최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국재난정보학회논문집 = Journal of the Society of Disaster Information, v.17 no.2 = no.52, 2021년, pp.375 - 390
소병기 (Department of Disaster and Safety Management, Soongsil University) , 정종수 (Department of Disaster and Safety Management, Soongsil University)
Purpose: Most of cybersecurity breaches occur in SMEs. As the existing cybersecurity framework and certification system are mainly focused on financial and large companies, it is difficult for SMEs to utilize it due to lack of cybersecurity budget and manpower. So it is necessary to come up with mea...
AON (2016). Cyber, the Fast Moving Target. (http://www.aon.com/attachments/risk-services/cyber/2016-CaptiveCyber-Survey-Interactive.pdf)
Australian Small Business and Family Enterprise Ombudsman (2017) Cybersecurity: The Small Business Best Practice Guide (https://www.asbfeo.gov.au/sites/default/files/documents/ASBFEO-cyber-security-research-report.pdf)
Cho, S.-K., Jun, M.-S. (2012). "Privacy leakage monitoring system design for privacy protection." Journal of The Korea Institute of Information Security & Cryptology, Vol. 22, No. 1, pp. 99-106.
Deloitte (2017). Cybersecurity and the Role of Internal Audit.
Financial Services Commission (2019). Regulation of Supervision on Electronic Financial.
International Security Exhibition & Conference (2019). Exhibition items for participation in the International Security Exhibition(Cybersecurity Field). (https://www.seconexpo.com/2019/kor/exhibit/sub02.asp)
Jeong, Y.-C. (2018). "Finance industry and cybersecurity policy." Journal of Financial Regulation and Supervision, Vol. 5, No. 2, pp. 89-122.
Jung, H.-C. (2017). A Study on Security Technology for Enhancing Security of Small and Medium Enterprises by using Open Source. Master Thesis, Soongsil University.
Kim, H.-W., Lee, K.-S., Kim, S.-H. (2005). "Website security evaluation for electronic commerce." Joint Spring Conference between The Korean Operations Research and Management Science Society/Korean Institute of Industrial Engineers, Chungbuk University, pp. 340-347.
Kim, J.-H., Cho, J.-H. (2010). "Security threats in cyber environments." Journal of The Korea Institute of Information Security & Cryptology, Vol. 20, No. 4, pp. 11-20.
Kim, K.-C., Kim, S.-J. (2012). "Evaluation criteria for Korean smart grid based on K-ISMS." Journal of The Korea Institute of Information Security & Cryptology, Vol. 22, No. 6, pp. 1375-1391.
Kim, K.-R. (2019). A Study on the Cyber Risk Item Disclosure for Cyber Insurance Subsidiary. Master Thesis, Sangmyung University.
Kim, K.-Y. (1997). "Risk management and crisis management: Disaster recovery for information system." Journal of Risk Management, pp. 291-315.
Kim, S.-H. (2019). A Study on the Improvement of Vulnerability Checklist for Enhanced PC Security. Master Thesis, Konkuk University
Kim, S.-Y. (2009). Korea Financial Telecommunications & Clearings Institute, Payment, Clearance and Information Technology, Vol. 38, pp. 34-62.
Kinosita, E., Ooya, T. (Kwon, J.-H., Trans.) (2012) Strategic Decision Making Techniques, AHP. Cheongram Press, Seoul, Korea.
Korea Communications Commission & KISA (2010). Guide for Information Security Management System.
Korea Information Security Agency (2003). A Study on the Development of Certification System for Information Protection Management System.
Korea Internet & Security Agency (2012). Information Security Guide for Small and Medium IT Service Companies(III), Information Security management for working-level officials.
Korea Internet & Security Agency (2020). Small and Medium Business Information Protection Practice Guide(1/2, 2/2).
Korea Insurance Development Institute (2015). A Study on Introduction of Government Reinsurance System in Environment Impairment liability Insurance. Research & Service Report by Minister of Environment.
Lee, K.-H. (2017). "A study on ERM standardization and insurance linkage scheme to promote corporate risk management." The Journal of Risk Management, Vol. 28, No. 3, pp. 43-79.
Lee, K.-H., Yoon, J.-D. (2008). "A study on the measurement methods and cases of personal information leakage risk in private enterprises." Journal of The Korea Institute of Information Security & Cryptology, Vol. 18, No. 3, pp. 92-100.
Lee, K.-S. (2006). "The problem and policy alternatives for cyber security in the networking age." Journal of Korea Association for Regional Information Society, Vol. 9, No. 1, pp. 109-128.
Min, B.-G., Lee, D.-H. (2006). "Research of improvement and system of the information security management evaluation." Journal of Convergence Security, Vol. 6, No. 4, pp. 101-112.
Ministry of Knowledge Economy, IO Consulting Co., Ltd. (2010). Detailed Security Control Implementation Guidelines for Technology Protection for SMEs.
Namu.Wiki (2021). (https://namu.wiki/w/개인정보%20유출사태)
NASSTAR (2019). Cyber Security for SMEs: A Practical Guide to Protection Your Business. (https://www.nasstar.com/hubfs/Marketing-Material/white%20paper%20-%20cyber%20security.pdf)
NIST (2016). NISTIR 7621, Small Business Information Security: The Fundamentals. (https://doi.org/10.6028/NIST.IR.7621r1)
NIST CSF (2018). Framework for Improving Critical Infrastructure Cybersecurity.
Oh, H.-G. (2019). "Countermeasure of Unmanned Aerial Vehicle(UAV) against terrorist's attacks in South Korea for the public crowded places." Journal of The Korea Society of Disaster Inforrmation, Vol. 12, No. 1, pp. 49-66.
Park, J.-T. (2020). A Study on the Establishment of IT-based Joint Disaster Recovery Center for Business Continuity Management System of Small and Medium Business. Ph.D. Dissertation, Hansei University
Park, J.-H., Cho, N.-W., Lee, K.-H., Choi, I.-H. (2008). " Development of Security System on Personal Information in custody internally in Corporates." Journal of The Korea Institute of Information Security & Cryptology, Vol. 18, No. 6, pp.28-34.
Radanliev, P., De Roure, D., Nurse, J.R.C., Nicolescu, R., Huth, M., Cannady, S., Montalvo, R.M. (2019). Cyber Security Framework for the Internet-of-Things in Industry 4.0, University of Oxford, UK. (doi: 10.20944/preprints201903.0111.v1)
Son, S.-S. (2014). The Study on the Improved Assessment Methodology for Information Security Level Using ISO 27001. Master Thesis, Sungkyunkwan University
Song, E.-J., Bae, B.-H., Oh, N.-H. (2018). "A comparative analysis on the calculation method of domestic and foreign information security market." Institute for Information & Communications Technology Promotion, Weekly ICT Trends, Vol. 1860, pp. 17-26.
Spinello, R. (2003). "Cyberethics: Morality and law in cyberspace." 2th Edition. Jones and Bartlett Learning, LLC., Jones and Bartlett Publishers, Inc, USA.
Symantec (2018). Cybersecurity for SMEs, a lightweight cybersecurity framework for thorough protection. (https://www.smesec.eu/doc/SMESEC_Flyer_A5_V2_2018-05-03_Singlepages.pdf)
Wikipedia, Korea (2021). (https://ko.wikipedia.org/wiki/대한민국의_정보_보안_사고_목록)
Yang, D.-I. (2019). Introduction to Information Security(3rd E.). Hanbit Academy, Seoul, Korea.
Yoon, J.-G. (1990). "Application of AHP and its limitation." Management & Economics review, Vol. 7, pp. 75-92.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.