中文部分
[1] 鄧振源、曾國雄,1989,”層級分析法(AHP)的內在特性與應用”,中國統計學報,27卷,6期,頁5-22。[2] 鄧振源、曾國雄,1989,”層級分析法(AHP)的內在特性與應用”,中國統計學報,27卷,7期,頁1-20。[3] 葉牧青,1989,AHP層級結構設定問題之探討,國立交通大學管理科學研究所,碩士論文。[4] 黃亮宇, 1992,資訊安全規劃與管理,松崗電腦圖書出版社,台北。
[5] 姜文閔譯,1992,我們如何思維。譯自John Dewey: How we think(1933),五南出版社,台北。
[6] 刀根薰著,1993,競賽式決策制定法─AHP入門,陳名揚譯,建宏出版社,台北。
[7] 吳瑞明,1994,”系統安全的問題與防護措施”,資訊與教育雜誌,頁6-12。[8] 劉國昌、劉國興,1995,資訊安全,儒林圖書公司,台北。
[9] 張真誠、婁德權,1995,”資訊系統安全之對策”,資訊與教育,59期,頁41-47。[10] 王學弘,1995,以分析層級程序法進行彈性系統製造商之評選,中原大學工業工程研究所,碩士論文。[11] 謝清佳,1998,資訊管理,智勝文化公司,台北。
[12] 黃慶堂,1999,我國行政機關資訊安全管理之研究,政治大學公共行政系,碩士論文。[13] 謝清佳、吳琮璠,1999,資訊管理─理論與實務,資訊管理智勝文化事業,台北。
[14] 王秉鈞,1999,管理資訊系統,美商普林帝斯霍爾國際出版有限公司,台北。
[15] 佐藤隆博、齊藤昇、長谷川勝久,1999,中學校數學科の教材開發-コンセプトマップ.授業設計.達成度評價問題,明治圖書出版株式會社,東京。
[16] 曾雪卿,1999,提昇我國積體電路產業競爭優勢之關鍵因素,成功大學企業管理研究所,碩士論文。[17] 國家安全局,2000,建立我國資訊基礎建設安全機制研究報告書(本文),國家安全局。
[18] 陳祥輝,2000,資訊系統的管理安全與鑑識軌跡設計─基於MIB與資料庫之探討,中國文化大學資訊研究所,碩士論文。[19] 林傳敏,2000,”電腦稽核─網路世代不能沒有電腦稽核概念(上、下)”,企銀報導,199、200期。[20] 2001年資通安全報告,2001,http://www.icst.org.tw/template/ncert/2001secbook.doc
[21] 樊國禎、方仁威與徐士坦,2001a,建立我國通資訊基礎建設安全機制標準規範實作芻議研究報告書,經濟部標準檢驗局委辦計畫,頁1-52。
[22] 樊國禎、方仁威與林勤經,2001b,”資訊安全管理稽核概要─以電子銀行為例”,資訊系統可信賴作業體制研討會論文集,頁169-185。
[23] 李盈德,2001,”資訊安全防護Part1”,普華資安資訊,Available:www.powerinfosec.com/article/Info%20Policy.PDF。
[24] 吳昊,2001,由醫療資訊隱私之觀點論全民健保IC卡政策,國立台灣大學法律學研究所,碩士論文。[25] 劉永禮,2001,以BS7799資訊安全管理規範建構組織資訊安全風險管理模式之研究,元智大學工業工程與管理系,碩士論文。[26] 樊國禎,2002,資訊安全能力評鑑,行政院國家科學委員會科學技術資料中心。
[27] 葉相妤,2002,運用BS 7799檢測醫療院所資訊安全管理作業文件之研究,陽明大學衛生資訊與決策研究所,碩士論文。
[28] 行政院勞工委員會職訓練局資訊安全管理作業準則,2002,http://www.evta.gov.tw/lawevta/202017.html
[29] 行政院國家資通安全會報技術服務中心,2002,資訊安全管理制度導入手冊,行政院國家資通安全會報技術服務中心,台北。
[30] 鄧振源,2002,計畫評估:方法與應用,海洋大學運籌規劃與管理研究中心,基隆。
[31] 行政院研考會,2002,電子商務風險與管理。
[32] 國家資通安全會報技術服務中心,2003,ICST九十二年執行成果彙編, [online],Available:www.icst.org.tw。
英文部分
[1] BSI (British Standards Institution), 1999, Information security management- Part 2: Specification for information security management systems, BS 7799-2.
[2] BSI (British Standards Institution), 2000, Information security management- Part 1: Code of paractice for information security management, BS 7799-1.
[3] BS7799Home,2002,http://www.dnv.com/certification/Services/Info_pages/info_bs.htm
[4] Busacker, R. G. & Saaty, T. L., 1965, Finite Graphs and Networks: An Introduction with Applications, McGraw-Hill, New York.
[5] Baskerville, R., 1993, “An Analytical Survey of Information Systems Security Design Methods: Implications for Information Systems Development”, ACM Computing Surveys, vol.25, no.4, pp.375-414, December.
[6] COBIT, 1998, Governance, Control and Audit for Information and Relational Technology, 3rd Edition Control Objectives.
[7] Caelli, W., D. Longley & M. Shain, 1989, Information Security for Managers, Stockton Press, New York.
[8] Finne, T., 2000, “Information Systems Risk Management: Key Concepts and Business Processes” , Computers & Security, vol.19, no.3, pp.234-235.
[9] Gollmann, D., 1999 , Computer Security, John Wiley & Sons Ltd, UK.
[10] Hill, J. D. and Warfield, J. N., 1972, “Intent structures. IEEE Transactions on Systems, Man, and Cybernetics”, SMC-2, pp.133-140.
[11] Hutt, A. E., 1995, Management’s Role in Computer Security, Computer Security Handbook, Wiley, New York.
[12] Hakimi, S. L., 1972, ”To view networks as graphs”, IEEE Circuit Theory Soc.Newsl., pp.2-6.
[13] IBM, 1984, IBM Data Security Support Programs, USA.
[14] ISO/IEC 17799, 2000, ”Information technology-code of practice for information security management”.
[15] ISO 15408, 1999, Introduction to the Common Criteria for IT Security, http://csrc.nist.gov/cc/info/japan-brief-990318.pdf
[16] Kaufmann, A., 1965, The Science of Decision-Making, McGraw-Hill, New York.
[17] Lacity, M. C., Willcocks, L. P. & Frrny, D. F., 1996, “The value of selective IT sourcing”, Sloan management Review, pp. 13-25, Spring.
[18] Moulton, R., 1991, ”A Strategic Framework for Information Security Management”, Proceedings of the 14th Computer Security Conference, Washington D.C , October 1991.
[19] Miller, G.A., 1956, “The Magical Number Seven Plus or Minus Two Some Limits on our Capacity for Processing Information”, Psychological Rev., vol. 63, pp.81~97.
[20] OECD, 1992, Guidelines for the Security of Information System, OECD.
[21] OECD, 2001, “OECD Guidelines for the Security of Information Systems, Information Security Objective”, [online], Available: http://www-oecd.org/oecd /pages/home/displaygeneral/0,3390,EN-document-43-nodirectorate-no-no-10249,FF.html#title.
[22] OECD, 2002, OECD Guideline for the Security of Information System and Networks.
[23] Parker D.B., ”Information Security in a Nutshell”, Information Systems Security, Spring, 16.
[24] Pounder, C., 2001, “The European Union Proposal for a Policy towards Network and Informaion Security”, Computers & Security, vol.20, no.7, pp.573-576.
[25] Russell D. & G..T. Gangemi, 1992, Computer Security Basic, O’Reilly & Associates Inc., California.
[26] Rackham, Lawerence Frifdman & Richard Ruff, 1995, Getting Partnering Right: How Market Leaders Are Creating Long-term Competitive Advantage, McGraw-Hill, New York.
[27] Saaty, T., 1980, The Analytic Hierarchy Process, McGraw-Hill, New York.
[28] Saaty T. L. & Vargas L. G., 1991, Prediction, Projection and Forecasting, Kluwer Academic Publishers.
[29] Saaty T. L., 1994, “How to Make a Decision: The Analytic Hierarchy Process”, Interfaces, vol.24, pp19-43.
[30] Saaty T. L., 1990, Decision Making for Leaders: The Analytic Hierarchy Process for Decision in a Complex World, RWS Publications.
[31] Saaty T. L., Models, Methods, Concepts & Applications of the Analytic Hierarchy Process, Kluwer Academic Publishers, 2001.
[32] Saaty, T.L., 1977, “A scaling method for priorities in Hierarchical structures”, Journal of Mathematical Psychology, vol. 15, no.3, pp.234-281.
[33] Schneider, E. C. & Therkalsen, 1990, “How Secure Are Your System? ”, Avenues To Automation, pp. 68-72, November.
[34] Spruit, M. E. M. & M. Looijen,1996, ”IT Security in Dutch Practice”, Computer & Security , vol. 15, no. 2, pp.157-170.
[35] Van Duyn, J., 1985, The Human Factor in Computer Crime, Petrocelli Books Inc., Princeton, NJ.
[36] Warfield, J. N., 1973a, “On Arranging Elements of a Hierarchy in Graphic Form”, IEEE Transactions on Systems, Man, and Cybernetics, SMC3, vol. 2, pp.121-132.
[37] Warfield, J. N., 1973b, “Binary Matrices in System Modeling”, IEEE Transactions on Systems, Man, and Cybernetics, SMC3, vol.2, pp.133-140.
[38] Warfield, J. N., 1974a, “Toward Interpretation of Complex Structural Models”, IEEE Transactions on Systems, Man, and Cybernetics, SMC4, vol.5, pp.405-417.
[39] Warfield, J. N., 1974b, “Developing Interconnection Matrices in Structural Modeling”, IEEE Transactions on Systems, Man, and Cybernetics, SMC4, vol.1, pp.81-87.
[40] Warfield, J. N., 1977, “Crossing Theory and Hierarchy Mapping”, IEEE Transactions on Systems, Man, and Cybernetics, SMC7, vol. 7, pp.505-523.
[41] Warfield, J. N., 1979, “Some Principles of Knowledge Organization”, IEEE Transactions on Systems, Man, and Cybernetics, SMC9, vol.6.
[42] Wilson, D., 1969, “Forms of hierarchy: a selected bibliography”, Gen. Syst., vol. 14, pp.3-15.
[43] Zahedi F., 1986, “The Analytic Hierarchy Process: A Survey of the Method and its Applications”, Interfaces, vol.16, pp.96-108.