참고문헌
- McKinsey. (2015). THE INTERNET OF THINGS: MAPPING THE VALUE BEYOND THE HYPE. www.mckinsey.com/mgi
- A. R. Lee. S. M. Son, H. J. Kim & B. S. Kim. (2016. 8). Improving Personal Data Protection in IoT Environments. Journal of the Korea Institute of Information Security & Cryptology, 26(4), 995-1012. DOI : 10.13089/JKIISC.2016.26.4.995
- Y. J. Shin. (2018). A Study on Developing Policy Indicators of Personal Information Protection for Expanding Secure Internet of Things Service. Informatization Policy, 25(3), 29-51. DOI : 10.22693/NIAIP.2018.25.3.029
- D. J. Choi. (2019. 9. 18). Net generation IoTsecurity in 5G era. Weekly Technology Trend Institute of Information & Communications Technology Planning & Evaluation.
- Y. R. Lee & J. S. Kim. (2014). "Persona information protection framework in IoT environment." 2014 SpringSpring Conference Proceeding, The Korea Contents Association 277-278.9
- Y. R. Lee, S. M. Kang, S. K. Seo & H. S. Lim. (2016). A study on information security framework according to the introduction of defense IoT. Defense technology, 448, 98-107.
- S. H. Park & J. G. Park (2014. 10). A7ctivation plan with analysis on technology and market of IoT, 2014 Fall academic conference, Korea Technology Innovation Society, 85-91.
- S. P. Hong, H. M. Jang, K. J. Kim, H. R. Kim & S. M. Park. (2015). Research on personal information protection issues and policy suggestions in IoT environment. KISA.
- N. J. Park et al. (2016). A Research on IoT production security certification and security maintenance promotion. KISA.
- J. S. Lee. (2009). Public Administration Dictionary. DYM Book.
- T. L. Saaty. (1980). The analytic hierarchy process: planning, priorisetting, resource allocation. New York. McGraw-Hill International Book Company.
- N. H. Kang. (2015). IoT convergence service security requirements. The Journal of The Korean Institute of Communication Sciences, 32(12), 45-50.
- Korea Internet & Security Agency. (2019). Internet of Things (IoT) Security Test and Certification Standards Commentary.. KISA.
- Ministry of Science and ICT & Korea Internet & Security Agency. (2018). Information protection pre-inspection guide. Ministry of Science and ICT & KISA.
- IoT security alliance. (2016). IoT Common Security Guidelines. IoT security alliance.
- Korea Internet & Security Agency. (2007). RFID Personal Information Protection Guidelines. Korea Internet & Security Agency.
- H. K. Kong, H. K. Gu, H. W. Cho & J. S. Kang. (2015). Research on based security certification of IoT device. KISA.
- S. Li & L. Da Xu. (2017). Securing the internet of things. Acorn publishing Co.
- Finance Security Institute. (2016. 12. 12). IoT security threats and accidents. IoT Common Security Guide.
- Y. S. Jeong. (2017). Data Storage and Security Model for Mobile Healthcare Service based on IoT. Journal of Digital Convergence, 15(3), 187-193. DOI : 10.14400/JDC2017.15.3.187
- Ministry of Science and Technology Information and Communication, Ministry of Public Administration and Security.Korea, Korea Communications Commission, & Korea Internet & Security Agency. (2019). Information protection and personal information protection management system certification system guide.
- Ministry of Public Administration and Security & Korea Internet & Security Agency. (2017). Personal information protection level diagnosis manual. MOPAS & KISA.
- ISO. (2013). ISO/IEC 27001:2013(en): Information technology - Security techniques - Information security management systems - Requirements. https://www.iso.org/obp/ui/#iso:std:iso-iec:27001:ed-2:v1:en
- Ministry of Public Administration and Security & Korea Internet & Security Agency. (2018). Personal Information Impact Assessment Guide..MOPAS & KISA.
- Ministry of Public Administration and Security & Korea Internet & Security Agency. (2019). 2019 Personal information protection level diagnosis manual. in public agencies..MOPAS & KISA.
- S. H. Choi. DRESS is a software for AHP. http://blog.daum.net/_blog/BlogTypeView.do?blogid=0FE2P&articleno=11045124&_bloghome_menu=recenttext