References
- 삼성경제연구소, "스마트폰이 열어가는 미래," 2010.2.3.
- 이민혜, 이준기, "스마트워크 연구에 대한 고찰과 향후 연구 주제," 정보화정책 제18권 제2호 통권67호, pp. 72-84, 2011.
- 이형찬, 이정현, 손기욱, "스마트워크 보안 위협과 대책," 정보보호학회지, 제21권 제3호, pp. 12-21, 2011.
- 정명수, 이동범, 곽진, "스마트워크 보안위협 및 보안 요구사항 분석," 정보보호학회지, 제21권 제3호, pp. 55-63, 2011.
- 한국정보화진흥원, "기업을 위한 스마트워크 도입.운영 가이드라인," 2010.
- 황해수, 이기혁, "안전한 스마트워크 향상을 위한 Mobile Security 대응모델에 관한 연구," 정보보호학회지, 제21권 제3호, pp. 22-34, 2011.
- Alan Bryman, "Barriers to Integrating Quantitative and Qualitative Research," Journal of Mixed Methods Research, Vol. 1, No. 1, pp. 8-22, 2007. https://doi.org/10.1177/2345678906290531
- Benjamin Halpert, "Mobile device security, InfoSec-CD," '04: Proceedings of the 1st annual conference on Information security curriculum development, pp. 99-101, 2004.
- Claudio Marciano, "DO YOU FEAR TELEWORK?-Understanding the petrify effect," ICT4S 2013: Proceedings of the First International Conference on Information and Communication Technologies for Sustainability, pp. 265-270, 2013.
- Day, F. C. and Burbach, M. E., "Telework Considerations for Public Managers with Strategiesfor Increasing Utilization," Communications of the IBIMA, vol. 2011.
- Ernst and Young, "Risk at Home: Privacy and Security in Telecommuting," Ernst and Young, pp. 1-23, 2008.
- Furnell, S., "Securing the home worker. Network Security," 2006(11), pp. 6-12, 2006.
- Godlove, "Examination of the factors that influence teleworkers willingness to comply with information security guidelines," Information Security Journal : A Global Perspective, Vol. 21, No. 4, pp. 216-229, 2012. https://doi.org/10.1080/19393555.2012.668747
- Ian Paul, Five Big Security Threats for 2011, PCwolrd, 2011. http://www.pcworld .com/article/2217 80/five_big_security_ threats_for_2011 .html
- James, P., "Are existing security models suitable for teleworking?," The 9th Australian Information Security Management Conference, 2011.
- Johnson, R. Burke, Onwuegbuzie, Anthony J., & Turner, Lisa A., "Toward a Definition of Mixed Methods Research," Journal of Mixed Methods Research, Vol. 1, pp. 112-133, 2007. https://doi.org/10.1177/1558689806298224
- Joice, W., "Implementing Telework: The Technology Issue," Public Manager, Vol. 36, pp. 64-68, 2007.
- Karen Scarfone, Murugiah Souppaya, "User's Guide to Securing External Devices for Telework and Remote Access," NIST Special Publication 800-114, NIST, 2007.
- Kent, K., Hoffman, P., and Souppaya, M., "Guide to enterprise telework and remote access security (draft)," U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009.
- Krueger, Richard A., "Focus Groups: A Practical Guide for Applied Research," Thousand Oaks, Calif: Sage Publications, 1994.
- Kitzinger, Jenny., "The Importance of Interaction between Research Participants," Sociology of Health and Illness, Vol. 16, No. 1, pp. 103-121, 1994. https://doi.org/10.1111/1467-9566.ep11347023
- Microsoft, "Telework Planning Considerations : A Risk-based Approach for it Managers," A Microsoft U.S. government white paper, 2011.
- Morgan, David L., "Paradigms Lost and Pragmatism Regained: Methodological Implications of Combining Qualitative and Quantitative Methods," Journal of Mixed Methods Research, Vol. 1, No. 1, pp. 48-76, 2007. https://doi.org/10.1177/2345678906292462
- Morrow, B., "BYOD security challenges: control and protect your most sensitive data," Network Security. Dec2012, Vol. 2012 Issue 12, pp. 5-8, 2012.
- Patricia Mayer Milligan, Donna Hutcheson, "Business Risks and Security Assessment for Mobile Devices," Proceedings of the 8th WSEAS Int. Conference on Mathematics and Computers in Business and Economics, pp. 189-193, 2007.
- Paul Turpin, "Securing Telecommuters : Possible threats and Solutions," Global Information Assurance Certification Paper, 2004.
- Peacey, A.,"eleworkers - extending security beyond the office," Network Security Journal, Vol. 2006, no. 11, pp. 14-16, 2006.
- Peltier, T. R., "Remote Access Security Issue," Information Systems Security, Vol. 10, No. 6, pp.31-36, 2013.
- Pyöriä, P., "Managing telework: risks, fears and rules," Management Research Review, Vol. 34, No. 4, pp. 386-399, 2011. https://doi.org/10.1108/01409171111117843
- Ruth, S., "The Dark Side of Telecommuting - Is a Tipping Point Approaching? GMU School of Public Policy Research Paper No. 2012-02, 2011.
- Sale, Joanna E. M., Lohfeld, Lynne H., & Brazil, Kevin, "Revisiting the Quantitative-Qualitative Debate: Implications for Mixed-Methods Research," Quality & Quantity, Vol. 36, pp. 43-53, 2002. https://doi.org/10.1023/A:1014301607592
- Saint-Germain, Michelle A., Bassford, Tamsen L. & Montano, Gail, "Surveys and Focus Groups in Health Research with Older Hispanic Women," Qualitative Health Research, Vol. 3, No. 3, pp.3 41-367, 1993. https://doi.org/10.1177/104973239300300306
- Scarfone, K., Hoffman, P. & Souppaya, M., "Guide to enterprise telework and remote access security: recommendations of the national institute of standards and technology," National Institute of Standards and Technology, 2009.
- Shedden, P., Scheepers, R., Smith, W. & Ahmad, A., "Incorporating a knowledge perspective into security risk assessments," The journal of information and knowledge management systems, Vol. 41 No. 2, pp. 152-166, 2011.
- Singleton, R. A., & Straits, B. C., "Approaches to social research (4th edition)," New York: Oxford University Press, 2005.
- Tashakkori, Abbas & Creswell, John W., "The New Era of Mixed Methods," Journal of Mixed Methods Research, Vol. 1, No. 1, pp. 3-7, 2007. https://doi.org/10.1177/2345678906293042
- Tim Godlove, Telework and Mobile Computing : Security Concerns and Risks, The security Journal, Vol. 30, pp. 5-11, 2010.
- Von Bergen C. W., "Safety and Workers' Compensation Considerations in Telework," Regional Business Review, vol. 27, 2009.
- William M. Fitzgerald, Ultan Neville, Simon N. Foley, "Automated Smartphone Security Configuration," Data Privacy Management and Autonomous Spontaneous Security Lecture Notes in Computer Science Volume 7731, pp. 227-242, 2013. https://doi.org/10.1007/978-3-642-35890-6_17
- Wolcott, Harry F., "Writing up Qualitative Research. Better," Qualitative Health Research, Vol. 12, No. 1, pp. 91-103, 2002. https://doi.org/10.1177/1049732302012001007
- Zhi Peng Shao, Shi Da Lu, Mu Chen, "Risk Analysis of Smart Terminals in Mobile Application of Power System and the Protection Solution Design," Applied Mechanics and Materials, Vol. 260-261, pp. 397-401, 2012. https://doi.org/10.4028/www.scientific.net/AMM.260-261.397
- Zernand, M., "The Risks and Management of Telework," EBS Review, Issue 16, pp. 101-104, 2003.
- Zimmerman, M., Haffey, J., Crane, E., Szumowski, D., Alvarez, F., Bhiromrut, P., Brache, V., Lubis, F., Salah, M., Shaaban, M., Shawky, B., & Sidi, I. P. S., "Assessing the Acceptability of Norplant Implants in Four Countries; Findings from Focus Group Research," Studies in Family Planning, Vol. 21, No. 2, pp. 92-103, 1990. https://doi.org/10.2307/1966670