参考文献
|
-
林妙雀(2005)。企業之智慧資本與分享組織文化對組織管理績效影響之實證研究。管理評論,24(1),55-81。
連結:
-
ISO ISO/IEC 27001:2005, International Organization for Standardization, Switzerland, 2005..
-
Adams, J. S.,Tashchian, A.,Shore, T. H.(2001).Codes of Ethics as Signals for Ethical Behavior.Journal of Business Ethics,29(3),199-211.
-
Allen, B.(1968).Danger Ahead! Safeguard Your Computer.Harvard Business Review,46(6),97-101.
-
Andress, M.,Fonseca, B.(2000).Manage People to Protect Data.InfoWorld,22(46),48.
-
Bagozzi, R. P.,Yi, Y.(1988).On the Evaluation of Structural Equation Models.Journal of the Academy of Marketing Science,16(1),74-94.
-
Baskerville, R.,Siponen, M.(2002).An Information Security Meta-Policy for Emergent Organizations.Logistics Information Management,15(5),337-346.
-
Beachboard, J. C.(2004).Conceptualizing IT Management: Testing a Competing Values Model of Policy Compliance.Proceedings of the Tenth Americas Conference on Information Systems,New York:
-
Borck, J. R.(2000).Advice for a Secure Enterprise: Implement the Basics and See that Everyone Uses Them.InfoWorld,22(46),90.
-
Breidenbach, S.(2000).How Secure Are You?.InformationWeek,800,71-78.
-
Chau, J.(2005).Skimming the Technical and Legal Aspects of BS7799 Can Give a False Sense of Security.Computer Fraud & Security,September,8-10.
-
Chaula, A. J.(2006).Department of Computer and Systems Sciences, Stockholm University.
-
Chia, P. A.,Maynard, S. B.,Ruighaver, A. B.(2003).Information Systems: The Challenges of Theory and Practice.Information Institute, United States of America.
-
Claver, E.,Llopis, J.,Gonzalez, M. R.,Gasco, J. L.(2001).The Performance of Information Systems through Organizational Culture.Information Technology & People,14(3),247-260.
-
Conolly, P. J.(2000).Security Starts from Within.InfoWorld,22(28),39-40.
-
Detert, J. R.,Schroeder, R. G.,Mauriel, J. J.(2000).A Framework for Linking Culture and Improvement Initiatives in Organizations.The Academy of Management Review,25(4),850-863.
-
Dhillon, G.,Backhouse, J.(2000).Information System Security Management in the New Millennium.Communication of the ACM,43(7),125-128.
-
Fang, D. P.,Chen, Y.,Louisa, W.(2006).Safety Climate in Construction Industry: A Case Study in Hong Kong.Journal of Construction Engineering and Management,132(6),573-584.
-
Farrell, H.,Farrell, B. J.(1998).The Language of Business Codes of Ethics- Implications of Knowledge and Power.Journal of Business Ethics,17(6),587-601.
-
Flynn, N. L.(2001).The E-Policy Handbook: Designing and Implementing Effective E-Mail, Internet, and Software Policies.New York:American Management Association.
-
Ford, R. C.,Richardson, W. D.(1994).Ethical Decision Making: A Review of the Empirical Literature.Journal of business ethics,13(3),205-221.
-
Fornell, C.,Larcker, D. F.(1981).Structural Equation Models with Unobservable Variables and Measurement Error.Journal of Marketing Research,18(3),382-388.
-
Gaunt, N.(1998).Installing an Appropriate Information Security Policy.International Journal of Medical Informatics,49(1),131-134.
-
Glendon, A. I.,Litherland, D. K.(2001).Safety Climate Factors, Group Differences and Safety Behavior in Road Construction.Safety Science,39(3),157-188.
-
Glendon, A. I.,Stanton, N. A.(2000).Perspectives on Safety Culture.Safety Science,34(1),193-214.
-
Goodhue, D. L.,Straub, D. W.(1991).Security Concerns of System Users: A Study of Perceptions of the Adequacy of Security.Information & Management,20(1),13-27.
-
Guilford, J. P.(1973).Fundamental Statistics in Psychology and Education.New York:McGraw-Hill.
-
Gupta, Y. P.(1991).The Chief Executive Officer and the Chief Information Officer: The Strategic Partnership.Journal of Information Technology,6(3-4),128-139.
-
Hair, J. F.,Anderson, R. E.,Tatham, R. L.,Black, W. C.(1998).Multivariate Data Analysis.Englewood Cliffs,:Prentice Hall.
-
Hancock, B.(2001).The Chief Security Officer's Top Ten List for 2001.Computers & Security,20(1),10-14.
-
Hartley, B.(1998).Ensure the Security of Your Corporate Systems (Developing a Security Policy).E-Business Advisor,16(6),30-32.
-
Hegarty, W. H.,Sims, H. P.(1979).Organizational Philosophy, Policies, and Objectives Related to Unethical Decision Behavior: A Laboratory Experiment.Journal of Applied Psychology,64(3),331-338.
-
Höne, K.,Eloff, J. H. P.(2002).Information Security Policy-What Do International Information Security Standards Say?.Computers & Security,21(5),402-409.
-
Hong, K. S.,Chi, Y. P.,Chao, L. R.,Tang, J. H.(2006).An Empirical Study of Information Security Policy on Information Security Elevation in Taiwan.Information Management & Computer Security,14(2),104-115.
-
Horrocks, I.(2001).Security Training: Education for an Emerging Profession?.Computers & Security,20(3),219-226.
-
Karyda, M.,Kiountouzis, E.,Kokolakis, S.(2005).Information Systems Security Policies: A Contextual Perspective.Computers & Security,24(3),246-260.
-
Kemp, M.(2005).Beyond Trust: Security Policies and Defence-in-Depth.Network Security,8,14-16.
-
Knapp, K. J.(2005).Auburn University.
-
Knapp, K. J.,Marshall, T. E.,Rainer, R. K.,Ford, F. N.(2006).Information Security: Management's Effect on Culture and Policy.Information Management & Computer Security,14(1),24-36.
-
Kotulic, A. G.,Clark, J. G.(2004).Why There Aren't More Information Security Research Studies.Information & Management,41(5),597-607.
-
Kuusisto, R.,Nyberg, K.,Virtanen, T.(2004).Unite Security Culture: May a Unified Security Culture be Plausible?.Proceedings of the Third European Conference on Information Warfare and Security,United Kingdom:
-
Leach, J.(2003).Improving User Security Behaviour.Computers & Security,22(8),685-692.
-
Loe, T. W.,Ferrell, L.,Mansfield, P.(2000).A Review of Empirical Studies Assessing Ethical Decision Making in Business.Journal of business ethics,25(3),185-204.
-
Martin, J.(1992).Cultures in Organizations: Three Perspectives.New York:Oxford University Press.
-
Martins, A.,Eloff, J.(2002).Promoting Information Security Culture through an Information Security Culture Model.Proceedings of South Africa: Information Security South Africa
-
Nunnally, J. C.(1978).Psychometric Theory.New York:McGraw-Hill.
-
Ouchi, W. G.(1981).Theory Z: How American Business Can Meet the Japanese Challenge.Addison-Wesley.
-
Pettigrew, A. M.(1979).On Studying Organizational Culture.Administrative Science Quarterly,24(4),570-586.
-
Pfleeger, C. P.(1996).Security in Computing.New Jersey:Prentice Hall.
-
Rees, J.,Bandyopadhyay, S.,Spafford, E. H.(2003).PFIRES: A Policy Framework for Information Security.Communications of the ACM,46(7),101-106.
-
Richard, O. C.,McMillan-Capehart, A.,Bhuian, S. N.,Taylor, E. C.(2009).Antecedents and Consequences of Psychological Contracts: Does Organizational Culture Really Matter?.Journal of Business Research,62(8),818-825.
-
Richardson, R.(2003).Eighth Annual Computer Security Institute (CSI) and Federal Bureau of Investigation (FBI) Computer Crime and Security Survey.San Francisco:Computer Security Institute.
-
Richter, A.,Koch, C.(2004).Integration, Differentiation and Ambiguity in Safety Cultures.Safety Science,42(8),703-722.
-
Robbins, S. P.(2001).Organizational Behavior: Concepts, Controversies, Applications.New Jersey:Prentice Hall.
-
Schein, E. H.(1992).Organizational Culture and Leadership.San Francisco:Jossey-Bass.
-
Simon, H. A.(1957).Amounts of Fixation and Discovery in Maze Learning Behavior.Psychometrika,22(3),261-268.
-
Sims, R. L.,Keon, T. L.(1999).Determinants of Ethical Decision Making: The Relationship of the Perceived Organizational Environment.Journal of Business Ethics,19(4),393-401.
-
Siponen, M. T.(2000).A Conceptual Foundation for Organizational Information Security Awareness.Information Management & Computer Security,8(1),31-41.
-
Straub, D. W.(1990).Effective IS Security: An Empirical Study.Information Systems Research,1(3),255-276.
-
Straub, D. W.,Welke, R. J.(1998).Coping with Systems Risk: Security Planning Models for Management Decision Making.MIS Quarterly,22(4),441-469.
-
Thomson, K. L.,Von Solms, R.(2005).Information Security Obedience: A Definition.Computer & Security,24(1),69-75.
-
Tolsby, J.(1998).Effects of Organizational Culture on a Large Scale IT Introduction Effort: A Case Study of the Norwegian Army's EDBLF Project.European Journal of Information Systems,7(2),108-114.
-
Tudor, J. K.(2001).Information Security Architecture: An Integrated Approach to Security in the Organization.Boca Raton:CRC Press.
-
Vroom, C.,Von Solms, R.(2004).Towards Information Security Behavioral Compliance.Computers & Security,23(3),191-198.
-
Wood, C. C.(1995).Writing InfoSec Policies.Computers & Security,14(8),667-674.
-
Wood, C. C.(2000).An Unappreciated Reason Why Information Security Policies Fail.Computer Fraud & Security,2000(10),13-14.
-
黃清賢(2002)。職業安全管理。台北:新文京開發出版社公司。
-
蔡永銘(2003)。現代安全管理。台北:揚智文化事業公司。
|