共 25 条
[1]
Alberts C., Dorofee A., Managing Information Security Risks: The OCTAVE Approach, (2002)
[2]
Ammann P., Jajodia S., Liu P., Recovery from malicious transactions, IEEE Transactions on Knowledge and Data Engineering, 14, 5, pp. 1167-1185, (2002)
[3]
Andersen T.J., Information technology, strategic decision making approaches and organizational performance in different industrial settings, Journal of Strategic Information Systems, 10, 2, pp. 101-119, (2001)
[4]
Badenhorst K., Eloff J., The effect of intrusion detection management methods on the return on investment, Computers & Security, 13, 5, pp. 411-435, (1994)
[5]
Bradley P., Managers look to supply chain to cut costs, Logistics Management and Distribution Report, 38, 1, pp. 21-22, (1999)
[6]
Chopra K., Wallace W., Trust in electronic commerce, Proceedings of the 36th Annual Hawaii International Conference on System Sciences, 9, pp. 331-340, (2003)
[7]
Dhillon G., Torkzadeh G., Value focused assessment of information system security in organizations, Information Systems Journal, 16, 3, (2006)
[8]
Guarro S., Principles and procedures of the iram approach to information system risk analysis and management, Computers & Security, 6, 6, pp. 493-504, (1987)
[9]
Gupta M., Rees J., Chaturvedi A., Chi J., Matching information security vulnerabilities to organizational security profiles: A genetic algorithm approach, Decision Support Systems, 41, 3, pp. 592-603, (2006)
[10]
Jiang X., Landay J.A., Modeling privacy control in context-aware systems, IEEE Pervasive Computing, 1, 3, pp. 59-63, (2002)