中文部分
黃士銘, 張碩毅, 和蘇耿弘. (2006). 企業導入 BS7799 資訊安全管理系統之關鍵成功因素-以石化產業為例. 資訊管理學報, 13(2), 171-192.陳萬淇 (1995), 個案研究法, 台北, 華泰文化事業.
葉重新 (2001), 教育研究法, 台北, 心理出版社.
英文部分
Ambler, S. W. (2002), Introduction to the Enterprise Unified Process (EUP), A Ronin International. Inc, White Paper, 26.
Andrews, P. W. (1951), Industrial Analysis in Economics, Oxford Studies in the Price Mechanism, 139-172.
Bernus, P. (1999), Generalised Enterprise Reference Architecture and Methodology, Version 1.6. 3, IFIPIFAC Task Force on Architectures for Enterprise Integration.
Birdwell, J., Horn, R., Icove, D., Wang, T., Yadav, P., and Niezgoda, S. (1999), A Hierarchical Database Design and Search Method for CODIS, Paper Presented at the Tenth International Symposium on Human Identification.
Chalmeta, R., Campos, C., and Grangel, R. (2001), References Architectures for Enterprise Integration, Journal of Systems and Software, 57(3), 175-191.
Ferraiolo, D. F., Kuhn, D. R., and Chandramouli, R. (2003), Role-Based Access Control, Artech House. Inc, Norwood, MA.
Fowler, M. (2003), Patterns of Enterprise Application Architecture: Addison-Wesley Professional.
Group, M. (2002), Enterprise Architecture Desk Reference, META Group Inc.
GROUP, O (2002), The Open Group Architecture Framework TOGAF–Version 8, Enterprise Edition.
Hatala, M., Eap, T. M., and Shah, A. (2005), Federated Security: Lightweight Security Infrastructure for Object Repositories and Web Services, Paper Presented at the Next Generation Web Services Practices, 2005, NWeSP 2005. International Conference on.
HIRVONEN, A. (2005), Enterprise Architecture Planning in Practice, The Perspectives of Information and Communication Technology Service Provider and End-User, 135.
Hirvonen, A. P., Oyj, T., and Pulkkinen, M. (2004), A Practical Approach to EA Planning and Development: the EA Management Grid, Paper Presented at the 7th International Conference on Business Information Systems.
Jayaratna, N. (1994), Understanding and Evaluating Methodologies: NIMSAD, a Systematic Framework: McGraw-Hill, Inc.
Kienzle, D. M., and Elder, M. C. (2002), Final Technical Report: Security Patterns for Web Application Development, DARPA, Washington DC.
Lapkin, A. (2003), The Gartner Enterprise Architecture Framework, Paper Presented at the ITXPO Symposium, Gartner Inc.
Lee, Y.-J. (2005), A Dynamic Virtual Organization Solution for Web-Services Based Grid Middleware, Paper Presented at the Database and Expert Systems Applications, 2005, Proceedings, Sixteenth International Workshop on.
Lowe, G. (1997), A Hierarchy of Authentication Specifications, Paper Presented at the Computer Security Foundations Workshop, 1997, Proceedings., 10th.
Perks, C., and Beveridge, T. (2003), Guide to Enterprise IT Architecture: Springer-Verlag New York Incorporated.
Pulkkinen, M. (2006), Systemic Management of Architectural Decisions in Enterprise Architecture Planning, Four Dimensions and Three Abstraction Levels, Paper Presented at the System Sciences, 2006. HICSS'06, Proceedings of the 39th Annual Hawaii International Conference on.
Pulkkinen, M., and Hirvonen, A. (2005), Ea Planning, Development and Management Process for Agile Enterprise Development, Paper Presented at the System Sciences, 2005. HICSS'05. Proceedings of the 38th Annual Hawaii International Conference on.
Pulkkinen, M., Naumenko, A., and Luostarinen, K. (2007), Managing Information Security in a Business Network of Machinery Maintenance Services Business–Enterprise Architecture as a Coordination Tool, Journal of Systems and Software, 80(10), 1607-1620.
Putman, J. (2001), Architecting with Rm-odp: Prentice Hall PTR.
Rosenfeld, S. A. (1995), Industrial-Strength Strategies, Regional Business Clusters and Public Policy, Washington, DC.
Russell, D., and Gangemi, G. (1991), Computer Security Basics: O'Reilly Media, Inc.
Shaikh, R. A., Rajput, S., Zaidi, S., and Sharif, K. (2005), Comparative Analysis and Design Philosophy of Next Generation Unified Enterprise Application Security, Paper Presented at the Emerging Technologies, 2005, Proceedings of the IEEE Symposium on.
Sowa, J. F., and Zachman, J. A. (1992), Extending and Formalizing the Framework for Information Systems Architecture, IBM systems journal, 31(3), 590-616.
Vermeulen, C., and Von Solms, R. (2002), The Information Security Management Toolbox–Taking the Pain out of Security Management. Information Management and Computer security, 10(3), 119-125.
Weiss, M. (2003), Patterns for Web Applications, Paper Presented at the Proc, PLOP 2003.
Whitman, L., Ramachandran, K., and Ketkar, V. (2001), A Taxonomy of a Living model of the Enterprise, Paper Presented at the Proceedings of the 33nd Conference on Winter Simulation.
Witty, R. (2003). The Identity and Access Management Market Landscape: Gartner Research Note COM-21-4534.
Yin, R. K. (1994), Case Study Research: Design And methods, California: SAGE Publications, Inc.
Zachman, J. A. (1987), A Framework for Information Systems Architecture, IBM systems journal, 26(3), 276-292.