[1] | Auditing methodology on legal compliance of enterprise information systems, International Journal of Technology Management, vol.54, nos.2/3, 2011. |
[2] | Linking information engineering and security engineering with a problem-solving perspective, International Journal of Technology Management, vol.54, nos.2/3, 2011. |
[3] | Integrated security framework for industrial R&D environments, International Journal of Software Engineering and Knowledge Engineering, vol.20, no.1, 2010. |
[4] | Assessment on security risks of customer relationship management systems, International Journal of Software Engineering and Knowledge Engineering, vol.20, no.1, 2010. |
[5] | IT compliance of industrial information systems: technology management and industrial engineering perspective, Journal of Systems and Software, vol.80, no.10, 2007. |
[6] | Common defects in information security management system of Korean companies, Journal of Systems and Software, vol.80, no.10, 2007. |
[7] | A study on development methodology of business model in ubiquitous technology environment, International Journal of Technology Management, vol.38, no.4, 2007. |
[8] | Framework for email records management in corporate environments, International Journal of Technology Management, vol.38, no.4, 2007. |
[9] | A study on decision consolidation methods using analytic models for security systems, Computers & Security, vol.26, no.2, 2007. |
[10] | High-performing AAA architecture in massive IPv4 networks, Future Generation Computer Systems, vol.23, no.2, 2007. |
[11] | A study on development of business factor in ubiquitous technology, Lecture Notes in Artificial Intelligence, vol.4251, 2006. |
[12] | General drawing of the integrated framework for security governance, Lecture Notes in Artificial Intelligence, vol.4251, 2006. |
[13] | A study on the development of evaluation framework for usability of digital TV, Lecture Notes in Computer Science, vol.3983, 2006. |
[14] | Security engineering methodology based on problem solving theory, Lecture Notes in Computer Science, vol.3983, 2006. |
[15] | Economic load dispatch using quadratic interior point method, International Journal of Operations and Quantitative Management, vol.11, no.3, 2005. |
[16] | An evaluation methodology of enterprise security management systems, International Journal of Operations and Quantitative Management, vol.11, no.3, 2005. |
[17] | Enterprise security architecture in business convergence environments, Industrial Management and Data Systems, vol.105, no.7, pp.919-316, 2005. |
[18] | Assessment methodology on maturity model of ISMS, Lecture Notes in Artificial Intelligence, vol.3683, 2005. |
[19] | CSFs for HCI in ubiquitous computing environments, Lecture Notes in Artificial Intelligence, vol.3683, 2005. |
[20] | Practical design recovery techniques for embedded operating system on complying with RTCA/DO-178B and ISO/IEC 15408, Lecture Notes in Artificial Intelligence, vol.3683, 2005. |
[21] | A study on authentication mechanism using robot vacuum cleaner, Lecture Notes in Computer Science, vol.3483, 2005. |
[22] | A case study on the development of employee internet management system, Lecture Notes in Computer Science, vol.3482, 2005. |
[23] | Cost-benefit analysis of security investments: a methodology and case study, Lecture Notes in Computer Science, vol.3482, 2005. |
[24] | Security of the internet-based instant messenger: risks and safeguards, Internet Research: Electronic Networking Applications and Policy, vol.15, no.1, 2005. |
[25] | Decision supporting method with the analytic hierarchy process model for the systematic selection of COTS-based security control, Lecture Series on Computer Science and Computational Sciences, vol.1, 2004. |
[26] | Applying the ISO17799 baseline controls as a security engineering principle under the Sarbanes-Oxley Act, Lecture Series on Computer Science and Computational Sciences, vol.1, 2004. |
[27] | Architecture of authentication mechanism for emerging t-commerce environments, Lecture Notes in Computer Science, vol.3331, 2004. |
[28] | A case study on the real-time click stream analysis system, Lecture Notes in Computer Science, vol.3314, 2004. |
[29] | Implementation of the security system for instant messengers, Lecture Notes in Computer Science, vol.3314, 2004. |
[30] | An information engineering methodology for the security strategy planning, Lecture Notes in Computer Science, vol.3043, 2004. |
[31] | Introduction to an integrated methodology for development and implementation of enterprise information systems, Journal of System and Softwares, vol. 60 , 2002. |