References
- Choi, Y. C. and Park, S. J., "Trend Analysis on Public Administration Research : Applications of Network Text Analysis methods," The Journal of Korea Public Administration, Vol. 45, No. 1, pp. 123-139, 2011.
- Jang, S. O. and Lim, J. I., "Developing key Performance Indicators for Financial IT Security," The Journal of Society for e-Business Studies, Vol. 18, No. 3, pp. 125-142, 2013. https://doi.org/10.7838/jsebs.2013.18.3.125
- Jeong, J. H. and Kim, D. W., "A research on the methods and target of privacy risk in smart social," Korea Journal of Local Information Society, Vol. 16, No. 3, pp. 113-136, 2013.
- Kim, A. C., Lee, S. M., and Lee, D. H., "Compliance Risk Assessment Measures of Financial Information Security using System Dynamics," IJSIA(International Journal of Security and Its Applications), Vol. 6, No. 4, pp. 191-200, 2012.
- Kim, K. C. and Kim, S. J., "Evaluation Criteria for Korean Smart Grid based on K-ISMS," Journal of The Korea Institute of Information Security and Cryptology, Vol. 22, No. 6, pp. 1375-1391, 2012.
- Kim, K. C., Heo, O., and Kim, S. J., "A Security Evaluation Criteria for Korean Cloud Computing Service," Journal of The Korea Institute of Information Security and Cryptology, Vol. 23, No. 2, pp. 251-265, 2013. https://doi.org/10.13089/JKIISC.2013.23.2.251
- Kim, Y. H., Yoon, J. R., Cho, H. S., and Kim, Y. J., "Structure of Collaboration Network among Korean Scientists-'Small World' and Position Effect," Korea Journal of Sociology, Vol. 41, No. 4, pp. 68-103, 2007.
- Lee, S. S., Network Analysis Methodology. Social Science Research Institute, Pusan National University Studies series, Vol. 2, Seoul, 2012.
- NIST, SP 800-53, Recommended Security Controls for Federal Information Systems, Oct 2003.
- Park, H. W. and Loet Leydesdorff., "Kr-Kwic for Korean content analysis and understanding of the applicable program," Journal of the Korean Data Analysis Society, Vol. 6, No. 5, pp. 1377-1387, 2004.
- Popping, R., Computer-assisted Text Analysis. London, Sage Publications, 2000.
- Shim, J. S. and Kim, J. S., "Understanding Conflict Frames about a Nuclear Power Plant : Focusing on the Effect of the Fukushima Nuclear Accident," The Journal of Korea Public Administration, Vol. 45, No. 3, pp. 173-202, 2011.
- TTA, TTAK.KO-12.0093, A Guide to Establishing Information Security Policies of Organization, Dec 2008.
- White, H. D., "Pathfinder networks and author cocitation analysis : A remapping of paradigmatic information scientists," Journal of the American Society for Information Science and Technology, Vol. 54, No. 5, pp. 423-434, 2003. https://doi.org/10.1002/asi.10228
- Wi, C. K., Kim, H. J., and Lee, S. J., "A Study on Detection Technique of Anomaly Signal for Financial Loan Fraud Based on Social Network Analysis," Journal of The Korea Institute of Information Security and Cryptology, Vol. 22, No. 4, pp. 851-868, 2012.
- Won, D. K. et al., Development and implementation of knowledge Map in academic social science research area, Korea Institute of Science and Technology Information Research Report, 2009.
- Wikipedia, "Power law," http://en.wikipedia.org/wiki/Power_law.
- Wikipedia, "NIACAP," http://en.wikipedia.org/wiki/NIACAP.
Cited by
- Padding Oracle Attack on Block Cipher with CBC|CBC-Double Mode of Operation using the BOZ-PAD vol.20, pp.1, 2015, https://doi.org/10.7838/jsebs.2015.20.1.089
- A Study on Design Direction of Industry-Centric Security Level Evaluation Model through Analysis of Security Management System vol.20, pp.4, 2015, https://doi.org/10.7838/jsebs.2015.20.4.177
- 소셜 네트워크 분석(SNA)을 이용한 실과(기술·가정)교육 분야 연구 동향 분석 vol.56, pp.6, 2018, https://doi.org/10.6115/fer.2018.043
- 소셜 네트워크 분석(SNA)을 이용한 실과(기술·가정)교육 분야 연구 동향 분석 vol.56, pp.6, 2018, https://doi.org/10.6115/fer.2018.043