参考文献
|
-
李科逸(2013)。國際因應智慧聯網環境重要法制研析-歐盟新近個人資料修法與我國建議。科技法律透析,25(12),41-62。
連結:
-
林育震(2010)。掌控風險-發揮雲端效益。資訊安全通訊,16(4),138-149。
連結:
-
莊祐軒,羅乃維(2013)。物聯網安全的現況與挑戰。資訊安全通訊,19(4),16-29。
連結:
-
Akhtaruddin, M.,Ohn, J.(2016).Internal control deficiencies, investment opportunities, and audit fees.International Journal of Accounting and Finance,6(2),127-144.
-
Amid, A.,Moradi, S.(2013).A Hybrid Evaluation Framework of CMM and COBIT for Improving the Software Development Quality.Journal of Software Engineering and Applications,6(5),280-288.
-
Anderson, D. J., & Eubanks, G. (2015). Governance and internal control: lLeveraging COSO across the three lines of defense. Retrieved April 27, 2016, from 2016 https://na.theiia.org/standards-guidance/Public%20Documents/2015-Leveraging-COSO-3LOD.pdf
-
Ayre, C.,Scally, A. J.(2014).Critical values for Lawshe's content validity ratio revisiting the original methods of calculation.Measurement and Evaluation in Counseling and Development,47(1),79-86.
-
Babar, S.,Mahalle, P.,Stango, A.,Prasad, N.,Prasad, R.(2010).Proposed security model and threat taxonomy for the internet of things (IoT).Proceedings of International Conference on Network Security and ApplicationsIn Recent Trends in Network Security and Applications,Chennai, India:
-
Baldini, G.,Peirce, T.,Handte, M.,Rotondi, D.,Gusmeroli, S.,Piccione, S.,Copigneaux, B.,Le Gall, F.,Melakessou, F.,Smadja, P.,Serbanati, A.,Stefa, J.(2013).Internet of Things Privacy, Security, and Governance.Internet of things – Converging technologies for smart environments and integrated ecosystems,Aalborg:
-
Barnaghi, P.,Cousin, P.,Malo, P.,Serrano, M.,Viho, C.(2013).Simpler IoT word (s) of tomorrow, more interoperability challenges to cope today.Internet of things – Converging technologies for smart environments and integrated ecosystems,Aalborg:
-
Barnaghi, P.,Sheth, A.,Henson, C.(2013).From data to actionable knowledge: big data challenges in the web of things.IEEE Intelligent Systems,28(6),6-11.
-
Baxter, P.,Jack, S.(2008).Qualitative case study methodology: Study design and implementation for novice researchers.The Qualitative Report,13(4),544-559.
-
Beasley, M. S.,Clune, R.,Hermanson, D. R.(2005).Enterprise risk management: An empirical analysis of factors associated with the extent of implementation.Journal of Accounting and Public Policy,24(6),521-531.
-
Bohli, J. M.,Gruschka, N.,Jensen, M.,Iacono, L. L.,Marnau, N.(2013).Security and privacy-enhancing multicloud architectures.IEEE Transactions on Dependable and Secure Computing,10(4),212-224.
-
Brender, N.,Markov, I.(2013).Risk perception and risk management in cloud computing: Results from a case study of Swiss companies.International Journal of Information Management,33(5),726-733.
-
BSI. (2013). ISO/IEC 27001:2013. The British Standards Institution. Retrieved November 29, 2016, from http://www.bsigroup.com/en-GB/iso-27001-information-security/ISOIEC-27001-Revision/
-
Chang, S. I.(2005).An alternative methodology for Delphi-type research in IS key issues studies.International Journal of Management and Enterprise Development,3(1-2),147-168.
-
Chen, S.,Xu, H.,Liu, D.,Hu, B.,Wang, H.(2014).A vision of IoT: Applications, challenges, and opportunities with China perspective.IEEE Internet of Things Journal,1(4),349-359.
-
Chen, X. Y.,Jin, Z. G.(2012).Research on key technology and applications for internet of things.Physics Procedia,33(2012),561-566.
-
Cooper, D. R.,Schindler, P. S.(2001).Business research methods.Glasgow:McGraw-Hill Higher Education.
-
CSA. (2013). The Notorious Nine: Cloud Computing Top Threats in 2013. Cloud Security Alliance, Retrieved October 12, 2014 from https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf
-
Dalkey, N.,Helmer, O.(1963).An experimental application of the Delphi method to the use of experts.Management Science,9(3),458-467.
-
De Cremer, D.,Nguyen, B.,Simkin, L.(2016).The integrity challenge of the Internet-of-Things (IoT): On understanding its dark side.Journal of Marketing Management,33(1-2),145-158.
-
De Haes, S.,Van Grembergen, W.,Debreceny, R. S.(2013).COBIT 5 and Enterprise Governance of Information Technology: Building Blocks and Research Opportunities.Journal of Information Systems,27(1),307-324.
-
De Oliveira, S. B.,Valle, R.,Mahler, C. F.(2010).A comparative analysis of CMMI software project management by Brazilian, Indian and Chinese companies.Software Quality Journal,18(2),177-194.
-
Debreceny, R. S.,Gray, G. L.(2013).IT governance and process maturity: A multinational field study.Journal of Information Systems,27(1),157-188.
-
Del Giudice, M.(2016).Discovering the Internet of Things (IoT) within the business process management: A literature review on technological revitalization.Business Process Management Journal,22(2),263-270.
-
Domingo, M. C.(2012).An overview of the Internet of Things for people with disabilities.Journal of Network and Computer Applications,35(2),584-596.
-
Domingo, M. C.(2012).An overview of the internet of underwater things.Journal of Network and Computer Applications,35(6),1879-1890.
-
Domingo, M. C.(2011).Securing underwater wireless communication networks.IEEE Wireless Communications,18(1),22-28.
-
Dos Santos, R. P.,De Oliveira, K. M.,Da Silva, W. P.(2009).Evaluating the service quality of software providers appraised in CMM/CMMI.Software Quality Journal,17(3),283-301.
-
Doughty, K. (2011). The Three Lines of Defence Related to Risk Governance. Retrieved April 27, 2016, from http://www.isaca.org/Journal/archives/2011/Volume-5/Documents/11v5-The-Three-Lines-of-Defence-Related-to-Risk-Governance.pdf
-
Eisenhardt, K. M.(1989).Building theories from case study research.Academy of Management Review,14(4),532-550.
-
Everett, C.(2011).A risky business: ISO 31000 and 27005 unwrapped.Computer Fraud & Security,2011(2),5-7.
-
Feagin, J. R.(Ed.),Orum, A. M.(Ed.),Sjoberg, G.(Ed.)(1991).A case for the case study.Chapel Hill:UNC Press Books.
-
Feng, M.,Li, C.,McVay, S.(2009).Internal control and management guidance.Journal of Accounting & Economics,48(2-3),190-209.
-
Fox, R.(2007).Gowin's knowledge vee and the integration of philosophy and methodology: A case study.Journal of Geography in Higher Education,31(2),269-284.
-
Galliers, R. D.,Leidner, D. E.(2014).Strategic information management: challenges and strategies in managing information systems.New York:Routledge.
-
Gerring, J.(2006).Case study research: Principles and practices.New York:Cambridge University Press.
-
Gordon, K. O.,Czekanski, W. A.,DeMeo, J. A.(2016).Assessing the influence of sport security operations on the guest experience: Using the Delphi method to understand practitioner perspectives.Journal of Sport Safety and Security,1(1),1-13.
-
Gowin, D. B.(1981).Educating.New York:Cornell University Press.
-
Gubbi, J.,Buyya, R.,Marusic, S.,Palaniswami, M.(2013).Internet of Things (IoT): A vision, architectural elements, and future directions.Future Generation Computer Systems,29(7),1645-1660.
-
Hair, J. F.,Black, B.,Babin, B.,Anderson, R. E.,Tatham, R. L.(2006).Multivariate data analysis.Upper Saddle River, NJ:Pearson/Prentice Hall.
-
Hanafin, S.(2004).Review of literature on the Delphi Technique.Dublin:National Children's Office.
-
Hardy, K.(2014).Enterprise risk management: A guide for government professionals.CA:John Wiley & Sons.
-
Hill, K. Q.,Fowles, J.(1975).The methodological worth of the Delphi forecasting technique.Technological Forecasting and Social Change,7(2),179-192.
-
Holden, M. C.,Wedman, J. F.(1993).Future issues of computer-mediated communication: The results of a Delphi study.Educational Technology Research and Development,41(4),5-24.
-
ISACA(2011).COBIT mapping: Overview of international IT guidance.Rolling Meadows, IL:ISACA.
-
ISACA(2011).Global status report on the governance of enterprise IT (GEIT)-2011.Rolling Meadows, IL:ISACA.
-
Kabir, M.,Rusu, L.(2016).IT project development using capability maturity model.Information Resources Management Journal,29(4),35-48.
-
Kaplan, R. S.,Mikes, A.(2012).Managing risks: A new framework.Harvard Business Review,90(6),48-60.
-
Kaufmann, P. R.(2016).Integrating factor analysis and the Delphi method in scenario development: A case study of Dalmatia, Croatia.Applied Geography,71,56-68.
-
Kranz, M.,Roalter, L.,Michahelles, F.(2010).Things that twitter: Social networks and the internet of things.What can the Internet of Things do for the Citizen (CIoT) Workshop at The Eighth International Conference on Pervasive Computing (Pervasive 2010),Helsinki, Finland:
-
Krishnan, J.(2005).Audit committee quality and internal control: An empirical analysis.The Accounting Review,80(2),649-675.
-
Lawshe, C. H.(1975).A quantitative approach to content validity.Personnel psychology,28(4),563-575.
-
Ledesma, R. D.,Valero-Mora, P.(2007).Determining the number of factors to retain in EFA: An easy-to-use computer program for carrying out parallel analysis.Practical Assessment, Research & Evaluation,12(2),1-11.
-
Madakam, S.,Ramaswamy, R.,Tripathi, S.(2015).Internet of Things (IoT): A literature review.Journal of Computer and Communications,3(5),164-173.
-
McGregor, C.,Schiefer, J.(2004).A Web-service based framework for analyzing and measuring business performance.Information Systems and E-Business Management,2(1),89-110.
-
Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. Retrieved June 10, 2014 from https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-145.pdf
-
Mihaela, D.,Iulian, S.(2012).Internal control and the impact on corporate governance, in Romanian listed companies.Journal of Eastern Europe Research in Business & Economics,2012,1-10.
-
Nelson, K.,Clarke, J.,Stoodley, I.,Creagh, T.(2015).Using a capability maturity model to build on the generational approach to student engagement practices.Higher Education Research & Development,34(2),351-367.
-
Novak, J.(2002).Meaningful learning: The essential factor for conceptual change in limited or inappropriate prepositional hierarchies leading to empowerment of learners.Science Education,86(4),548-571.
-
Novak, J. D.(1998).Learning, creating, and using knowledge: Concept maps as facilitative tools in schools and corporations.Mahwah, NJ, US:Lawrence Erlbaum Associates Press.
-
Novak, J. D.,Gowin, D. B.(1984).Learning how to Learn.England:Cambridge University Press.
-
Ordanini, A.,Rubera, G.(2010).How does the application of an IT service innovation affect firm performance? A theoretical framework and empirical analysis on ecommerce.Information & Management,47(1),60-67.
-
Parry, V. K. A.,Lind, M. L.(2016).Alignment of Business Strategy and Information Technology Considering Information Technology Governance, Project Portfolio Control, and Risk Management.International Journal of Information Technology Project Management,7(4),21-37.
-
Pathak, J.(2005).Risk management, internal controls and organizational vulnerabilities.Managerial Auditing Journal,20(6),569-577.
-
Pereira, R.,Almeida, R.,da Silva, M. M.(2013).How to generalize an information technology case study.Proceedings of the 8th International Conference on Design Science at the Intersection of Physical and Virtual Design (DESRIST 2013),Helsinki, Finland:
-
Rahimian, F.,Bajaj, A.,Bradley, W.(2016).Estimation of deficiency risk and prioritization of information security controls: A data-centric approach.International Journal of Accounting Information Systems,20,38-64.
-
Roche, N.,Reddel, H.,Martin, R.,Brusselle, G.,Papi, A.,Thomas, M.,Postma, D.,Thomas, V.,Rand, C.,Chisholm, A.,Price, D.(2014).Quality standards for real-world research. Focus on observational database studies of comparative effectiveness.Annals of the American Thoracic Society,11(2),99-104.
-
Saripalli, P.,Walters, B.(2010).Quirc: A quantitative impact and risk assessment framework for cloud security.Proceedings of the 2010 IEEE 3rd international conference on cloud computing,Miami, Florida, USA:
-
Seawright, J.,Gerring, J.(2008).Case selection techniques in case study research a menu of qualitative and quantitative options.Political Research Quarterly,61(2),294-308.
-
Skinner, R.,Nelson, R. R.,Chin, W. W.,Land, L.(2015).The Delphi method research strategy in studies of information systems.Communications of the Association for Information Systems,37(2),31-63.
-
Spira, L. F.,Page, M.(2003).Risk management: The reinvention of internal control and the changing role of internal audit.Accounting, Auditing & Accountability Journal,16(4),640-661.
-
Sutton, S. G.,Khazanchi, D.,Hampton, C.,Arnold, V.(2008).Risk analysis in extended enterprise environments: Identification of critical risk factors in B2B e-commerce relationships.Journal of the Association for Information Systems,9(3-4),151-174.
-
The Institute of Internal Auditors (2013). The three lines of defense in effective risk management and control: Is your organization positioned for success? Retrieved December 2, 2016, from https://na.theiia.org/news/Pages/The-Three-Lines-of-Defense-in-Effective-Risk-Management-and-Control-Is-Your-Organization-Positioned-for-Success.aspx
-
Van Grembergen, W.,De Haes, S.(2009).Enterprise governance of information technology: Achieving strategic alignment and value.New York:Springer Science & Business Media.
-
Weber, R. H.(2010).Internet of Things–New security and privacy challenges.Computer Law & Security Review,26(1),23-30.
-
Weill, P.,Ross, J. W.(2004).IT governance: How top performers manage IT decision rights for superior results.Harvard Business Press.
-
Xue, Y.,Liang, H.,Boulton, W. R.(2008).Information technology governance in information technology investment decision processes: The impact of investment characteristics, external environment, and internal context.MIS Quarterly,32(1),67-96.
-
Yoo, Y.(2010).Computing in everyday life: A call for research on experiential computing.MIS Quarterly,34(2),213-231.
-
Zhou, H.(2012).The internet of things in the cloud: A middleware perspective.Boca Raton:CRC press.
-
江榮倫、廖柏侖(2014)。新興科技風險管控系列-淺談物聯網的安全隱憂與挑戰。勤業眾信聯合會計師事務所企業風險服務,取自 2015 年 6 月 15 日,http://www2.deloitte.com/tw/tc/pages/risk/articles/newsletter-11-43.html/
-
花俊傑(2012)。雲端運算安全入門(一):了解雲端之上的安全風險。網管人, 取自 2012 年 10 月 31 日,https://www.netadmin.com.tw/article_content.aspx?sn=1112150006
-
科技新報TechNews(2015)。Gartner:2016年使用中的物聯網件數量將達64億。Retrieved April 30, 2016, from http://technews.tw/2015/11/17/gartner-2016-iot/#more-121673
|