参考文献
|
-
陳志誠,林淑瓊,劉用貴,趙乃青(2018)。BYOD 導入企業之關鍵管理因素:組織資訊安全管理觀點。資訊管理學報,25(1),76-102。
連結:
-
黃士銘,張碩毅,蘇耿弘(2006)。企業導入 BS7799 資訊安全管理系統之關鍵成功因素-以石化產業為例。資訊管理學報,13(2),171-192。
連結:
-
葉桂珍,張榮庭(2006)。企業之資訊安全策略與其產業別及資訊化程度關係探討。資訊管理學報,13(2),113-143。
連結:
-
(2019)。行政院國家資通安全會報 (2019) , 國家資通安全發展方案 (106 年至 109)。
-
(2021)。行政院國家資通安全會報 (2021) , 國家資通安全發展方案 (110 年至 113), https://cloudschool.chc.edu.tw/open-message/074738/getfile/6041e464285d5d58af198572.pdf。https://cloudschool.chc.edu.tw/open-message/074738/getfile/6041e464285d5d58af198572.pdf
-
https://www.tcrc.edu.tw/files/0news/106-109%E5%B9%B4%E5%9C%8B%E5%AE%B6%E8%B3%87%E9%80%9A%E5%AE%89%E5%85%A8%E7%99%BC%E5%B1%95%E6%96%B9%E6%A1%88.pdf
-
Aguilar, F. J.(1967).Scanning the Business Environment.New York:Macmillan.
-
Babatunde, B. O.,Adebisi, A. O.(2012).Strategic Environmental Scanning and Organization Performance in a Competitive Business Environment.Economic Insights-Trends & Challenges,64(1),24-34.
-
Balozian, P.,Leidner, D.(2017).Review of IS security policy compliance: Toward the building blocks of an IS security theory.The DATA BASE for Advances in Information Systems,48(3),11-43.
-
Bourgeois, L. J., III(1980).Strategy and Environment: A Conceptual Integration.The Academy of Management Review,5(1),25-39.
-
Bulgurcu, B.,Cavusoglu, H.,Benbasat, I.(2010).Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness.MIS Quarterly,34(3),523-548.
-
Chebo, A. K.,Kute, I. M.(2019).Strategic process and small venture growth: The moderating role of environmental scanning and owner-CEO.Journal of Small Business Strategy,29(3),60-77.
-
Chen, H.,Li, Y.,Yin, J.(2021).Understanding employees’ adoption of the Bring-Your-Own-Device (BYOD): the roles of information security-related conflict and fatigue.Journal of Enterprise Information Management,34(3),770-792.
-
Da Veiga, A.(2016).Comparing the information security culture of employees who had read the information security policy and those who had not.Information & Computer Security,24(2),139-151.
-
Deane, J.K.,Goldberg, D.M.,Rakes, T.R.,Rees, L.P.(2019).The effect of information security certification announcements on the market value of the firm.Information Technology and Management,20,107-121.
-
Diamantopoulou, V.,Tsohou, A.,Karyda, M.(2020).From ISO/IEC 27001:2013 and ISO/IEC 27002:2013 to GDPR compliance controls.Information & Computer Security,28(4),645-662.
-
Drozd, O.(2016).Privacy pattern catalogue: a tool for integrating privacy principles of ISO/IEC 29100 into the software development process.IFIP Advances in Information and Communication Technology book series (Tutorials, volume 476),Springer, Cham:
-
Ermicioi, N.,Liu, X.M.(2021).An Interdisciplinary Study of Cybersecurity Investment in the Nonprofit Sector.American Journal of Management,21(5),39-50.
-
Fahey, L.,Christensen, H. K.(1986).Evaluating the research on strategy content.Journal of Management,12(2),167-183.
-
Fahey, L.,King, W. R.,Narayanan, V. K.(1981).Environmental scanning and forecasting in strategic planning—the state of the art.Long range planning,14(1),32-39.
-
Fleisher, C.S.,Bensoussan, B.E.(2003).Strategic and Competitive Analysis: Methods and Techniques for Analyzing Business Competition.New Jersey:Prentice Hall.
-
Gluckman, R.(2014).Gluckman, R. (2014). Buzzing around China, Forbes Asia. April: 18-21..
-
Gupta, A.(2013).Environment & PEST analysis: an approach to the external business environment.International Journal of Modern Social Sciences,2(1),34-43.
-
Hartman, B.,Flinn, D. J.,Beznosov, K.(2002).Enterprise Security with EJB and CORBA.New Jersey:John Wiley & Sons.
-
Hausken, K.(2006).Income, interdependence, and substitution effects affecting incentives for security investment.Journal of Accounting and Public Policy,25(6),629-665.
-
Ho, J. K. K.(2014).Formulation of a systemic PEST analysis for strategic analysis.European Academic Research,2(5),6478-6492.
-
Ilvonen, I.(2013).Information security assessment of SMEs as coursework–learning information security management by doing.Journal of Information Systems Education,24(1),53-62.
-
ISO/IEC(2013).Information technology‒Security techniques‒Code of practice for information security controls (ISO/IEC 27002).Geneva, Switzerland:ISO.
-
Jerman-Blažič, B.,Tekavčič, M.(2012).Managing the investment in information security technology by use of a quantitative modeling.Information Processing & Management,48(6),1031-1052.
-
Jobber, D.,Ellis-Chadwick, F.(2016).Principles and Practice of Marketing.London:McGraw-Hill Education.
-
Jogaratnam, G.,Law, R.(2006).Environmental scanning and information source utilization: exploring the behavior of Hong Kong hotel and tourism executives.Journal of Hospitality & Tourism Research,30(2),170-190.
-
Johnson, G.,Whittington R.,Scholes K.(2011).Exploring corporate strategy: text & cases.London:Pearson education.
-
Jouini, M.,Rabai, L.B.A.,Khedri, R.(2021).A quantitative assessment of security risks based on amultifaceted classification approach.International Journal of Information Security,20,493-510.
-
Kang, M.,Hovav, A.(2020).Benchmarking Methodology for Information Security Policy (BMISP): Artifact Development and Evaluation.Information Systems Frontiers,22,221-242.
-
Kemp, M.,Kemp, M.(2005).Beyond trust: security policies and defence-in-depth.Network Security,2005(8),14-16.
-
Kinnunen, H.,Siponen, M.(2018).Developing organization-specific information security policies by using critical thinking.Proceedings of the 22nd Pacific Asia Conference on Information Systems,Yokohama, Japan:
-
Kissoon, T.(2020).Optimum spending on cybersecurity measures.Transforming Government: People, Process and Policy,14(3),417-431.
-
Kong, H.K.,Kim,Kim, J.(2012).An analysis on effects of information security investments: a BSC perspective.Journal of Intelligent Manufacturing,23(4),941-953.
-
Krippendorff, K.(2018).Content analysis: An introduction to its methodology.Thousand Oaks:Sage publications, CA..
-
Lin, I. C.,Lin, Y. W.,Wu, Y. S.(2016).Corresponding Security Level with the Risk Factors of Personally Identifiable Information through the Analytic Hierarchy Process.Journal of Computers,11(2),124-131.
-
Neuendorf, K. A.(2017).Content analysis guidebook.Thousand Oaks:Sage, CA..
-
Niemimaa, E.,Niemimaa, M.(2017).Information systems security policy implementation in practice: From best practices to situated practices.European Journal of Information Systems,26(1),1-20.
-
Orehek, S.,Petric, G.(2021).A systematic review of scales for measuring information security culture.Information & Computer Security,29(1),133-158.
-
Peng, G. C. A.,Nunes, M. B.(2007).Using PEST analysis as a tool for refining and focusing contexts for information systems research.6th European Conference on Research Methodology for Business and Management Studies,Lisbon, Portugal:
-
Puhakainen, P.,Siponen, M.(2010).Improving employees' compliance through information systems security training: an action research study.MIS Quarterly,34(4),757-778.
-
Rastogi, N.,Trivedi, M.(2016).PESTLE technique–a tool to identify external risks in construction projects.International Research Journal of Engineering and Technology,3(1),384-388.
-
Robbins, S. P.,Judge, T.(2022).Organizational Behavior.NY:Pearson New York.
-
Ryan, J. J.,Ryan, D. J.(2006).Expected benefits of information security investments.Computers & Security,25(8),579-588.
-
Shadbad, F.N.,Biros, D.(2022).Technostress and its influence on employee information security policy compliance.Information Technology & People,35(1),119-141.
-
Sherif, E.,Furnell, S.,Clarke, N.(2015).A Conceptual Model for Cultivating an Information Security Culture.International Journal for Information Security Research,5(2),565-573.
-
Stewart, H.,Jürjens, J.(2017).Information security management and the human aspect in organizations.Information and Computer Security,25(5),494-534.
-
Talib, M. S. B.,Hamid, A. B. A.,Zulfakar, M. H.,Jeeva, A. S.(2014).Halal logistics PEST analysis: the Malaysia perspectives.Asian Social Science,10(14),119-131.
-
Tsai, C.H.,Su, P.C.(2021).The application of multi-server authentication scheme in internet banking transaction environments.Information Systems and eBusiness Management,19(1),77-105.
-
Vintilă, G.,Gherghina, S. C.,Toader, D. A.(2019).Exploring the Determinants of Financial Structure in the Technology Industry: Panel Data Evidence from the New York Stock Exchange Listed Companies.Journal of Risk Financial Management,12(4),163-180.
-
Yu, C.P.,Chu, C.P.,Lu, P.H.(2018).Applying a Security Management Mechanism to a System Development Lifecycle.International Journal of E-Adoption,10(1),1-17.
|