参考文献
|
-
黃士銘、張碩毅、蘇耿弘(2005)。企業導入BS7799資訊安全管理系統之關鍵成功因素─以石化產業為例。資訊管理學報,13(2),171-192。
連結:
-
黃經洲、陳加屏、艾昌瑞(2009)。以系統動力學模擬登革熱擴散現象與評估防治策略效果─台南市為例。臺灣公共衛生雜誌,28(6),541-551。
連結:
-
蘇建源、江婉媚、阮金聲(2010)。資訊安全政策實施對資訊安全文化與資訊安全有效性影響之研究。資訊管理學報,17(4),61-87。
連結:
-
ISO (2005), 'ISO/IEC 27001 information technology - code of practice for information'..
-
ISO (2005), 'ISO/IEC 27001 information technology - security techniques - information security management systems-requirements'..
-
CSI, (1999-2008), Computer Crime & Security Survey, Computer Security Institute.
-
CSI, (2009), Computer Crime & Security Survey Executive Summary, Computer Security Institute.
-
CSI, (1999-2008), Computer Crime & Security Survey, Computer Security Institute.
-
CSI, (1999-2008), Computer Crime & Security Survey, Computer Security Institute.
-
CSI, (1999-2008), Computer Crime & Security Survey, Computer Security Institute.
-
CSI, (1999-2008), Computer Crime & Security Survey, Computer Security Institute.
-
DTI, (2004), Information Security Breaches Survey, Department of Trade & Industry.
-
行政院主計處(2010),『98年電腦應用概況報告』,available at http://www.dgbas.gov.tw/ct.asp?xItem=28145&CtNode=5526&mp=1 (accessed 18 January 2011)。
-
CSI, (1999-2008), Computer Crime & Security Survey, Computer Security Institute.
-
CSI, (1999-2008), Computer Crime & Security Survey, Computer Security Institute.
-
CSI, (1999-2008), Computer Crime & Security Survey, Computer Security Institute.
-
CSI, (1999-2008), Computer Crime & Security Survey, Computer Security Institute.
-
CSI, (1999-2008), Computer Crime & Security Survey, Computer Security Institute.
-
Albrechtsen, E.,Hovden, J.(2009).The information security digital divide between information security managers and users.Computer & Security,28(6),476-490.
-
Anderson, R. M.,May, R. M.(1991).Infectious Diseases of Humans: Dynamics and Control.Oxford:Oxford University Press.
-
Bailey, N. T. J.(1975).The Mathematical Theory of Infectious Diseases and its Application.London:Charles Griffin.
-
Chen, Z.,Gao, L.,Kwiat, K.(2003).Modeling the spread of active worms.Proceedings of IEEE INFOCOM2003,San Francisco, California, USA:
-
Cho, K.,Lee, J.,Lim, J.,Moon, J.(2007).Verification method of network simulation for pervasive environments.Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops,Nice, France:
-
Cohen, F.(1984).Computer viruses theory and experiments.Proceedings of the 7th DoD/NBS Computer Security Conference,Gaithersburg, Maryland, USA:
-
Farmer, J. D.,Belin, A. d''A.(1991).Artificial life: the coming evolution.Artificial Life II,California:
-
Ferbrache, D.(1992).A Pathology of Computer Viruses.London:Springer-Verlag.
-
Forrester, J. W.(1961).Industrial Dynamics.Combridge:MIT Press.
-
Highland, Harold Joseph(1990).The Computer Virus Handbook.Oxford:Elsevier Science.
-
Hoppensteeadt, F.,Waltman, P.(1970).A problem in the theory of epidemics.Mathematical Biosciences,9,71-91.
-
Hruska, J.(1990).Computer Viruses and Anti-virus Warfare.New York:Ellis Horwood.
-
Kephart, J. O.,White, R. S.(1993).Measuring and modeling computer virus prevalence.Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy,Oakland, California, USA:
-
Kephart, J. O.,White, R. S.(1991).Directed-graph epidemiological models of computer virus.Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy,Oakland, California, USA:
-
Kotulic, A. G.,Clark, J. G.(2004).Why there aren't more information security research studies.Information & Management,41(5),597-607.
-
Ludwig, M. A.(1996).The Little Black Book of Computer Viruses.Arizona, USA:American Eagle Publucations.
-
Mishra, B. K.,Pandey, S. K.(2010).Fuzzy epidemic model for the transmission of worms in computer network.Nonlinear Analysis: Real World Applications,11(5),4335-4341.
-
Peter, S.(2005).The Art of Compter Virus Research and Defense.Boston:Addison Wesley Professional.
-
Piqueira, J. R. C.,Araujo, V. O.(2009).A modified epidemiological model for computer viruses.Applied Mathematics and Computation,213(2),355-360.
-
Post, G.,Kagan, A.(2000).Management tradeoffs in anti-virus strategies.Information & Management,37(1),13-24.
-
Qing, S.,Wen, W.(2005).A survey and trends on Internet worms.Computer & Security,24(4),334-346.
-
Senge, P. M.(1990).The Fifth Discipline: The Art and Practice of the Learning Organization.New York:Doubleday.
-
Silva, L.,Backhouse, J.(2003).The circuits-of-power framework for studying power in institutionalization of information systems.Journal of the Association for Information Systems,4(6),294-336.
-
Smith, S.,Winchester, D.,Bunker, D.,Jamieson, R.(2010).Circuits of power: a Study of mandated compliance to an information systems security De Jure standard in a government organization.MIS Quarterly,34(3),463-486.
-
Stallings, W.(2006).Cryptography and Network Security Principles and Practices.New Jersey:Pearson Prentice Hill.
-
Sterman, J. D.(1989).Modeling management behavior: misperceptions of feedback in a dynamics decision making experiment.Management Science,35(3),321-339.
-
Sterman, J. D.(2000).Business Dynamics: System Thinking and Modeling for a Complex World.New York:McGraw-Hill.
-
Sterman, J. D.,Wittenberg, J.(1999).Path dependence, competition, and succession in the dynamics of scientific revolution.Organization Science,10(3),322-341.
-
Wang, F.,Zhang, Y.,Wang, C.,MA, J.,Moon, S.(2010).Stability analysis of a SEIQV epidemic model for rapid spreading worms.Computers & Security,29(4),410-418.
-
Whitman, M. E.,Mattord, H. J.(2008).Management of Information Security.Boston:Thomson Course Technology.
-
Wierman, J. C.,Machette, D. J.(2004).Modeling computer virus prevalence with a Susceptible-Infected-Susceptible model with reintroduction.Computational Statistics & Data Analysis,45(1),3-23.
-
Yang, Y.,Fang, Y.,Li, L. Y.(2008).The analysis of Propagation model for Internet worm based on active vaccination.Proceedings of Fourth International Conference on Natural Computation,Jinan, China:
-
Yuan, H.,Chen, G.,Wu, J.,Xiong, H.(2009).Towards controlling virus propagation in information systems with point-to-group information sharing.Decision Support Systems,48(1),57-68.
-
Zou, C. C.,Gong, W.,Towsley, D.(2002).Code red worm propagation modeling and analysis.Proceedings of 9th ACM Symposium on Computer and Communication Security,Washington, DC, USA:
-
林宜隆、黃讚松(2001)。網路犯罪學之探討。中央警察大學學報,38,325-348。
-
張宏琳(2007)。碩士論文(碩士論文)。中國,中國陝西師範大學智能信息處理與信息安全研究所。
-
郭家宏(2005)。碩士論文(碩士論文)。花蓮縣,國立東華大學企業管理研究所。
-
蔡思達(2007)。碩士論文(碩士論文)。臺北市,國立臺灣科技大學資訊管理系。
-
蘇懋康(1988)。系統動力學原理及應用。中國上海:上海交通大學出版社。
|