共 42 条
[1]
Abu-Musa A.A., Exploring perceived threats of CAIS in developing countries: The case of Saudi Arabia, Managerial Auditing Journal, 21, 4, pp. 387-407, (2006)
[2]
Abu-Musa A.A., Exploring information technology governance (ITG) in developing countries: An empirical study, The International Journal of Digital Accounting Research, 7, 13, pp. 71-117, (2007)
[3]
Abu-Musa A.A., Exploring COBIT processes for ITG in Saudi organizations: An empirical study, The International Journal of Digital Accounting Research, 9, pp. 99-126, (2009)
[4]
Abu-Musa A.A., Exploring the importance and implementation of COBIT processes in developing countries: An empirical study, Information Management & Computer Security, 17, 2, pp. 73-95, (2009)
[5]
Allen J.H., Westby J.R., Governing for Enterprise Security (GES): Implementation Guide, Article 1: Characteristics of Effective Security governance, (2007)
[6]
Veiga D.A., Eloff J.H., An information security governance framework, Information Systems Management, 24, 4, pp. 361-372, (2007)
[7]
Eloff J.H.P., Eloff M., Integrated information security architecture, Computer Fraud & Security, 11, pp. 10-16, (2005)
[8]
Entrust, Information Security Governance (ISG): An Essential Element of Corporate governance, (2004)
[9]
Hong K.-S., Chi Y.-P., Chao L.R., Tang J.-H., An integrated system theory of information security management, Information Management & Computer Security, 11, 5, pp. 243-248, (2003)
[10]
Huang S.-M., Lee C.-L., Kao A.-C., Balancing performance measures for information security management: A balanced scorecard framework, Industrial Management & Data Systems, 106, 2, pp. 242-255, (2006)