Digital Library
Search: "[ keyword: Security ]" (547)
안전한 전자금융거래를 위한 보안등급 기준마련 및 사례연구
장길영,
김인석,
Vol. 28, No. 3, pp. 729-741,
5월.
2018
10.13089/JKIISC.2018.28.3.729
주제어: certificate, Electronic Financial Transactions, authentication, Privacy Protection, Security Review, certificate, Electronic Financial Transactions, authentication, Privacy Protection, Security Review
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: certificate, Electronic Financial Transactions, authentication, Privacy Protection, Security Review, certificate, Electronic Financial Transactions, authentication, Privacy Protection, Security Review
교차영향분석을 이용한 국내ICT 융합산업의 정보보호정책 우선순위 분석
이동희,
전효정,
김태성,
Vol. 28, No. 3, pp. 695-706,
5월.
2018
10.13089/JKIISC.2018.28.3.695
주제어: ICT convergence Industry, Information Security Policy, Cross-impact analysis, ICT convergence Industry, Information Security Policy, Cross-impact analysis
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: ICT convergence Industry, Information Security Policy, Cross-impact analysis, ICT convergence Industry, Information Security Policy, Cross-impact analysis
정보보안 투자가 침해사고에 미치는 영향에 대한 실증분석: 정보보안 교육 서비스 투자를 중심으로
이한솔,
채상미,
Vol. 28, No. 1, pp. 269-281,
2월.
2018
10.13089/JKIISC.2018.28.1.269
주제어: Information Security Investment, Information security product, information security service, security education, Training, and awareness (SETA) programs, security monitoring, vulnerability testing, Information Security Investment, Information security product, information security service, security education, Training, and awareness (SETA) programs, security monitoring, vulnerability testing
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Information Security Investment, Information security product, information security service, security education, Training, and awareness (SETA) programs, security monitoring, vulnerability testing, Information Security Investment, Information security product, information security service, security education, Training, and awareness (SETA) programs, security monitoring, vulnerability testing
미국 ATE 정책 기반의 신규 사이버보안 인력양성 정책 비교 프레임워크 연구
홍순좌,
Vol. 28, No. 1, pp. 249-267,
2월.
2018
10.13089/JKIISC.2018.28.1.249
주제어: ATE, NICE, FISMA, Cybersecurity Act, CSSIA, CSEC, NCC, CWW, ACE, Cybersecurity Training, ATE, NICE, FISMA, Cybersecurity Act, CSSIA, CSEC, NCC, CWW, ACE, Cybersecurity Training
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: ATE, NICE, FISMA, Cybersecurity Act, CSSIA, CSEC, NCC, CWW, ACE, Cybersecurity Training, ATE, NICE, FISMA, Cybersecurity Act, CSSIA, CSEC, NCC, CWW, ACE, Cybersecurity Training
개인정보 침해 관련 정보 제공 서비스 사용 의도 분석
김택영,
전효정,
김태성,
Vol. 28, No. 1, pp. 199-213,
2월.
2018
10.13089/JKIISC.2018.28.1.199
주제어: Information Breach, Social Disaster, Service Acceptance, Poersonal Information Security, Information Breach, Social Disaster, Service Acceptance, Poersonal Information Security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Information Breach, Social Disaster, Service Acceptance, Poersonal Information Security, Information Breach, Social Disaster, Service Acceptance, Poersonal Information Security
패스워드 보안행위의도에 영향을 미치는 요인
이동희,
김태성,
전효정,
Vol. 28, No. 1, pp. 187-198,
2월.
2018
10.13089/JKIISC.2018.28.1.187
주제어: Password, Security behavior intention, health belief model, Password, Security behavior intention, health belief model
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Password, Security behavior intention, health belief model, Password, Security behavior intention, health belief model
CAN 트레이스 분석을 통한 데이터 필드 형식 추론 방법 연구
지청민,
김지민,
홍만표,
Vol. 28, No. 1, pp. 167-177,
2월.
2018
10.13089/JKIISC.2018.28.1.167
주제어: Vehicle Security, CAN, protocol reverse engineering, Vehicle Security, CAN, protocol reverse engineering
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Vehicle Security, CAN, protocol reverse engineering, Vehicle Security, CAN, protocol reverse engineering