References
- Seung-hwan Kim, "Trend of personal healthdevice standardization for u-health service," Journal of KIISE Vol.29-1, pp.31-37, 2011.
- u-Health Forum Korea, "2009 u-Health Industry white paper," 2009.
- Don-sik Yoo, "Review & Scheme of u-Health Standardization," TTA 20th Anniversary Seminar, Sep. 2008.
- Chan-young Park, jun-ho Lim, Soo-jun Park and Seung-hwan Kim, "Technical trend of u-healthcare standardization," Electronics and Telecommunications Trends Vol. 25, pp. 48-59, Aug. 2010. https://doi.org/10.22648/ETRI.2010.J.250406
- Am-suk Oh, "A Study on Home Healthcare Convergence for IEEE 11073 Standard," JKIICE Vol.19 no. 2, pp. 422-427, Feb. 2015.
- Nathanael Paul, Tadayoshi Kohno and David C Klonfoo, "AReviewof the Security of Insulin Pump Infusion Systems," Journal of Diabetes Science and Technology, 5(6), pp. 1557-62, Nov. 2011. https://doi.org/10.1177/193229681100500632
- ISO/DIS 27799:2014(E), "Health informatics - Information security management in health using ISO/IEC 27002," ISO, Feb. 2015.
- ISO/IEC 27005:2011, "Information security risk management (second edition)," ISO, Dec. 2011.
- Kyoung-hee Baek and yun-hwa Jang, "A Legal Study on the Relationship between In-Person and Remote Medical Treatments," Seoul Law Review, Vol. 21, pp. 449-482, Feb. 2014 https://doi.org/10.15821/slr.2014.21.3.013
- Katherine Chretien, "For Medical Secrets, Try Facebook," Journal of the American Medical Association, vol 302, pp. 1309, Sep, 2009 https://doi.org/10.1001/jama.2009.1387
- Barnaby Jack, "Hacker Shows Off Lethal Attack By controlling Wireless Medical Device," RSA Conference, Feb. 2012
- http://fox6now.com/2013/02/14/froedte rt-hospital-hacked-patients-alerted-of- illegal-access/, "Froedtert Hospital hacked, patients alerted of illegal access," fox6now.com, Feb. 2013
- http://www.esecurityplanet.com/network-security/healthsource-of-ohio-data-breach-exposes-8800-patients-personal-info.html, "HealthSource of Ohio data leak exposed 8,800 patients information," eSecurity Planet, Mar. 2014
- http://www.wired.com/2014/06/hospital-networks-leaking-data/, "Hospital database hacked, patient info vulnerable," WIRED, Mar. 2014.
- Dong-won Kim, Keun-hee Han, In-seok Jeon and Jin-young Choi, "Telemedicine Security Risk Evaluation Using Attack Tree," Journal of The Korea Institute of Information Security & Cryptology Vol.25, No.4, pp.951-960, Aug. 2015. https://doi.org/10.13089/JKIISC.2015.25.4.951
- C. H. Lawshe, "A Quantitative approach to content validity," Personnel Psychology, Volume 28, Issue 4, pp. 563-575, Dec, 1975 https://doi.org/10.1111/j.1744-6570.1975.tb01393.x
- KOSF, The Foundation for the spread of the smart plant study on spontaneous composition, 2016
- NIST, "Guide for Mapping Types of Information and Information Systems to Security Categories," NIST SP800-60 vol. 1, Ayg. 2008.
- In-seok Jeon, Dong-won Kim, Keun-hee Han and Jin-young Choi, "Curriculum Development for Smart Factory Information Security Awareness Training," Journal of The Korea Institute of Information Security & Cryptology Vol.26, No.5, pp.1335-1348, Oct. 2016. https://doi.org/10.13089/JKIISC.2016.26.5.1335
- Young-seok Park, Yun-mok Son, Ho-cheol Shin, Doh-yun Kim and Yong-dae Kim, "This ain't your dose: Sensor Spoofing Attack on Medical Infusion Pump," usenix, WOOT'16 Proceedings of the 10th USENIX Conference on Offensive Technologies, Pages 189-199, Aug. 2016.
- NIST, "Building an Information Technology Security Awareness and Training Program," NIST SP800-50, Oct. 2003.
- NIST, "Information Technology Security Training Requirements:A Role- and Performance-Based Model," NIST SP800-16, Apr. 1998.
- 한국융합보안학회.융합보안논문지 제16권 제7호 (2016) pp.21-29 "의료클러스터 기반의 빅데이터환경에대한IP Spoofing 공격발생시상호협력보안 모델 설계" https://www.earticle.net/Article/A301561
- 한국융합보안학회.융합보안논문지 제14권 제3호 (2014) pp.11-19 "체내 이식형 의료기기의보안성 향상을 위한 3-Tier 보안 메커니즘 설계" https://www.earticle.net/Article/A224196
- 한국융합보안학회.융합보안논문지 제18권 제5호 (2018) pp.75-81 "의료융합 환경에서 수용성을 고려한 비용 효율적 보안체계구축 방안 연구 : 중소의료기관을 중심으로" https://www.earticle.net/Article/A346536