1 |
J. S. Park & J. C. Ha. (2012). Vulnerability Analysis of Security Document Management in Multi Function Peripheral and Its Countermeasure, Journal of Korean Institute of Information Technology, 10(6), 133-143.
|
2 |
K. S. Sung, D. Y. Oh, J. J. Kim, W. S. Na & H. S. Oh. (2008). Study on the Efficiency System Design for Minimize the Information Leak of the E-Document Store Service, The Journal of The Korean Institute of Communication Sciences, 33(10), 350-358.
|
3 |
B. H. Kang. (2018). 5 Topics for Education and Research in Business Ethics. Journal of Digital Convergence, 16(8), 137-150.
DOI
|
4 |
S. U. Kang & Y. S. Choi. (2014). Design of Open Collaboration Solution's Server for Smart Work. Journal of the Institute of Electronics and Information Engineers, 51(7). 133-141.
DOI
|
5 |
J. S. Kim & K. S. Han. (2016). The key technology factors of Smart work and the situations in Korea and overseas. The Korea Contents Association Review 14(1), 14-20.
DOI
|
6 |
S. E. Yoo & S. Y. Lee. (2013). An Analysis on Types of Smart Workplace and its Planning Strategies. Journal of Korea Design Knowledge, 25, 279-288.
DOI
|
7 |
S. H. Lee, H. J. Jun & T. S. Kim. (2018). A Study on Cyber Security Risk Management for Diffusion of Korean Smart Factories. The Journal of Korean Institute of Communications and Information Sciences, 43(10). 1741-1750.
DOI
|
8 |
B. I. Kang & S. J. Kim. (2014). Study on Security Grade Classification of Financial Company Documents, Journal of the Korea Institute of Information Security & Cryptology, 24(6), 1319-1328.
DOI
|
9 |
S. H. Paik, S. K. Kim & H. B. Park. (2010). Design and Implementation of Network Access Control for Security of Company Network, The Institute of Electronics Engineers of Korea - Telecommunications, 47(12), 90-96.
|
10 |
W. R. Jeon, J. Y. Kim, Y. S. Lee & D. H. Won. (2011). Analysis of Threats and Countermeasures on Mobile Smartphone, Journal of the Korea Society of Computer and Information, 16(2), 153-163.
DOI
|
11 |
Y. J. Lee, Y. H. Jang & S. C. Park (2016). Design and Implementation of App Control System for Improving the Security of the Mobile Application, Journal of The Korea Contents Association, 16(2), 243-250.
DOI
|
12 |
J. H. Lee, D. H. Lee & H. K. Kim. (2012). Decision Support System to Detect Unauthorized Access in Smart Work Environment. Journal of the Korea Institute of Information Security & Cryptology, 22(4), 797-808.
|
13 |
C. Kwan. (2015). Rethinking of Situational Context and Characteristic of Industrial Secrets Leakage: Some National Security and Psychological Perspectives. The Korean Journal of Forensic Psychology, 6(1), 1-11.
|
14 |
Google. (2018). Firebase Documentation. Firebase(Online). https://firebase.google.com/docs
|
15 |
Apache Cordova. (2018). Apache Cordova Documentation. Apache Cordova Documentation(Online). https://cordova.apache.org/docs/en/latest
|