Digital Library
Search: "[ keyword: Policy ]" (48)
정보보안문화와 경영진 리더십이 조직 구성원의 정보보안 행동에 미치는 영향
박성환,
박재영,
김범수,
Vol. 32, No. 2, pp. 355-370,
4월.
2022
10.13089/JKIISC.2022.32.2.355
주제어: Information Security Culture, Transactional Leadership, Transformational Leadership, Information Security Policy

주제어: Information Security Culture, Transactional Leadership, Transformational Leadership, Information Security Policy
금융데이터거래 정보보호 강화방안: 데이터브로커 보안이슈를 중심으로
김수봉,
권헌영,
Vol. 32, No. 1, pp. 141-154,
2월.
2022
10.13089/JKIISC.2022.32.1.141
주제어: Data Trading, Data Brokers, Data security, Information Security Policy, Personal Information

주제어: Data Trading, Data Brokers, Data security, Information Security Policy, Personal Information
국가 암호정책에 대한 연구:암호접근권한을 중심으로
김동훈,
권헌영,
홍석희,
Vol. 31, No. 1, pp. 99-109,
2월.
2021
10.13089/JKIISC.2021.31.1.99
주제어: cryptanalysis, Cryptography Policy, National Security, misuse cryptography, cryptanalysis, Cryptography Policy, National Security, misuse cryptography

주제어: cryptanalysis, Cryptography Policy, National Security, misuse cryptography, cryptanalysis, Cryptography Policy, National Security, misuse cryptography
방화벽 접근정책의 계층적 가시화 방법에 대한 연구
김태용,
권태웅,
이준,
이윤수,
송중석,
Vol. 30, No. 6, pp. 1087-1101,
12월.
2020
10.13089/JKIISC.2020.30.6.1087
주제어: firewall, Access Control List, Hierarchical Visualization, 3D Drill-Down User Interface, Policy Anomaly, firewall, Access Control List, Hierarchical Visualization, 3D Drill-Down User Interface, Policy Anomaly

주제어: firewall, Access Control List, Hierarchical Visualization, 3D Drill-Down User Interface, Policy Anomaly, firewall, Access Control List, Hierarchical Visualization, 3D Drill-Down User Interface, Policy Anomaly
딥러닝을 활용한 개인정보 처리방침 분석 기법 연구
조용현,
차영균,
Vol. 30, No. 2, pp. 305-312,
4월.
2020
10.13089/JKIISC.2020.30.3.305
주제어: Privacy Policy, Text Mining, Decision Tree Model, Privacy Protect, Subject Right, Privacy Policy, Text Mining, Decision Tree Model, Privacy Protect, Subject Right

주제어: Privacy Policy, Text Mining, Decision Tree Model, Privacy Protect, Subject Right, Privacy Policy, Text Mining, Decision Tree Model, Privacy Protect, Subject Right
안드로이드 환경에서 개인정보 처리방침의 투명성 확보방안에 관한 연구: GDPR을 기반으로
백인주,
오준형,
이경호,
Vol. 29, No. 6, pp. 1477-1489,
12월.
2019
10.13089/JKIISC.2019.29.6.1477
주제어: Privacy Policy, transparency, Security, GDPR, Android Application, Privacy Policy, transparency, Security, GDPR, Android Application

주제어: Privacy Policy, transparency, Security, GDPR, Android Application, Privacy Policy, transparency, Security, GDPR, Android Application
트럼프 행정부의 주요기반시설 사이버보안 정책분석에 관한 연구
김근혜,
Vol. 29, No. 4, pp. 907-918,
8월.
2019
10.13089/JKIISC.2019.29.4.907
주제어: Trump Administration, Obama Administration, Critical Infrastructure, Cybersecurity Policy, Department of Homeland Security

주제어: Trump Administration, Obama Administration, Critical Infrastructure, Cybersecurity Policy, Department of Homeland Security
국내외 IT제품 도입제도 동향 분석 및 국내 제도 개선방안 도출
손효현,
김광준,
이만희,
Vol. 29, No. 4, pp. 897-906,
8월.
2019
10.13089/JKIISC.2019.29.4.897
주제어: Introduction Policy, Security Conformance, Common Criteria, Cryptographic Module Validation Program, Common Criteria Recognition Arrangement

주제어: Introduction Policy, Security Conformance, Common Criteria, Cryptographic Module Validation Program, Common Criteria Recognition Arrangement
게임을 통한 정보보안인식 향상에 관한 연구: 개별 정보보안정책에 대한 인식변화를 중심으로
최종현,
Vol. 28, No. 4, pp. 951-962,
7월.
2018
10.13089/JKIISC.2018.28.4.951
주제어: Serious Game, Information Security Awareness, Security Learning, Teaching Tool, Security Policy, Serious Game, Information Security Awareness, Security Learning, Teaching Tool, Security Policy

주제어: Serious Game, Information Security Awareness, Security Learning, Teaching Tool, Security Policy, Serious Game, Information Security Awareness, Security Learning, Teaching Tool, Security Policy
교차영향분석을 이용한 국내ICT 융합산업의 정보보호정책 우선순위 분석
이동희,
전효정,
김태성,
Vol. 28, No. 3, pp. 695-706,
5월.
2018
10.13089/JKIISC.2018.28.3.695
주제어: ICT convergence Industry, Information Security Policy, Cross-impact analysis, ICT convergence Industry, Information Security Policy, Cross-impact analysis

주제어: ICT convergence Industry, Information Security Policy, Cross-impact analysis, ICT convergence Industry, Information Security Policy, Cross-impact analysis