Digital Library
Search: "[ keyword: information security ]" (94)
비대면 정보보호 교육을 위한 LMS 평가지표 개발
이지은,
Vol. 31, No. 5, pp. 1055-1062,
10월.
2021
10.13089/JKIISC.2021.31.5.1055
주제어: Non-Face-to-Face, Information Security Education, LMS, Evaluation index
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Non-Face-to-Face, Information Security Education, LMS, Evaluation index
실무중심 정보보안 교육을 위한 셀 기반 입체교육 모델
최상용,
김정삼,
이규창,
Vol. 31, No. 5, pp. 1031-1043,
10월.
2021
10.13089/JKIISC.2021.31.5.1031
주제어: information security, Cyber Security, education, curriculum, model
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: information security, Cyber Security, education, curriculum, model
디지털트윈 기반의 스마트공장에서 랜섬웨어 공격과 피해 분석을 위한 정보보안 실습콘텐츠 시나리오 개발
남수만,
이승민,
박영선,
Vol. 31, No. 5, pp. 1001-1010,
10월.
2021
10.13089/JKIISC.2021.31.5.1001
주제어: Information Security Contents, Ransomware, Smart Factories, Digital Twin, Conversion Technology
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Information Security Contents, Ransomware, Smart Factories, Digital Twin, Conversion Technology
해외 애플리케이션의 개인정보 무단 수집 실태 분석과 대응 방안에 대한 연구
김세환,
윤형준,
정다현,
장승훈,
한철규,
Vol. 31, No. 3, pp. 453-462,
6월.
2021
10.13089/JKIISC.2021.31.3.453
주제어: information security, foreign Applications, Personal Information, Business ethics
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: information security, foreign Applications, Personal Information, Business ethics
Adaptive Boosting을 사용한 패커 식별 방법 연구
장윤환,
박성준,
박용수,
Vol. 30, No. 2, pp. 169-177,
4월.
2020
10.13089/JKIISC.2020.30.2.169
주제어: computer security, information security, Malware detection, Machine learning., computer security, information security, Malware detection, Machine learning.
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: computer security, information security, Malware detection, Machine learning., computer security, information security, Malware detection, Machine learning.
금융 클라우드의 데이터 국지화에 대한 비판적 고찰
장우경,
김인석,
Vol. 29, No. 5, pp. 1191-1204,
10월.
2019
10.13089/JKIISC.2019.29.5.1191
주제어: Cloud computing, Data Localization, information security, Improvement of Regulations, Cloud computing, Data Localization, information security, Improvement of Regulations
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Cloud computing, Data Localization, information security, Improvement of Regulations, Cloud computing, Data Localization, information security, Improvement of Regulations
코딩 표준 검색 기법을 이용한 소프트웨어 보안 취약성 검출에 관한 연구
장영수,
Vol. 29, No. 5, pp. 973-983,
10월.
2019
10.13089/JKIISC.2019.29.5.973
주제어: information security, Secure Coding, Defensive Programming, Public Static Analysis tools, information security, Secure Coding, Defensive Programming, Public Static Analysis tools
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: information security, Secure Coding, Defensive Programming, Public Static Analysis tools, information security, Secure Coding, Defensive Programming, Public Static Analysis tools
정보보안 종사자의 조직갈등과 직무이탈 의도에 관한 연구
김근혜,
박규동,
심미나,
Vol. 29, No. 2, pp. 451-463,
3월.
2019
10.13089/JKIISC.2019.29.2.451
주제어: Conflict, Organizational Conflict, Information Security Management, Pondy's Conflict Model, structural equation modeling, Conflict, Organizational Conflict, Information Security Management, Pondy's Conflict Model, structural equation modeling
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Conflict, Organizational Conflict, Information Security Management, Pondy's Conflict Model, structural equation modeling, Conflict, Organizational Conflict, Information Security Management, Pondy's Conflict Model, structural equation modeling
보안성숙도 모델을 활용한 정보보호 관리수준 점검방법에 관한 연구
이상규,
김인석,
Vol. 28, No. 6, pp. 1585-1594,
11월.
2018
10.13089/JKIISC.2018.28.6.1585
주제어: information security, Information security management system, ISMS, Security Maturity Model, C2M2, information security, Information security management system, ISMS, Security Maturity Model, C2M2
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: information security, Information security management system, ISMS, Security Maturity Model, C2M2, information security, Information security management system, ISMS, Security Maturity Model, C2M2
기업의 BYOD 환경에서 정보보안이 모바일 오피스 서비스 만족과 지속적 사용에 미치는 영향에 관한 연구
박병우,
장석은,
이은경,
이상준,
Vol. 28, No. 4, pp. 929-939,
7월.
2018
10.13089/JKIISC.2018.28.4.929
주제어: Mobile Information Security, Personal information security, mobile office, BYOD, Mobile Information Security, Personal information security, mobile office, BYOD
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Mobile Information Security, Personal information security, mobile office, BYOD, Mobile Information Security, Personal information security, mobile office, BYOD