legal Justice of Conferring Criminal Negligence on Chief Privacy Officers, Journal of the Korea Society of IT Services, Vol. 10, No. 4, pp. 21-32, 2011.
과학기술학회마을
DOI
|
6 |
Kim, D. K. and Kim, O. K., "A Study on the Development of Criteria and Priority Orders for Selecting Third Party Logistics Companies," Journal of the Korean Operations Research and Management Science Society, Vol. 20, No. 2, pp. 161-163, 2003.
|
7 |
Kim, J. D. and Hwang, S. H., "A Study on Critical Success Factors for Implementing Governance of Personal Information Protection," Journal of the Korea Institute of Information Security and Cryptology, Vol. 21, No. 5, pp. 97-203, 2011.
과학기술학회마을
|
8 |
Kim, S. G., "Analysis on Domestic and Foreign Privacy Information Acts to Suggest Directions for Developing Korean Privacy Information Protection Act," Journal of the Korea Institute of Information Security and Cryptology, Vol. 22. No. 5. pp. 1091-1102, 2012.
과학기술학회마을
|
9 |
Kim, Y. H. and Kook, K. H., "A Study on Priority Ranking of Actions Providing Personal Information Security," Convergence Security Journal, Vol, 14. No. 4, pp. 9-17, 2014.
|
10 |
Korea Communications Commission, National Information Society Agency, "15th hacking prevention workshop," National Information Society Agency, 2011.
|
11 |
LEE, C. H., "group decision making," sejongbooks, 2000.
|
12 |
Lee, P. J., "System of Personal Information Protection Act and The Related Laws," Journal of the Korean Review of Crisis and Emergency Management, Vol. 10, No. 1, pp. 81-103, 2014.
|
13 |
Mann, H. and Whitney, D., "On a Test of whether One of Two Random Variables Is Stochastically Larger than the Other," Ann. Math. Statist, Vol. 18, pp. 50-60, 1949.
|
14 |
Ministry of Security and Public Administration, "National Informatization Whith Paper," National Information Society Agency pp. 407-408, 2012.
|
15 |
Ministry of Security and Public Administration, "The terms of the Personal Information Protection Act personal information and infringement," Ministry of Security and Public Administration, pp. 18-53, 2010.
|
16 |
Saaty, T. L., "Decision Making with Dependenceand Feedback : The Analytic Network Process," Int. J. Services Sciences, Vol. 1, No. 1, pp. 83-98, 2008.
DOI
ScienceOn
|
17 |
National IT Industry Promotion Agency, Korea Internet Security Center, "IT industry 10 grand challenge," National IT Industry Promotion Agency, 2012.
|
18 |
Organization for Economic Cooperation and Development guidelines, Annex to the recommendation of the Council of Vol. 23, 1980, "Guidelines governing the protection of privacyand transborder flows of personal data."
|
19 |
Saaty, T. L., "The Analytic Hierarchy Process," New York : McGraw-Hill. International, 1980.
|
20 |
Saaty, T. L., "Decision making for leaders (AHP series, Vol. 2)," RWS, 1995.
|
21 |
Shin, Y. J., Jeong, H. C., and Kang, W. Y., "A Study of Priority for Policy Implement of Personal Information Security in Public Secto," Journal of the Korea Institute of Information Security and Cryptology, Vol. 22, No. 2, pp. 379-390, 2012.
|
22 |
So, W. Y., "A Study on the Operating Status of the Protection Organizations in Developed Countries," Korea Information Security Agency, 1998.
|
23 |
Wacks, R., Personal Information : Privacy and the Law, Oxford : Clarendon Place, 1989.
|
24 |
Ministry of Security and Public Administration, "Actions Providing Personal Information Security," Ministry of Security and Public Administration Notice No. 43, pp. 1-48, 2011.
|