王別瑄,2022,影響傳統製造業導入智慧製造之關鍵因素-以S化纖公司為例,未出版碩士論文,中原大學商學院企業管理學系,桃園。王涵雁,2021,應用模糊德菲法探討國際彩繪造型競賽之得獎關鍵因素-以World Bodypainting Festival,未出版碩士論文,國立屏東科技大學技職教育研究所,屏東。江南志,2019,建築設計審議許可的決策傾向與決策溝通之研究,未出版博士論文,國立臺灣科技大學設計學院建築研究所,台北。李智明、紀彥斌,2021,消費者選擇影音服務平台之關鍵因素-使用層級分析法,輔仁管理評論,28(2),23-54。
余泳儒、江為國、黃仁竑、李新林,2017,TWAREN網路應用-以大學甄選入學系統為例,載於東海大學(主編),TANET2017 臺灣網際網路研討會(265-270)。
何雅惠,2022,以模糊德爾菲法探討海域遊憩活動風險之研究,未出版碩士論文,國立成功大學工學院水利及海洋工程學系,台南。林彥良,2020,遠距工作的資安風險與防護重點,會計研究月刊,(414),56-62。
林志達,2019,工業製程轉型浪潮下的工控資安,電工通訊季刊,54-69。
徐雅鈴,2018,應用修正式德菲法架構及AHP層級分析建立供應商評選決策模型 - 以A公司之勞務外包為例,未出版碩士論文,國立交通大學工學院工程技術與管理學程,新竹。
孫嘉明、邱靜宜、林宜隆,2017,持續性稽核技術整合架構-以主計資訊系統為例,電腦稽核,(35),80-95。
陳佳秀,2017,創新的密碼檔案外洩偵測機制,未出版碩士論文,國立成功大學電機資訊學院電腦與通信工程研究所,台南。陳佑寰,2022,反映企業內控治理水準 - 資安事故應變揭露有原則,NetAdmin 網管人,(201),51-52。
陳岱君,2018,在OpenStack上使用分散式路由器設計與實作具備高可用性的異質負載均衡器架構,未出版碩士論文,國立交通大學資訊科學與工程研究所,新竹。黃明哲,2019,企業資訊安全管理之關鍵因素探討,未出版碩士論文,國立臺北科技大學經營管理系,台北。黃怡芸,2020,營運持續管理系統(BCMS)之資訊系統導入實務,證券服務,(679),47-50。
黃献誠,2019,運用修正式德菲法及層級分析法(AHP)探究公共工程採行專業營建管理制度對於進度管理之影響,未出版碩士論文,國立交通大學工學院工程技術與管理學程,新竹。黃峻嘯,2022,應用層級分析法評估進入企業資源規劃服務國際市場之決策分析,未出版碩士論文,國立臺灣大學管理學院在職專班資訊管理組,台北。黃富祿、張力允、李仁鐘、周碩聰,2010,組織導入雲端運算之資安管理評估,資訊安全通訊,16(4),66-83。
葉雲雲,2023,內部稽核推動資訊安全治理,內部稽核,(121),4-8。
劉祉君,2018,基於瀏覽器之分散式阻斷服務攻擊防禦技術研究,資訊安全通訊, 24(1), 1-17.
劉峻正、張家臻、賴香如、蔡兆勳、明金蓮、董貞吟,2020,運用德菲法建構醫師健康職能專業知能指標之研究,Taiwan Journal of Publich Health/Taiwan Gong Gong Wei Sheng Za Zhi,(39),3。
鄭淑玲,2021,國民中學校園安全指標之建構,未出版碩士論文,國立政治大學,台北。蔡翼擎、黃翎榛、陳家羚、王馨儀、陳儀倫、林立晴、許芳瑜,2018,以層級分析法探索臺灣手遊產業建構有效創業模式之關鍵決策因子,管理資訊計算,7(1),71-89。
蔡權昱,2012,NCTU CStack:OpenStack 與 Ceph 的整合與應用,未出版碩士論文,國立交通大學資訊科學與工程研究所,新竹。魏銪志、吳易昇,2022,多產業資訊安全風險評鑑機制之研究,電腦稽核(45),43-65。
羅慧萍,2022,應用層級分析法建構企業併購之決策模型,未出版碩士論文,國立臺灣大學管理學院在職專班財務金融組,台北。蘇聖凱,2012,應用德菲法與層級分析法建構研發外包供應商評選模式
–以消費型桌上電腦為例,未出版碩士論文,國立臺灣科技大學工業管理系碩士在職專班,台北。
Adamov, A., Carlsson, A., & Surmacz, T. (2019, Sep). An analysis of lockergoga ransomware. In 2019 IEEE East-West Design & Test Symposium (EWDTS) (pp. 1-5). IEEE.
Alessa, L., Moon, S., Griffith, D., & Kliskey, A. (2018). Operator driven policy: Deriving action from data using the quadrant enabled Delphi (QED) method. Homeland Security Affairs, 14.
Alkhalil, Z., Hewage, C., Nawaf, L., & Khan, I. (2021). Phishing attacks: A recent comprehensive study and a new anatomy. Frontiers in Computer Science, 3, 563060.
Alwan, Z. S., & Younis, M. F. (2017). Detection and prevention of SQL injection attack: a survey. International Journal of Computer Science and Mobile Computing, 6(8), 5-17.
Baginda, Y. P., Affandi, A., & Pratomo, I. (2018). Analysis of RTO and RPO of a Service Stored on Amazon Web Service (AWS) and Google Cloud Engine (GCE). In 2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE) (pp. 418-422). IEEE.
Benitez, C. (2023, Jan 2). 31+ Latest WeChat Statistics For 2023: Usage, Facts, And Trends [Online]. Retrieved on June 24, 2023, from https://startupbonsai.com/wechat-statistics/
Dalkey, N., & Helmer, O. (1963). An experimental application of the Delphi method to the use of experts. Management science, 9(3), 458-467.
Diamond Paul. (2020, Sep 25). Cloud storage vs. on-premises servers: 9 things to keep in mind [Online]. Retrieved on June 24, 2023, from https://www.microsoft.com/en/microsoft-365/business-insights-ideas/resources/cloud-storage-vs-on-premises-servers
Ehrenfeld, J. M. (2017). Wannacry, cybersecurity and health information technology: A time to act. Journal of medical systems, 41, 1-1.
Hazel, E. (2022, Oct 25). 23 Essential Google Search Statistics for 2022 [Online]. Retrieved on June 24, 2023, from https://fitsmallbusiness.com/google-search-statistics/
Johnson, J. (2021). Number of e-mails per day worldwide 2017-2025. Statista. com, 7.
Kahraman, C., & Otay, I. (2018). Solar PV power plant location selection using a Z-fuzzy number based AHP. International Journal of the Analytic Hierarchy Process, 10(3).
Kuo, Y. F., & Chen, P. C. (2008). Constructing performance appraisal indicators for mobility of the service industries using Fuzzy Delphi Method. Expert systems with applications, 35(4), 1930-1939.
Loveland, S., Dow, E. M., LeFevre, F., Beyer, D., & Chan, P. F. (2008). Leveraging virtualization to optimize high-availability system configurations. IBM Systems Journal, 47(4), 591-604.
Lee, S., & Ross, S. (1995). Disaster recovery planning for information systems. Information Resources Management Journal (IRMJ), 8(3), 18-24.
Lin, Y. (2020). 10 WhatsApp statistics every marketer should know in 2021. Retrieved on June 24, 2023, from https://www.oberlo.co.za/blog/whatsapp-statistics.
Meng, G., Liu, Y., Zhang, J., Pokluda, A., & Boutaba, R. (2015). Collaborative security: A survey and taxonomy. ACM Computing Surveys (CSUR), 48(1), 1-42.
Miranda, H. (2022, Aug 9). The World Is Moving Beyond Big Data, According to Ocient Survey of 500 Data and Technology Leaders. Retrieved on June 24, 2023, from https://finance.yahoo.com/news/world-moving-beyond-big-data-130000425.html
Mohsin, M. (2020). YouTube stats every marketer should know in 2020. 2021-01-25]. Retrieved on June 24, 2023, from https://www.oberlo.com/blog/youtube-statistics.
Murry, John W., Jr. & Hammons, James O. (1995) "Delphi: A Versatile Methodology for Conducting Qualitative Research. The Review of Higher Education, vol. 18 no. 4, 1995, p. 423-436. Project MUSE, doi:10.1353/rhe.1995.0008.
Naseer, A., Mir, R., Mir, A., & Aleem, M. (2020). Windows-based Ransomware: A Survey. Journal of Information Assurance & Security, 15(3).
Okoli, C., & Pawlowski, S. D. (2004). The Delphi method as a research tool: an example, design considerations and applications. Information & management, 42(1), 15-29.
Parikh, M., Verma, S. (2002). Utilizing Internet Technologies to Support Learning: an empirical analysis. International Journal of Information Management, 22(1), 27-46.
Petrenko, A. S. (2018, January). Protection model of PCS of subway from attacks type «wanna cry»,«petya» and «bad rabbit» IoT. In 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) (pp. 945-949). IEEE.
Petrenko, S. A., Vorobieva, D. E. (2021). Secure Software-Defined Storage.
Rowe, G., & Wright, G. (1999, Oct). The Delphi technique as a forecasting tool: issues and analysis. International journal of forecasting, 15(4), 353-375.
Saaty, T. L. (1996). Multicriteria decision making: The analytic hierarchy process. RWS Publ..
Saaty, T. L. (2008). Decision making with the analytic hierarchy process. International journal of services sciences, 1(1), 83-98.
Shirer, M. (2023, Sep 30). IDC Tracker Finds Spending on Compute and Storage Cloud Infrastructure Increased Strongly Across Most Regions in the Second Quarter of 2022. Retrieved on June 24, 2023, from https://www.idc.com/getdoc.jsp?containerId=prUS49732022
Taylor, P. (2021). Volume of data/information created, captured, copied, and consumed worldwide from 2010 to 2020, with forecasts from 2021 to 2025. IDC & Statista, Jun.
Usharani, S., & Sandhya, S. G. (2020). Detection of ransomware in static analysis by using Gradient Tree Boosting Algorithm. In 2020 International Conference on System, Computation, Automation and Networking (ICSCAN) (pp. 1-5). IEEE.
Vernon, W. (2009). The Delphi technique: a review. International Journal of Therapy and rehabilitation, 16(2), 69-76.
Wise, J. (2022, Jul 28). HOW MANY PICTURES ARE ON INSTAGRAM IN 2023?. Retrieved on June 24, 2023, from https://earthweb.com/how-many-pictures-are-on-instagram/
Yaqub, M. (2022). How Many Tweets per Day 2022 (New Data). Retrieved on June 24, 2023, from Renolon: https://www.renolon.com/number-of-tweets-per-day
Yu, K., Gao, Y., Zhang, P., & Qiu, M. (2015). Design and architecture of dell acceleration appliances for database (DAAD): A practical approach with high availability guaranteed. In 2015 IEEE 17th international conference on high performance computing and communications, 2015 IEEE 7th international symposium on cyberspace safety and security, and 2015 IEEE 12th international conference on embedded software and systems (pp. 430-435). IEEE.