References
- Lee, H.J., The Legislation on the Personal Medical Information Protection Law. Korean Journal of Medicine and Law 2014. 22(1): p. 177-208. https://doi.org/10.17215/kaml.2014.06.22.1.177
- Jeong, G.W., Use and protection of medical information. Journal of Korea Association For Informedia Law, 2002. 6(1): p. 3-4.
- Jang, S.C., The Lgislation on the Protection of Medical Information. The Journal of Law, 2013. 24(2): p. 425-446.
- Jeong, B.G., Issues on the Patient's Information Protection. THE KOREAN SOCIETY OF LAW AND MEDICINE, 2008. 9(2): p. 339-382.
- Lee, H.J., The Legislation on the Personal Medical Information Protection Law. Korean Journal of Medicine and Law, 2014. 22(1): p. 177-208. https://doi.org/10.17215/kaml.2014.06.22.1.177
- Cho, H.S., Protection of Individual Medical Information in Risksociety. Hanyang law review, 2013. 24(4): p. 171-191.
- Park, J.H., Impact of Personal Health Information Security Awareness on Convenience. The Journal of the Korea Contents Association, 2017. 17(6): p. 600-612. https://doi.org/10.5392/JKCA.2017.17.06.600
- Baek, Y.C., Medical Service Information and Individual Information Protection in Korea. Constitutional Law, 2005. 11(1): p. 395-442.
- Care at a hospital medical institution Personal information protection. boannews, 2013. 6. 27.
- Jeong, H.J., Kim, N.H., A Study on the institution of a Personal Health Information Protection Law - With the focus on the Personal Information Control Right -. The Journal of Korea Association of Medical Law, 2008. 16(2): p. 99-121.
- Von Solms, B., Information security-the fourth wave. Computers & security, 2006. 25(3): p. 165-168. https://doi.org/10.1016/j.cose.2006.03.004
- Wei, H., Frincke, D., Carter, O., and Ritter, C., Cost-benefit analysis for network intrusion detection systems. CSI 28th Annual Computer Security Conference, October, Washington DC, USA,, 2001: p. 29-31.
- Aron, J.L., Gove, R. A., Azadegan, S., and Schneider, M. C., The Benefits of a Notification Process in Addressing the Worsening Computer Virus Problem : Results of a Survey and a Simulation Model. Computers and Security, 2001. 20(8): p. 693-714. https://doi.org/10.1016/S0167-4048(01)00812-4
- Dhillon, G.a.J.B., Information System Security Management in the New Millennium. Communications if the ACM, 2000. 43: p. 125-128. https://doi.org/10.1145/341852.341877
- Kim, H.N., In the era of personal information leakage, protection of personal medical information. Research Institute for Healthcare Policy Korea Medical Association, 2014. 12(1): p. 71-77.
- Confession to leave EMR unauthorized visit Seoul National Univ. Medical Today News, 2019.1.21.
- "Online Defamation Attendance" Medical Ransomware Red Alarm. MedicalTimes, 2019-02-26.
- GoodHue, D.L.a.D.W.S., Security Concerns if System Users: A Study of Perceptions of the Adequacy of Security Measures. Information & Management, 1991. 20: p. 13-27. https://doi.org/10.1016/0378-7206(91)90024-V
- Lim, C.H., Effective information protection awareness improvement plan. Journal of the Korea Institute of Information Security, 2006. 16(2): p. 30-36.
- Agency, K.I.S., 2017 Survey on Information Security Businiess. Korea Internet & Security Agency, 2017.
- Jung, Y.C., Lee, K.H., Lee, Y.R., A Study on Current Privacy Policies of Medical Institutes and Suggestions. Korea Institute for Health and Social Affairs, 2013. 29.
- Lee, C.S., Information security auditing framework in industrial control system. Journal of the Korea Institute of Information Security & Cryptology, 2008. 18(1): p. 139-148. https://doi.org/10.14801/jkiit.2020.18.3.139
- Moon, K.W., Kim, S.G., Relationship between Information Security Activities of Enterprise and Its Infringement : Mainly on the Effects of Information Security Awareness. Journal of the Korea Institute of Information Security & Cryptology, 2017. 27(4): p. 897-912. https://doi.org/10.13089/JKIISC.2017.27.4.897
- Chu, J.H., Wang, S.H., Cho, Y.W., Park, M., Lee, B.R., A Study on the Improvement of Legal System for Activation of Medical Information Industry. Korea Information Society Development Institute, 2003: p. 99-100.
- Ministry of Public Administration and Security, Notice No. 2017-1(2017.7.26).
- Amitava, D.a.K.M., Manangement's Role in Information Security in a Cyber Economy. California Management Review, 2002. 45: p. 67-87. https://doi.org/10.2307/41166154
- Choi, D.K., Song, M.S. , Im, J.I. , Lee, K.H., Study the role of information security personnel have on an organization's information security level. Journal of The Korea Institute of Information Security & Cryptology, 2015. 25(1): p. 197-209. https://doi.org/10.13089/JKIISC.2015.25.1.197
- Straub, D.W., Effective IS Security: An Empirical Study. Information Systems Research, 1990. 1: p. 255-276. https://doi.org/10.1287/isre.1.3.255
- Park, J.K., Kim, B.S., Cho, S.W. , Primary Factors Affecting Corporate Employees' Attitudes Toward Information Security. Korea Business Review, 2011. 40(4): p. 955-985.
- Yoo, J.H., Comparison of Information Security Controls by Leadership of Top Management. Journal of Korea Society of Electronic Commerce, 2014. 19(1): p. 63-78.
- Song, J.S., Jeon, M. J., and Choi, M. G., A Study on Factors Affecting the Level of Information Security Governance in Korea Government Institutions and Agencies. The Journal of Society for e-Business Studies, 2011. 16(1): p. 133-151.
- Joshi, K., The measurement of fairness or equity perceptions of management information systems users. MIS Quarterly, 1989. 13: p. 343-358. https://doi.org/10.2307/249010
- Choi, M.G., An Exploring Study on Relation Between Maturity Levels of Organizations and Factors Affecting Information Security Policy. Journal of Korean Academic Association of Business Administration, 2009. 22(3): p. 1729-1748.
-
Lee, G.G., [Future society hopes for technology]
We need social security strategy. Naeilnews, 2009.11.15.