A. H. Van de Ven, A. Delbecq, R. Koenig. (1976). “Determinants of coordination modes within organizations,” American Sociological Review, vol.41, no.4, pp. 322-328.
A. C. Amason and D. M. Schweiger. (1994). “Resolving the paradox of conflict, strategic decision making and organizational performance.” International Journal of Conflict Management, vol.5, pp.239-253.
B. H. Raven, A. W. Kruglanski. (1970). Conflict and Power, Academic Press Inc., New York., pp.69-109.
Bagozzi, R.P. & Youjae Yi. (1988). On the Evaluation of Structural Equation Models,
Journal of the Academy of Marketing Science , vol.16, no.1, pp.74-94.
Bartlett, C.A., Ghoshal, S. (1989). Managing Across Borders. The Transnational Solution, Boston, Mass:Harvard Business School Press.
BS 7799-1. (1997). “Information Security Management-Part1: Code of Practic e for Information Security Management, BS7799-1:1999,” BSI(British Standards Institution).
D. Cray. (1984). “Control and coordination in multinational corporations,” Journal of International Business Studies, vol.15, no.3, pp. 85-98.
Devellis, R. F. (1991). Scale development: Theory and application. Newbury Park, CA:Sage
Dellecave, T. Jr. (1996). Insecurity: Is Technology Putting Your Company’s Primary
Asset-It’s Information-At Risk?, Sales & Marketing Management,39-50.
De Dreu, K. W. Carsten& Annelies E.M. Van Vianen. (2001). “Managing relationship conflict and the effectiveness of organizational teams.” Journal of Organizational Behavior, vol.22, pp.309-328.
DeChurch, A. Leslie, & Michelle A. Marks. (2001). “Maximizing the benefits of task conflict: The role of conflict management.” International Journal of Conflict Management. vol.12, no.1, pp.4-22.
F. D. Davis. (1989). “Perceived usefulness, perceived ease of use, and user acceptance of information technology,” MIS Quarterly, vol.13, no.3, pp. 319-340.
F. D. Davis, R. P. Bagozzi, and P. R. Warshaw. (1989). “User Acceptance of Computer Technology:A Comparison of Two Theoretical Model,” Management Science, vol.35, no.8, pp.982-1003.
H. Guestzkow, and J. Gyr. (1954). ”An analysis of conflict in decision-making group.” Human Relations, vol.7, pp.367-381.
Hair, J. F., Anderson, R. E., Tatham, R. L. & Black. W. C. (2009). Multivariate Data Analysis, New Jersey: Prentice-Hall.
ISO, “Information Technology – Code of practice for information security management, ISO/IEC 17799:2000,” ISO.
ISF. (2002). “Effective security awareness – workshop report”, Information Security Forum.
ISF. (2003). “The standard of good practice for information security Version 4.0”, Information Security Forum.
J. Child. (1972). “Organization structure and strategies of control: Areplication of the Aston study,” Administrative Science Quarterly, vol.17, no.1, pp. 163-177.
J. R. Koehler. (1978). Public communication. New York: Macmillan Publishing Inc., pp.94-101.
J.I. Martinez, J. C. Jarillo. (1991).“Coordination demands of international strategies,” Journal of International Business Studies, vol.9, no.4, pp. 429-444.
K. W. Thomas, Conflict and management. In Dunnette, M. D.(ed). (1976). “Handbook of Industrial and Organizational Psychology.” Chicago: Rand McNally.
Koehler, J.R. (1978). Public communication. New York: Macmillan Publishing Inc.,
pp.94-101.
K.W. Thomas. (1992). Conflict and negotiation process in organizations, Handbook of Industrial and Organizational Psychology, Palo Alto, CA: Consulting Psychologist Press, pp.651-717.
K. A. Jehn. (1995). “A multimethod examination of the benefits and detriments of intragroup conflict.” Administrative Science Quarterly, vol.40, pp.256-283.
Karen A. Jehn, Clint. Chadwick,& Sherry M. B. Thatcher. (1997). “To agree or not to agree: The effects of value congruence, individual demographic dissimilarity, and conflict on workgroup outcomes.” International Journal of Conflict Management, vol.8, pp.287-306.
K. A. Jehn, G. B. Northcraft, and M. A. Neale. (1999). “Why difference make a difference: A field study of diversity, conflict, and performance in workgroups.” Administrative Science Quarterly. vol.44, pp.741-763.
L. R. Pondy. (1967). “Organizational Conflict: Concepts And Models,” Administrative Science Quarterly, vol.12, no.2, pp. 296-320.
Malone, T. W., & Crowston, K. (1990). What is coordination theory and how can it help design cooperative work systems?. (D. Tatar)Proceedings of the Third Conference on Computer-supported Cooperative Work (CSCW). Los Angeles, CA: ACM Press. doi:10.1145/99332.99367.
Marsh, H. W., J. R. Balla & R.P. McDonald. (1998). Goodness of Fit Indexes in Confirmatory Factor Analysis: The Effect of Sample Size, Psychological Bulletin, vol.103, no.3, pp.391-410.
P. R.Lawrence and J. W. Lorsch. (1969). “Organization and environment: Managing differentiation and integration,” Journal of Management, 22 , pp. 113-137.
Priem, Richard.and P. Kenneth. (1991). ”Process and outcome expectations for the dialectical inquiry, devil’s advocacy, and consensus techniques of strategic decision making.” Group and Organization studies, vol.16, pp.206-225.
P. Williams, Andersen. (2001). “Information security governance,” Information security technical report, vol.6, no.3, pp. 60-70.
R. M. Steers. (1991). Organizational behavior 4th ed., New York : Haper Collins Publisher.
S. P. Robbins. (1992). Organizational behavior :concept , controversies, and application, New Jersey:Prentice Hall International Ltd.
S. P. Robbins. (1998). Organizational behavior (8th ed.). Englewood Cliffs, N. J.: Prentice-Hall.
Wall, A. Jr. James & Callister. (1995). “Conflict and its management.” Journal of Management, vol.21, pp.515-558.
張勝貴,2015,國際標準整合管理模式之研究-以ISMS、PIMS暨QMS為例,
國防大學管理學院資訊管理學系碩士班碩士論文。
黃郁育,2014,資訊安全管理系統版本差異之導入流程整合,國立中山大學資訊管理學系碩士論文。李昀徽,2016,組織變革知覺、工作滿意度與變革抗拒心態之關係研究,國立中山大學資訊管理學系碩士論文。張正宏,2012,探討銀行業ISO/IEC 27001:2005資訊安全管理現況-以T銀行為例,國立中央大學資訊管理學系碩士論文。李坤達,2012,證劵業資訊人員資訊安全認知對資安治理影響之研究,淡江大學資訊管理學系碩士在職專班碩士論文。蔡慈芸,2013,以創新擴散理論探討醫療院所導入ISMS之研究,國立成功大學經營管理碩士學位學程碩士論文。劉維宗,2007,資訊安全成熟度之校園實證研究-科技接受模式與組織協調觀點,國立台北商業技術學院商學研究所碩士論文。杜偉欽,2006,結合HIPAA與ISO27001為基礎探討醫療院所資訊管理之研究,國立成功大學工程科學研究所碩士論文。王天健,2010,植基於ISO27001:2005之跨產業資訊安全管理系統比較—以高科技產業與傳統產業為例,國立中正大學資訊管理研究所碩士論文。洪國興、季延平、趙榮耀,「組織制定資訊安全政策對資訊安全影響之研究」,資訊管理研究,第三卷,2003,頁65-96。
魏文欽、黃素芬,「台灣不動產服務業顧客滿意度因果關係實證研究」,International Journal of LISREL,Vol. 1,No. 1,March,2008,pp.1~22。
唐震、劉維宗,「以科技接受模式探討資訊安全管理-以大專電算中心為例」,Web Journal of Chinese Management Review,Vol. 13,No. 4,November 2010。
黃冠文、莊文勝、張弘毅,「支援階層式資料保護之資訊安全風險管理系統」,Cryptology and Information Security Conference 2011。
林玉山(2010),導入ISO 27001 ISMS資訊安全管理系統:以醫療院所核心資料庫安全性的策略和方法為例,電腦稽核,第22期,頁90-102。林勤經、樊國楨、黃景彰(2002),資訊安全管理系統建置工作之研究,資訊管理研究,第四卷,第二期,頁43-65。
曹中天 (2003),管理資訊系統,鼎茂圖書。
邱皓政(2005),量化研究法(二):「統計原理與分析技術」,雙葉書廊。
吳萬益(2008),企業研究方法,華泰文化。
吳明隆、涂金堂(2006),SPSS與統計應用分析,五南圖書。
邱皓政(2003),結構方程模式,LISREL的理論技術與應用,雙葉書廊。
陳順宇(2007),結構方程模式,心理出版社。
楊世瑩(2014),SPSS 22 統計分析嚴選教材,碁峯。
吳明隆(2007),SPSS 問卷分析與應用統計,易學。
古永嘉、楊雪蘭(2014),企業研究方法,華泰文化。
林信惠、黃明祥、王文良(2010),軟體專案管理,智勝。
林欽榮(1988),「管理心理學」,五南。
謝安田(1992),「企業管理」,五南。
吳萬益、林清河(2000),「企業研究方法」,華泰出版社。