References
- H. C. Kim, “A Study on the Destruction of the Personal Information,” The Journal of Comparative Private Law, Vol. 21, No. 3, pp. 1109-1138, 2014.
- D. J. Cho, "The development of IT technology and protection of personal information," KOREAN LEGAL CENTER, The Justice 158-1, pp. 49-58, 2017.
- S. B. Kim and B. M. Chang, “Design and Implementation of Privacy Impact Assessment Information System,” Journal of Korean Institute of Information Technology, Vol. 13, No. 6, pp. 87-104, 2015. DOI : 10.14801/jkiit.2015.13.6.87
- D. K. Lee and J. I. Lim, “Forecast System for Security Incidents,” Journal of The Institute of Electronics and Information Engineers, Vol. 53, No. 6, pp. 69-79, 2016. DOI : 10.5573/ieie.2016.53.6.069
- S. H. Bae, J. S. Shin, S. H. Chun and H. S. Chung, “A Study on Improving the Privacy for personal information collected for statistical processing,” Journal of Convergence Society for SMB, Vol. 6, No. 2, pp. 25-30, Jun. 2016. DOI : 10.22156/cs4smb.2016.6.2.025
- H. J. Mun, Y. C. Hwang and H. Y Kim, “Countermeasure for Prevention and Detection against Attacks to SMB Information System – A Survey,” Journal of Convergence Society for SMB, Vol. 5, No. 2, pp. 1-6, Jun. 2015.
- H. T. Chae and S. J. Lee, “Security Policy Proposals through PC Security Solution Log Analysis,” Journal of the Korea Institute of Information Security and Cryptology, Vol. 24, No. 5, pp. 961-968, Oct. 2014. DOI : 10.13089/jkiisc.2014.24.5.961
- S. K. Cho and M. S. Jun, “Privacy Leakage Monitoring System Design for Privacy Protection,” Journal of the Korea Institute of Information Security and Cryptology, Vol. 22, No. 1, pp. 99-106, Feb. 2012.
- B. J. Jeon, D. B. Yoon and S. S. Shin, “Improved Integrated Monitoring System Design and Construction,” Journal of Convergence for Information Technology, Vol. 7, No. 1, pp. 25-33, Jan. 2017. DOI : 10.22156/cs4smb.2017.7.1.025
- B. J. Jeon, D. B. Yoon and S. S. Shin, “Integrated Monitoring System using Log Data,” Journal of Convergence for Information Technology, Vol. 7, No. 1, pp. 35-42, Jan. 2017. DOI : 10,22156/CS4SMB.2017.7.1..035 https://doi.org/10.14801/jaitc.2017.7.2.35
- M. S. Kim and D. W. Kang, "Information leakage prevention system design for small business," 2008.
- J. Y. Lee and S. Y. Kang, “Design and Verification of the Integrated Log Analysis System for Enterprise Information Security,” Journal of Digital Contents Society, Vol. 9, No. 3, pp. 491-498, Sep. 2008.
- K. S. Yu, S. H. Im and H. B. Kim, “Technology trend and development direction of integrated log management system,” Korea Institute Of Information Security And Cryptology, Vol. 23, No. 6, pp. 90-99, 2013.
- B. G. Seo and D. H. Park, “Development on Early Warning System about Technology Leakage of Small and Medium Enterprises,” Journal of Intelligence and Information Systems, Vol. 23, No. 1, pp. 143-159, Mar. 2017. https://doi.org/10.13088/jiis.2017.23.1.143
- S. J. Park and J. I. Llim, “A study on the development of SRI(Security Risk Indicator)-based monitoring system to prevent the leakage of personally identifiable information,” Journal of the Korea Institute of Information Security & Cryptology, Vol. 22, No. 3, pp. 637-644, Jun. 2012.