최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기통상정보연구 = International commerce and information review, v.19 no.4, 2017년, pp.29 - 50
손원배 (한국 뉴욕 주립대학교) , 박문수 (한국 뉴욕 주립대학교)
In emerging technologies, innovation processes are dynamic in that the government needs to regularly review its policies to resonate with rapid technological advancements, changing public needs, and evolving global trends. In the 1990s, the Internet grew at an explosive rate, but many applications w...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
American Bar Association, Digital Signature Guidelines, 1996
Baek, Bongsam., Korean Internet Environment, 'PCMS'.'MobileGoogle'. Retrieved September 10, 2015.
Burr, William E., Dodson, Donna F., Newton, Elaine M., Perlner, Ray A., Polk, W. Timothy., Gupta, Sarbari, & Nabbus, Emad. A., Electronic Authentication Guideline. National Institute of Standards and Technology, 2011.
Cerna, Lucie, The Nature of Policy Change and Implementation: A Review of Different Theoretical Approaches, Organization for Economic Co-operation and Development, 2013.
Clinton, J. William., Administration of Export Controls on Encryption Products. Executive Order, 13026, 1996.
Chromium Blog (2013) Saying Goodbye to Our Old Friend NPAPI, Retrived from https://blog.chromium.org/2013/09/saying-goodbye-to-our-old-friend-npapi.html
Danielle, Kehl, Wilson, Andi, & Bankston, Kevin. (2015). Doomed To Repeat History? Retrieved from https://static.newamerica.org/attachments/3407-125/LessonsFromtheCryptoWarsofthe1990s.882d6156dc194187a5fa51b14d55234f.pdf
Department of Commerce. (2000, January 10). Revised U.S. Encryption Export Control Regulations.
Grassi, Paul A., Garcia, Michael. E., & Fenton, James. L., NIST 800-63-3: Digital Identity Guidelines. National Institute of Standards and Technology, 2017.
International Telecoms Union Telecommunication Standardization Sector. (1997). International TeleX. 509 : Information technology-Open Systems Interconnection-The Directory: Public-key and at tribute certificate frameworks Retreved from: https://www.itu.int/rec/T-REC-X.509
Johnson, Chalmers., MITI and the Japanese miracle: the growth of industrial policy, 1925-1975, Stanford University Press, 1982.
Kim, Tong-hyung. (2009, September 23). Korea Paying Price for Microsoft Monoculture. Retrieved from the Korean Times,: http://www.koreatimes.co.kr/www/news/biz/2010/05/123_52401.html
Lee, Junghyun, The usage and problem of the authorized certificate in smart environment, Internet & Security Focus, Korea Internet Security Agency, 2013.
Lee, Soo Hee, & Yoo, Taeyoung, "Government Policy and Trajectories of Radical Innovation in Dirigiste States: A Comparative Analysis of National Innovation Systems in France and Korea", Technology Analysis and Strategic Management, Vol. 19, No. 4, 2007, pp. 451-470.
Lopez, Javier, Oppliger, Rolf, & Pernul, Gunther, "Why have public key infrastructures failed so far?" Internet Research, Vol. 15, No. 5, 2005, pp.544-556.
Lui-Kwan, M. Kalama, "Recent Developments in Digital Signature Legislation and Electronic Commerce", Berkeley Technology Law Journal, Vol. 14, Iss. 1, 1999.
Mundy, Simon. (2014, June). South Korea suffers poor cyber security controls. Retrieved from https://www.ft.com/content/7ae2b288-e29a-11e3-a829-00144feabdc0
Muller, Milton, Rulling the root: Internet governance and the taming of cyberspace, The MIT Press, Cambridge, Massachusets London, England, 2002.
National Cyber Security Center; National Security Research Institute, ActiveX Control Development Security Guideline, 2008.
Organization for Economic Co-operation and Development, National Innovation System, 1997.
Organization for Economic Co-operation and Development, Electronic Commerce. Policy Brief, 2001.
Oh, Se-Jung, Networking between Academia, Public Research Institutes and Industry-Korean Experiences [PowerPoint slides], 2012.
Park, Hun Myoung, "The Web Accessibility Crisis of the Korea's Electronic Government: Fatal Consequences of the Digital Signature Law and Public Key Certificate", 45th Hawaii International Conference on System Sciences, 2012.
Park, Jihyun, Major issues and status on deregulation of the Authorized Certificate mandate in online transactions. Korea Financial Telecommunications & Clearings Institute. Korea Financial Telecommunications & Clearings Institute, 2010.
Park, Mun Su, & Lee, Ho-hyung, "A Study of Technical Support Policy for Innovative SMEs", International Commerce and Information Review, 14(1), 2012, pp.197-218.
Saenuri Party, Public commitment of Saenuri party for 18th presidential election, 2012.
Simmie, James, "Path Dependence and New Technological Path Creation in the Danish Wind Power Industry", European Planning Studies, Vol. 20, No. 5, 2012.
Son, Yeol, "Technolgy, Institutions, Path Dependence: A compartive Study of Venture Nurturing Policies in Korea and Japan", Korean Political Science Review, Vol. 40, No. 3, 2006, pp.237-261.
Statcounter.com. (2015). StatCounter Global Stats - Browser Market Share. Retrieved from Statcounter.: http://gs.statcounter.com/browser-market-share#monthly-201501-201501-map
Statistics Korea. (2016). The government Research and Development Budget, Retrieved from http://www.index.go.kr/potal/main/EachDtlPageDetail.do?idx_cd1330
United Nations Commission on International Trade Law, Model Law on Electronic Commerce with Guide to Enactment, 1996.
United States General Accounting Office, Information Security: Advances and Remaining Challenges to Adoption of Public Key Infrastructure Technology, 2001.
Verizon, 2016 Data Breach Investigations Report. Verizon
Yoon, Min-sik. (2013, July). Korea grapples with massive personal data theft, regulatory mess. Ret rieved from The Korea Harald: http://www.koreaherald.com/view.php?ud20130719000708
Winn, Jane K., US and EU Regulatory Competition and Authentication Standards in Electronic Commerce, 2006.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.