Digital Library
Search: "[ keyword: information security ]" (99)
해외 애플리케이션의 개인정보 무단 수집 실태 분석과 대응 방안에 대한 연구
김세환,
윤형준,
정다현,
장승훈,
한철규,
Vol. 31, No. 3, pp. 453-462,
6월.
2021
10.13089/JKIISC.2021.31.3.453
주제어: information security, foreign Applications, Personal Information, Business ethics
주제어: information security, foreign Applications, Personal Information, Business ethics
Adaptive Boosting을 사용한 패커 식별 방법 연구
장윤환,
박성준,
박용수,
Vol. 30, No. 2, pp. 169-177,
4월.
2020
10.13089/JKIISC.2020.30.2.169
주제어: computer security, information security, Malware detection, Machine learning., computer security, information security, Malware detection, Machine learning.
주제어: computer security, information security, Malware detection, Machine learning., computer security, information security, Malware detection, Machine learning.
금융 클라우드의 데이터 국지화에 대한 비판적 고찰
장우경,
김인석,
Vol. 29, No. 5, pp. 1191-1204,
10월.
2019
10.13089/JKIISC.2019.29.5.1191
주제어: Cloud computing, Data Localization, information security, Improvement of Regulations, Cloud computing, Data Localization, information security, Improvement of Regulations
주제어: Cloud computing, Data Localization, information security, Improvement of Regulations, Cloud computing, Data Localization, information security, Improvement of Regulations
코딩 표준 검색 기법을 이용한 소프트웨어 보안 취약성 검출에 관한 연구
장영수,
Vol. 29, No. 5, pp. 973-983,
10월.
2019
10.13089/JKIISC.2019.29.5.973
주제어: information security, Secure Coding, Defensive Programming, Public Static Analysis tools, information security, Secure Coding, Defensive Programming, Public Static Analysis tools
주제어: information security, Secure Coding, Defensive Programming, Public Static Analysis tools, information security, Secure Coding, Defensive Programming, Public Static Analysis tools
정보보안 종사자의 조직갈등과 직무이탈 의도에 관한 연구
김근혜,
박규동,
심미나,
Vol. 29, No. 2, pp. 451-463,
4월.
2019
10.13089/JKIISC.2019.29.2.451
주제어: Conflict, Organizational Conflict, Information Security Management, Pondy's Conflict Model, structural equation modeling, Conflict, Organizational Conflict, Information Security Management, Pondy's Conflict Model, structural equation modeling
주제어: Conflict, Organizational Conflict, Information Security Management, Pondy's Conflict Model, structural equation modeling, Conflict, Organizational Conflict, Information Security Management, Pondy's Conflict Model, structural equation modeling
교차영향분석을 이용한 국내ICT 융합산업의 정보보호정책 우선순위 분석
이동희,
전효정,
김태성,
Vol. 28, No. 3, pp. 695-706,
6월.
2018
10.13089/JKIISC.2018.28.3.695
주제어: ICT convergence Industry, Information Security Policy, Cross-impact analysis, ICT convergence Industry, Information Security Policy, Cross-impact analysis
주제어: ICT convergence Industry, Information Security Policy, Cross-impact analysis, ICT convergence Industry, Information Security Policy, Cross-impact analysis
차세대 보안리더 양성프로그램의 성과평가 지표 개발
박성규,
김태성,
김진석,
유성재,
Vol. 28, No. 2, pp. 501-511,
4월.
2018
10.13089/JKIISC.2018.28.2.501
주제어: Information Security Training, Performance Indicator, Workforce Development, Logic Model, AHP, Information Security Training, Performance Indicator, Workforce Development, Logic Model, AHP
주제어: Information Security Training, Performance Indicator, Workforce Development, Logic Model, AHP, Information Security Training, Performance Indicator, Workforce Development, Logic Model, AHP
개인정보 침해 관련 정보 제공 서비스 사용 의도 분석
김택영,
전효정,
김태성,
Vol. 28, No. 1, pp. 199-213,
2월.
2018
10.13089/JKIISC.2018.28.1.199
주제어: Information Breach, Social Disaster, Service Acceptance, Poersonal Information Security, Information Breach, Social Disaster, Service Acceptance, Poersonal Information Security
주제어: Information Breach, Social Disaster, Service Acceptance, Poersonal Information Security, Information Breach, Social Disaster, Service Acceptance, Poersonal Information Security
정보보안 투자가 침해사고에 미치는 영향에 대한 실증분석: 정보보안 교육 서비스 투자를 중심으로
이한솔,
채상미,
Vol. 28, No. 1, pp. 269-281,
2월.
2018
10.13089/JKIISC.2018.28.1.269
주제어: Information Security Investment, Information security product, information security service, security education, Training, and awareness (SETA) programs, security monitoring, vulnerability testing, Information Security Investment, Information security product, information security service, security education, Training, and awareness (SETA) programs, security monitoring, vulnerability testing
주제어: Information Security Investment, Information security product, information security service, security education, Training, and awareness (SETA) programs, security monitoring, vulnerability testing, Information Security Investment, Information security product, information security service, security education, Training, and awareness (SETA) programs, security monitoring, vulnerability testing