中文部份:
1.李東峰、林子銘,(2002)。“資訊主管對企業資訊安全之風險控管決策”,資訊管理研究,7 月號第四卷,第二期。
2.林清山,(1995)。心理與教育統計學。台北:東華書局。
3.孫思源,(2001)。 由社會交換理論探討資訊系統委外夥伴關係之影響因素,國立中山大學資訊管理研究所博士論文。4.許婉倫,(2000)。“中小企業e 化面面觀”,資訊與電腦,(6 月),67-122。
5.陳偉智 (2000)。 高科技產業補貼競爭之研究,政治大學經濟學研究所碩士論文。6.曾淑惠,(2002)。以BS 7799 為基礎評估銀行業的資訊安全環境,淡江大學資訊管理學系碩士論文。7.葉嘉綺,(2003)。高階主管安全意識及環境不確定性對企業資訊安全活動成效之影響,國立高雄第一科技大學資訊管理研究所碩士論文。8.劉永禮,(2001)。以BS7799資訊安全管理規範建構組織資訊安全風險管理模式之研究,元智大學工業工程與管理學系碩士論文9.iThome 2004 電腦週刊, 170, pp.54-61
10.iThome 2005 電腦週刊, 171, pp.64-68
11.http://www.symantec.com/region/tw/avcenter/threat_report.html
英文部份:
1.Atreyi KanKanhalli, Teo Hock-Hai, Tan Bernard C.Y., Wei Kwok-Kee, 2003, “An integrative Study of information Systems security effectiveness,” International Journal of Information Mnagement, 23, pp.139-154.
2.Barsanti, C. 1999, Modern network complexity needs comprehensive security. Security, 36(7), 65–68.
3.Blumstein, A., 1978, “Introduction in Deterrence and Incapacitation:Estimating the Effects of Criminal Sanctions on Crime Rates,” A.Blumstein, J. Cogen and D. Nagin (eds.), National Academy of Sciences, Washington, DC.
4.Brancheau, J. C., Janz, B. D., & Wetherbe, J. C. 1996, Key issues in information systems management: 1994–95 SIM Delphi results. MIS Quarterly, 20(2), 225–242.
5.Bruce Murphy, Rik Buren and Steve Schlarman, 2000, “Enterprise Security Architecture,” Information Systems Security, May-June, pp.18-31.
6.BS 7799-1 1999, “Information Security Management- Part 1: Code of Practice for Information Security Management,” British Standards Institution, London.
7.BS 7799-2 1999, “Information Security Management- Part 2: Specification for Information Security Management Systems,” British Standards Institution, London.
8.Burger, K., 1993, “The new age of anxiety,” Insurance and Technology, 18(10), pp.48-54.
9.Carnoy, M. (1985), “High Technology and International Labor Markets,” International Labor Review, Vol. 124, pp. 643-659.
10.Cerveny, R. P. and G. L. Sanders, 1986, “Implementation and Structural Variables,” Information & Management, 11, pp.191-198.
11.Damanpour, F. 1991, “Organizational innovation: A meta-analysis of effects of determinants and moderators,” Academy of Management Journal, 34(3), 555–590.
12.DeLone, W. H., 1988, “Determinants of Success for Computer Usage in small business,”MIS Quarterly (12: 1), March 1988, pp.51-61.
13.Dixon, R., Marston, C., and Collier, P., 1992, “Report on the Joint CIMA and IIA Computer Fraud Survey,”Computers & Security (11: 4), July, pp.307-313.
14.Dunn, Thurman Stanley, 1982, “Methodology for the Optimization of Resources in the Detection of Computer Fraud,”doctoral disseration, University of Arizona.
15.Ein-Dor, P., & Segev, E. 1978, “Organizational context and the success of management information systems,” Management Science, 24(10), 1064–1077.
16.Eloff, J. H. P. 1988, “Computer security policy: Important issues,”Computers and Security, 7(6), 559–562.
17.Forcht, K., 1994, “Computer Security Management,” Boyd & Fraser, Danvers, MA.
18.Gable, G.G., “Consultant Engagement for First Time Computerization: a Pro-Action Client Role in Small Business,” Information& Management, Vol. 20, No. 2, 1991, pp. 83-93.
19.Ginzberg, M. J., 1981, “Key Recurrent Issues in the MIS Implementation Process,”MIS Quarterly (5: 2), June, pp.47-59.
20.Gopal, R. D., & Sander, G. L., 1997, “Preventive and deterrent controls for software piracy,” Journal of Management Information Systems, 13(4), pp.29-47.
21.Goodhue, D. L., & Straub, D. W., 1991, “Security concerns of system users:A study of perceptions of the adequacy of security,”Iinformation and Management, 20(1), pp.13-27.
22.Grupp, H. 1996, “Knowledge-Intensive and Resource-Concerned Growth in Germany,” Research Evaluation, Vol. 2.
23.Hoffer, J. A., & Straub, D. W., 1989, “The 9 to 5 Underground : Are you Policing Computer Crimes?” Sloan Management Review, (30:4), Summer, pp.35-44.
24.Hoffer, J. A., & Straub, D. W. (1994). “The 9 to 5 underground: Are you policing computer crimes?” In P. Gray,W. R. King, E. R. Mclean, & H. Watson (Eds.), Management of information systems (pp. 388–401). Fort Worth, TX: Harcourt Brace.
25.Hsaio, David K, Kerr, Douglas S., and Madnick, Stuart E., 1979, “Computer Security,” Academic Press, New York.
26.Thong James Y.L., Yap Chee-Sing, Raman K.S., 1996, “Top Management Support, External Expertise and Information Systems Implementation in small Business,”Information Systems Research, Vol7(2), June, pp.248-267.
27.Jarvenpaa, S. L., & Ives, B., 1991,“Information technology and corporate strategy:A view from the top,”Iinformation Systems Research, 1(4), pp.351-375.
28.Kaiser, H. F., 1974, “Little Jiffy, Mark IV,” Educational and Psychology Measurement, Vol. 34, pp.100-117.
29.Keen, P. G. W. and M. S. Scott- Morton, 1978, “Decision Support Systems: An Organizational Perspective,”Addison-Wesley, Reading, MA.
30.Kwon , T. H. and R. W. Zmud ,1987,“Unifying the Fragmented Models of Information Systems Implementation,” in R. J. Boland, Jr. and R.A. Hirscheim(Eds.), Critical Issues in Information Systems Research,Wiley,New York.
31.Lucas, H. C., Jr., “Implementation: The Key to Successful Information Systems,” McGraw-Hill, New York.
32.Martin, J., 1973, “Security, Accuracy, and Privacy in Computer Systems,” Prentice-Hall, Englewood Cliffs, NJ.
33.Nance, W.D., & Straub, D. W., 1988, “An investigation into the use and usefulness of security software in detecting computer abuse,” Proceedings of the ninth annual international conference on information systems, pp.283-294.
34.Olnes, J. 1994, “Development of security policies,”Computers and Security, 13(8), 628–636.
35.Panettieri, J. C., 1995, “Informationweek/Ernst and Young security survey,” Informationweek, 555. pp.32-37.
36.Parker, D. B., 1981, “Computer Security Management,”Reston Publishing, Reston, VA.
37.Parker, D. B. (1983). “Fighting computer crime,” New York, NY: Scribner.
38.Pearson, F. S., & Weiner, N. A., 1985, “Toward an intergration of criminological theories,” Journal of Crime and Criminology, 76(1) ,pp.116-150.
39.Power, E., 2001,“2001 CSI/FBI Computer Crime and Security Survey,” Computers Security Journal, 8(2), pp.29-51.
40.Reich, B. H., & Benbasat, I. (1990). An empirical investigation of factors influencing the success of customer oriented strategic systems. Information Systems Research, 1(3), 325–347.
41.Straub, Detmar W., 1986,“Computer Abuse and Computer Security:Update on an Empirical,” Security Audit, and Control Review, ACM Special Interest Group Journal, 4, pp.21-31.
42.Straub D. W. Jr., Welke, R. J. , 1998, “Coping with Systems Risk:Security for Management Decision Making,”MIS Quarterly, December, pp.441-469.
43.Thong, J. Y. L., Yap, C. S., & Raman, K. S. (1996). “Top management support, external expertise and information systems implementation in small businesses,” Information Systems Research, 7(2), 248–267.
44.Title, C.R. “Sanctions and Social Deviance: The Question of Deterrence,” Praeger Publishers, New York, 1980.
45.White, G. B., Fisch, E. A., & Pooch, U. W. (1996). Computer system and network security. Boca Raton, FL: CRC Press.
46.Yap, C. S., Soh, C. P. P., & Raman, K. S., 1992,“Information system success factors in small business,” Omega, 20(5), pp.597-609.
47.Yehuda, Baruch, 1997, High Technology Organization-what it is, what it isn’t. International Journal of Technology Management. 13(2): 179-195
48.Zviran, M., & Haga, W., 1999, “Password Security:An empirical study,” Journal of Management Information Systems, 15(4), pp.161-185.