참고문헌
- Myoung-Yong Um, Moon-Ki Rhee, Tae-Ung Kim, "Empirical Study on Internet Users' Information Privacy Concerns and Information Protection Behavior," J. of The Korean Association of Computer Education, Vol. 18, No. 1, pp. 69-79, Jan. 2016
- Kunwoo Kim, Jongduk Kim, "A study on effects of implementing information security governance by information security committee activities, " J. of The Korean Institute of Information Security & Cryptology, Vol. 25, No. 4, pp. 915-920, Aug. 2015 https://doi.org/10.13089/JKIISC.2015.25.4.915
- Dong-Keun Choi, Mi-Sun Song, Jong In Im, Kyung-Ho Lee, "Study the role of information security personnel have on an organization's information security level, " J. of The Korean Institute of Information Security & Cryptology, Vol. 25, No. 1, pp. 197-209, Feb. 2015 https://doi.org/10.13089/JKIISC.2015.25.1.197
- Byung-chul Kim, "The SME Informatization Level Analysis and Design for Privacy," J. of The Digital Convergence, Vol. 13, No. 2, pp. 121-126, Feb. 2016 https://doi.org/10.14400/JDC.2015.13.2.121
- Chang-Soo Moon, Sun-Hyung Kim, "A Study on Advanced Model for Personal Information Security Management," J. of KIIT, Vol. 13, No. 1, pp. 93-99, Jan. 2015
- Yeon-ho Jo, Yong-pil Lee, Jong-in Lim, Kyoung-ho Lee, "A Study on Policy for cost estimate of Security Sustainable Service in Information Security Solutions," J. of The Korean Institute of Information Security & Cryptology, Vol. 25, No. 4, pp. 905-914, Aug. 2015 https://doi.org/10.13089/JKIISC.2015.25.4.905
- Hyojik Lee, Onechul Na, Soyong Sung, Hangbae Chang," A Design on Security Governance Framework for Industry Convergence Environment," Journal of the Korea Convergence Society, Vol. 6, No. 4, pp. 33-40, Aug. 2015 https://doi.org/10.15207/JKCS.2015.6.4.033
- Yonghee Noh, Tae-Kyung Kim, "A Study on Developing Guidelines for Personal Information Protection in Library," J. of Korea Society for Information Management, Vol. 32, No. 2, pp. 21-61, Jun. 2015 https://doi.org/10.3743/KOSIM.2015.32.3.021
- Dal-mi Seo, Ki-Jong Cha, Yo-Soon Shin, Choong-Heui Jeong, Young-Mi Kim, "Assessment Method of Step-by-Step Cyber Security in the Software Development Life Cycle," Journal of The Korea Institute of Information Security & Cryptology, Vol. 25, No. 2, pp. 363-374, Apr. 2015 https://doi.org/10.13089/JKIISC.2015.25.2.363
- Dae-Ha Park, Sang-Nyeong Yoo, Heung-Youl Youm, "Development of Information System Operational Audit Checklist for Personal Information Protection in Public Organizations," Journal of Security Engineering, Vol. 12, No. 1, pp. 47-64, Feb. 2015 https://doi.org/10.14257/jse.2015.02.02