1 |
김종기, 김기윤, 이경석, 김정덕, "정보시스템 재해에 대비한 업무 지속성 관리," 정보보호학회지, Vol. 11, No. 1, pp. 9-19, 2001.
과학기술학회마을
|
2 |
Anderson R., "Why Information Security is Hard - An Economic Perspective," 17th Annual Computer Security Applications Conference, Dec. 2001.
|
3 |
Brink, D., A Guide to Determining Return on Investment for e-security, RSA Security Inc. 2001.
|
4 |
Cavusoglu, H., Mishra, B. and Raghunathan, S., "A Model for Evaluating IT Security Investments", Communications of the ACM, Vol. 47, No. 7, pp. 87-92, July 2004.
DOI
ScienceOn
|
5 |
Fung, A.R.W., Farn K.J., and Lin, A.C., "A Study on the Certification of the Information Security Management Systems," Computer Standards and Interfaces, Vol. 25, No. 5, pp. 447-461, 2003.
DOI
|
6 |
Lee, S., Park, S., Cho, C., Lee, H. and Ryu, S., "The Wireless Broadband(WiBro) System for Broadband Wireless Internet Services," IEEE Communications Magazine, Vol. 44, No. 7, pp. 106-112, 2006.
|
7 |
Eloff, M. and Solms, S.H., "Information. Security Management, An Hierachical Framework for Various Approaches," Computers and Security, Vol. 19, No. 3, pp. 243-256, 2000.
DOI
|
8 |
알엔디비즈 편집부, "와이브로 시장동향 리포트," (주)알엔디비즈, p. 13,, 2006.
|
9 |
Gentile, F., Giuri, L., Guida, F., Montolivo, E., and Volpe, M., "Security Evaluation in Information Technology Standards," Computers and Security, Vol. 13, No. 8, pp. 647-650, 1994.
DOI
|