共 22 条
[1]
Information Security Management Part 2: Specification for Information Security Management Systems, (1999)
[2]
COBIT: Control Objectives, (1998)
[3]
Drazin R., Van De Ven A.H., Alternative forms of fit in contingency theory, Administrative Science Quarterly, 30, 4, pp. 514-539, (1985)
[4]
Eloff M.M., Solms S.H.V., Information security management: An approach to combine process certification and product evaluation, Computers & Security, 19, 3, pp. 698-709, (2000)
[5]
Flynn N.L., The Epolicy Handbook: Designing and Implementing Effective E-mail, Internet and Software Policies, (2001)
[6]
Gollmann D., Computer Security, (1999)
[7]
Gupta M., Charturvedi A.R., Metha S., Valeri L., The experimental analysis of information security management issues for online financial services, ICIS 2000, pp. 667-675, (2001)
[8]
Information Technology Code of Practice for Information Services, (2000)
[9]
Kabay M.E., The NCSA Guide to Enterprise Security, (1996)
[10]
Kaplan A., The Conduct of Inquiry, (1964)