References
- Ahn, J. H., Park, J. H., Sung, K. M., and Lee, J. H., "Impacts of Punishment and Ethics Training on Information Security Compliance: Focus on the Moderating Role of Organizational Type," Information Systems Review, Vol. 12, No. 1, pp. 23-42, 2010.
- Albrechtsen, E., "A qualitative study of users' views on information security," Computers and Security, Vol. 26, No. 4, pp. 276-289, 2007. https://doi.org/10.1016/j.cose.2006.11.004
- Bae, Y. S. and Chang, H. B., "A Qualitative Research on ICT Policy Design for Small and Medium Business," The Journal of Society for e-Business Studies, Vol. 18, No. 1, pp. 57-70, 2013. https://doi.org/10.7838/jsebs.2013.18.1.057
- Cha, I. H., "Development of Personnel Security Management for Protection against threat," The Journal of The Korea Institute of Electronic Communication Sciences, Vol. 3, No. 4, pp. 221-232, 2008.
- Chang, H. B. and Kim, K. K., "Design of Inside Information Leakage Prevention System in Ubiquitous Computing Environment," Lecture Notes in Computer Science, Vol. 3483, pp. 128-137, 2005.
- Cho, M. K., Kim, S. C., Hwang, J. M., and Kim, S. C., "A Study on the Effect of Institutionalization of the Security Education: Survey of National R&D Projects," The Journal of Korean Association of Computer Education, Vol. 17, No. 2, pp. 21-29, 2014.
- Choi, J. H., "A Study on the Institutional Improvement Directions of Industrial Security Programs: Focused upon Policies and Practices in the U.S," Korea Security Science Association, Vol. 22, pp. 197-230, 2010.
- Choi, M. G., Jeong, J. H., and Kim, J. H., "A Study on the Effects of the Security Perceptions of Top Managers and the Education on the Business Performances," Asia Pacific Journal of Small Business, Vol. 36, No. 2, pp. 209-226, 2014.
- Choi, S. T. and Yu, H. C., "A Study on the Establishment of Industrial Security Education Programs in Korea," Korea Security Science Association, Vol. 25, pp. 185-208, 2010.
- Kang, J. G., Lim, J. H., Lee, H. J., and Chang, H. B., "A Study on Classification of Information Asset Considering Business Process Characteristics for Small IT Service Organization," The Journal of Society for e-Business Studies, Vol. 16, No. 4, pp. 97-108, 2011. https://doi.org/10.7838/jsebs.2011.16.4.097
- Kim, Y. H. and Chang, H. B., "Human centric security policy and management design for small and medium business," Security and Communication Networks, Vol. 7, No. 10, pp. 1622-1632, 2014.
- Kim, Y. H., Moon, J. W., Hwang, S. H. Chang, H. B., "A study on Method of Security Management in the ICT Outsourcing Environment," Review of Korea Institute of Information Security and Cryptology, Vol. 24, No. 1, pp. 23-31, 2014.
- Moon, H. J., "A study on the system and problems of educational training for developing competency of small & medium enterprise in Korea," Review of Korea Institute of Information Security and Cryptology, Vol. 19, No. 1, pp. 29-39, 2009.
- National Intelligence Service, "Industrial technology protection: trace for 5 years gone by," High Industrial Technology Trend, Vol. 9, pp. 8-145, 2008.
- No, M. S. and Lee, S. Y., "Explaining Industrial Security of SMEs in Korea: An Ordered Logit Analysis," The Journals of Korean Public Administration Review, Vol. 44, No. 3, pp. 239-259, 2014.
- Yoo, J. H. and Chang, H. B., "Public IT service strategy for social information security in the intelligence all-things environment," Electronic Commerce Research, Vol. 14, No. 3, pp. 293-319, 2014. https://doi.org/10.1007/s10660-014-9155-2
Cited by
- A Study on Design Direction of Industry-Centric Security Level Evaluation Model through Analysis of Security Management System vol.20, pp.4, 2015, https://doi.org/10.7838/jsebs.2015.20.4.177
- Security Knowledge Classification Framework for Future Intelligent Environment vol.20, pp.3, 2015, https://doi.org/10.7838/jsebs.2015.20.3.047
- The rating model of corporate information for economic security activities pp.1743-4645, 2019, https://doi.org/10.1057/s41284-019-00171-z
- 중소기업 기술 유출에 대한 조기경보시스템 개발에 대한 연구 vol.23, pp.1, 2017, https://doi.org/10.13088/jiis.2017.23.1.143
- The Effect of Security Awareness Training on the Use of Biometric Authentication: Focusing on the Protection Motivational Behaviors vol.27, pp.2, 2015, https://doi.org/10.21219/jitam.2020.27.2.001