参考文献
|
-
Chien, C.-F.,Chen, C.-P.,Chen, C.-H.(2009).Designing performance indices and a novel mechanism for evaluating government R & D projects.Journal of Quality,16(2),119-135.
連結:
-
Chien, C.-F.,Yu, C.-M.,Hsu, S.-C.(2009).UNISON decision analysis framework for constructing the workforce planning decision model for semiconductor manufacturing fab.Journal of Management & Systems,16(2),157-180.
連結:
-
李東峰、林子銘(2002)。資訊主管對企業資訊安全之風險控管決策。資訊管理研究,4(2),1-42。
連結:
-
Bancon, C. J.(1992).The use of decision criteria in selecting information system/technology investment.MIS Quarterly,16(3),335-353.
-
Bharadwaj, A. S.(2000).A resource-based perspective on information technology capability and firm performance: an empirical investigation.MIS Quarterly,24(1),169-196.
-
Bodin, L.,Gordon, L. A.,Loeb, M. P.(2008).Information security and risk management.Communications of the ACM,51(4),64-68.
-
Bojanc, R.,Jerman-Blazic, B.(2008).An economic modeling approach to information security management.International Journal of Information Management,28(5),413-422.
-
Briney, A.,Prince, F.(2002).2002 ISM Survey.Information Security Magazine,2002(September),36-54.
-
Cavusoglu, H.,Mishra, B.,Raghunathan, R.(2004).A model for evaluating IT security investments.Communications of the ACM,47(7),87-92.
-
Chai, S.,Kim, M.,Rao, H. R.(2011).Firms 'information security investment decisions: stock market evidence of investors' behavior.Decision Support System,50(4),651-661.
-
Chan, C. L.(2011).Information security risk modeling using bayesian index.The Computer Journal,54(4),628-638.
-
Chang, S. E.,Ho, C. B.(2006).Organizational factors to the effectiveness of implementing information security management.Industrial Management and Data Systems,106(3),345-361.
-
Chien, C.-F.,Wang, H.-J.,Wang, M.(2007).A UNISON framework for analyzing alternative strategies of IC final testing for enhancing overall operational effectiveness.International Journal of Production Economics,107(1),20-30.
-
Clemen, R. T.(1996).Making Hard Decisions: An Introduction to Decision Analysis.Belmont, CA.:Duxbury Press.
-
Fung, A. R.-W.,Farn, K.-J.,Lin, A. C.(2003).A study on the certification of the information security management systems.Computer Standards & Interfaces,25(5),447-461.
-
Gatignon, H.,Robertson, S. T.(1989).Technology diffusion: an Empirical test of cometitive effects.Journal of Marketing,53(1),35-49.
-
Gordon, L. A.,Loeb, M. P.(2006).Budgeting process for information security expenditures.Communications of the ACM,49(1),121-125.
-
IBM X-Force(2010).,未出版
-
Janz, B.,Dibrell, C.(1998).The implementation of strategy in an innovative information service organization: an empirical comparison of theoretical frameworks.Journal of Information Technology Management,9(3),1-20.
-
Jarvenpaa, S. L.,Ives, B.(1991).Executive involvement and participation in the management of information technology.MIS Quarterly,15(2),205-227.
-
Keeney, R. L.,Raiffa, H.(1993).Decisions with Multiple Objectives: Preferences and Value Tradeoffs.New York:Cambridge University Press.
-
Kelly, D.,Amburgey, T. L.(1991).Organizational inertia and momentum: a dynamic model of strategic change.Academy of Management Journal,34(3),591-612.
-
Klapper, L. F.,Love, I.(2004).Corporate governance, investor protection, and performance in emerging markets.Journal of Corporate Finance,10(5),703-728.
-
Kotulic, A. G.,Clark, J. G.(2004).Why there aren't more information security research studies.Information & Management,41(5),597-607.
-
Kuhl, J.(ed.),Bechmann, J.(ed.)(1985).Action Control from Cognition to Behavior.Berlin:Springer.
-
Mata, F. J.,Fuerst, W. L.,Barney, J. B.(1995).Information technology and sustained competitive advantage: a resource-based analysis.MIS Quarterly,19(4),487-505.
-
Mclvor, R.,McHugh, M.(2000).Partnership Sourcing: an organization chang management perspective.The Journal of Supply Chain Management,36(3),12-20.
-
Mercuri, R. T.(2003).Analyzing security costs.Communications of the ACM,46(6),15-18.
-
Miller, J.,Doyle, B. A.(1987).Measuring effectiveness of computer-based information systems in the financial service sector.MIS Quarterly,11(1),107-125.
-
Mohan-Neill, S.(2006).Online market information and environmental scanning activity by small business: the correlation between firms characteristics and online market information acquisition.Academy of Entrepreneurship Journal,12(2),85.
-
Pemberton, J. D.,Stonehouse, G. H.,Barber, C. E.(2001).Competing with CRS-generated information in the airline industry.Journal of Strategic Information Systems,10(1),59-76.
-
Porter, M. E.(1998).Clusters and the new economics of competition.Harvard Business Review,76(6),77-90.
-
Premkumar, G.,King, W. R.(1994).Organizational characteristics and information systems planning: an empirical study.Information Systems Research,5(2),75-104.
-
Purser, S. A.(2004).Improving the ROI of the security management Process.Computer and Security,23(7),542-546.
-
Ravichandran, T.,Lertwongsatien, C.(2005).Effect of Information systems resources and capabilities on firm performance: a resource-based perspective.Journal of Management Information Systems,21(4),237-276.
-
Saaty, T. L.(1980).The Analytic Hierarchy Process.New York:McGraw-Hill.
-
Shelly, G. S.,Stewart, W. H.,Swet, R. R.,Luker, W. A.(2000).Convergence versus strategic reorientation: the antecedents of fast-paced organizational change.Journal of Management,26(5),911-945.
-
Sonnenreich, W.,Albanese, J.,Stout, B.(2006).Return on security investment (ROSI)-aractical quantitative model.Journal of Research and Practice in Information Technology,38(1),45-56.
-
Straub, D. W.,Welke, R. J.(1998).Coping with systems risk: security planning models for management decision making.MIS Quarterly,22(4),441-469.
-
Tallon, P. P.,Kraemer, K. L.,Grbaxani, V.(2000).Executives' perceptions of the business value on information technology: a process-oriented approach.Journal of Management Information Systems,16(4),145-173.
-
Teo, T. S. H.,Ang, J. S. K.(1999).Critical success factors in the alignment of IS Plans with business plans.International Journal of Information Management,19(2),173-185.
-
Thong, J. Y. L.(1999).An integrated model of information systems adoption in small business.Journal of Management Information Systems,15(4),187-214.
-
Thong, J. Y. L.,Yap, C. S.(1995).CEO characteristics, organizational characteristics and information technology adoption in small business.Omega,23(4),429-442.
-
Vermeulen, C.,Von Solms, R.(2002).The information security management toolbox-taking the pain out of security management.Information Management & Computer Security,10(3),119-125.
-
Von Solms, B.,Von Solms, R.(2004).The 10 deadly sins of information security management.Computers & Security,23(5),371-376.
-
Von Winterfeld, D.,Edwards, W.(1986).Decision Analysis and Behavioral Research.Cambridge:Cambridge University Press.
-
Weill, P.,Olson, M. H.(1989).Managing investment in information technology: mini case examples and implications.MIS Quarterly,13(1),3-17.
-
Wu, J.-Z.,Chien, C.-F.(2008).Modeling strategic semiconductor assembly outsourcing decisions based on empirical settings.OR Spectrum,30(3),401-430.
-
行政院主計處電子處理資料中心(2010)。資通安全外部稽核。作者。
-
吳明隆(2006)。SPSS統計應用學習實務:問卷分析與應用統計。臺北:易習圖書。
-
吳明隆(2009)。SPSS操作與應用:問卷統計分析實務。臺北市:五南圖書出版股份有限公司。
-
李東峰(2003)。博士論文(博士論文)。桃園,臺灣,國立中央大學資訊管理研究所。
-
李順仁(2007)。資訊安全。臺北:文魁資訊。
-
洪國興、季延平、趙榮耀(2003)。資訊安全評估準則層級結構之研究。圖書館學與資訊科學,29(2),22-44。
-
財團法人資訊工業策進會MIC(2010)。資訊服務產業年鑑。作者。
-
樊國楨(2005)。資訊安全風險管理。臺北:行政院國家科學委員會科學技術資料中心。
-
鄧家駒(1998)。風險管理。臺北:華泰文化事業公司。
-
賴志明(2009)。博士論文(博士論文)。臺北,臺灣,國立臺灣科技大學資訊管理研究所。
-
簡禎富(2005)。決策分析與管理。臺北市:雙葉書廊。
-
羅英嘉(2008)。CISSP與資訊安全基礎技術。臺北:財團法人資訊工業策進會。
|