1 |
Ahn, J. H., Choi, K. C., Sung, K. M., and Lee, J. H., "A Study on the Impact of Security Risk on the Usage of Knowledge Management System: Focus on Parameter of Trust," The Journal of Society for e-Business Studies, Vol. 15, No. 4, pp. 143-163, 2011.
|
2 |
Anderson, R. and Moore, T., "The economics of information security," Science, Vol. 314, No. 5799, pp. 610-613, 2006.
DOI
|
3 |
Andre, A., Fredrik, V., Giovanni, V., and Richard, A. K., Using hidden markov models to evaluate the risks of intrusions. In: Recent Advances in Intrusion Detection. Springer Berlin Heidelberg, pp. 145-164, 2006.
|
4 |
Bojanc, R. and Jerman-Blazic, B., "Quantitative Model for Economic Analyses of information Security investment in an Enterprise information System," Organizacija, Vol. 45, No. 6, pp. 276-288, 2012.
|
5 |
Bojanc, R., Jerman-Blazic, B., and Tekavcic, M., "Managing the Investment in Information Security Technology by use of Quantitative Modeling Approach," Information Processing & Management, Vol. 48, No. 6, pp. 1031-1052, 2012.
DOI
|
6 |
Chai, S. W., "Economic Effects of Personal Information Protection," Journal of consumer policy studies, pp. 43-64, 2008.
|
7 |
Chae, J. W. and Jeong, J. H., "Study on decision making for the industrial security management factor's priority," Journal of Security Engineering, Vol. 10, No. 2, pp. 123-140, 2013.
|
8 |
Gordon, L. A. and Loeb, M. P., "The economics of information security investment," ACM Transactions on Information and System Security (TISSEC), Vol. 5, No. 4, pp. 438-457, 2002.
DOI
|
9 |
Gordon, A. L. and Richardson, R.(April 13, 2004), "The New Economics of Information Security," Information Week, 53-56. Retrieved February 11th, 2007.
|
10 |
Han, C. H., Chai, S. W., Yoo, B. J., Ahn, D. H., and Park, C. H., "A Quantitative Assessment Model of Private Information Breach," The Journal of Society for e-Business Studies, Vol. 16, No. 4, pp. 17-31, 2011.
DOI
|
11 |
Kim, S. H. and Park, S. Y., "Influencing Factors for Compliance Intention of Information Security Policy," The Journal of Society for e-Business Studies, Vol. 16, No. 4, pp. 33-51, 2011.
DOI
|
12 |
Korea Internet & Security Agency, A handbook on ISMS certification system, Jun 2013.
|
13 |
Korea Internet & Security Agency, 2013 Research on the actual condition of the information security, Dec. 2013.
|
14 |
Lee, C. C., KIM, J., and Lee, C. H., "A comparative study on the priorities between perceived importance and investment of the areas for Information Security Management System," Journal of The Korea Institute of Information Security and Cryptology, Vol. 24, No. 5, pp. 919-929, 2014.
DOI
|
15 |
Mclean, G. and Brown, J., Determining the ROI in IT Security, CA Magazine, 2003.
|
16 |
Purser, S. A., "Improving the ROI of the security management process," Computers and Security, Vol. 23, No. 7, pp. 542-546, 2004.
DOI
|
17 |
Sklavos, N., Souras, P., "Economic Models & Approaches in Information Security for Computer Networks," IJ Network Security, Vol. 2, No. 1, pp. 14-20, 2006.
|