참고문헌
- K. Lee. (2009). Increased Internet privacy violation. The Science Times, https://www.sciencetimes.co.kr
- G. B. Kwon, H. J. Lee & I. Kim. (2018). The Study on Legislation Process of GDPR(General Data Protection Regulation) and Subsequent Trend in EU System, Studies on American Constitution, 29(1), 1-38.
- T. Oh & J. Yu. (2011). Change of privacy concept in social network service (SNS) environment, KISDI, 23(4), 26-42.
- J. L. Yu. (2011). Personal Information Protection in Digital Era - Reviewing Personal information protection Act, Journal of Digital Convergence, 9(6), 81-90. UCI : G704-002010.2011.9.6.022 https://doi.org/10.14400/JDPM.2011.9.6.081
- K. Lee. (2014). Privacy Protection in the Big Data Age, Company Ethics Briefs, 11, 1-26.
- M. Park. (2018). GDPR, Microsoft's commitment to privacy and customer data management, Microsoft, https://news.microsoft.com/ko-kr
- Y. Jung. (2001). Review of the Theory of Privacy in Modern Constitutional Law, Journal of Cybercommunication Academic Society, 7, 214-267.
- S. D. Warren & L. D. Brandeis (1890). The right to privacy, Harvard Law Review, 4(5), 193-220. https://doi.org/10.2307/1321160
- A. F. Westin. (1967). Privacy and Freedom, Atheneum. York: Ig Publishing.
- E. J. Bloustein. (1964). Privacy as an Aspect of Human Dignity: An answer to Dean Prosser, New York University Law Review, 39, 962-1007.
- Y. H. Son. (2014). The Protection of Personal Information in the Era of Big Data, Business Law Review, 28(3), 355-393. UCI : G704-001299.2014.28.3.003
- G. Moon. (2019). Survive the privacy of the Internet, Security News, https://www.boannews.com
- S. Sung. (2004). Cyber space and privacy, KISDI.
- Supreme Court. (1998.7.24.). Sentence, 96Na42789 Judgement.
- T. M. Cooley. (1888). A Treatise on the Law of Torts or the Wrongs Which Arise Independently of Contract, Chicago : Callaghan and Company.
- K. Cho. (2005). Statutory Development of Privacy in the United States, Sungkyunkwan Law Review, 17(3), 75-113. UCI : G704-001437.2005.17.3.013
- A. Westin. (1970). Privacy and Freedom. (first edition 1967). Atheneum, New York.
- J. Kim & S. Kim. (2015). A Study on Privacy Paradox from the Behavioral Economics Perspective, Informatization Policy, 22(3), 16-35. DOI : 10.22693/NIAIP.2015.22.3.016
- J. B. Young. (1978). Privacy. Wiley, Chichester, UK, Cambridge University. DOI : https://doi.org/10.1017/S0047279400009223
- I. S. Ham. (2016). The Enactment of 2016 General Data Protection Regulation(GDPR) in the EU and its Implications, Chonnam Law Review, 36(3), 411-453. UCI : G704-002100.2016.36.3.018
- ITWorld. (2018). Chinese data confidentiality protection law came into effect similar to China's GDPR in May, http://www.itworld.co.kr
- M. Cho & H. Lee. (2017). Improvement Issues of Personal Information Protection Laws through Meta-Analysis, Journal of Digital Convergence, 15(9), 1-14. DOI : https://doi.org/10.14400/JDC.2017.15.9.1
- H. Jung. (2016). A Study on a Unique and Distinctive Culture(Law and Understanding) Regarding the Protections for Privacy in the U.S., Ilkam Law Review, 35, 277. DOI : 10.35148/ilsilr.2016..35.271
- B. C. Kim. (2014). A study on Utilization of Big Data Based on the Personal Information Protection Act, Journal of Digital Convergence, 12(12), 87-92. DOI : 10.14400/JDC.2014.12.12.87
- C. Chang. (2016). An Argument for Making Privacy a Working Constitutional Right - Referring to Daniel Solove's Pragmatic Theory -, Journal of Media Law, Ethics and Policy Research, 15(3), 1-30. UCI : G704-001997.2016.15.3.005
- C. W. Park & J. W. Kim. (2015). An Empirical Research on Information Privacy and Trust Model in the Convergence Era, Journal of Digital Convergence, 13(4), 219-225. DOI : http://dx.doi.org/10.14400/JDC.2015.13.4.219
- J. Kim & S. Kim. (2014). A Study on Privacy Paradox between Privacy Concern and Information Disclosure behavior: Focus on Privacy Calculus Theory, Entrue Journal of Information Technology, 13(3), 139-152. UCI : G704-001673.2014.13.3.007
- H. J. Smith, T. Dinev & H. Xu. (2011). Information privacy research: an interdisciplinary review. MIS Quarterly, 35(4), 989-1016. DOI : 10.2307/41409970
- I. Altman. (1975). The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding, Brooks/Cole Publishing Company, Monterey, California.
- S. Petronio. (2007). Translational research endeavors and the practices of communication privacy management. Journal of Applied Communication Research, 35(3), 218-222. DOI : https://doi.org/10.1080/00909880701422443
- W. Zhou & S. Piramuthu. (2015). Information Relevance Model of Customized Privacy for IoT. Journal of Business Ethics, 131(1), 19-30. DOI : 10.1007/s10551-014-2248-y
- A. Hotho, A. Nurnberger & G. Paass. (2005). A brief survey of text mining. In Ldv Forum, 20(1), 19-62.
- H. K. Kong & H. J. Jun & S. U. Yoon. (2018). A Study on the Privacy Policy of Behavioral Advertising, Journal of the Korea Convergence Society, 9(3), 231-240. https://doi.org/10.15207/JKCS.2018.9.3.231
- Y. S. Jeong. (2014). Tracking Analysis of User Privacy Damage using Smartphone, Journal of Convergence for Information Technology, 4(4), 13-18. https://doi.org/10.22156/CS4SMB.2014.4.4.013
- D. Lee. (2019). One year of GDPR implementation, a different change than expected, ITWorld, http://www.itworld.co.kr
- N. H. Sung, (2010). The Future of Digital Privacy. LG Economy Research Institute, http://www.lgeri.com/report/view.do?idx=16658
- K. A. Kim. (2018). A Rise on the Privacy Protection based on Secret Code : Focus on Homomorphic Encryption. Boannews, https://www.boannews.com/media/view.asp?idx=74664
- H. S. Lee. (2016). Personal Characteristics and Information Privacy Concerns. Asia-pacific Journal of Multimedia Service Convergent with Art, Humanities, and Sociology, 6(9), 267-276. http://dx.doi.org/10.14257/AJMAHS.2016.09.46
- J. W. Mun. (2013). Protection of Privacy : From myth to norm. A Policy Reports for the Improvement of Legal Protection System in Personal Information.