参考文献
|
-
Aivazian, C.(1998).Information Security during Organizational Transitions.Information strategy: the executive's journal,14(3),21-27.
-
Birch, D. G.W.,McEvoy, N. A.(1992).Risk analysis for Information Systems.Journal of Information Technology,7,44-53.
-
BSI(2002).BS7799-2:2002 British Standards for benchmarking Information Security Management Systems (ISMS).
-
Earl, M. J.(1989).Management Strategies for Information Technology.Prentice Hall, Hemel Hempstead.
-
Eloff, M.M.,von Solms, S.H.(2000).Information Security Management: A Hierachical Framework for Various Approaches.Computer & Security,19,243-256.
-
Fitzgerald, K. J.(1995).Information security baselines.information management & Computer Security,3(2),8-12.
-
Galliers, R. D.(1989).The developing information systems organization: an evaluation of the 'stages of growth' hypothesis.paper presented at the London Business School.
-
Galliers, R. D.,Sutherland, A.R.(1991).Information systems management and strategy formulation: the 'stages of growth' model revisited.Journal of Information Systems,1,89-114.
-
Gibson, D.,Nolan, R.L.(1974).Managing the four stages of EDP growth.Harvard Business Review,52(1)
-
Goodhue, D.L.,Straub, D.W.(1991).Security concerns of system users: A study of perceptions of the adequacy of security.Information & Management,20(1),13-22.
-
Hoffer, J.A.,Straub, D.W.,P. Gray (Eds.),W.R. King (Eds.),E.R. Mclean (Eds.),H. Waston (Eds.)(1994).Management of information systems.Fort Worth, TX:Harcourt Brace.
-
Icove, D.,Seger, K.,Vonstorch, W.(1999).Computer Crime, O'REILLY.
-
Jarvenpaa, S.L.,Ives, B.(1990).Information technology and corporate strategy: A view from the top.Information Systems Research,1(4),351-375.
-
Jung, B.,Han, I.,Lee, S.(2001).Securtity threats to Internet: a Korean multi-industry investigation.Information & Management,38(8),487-498.
-
Kankanhalli, A.,Teo, H.-H.,Tan, B. C.Y.,Wei, K.-K.(2003).An integrative study of information systems security effectiveness.International Journal of Information Management,23,139-154.
-
King, W. R.(1994).Organizational characteristics and information systems planning: An empirical study.Information Systems Research,5(2),75-109.
-
Kotulic, A.G.,Clark, J.G.(2004).Why there aren't more information security research studies.Information & Management,41(5),597-607.
-
Kwok, L.-F.,Longley, D.(1999).Information security management and modeling.Information Management & Computer Security,7(1),30-39.
-
Lichtenstein, S.(1996).Factors in the selection of a risk assessment method.Information Management & Computer Security,4(4),20-25.
-
Loch, K.D.,Carr, H.H.,Warkentin, M.E.(1992).Threats to information systems: Today's reality, yesterday's understanding.MIS Quarterly,June,173-186.
-
McFarlan, F.,McKenney, J.(1983).Corporate Information Systems Management: The Issues Facing Senior Executives.New York:Dow Jones Irwin.
-
Nolan, R.(1979).Managing the crises in data processing.Harvard Business Review,57(2)
-
Ølnes, J.(1994).Development of security policies.Computers & Security,13,628-636.
-
Peltier, T.R.(2001).Information security risk analysis.New York:Auerbach.
-
Pipkin, D.L.(2000).Information security protecting the global enterprise.New Jersey:Hewlett-Packard.
-
Rainer R.K.,Snyderr, C.A.,Carr, H.H.(1991).Risk analysis for information technology.Journal of Management Information Systems,Summer,192-197.
-
Computer Security Institute 2003
-
Ryan, S. D.,Bordoloi, B.(1997).Evaluating security threats in mainframe and client/server environments.Information & Management,32(3),137-146.
-
Sharma, S.(1996).Applied Multivariate Techniques.New York:Wiley.
-
Siegel, C.A.,Sagalow, T.R.,Serritella, P.(2002).Cyber-Risk Management: Technical and Insurance Controls for Enterprise-level Security.Security management practices,Sept./Oct.,33-49.
-
Siponen, M.T.(2002).Towards maturity of information security maturity criteria: six lessons learned from software maturity criteria.Information Management & Computer Security,10(5),210-224.
-
Smits, M.T.,van der Poel, V.G.,Ribbers, P.M.A.(1997).Assessment of information strategies in insurance companies in the Netherlands.Journal of Strategic Information Systems,6(2),129-148.
-
Straub, D.W.(1986).Computer abuse and computer security: Update on an empirical study.Security, Audit, and Control Review,4(2),21-31.
-
Straub, D.W.,Welke, R.J.(1998).Coping with systems risk: security planning models for management decision making.MIS Quarterly,December,441-469.
-
Vermeulen, C.,von Solms, R.(2002).The information security management toolbox-taking the pain out of security management.Information management & computer security,10(3),119-125.
-
Von Solms, R.(1996).Information Security Management: The Second Generation.Computers & Security,15(4),281-288.
-
Von Solms, R.(1999).Information Security Management: why standards are important.Information Management & Computer Security,7(1),50-57.
-
Von Solms, R.,H., Haar, van de,von Solms S.H.,Caelli, W.J.(1994).A framework for information security evaluation.Information & Management,26,143-153.
-
林東峰、林子銘(2001)。企業資訊安全政策之探索性分析。第七屆資訊管理研究暨實務研討會論文集
|