1 |
Lee, E. S., Lee, Z. K., and Cha, K. J., “The Experimental Research of Protection Behavior depends on Privacy Concern about Personal Information Protection on Privacy Policy for KakaoTalk Users,” Journal of The Korea Society of Computer and Information, Vol. 21, No. 2, pp. 135-151, 2016.
|
2 |
Lee, Y. J., Moon, S. H., and Kwon, C. O., “Standard Industry Classification in Surveying Related Fields,” Journal of the Korean Society of Cadastre, Vol. 22, No. 1, pp. 127-136, 2006.
|
3 |
Hwang, W. S. and Kim, S. M., "Safety Net of IoT age, Convergence Security," e-KIET Industry and Economic Information, Vol. 586, pp. 1-12, 2014.
|
4 |
Lim, C. H. and D. J. Joo, "Renewal of Korea Cyber Security and Security Industry," Journal of information and telecommunication facility engineering, No. 1, pp. 89-94, 2010.
|
5 |
Ministry of Trade, Industry and Energy, "Securing Knowledge Korea 2013," 2008.
|
6 |
Phillips, R. L. and Ormsby, R., “Industry classification schemes: An analysis and review,” Journal of Business & Finance Librarianship, Vol. 21, No. 1, pp. 1-25, 2016.
DOI
|
7 |
SICCOD(Standard Industrial Classification Code), [cited 2017 Aug], Available from: URL: https://siccode.com/en/pages/what-is-a-classification-system
|
8 |
Statistics Korea, "Korea Standard Industrial Classification 10th revised classification," 2017.
|
9 |
UNSD, "International Standard Industrial Classification of All Economic Activities Revision 4," United Nations Statics Division, 2008.
|
10 |
Ahn, J. S., Kim, H. T., Heo, M., and Lee, B. K., "A Study on the Classification of Geospatial Industry based on the Korea Standard Industry Classification," Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography, Vol. 29, No. 4, pp. 421-428, 2011.
DOI
|
11 |
ASIS, [cited 2017 Oct 31], Available from : URL: http://www.securitymanagementbuyersguide.com/BrowseDirectory.aspx#.
|
12 |
Booz et al., "Convergence of Enterprise Security Organization," ASIS, ISSA, ISACA, 2005.
|
13 |
Hwang, H. E., "Korea Standard Industrial Classification Commentary," Tax Concession Company, 2000.
|
14 |
Business Dictionary, [cited 2017 Oct 31]. Available from: URL: http://www.businessdictionary.com.
|
15 |
Cambridge Dictionary, [cited 2017 Oct 31]. Available from: URL: http://dictionary.cambridge.org.
|
16 |
DHS(The Department of Homeland Security), [cited 2017 Sep]. Available from : URL: http://homelandsecurityresearch.com/2016/11/global-homeland-security-publicsafety-industry-technologies-markets-2017-2022.
|
17 |
Korea Information Security Industry Association, "2017 Domestic Information Protection Industry Survey questionnaire," 2017.
|
18 |
Jeon, J. H., “A study on the classification systems of domestic security fields,” Journal of The Korea Society of Computer and Information, Vol. 20, No. 3, pp. 81-88, 2015.
DOI
|
19 |
Kim, J. E., Ko, S. W., Jeong, S. Y., Kim, M. S., and Jeong, H. J., "A Study on the Improvement of Korea Standard Industry Classification System and IT Industry Classification System," Information and Communication Policy Institute, 2006.
|
20 |
Kim, J. Y., “Analysis of Loss Expectancy on Personal Information Leakage using Quantitative Invest Decision Model,” The Journal of Society for e-Business Studies, Vol. 20, No. 3, pp. 93-106, 2015.
DOI
|
21 |
Korea Institute of S&T Evaluation and Planning, "Improvement of national science and technology standard classification system in 2015," 2015.
|
22 |
Lee, C. M., "Critical Review of Industrial Security Concepts," Korean Security Science Review, Vol. 50, pp. 295-303, 2017.
|