1 |
Osterman Research, "Best Practices for Implementing Security Awareness Training", Osterman Research, 2008.
|
2 |
Wan Soo, Lee, Chan Souk, Kim, Chong-Ryul, Park, "'Combination of 'Econ' and 'Nudge' : The Applicability of Concepts and Theories of Behavioral Economics in Communication Effect Researches", Korean Society For Journalism And Communication Studies, Vol. l, NO. 2, pp. 129-164, 2016.
|
3 |
Future Technology Research Center, "ECOsight 3.0: Future Technology Outlook", Electronics and Telecommunications Research Institute, 2015
|
4 |
Seung-min Lee, Geun-Hye Song, "Information security trends and security threat analysis", Electronics and Telecommunications Research Institute, 2017
|
5 |
Kim Eun Ji, Lee Joon Tai, "The Empirical Study on the Misuse Intention Using Information System : Focus on Healthcare Service Secto" Jouranl of Information and Security, Vol. 16, No. 5, pp. 23-31, 2016.
|
6 |
Kahneman, "Maps of bounded rationality: Psychology for behavioral economics", American Economic Review, Vol. 93, NO. 5, pp. 1449-1475, 2003.
DOI
|
7 |
Seon-gil Yun, 'Heuristics and Persuasion', Communication Books, 2015
|
8 |
Hang-Bae Chang, "An Exploratory Study of Industrial Security Studies for Science and Technologies Protection", The Korea navigation institute, Vol. 17, NO.1, pp. 123-131, 2013.
|
9 |
Mi-Hwa Kang, Tae-Sung Kim, "Research Trends in Information Security Economics: Focused on the Articles Presented at WEIS", Journal of The Korea Institute of Information Security & Cryptology, Vol. 25, NO. 6, pp. 1561-1570, 2015.
DOI
|
10 |
A. Gronlund, Editors, "State of the art in e-Gov Research-A survey", Proceeding of the 3rd International Conference of Electronic government, pp. 178-185, 2004.
|
11 |
A.V. Kozachok, M.V. Bochkov, E.V. Kochetkov, "Heuristic Malware Detection Mechanism Based on Executable Files Static Analysis", Proceeding of the 3rd International Conference of Information Technology and Nanotechnology, 2017.
|
12 |
J. Webter, R. T. Watson, "Analyzing the Past to Prepare for the Future : Writing a Literature Review, Management Information System Quarterly", Vol.26, No.2, pp.13-23, 2002.
|
13 |
Kunwoo Kim, Jungduk Kim, "An Analysis of Research Trends in Information Security Education", Journal of The Korea Institute of Information Security & Cryptology, VOL.26, NO.2, pp. 489-497, 2016.
DOI
|
14 |
Myeong-gyun Song, Jungduk Kim, "An analysis of literature review about information security culture: Setting a direction for future study", Journal of Security Engineering, Vol. 12, NO. 5, pp. 515-524, 2015.
DOI
|
15 |
Lee-Jin Lee, Doo-Ho Park, Chang-Hoon Lee, "Information Security : Phishing Detection Methodology Using Web Sites Heuristic", Korea Information Processing Society, Vol. 4, NO. 10, pp. 349-360, 2015.
|
16 |
Kyung-min Shim, Hoon-beom Hyun, Yong-tae Jeon, Hyun-sik Lee, "A Smishing Analysis and Correspondence method based on Heuristic", Korean Conference on Computers, pp. 1823-1825, 2015.
|
17 |
Kunwoo Kim, Jungduk Kim, "The Values and Strategies of Industrial Security in Digital Economy", Korean Journal of Industry Security, Vol.8, NO.1, pp. 61-74, 2018
|
18 |
Min Sik Kim, Jong In Lim, " The Best Model to Optimize Security Investments with Considering a Corelation of Response Techniques Against Each Threat", Jouranl of Information and Security, Vol. 16, NO. 05, 2016.
|
19 |
Jaewon Jun, Jung-hoon Le. Chae-ri Ki, "A Study on the influence of firm's Information Security Activities on the Information Security Compliance Intention of Employee", Jouranl of Information and Security, Vol.6, NO.7, pp. 51-59, 2016.
|