[1]刀根勳著,競賽是決策制定法—AHP入門,陳名楊譯,建宏出版社,台北,民國八十二年。
[2]中國國家標準,CNS 17799 資訊技術-資訊安全管理的實施要則,經濟部標準檢驗局,民國九十一年十二月。
[3]李順仁,資訊安全--第二版,台北市,文魁資訊,民國九十六年。
[4]辛宜聰,「國軍主計機構知識管理關鍵成功因素評估模之研究-Fuzzy AHP之應用」,元智大學,碩士論文,民國九十七年。[5]洪春娟,「台灣醫療機構資訊安全之研究」,屏東科技大學資管系,碩士論文,民國九十四年。[6]姜玉菁,「論電子病歷政策對醫療資訊安全所生之影響-從病患權利保護出發」,國立台北大學法學系,碩士論文,民國九十四年。
[7]莊梅櫻,「運用ISO17799 建立資訊安全管理自我評鑑模型-以某地區醫院病歷室為例」,中國文化大學資訊管理研究所,碩士論文,民國九十五年。[8]曾國雄、鄧振源,「層級分析法(AHP)的內涵特性與應用(上)」,中國統計學報,27(6),6~22,民國七十八年。[9]曾雪卿,提昇我國積體電路產業敬稱優勢之關鍵因素,成功大學企業管理研究所,碩士論文,民國八十八年。[10]張憶玲,IBM租賃模式可增加七成中小企業e化意願,電子時報,民國九十六年。
[11]張維君,網路犯罪愈演愈烈企業與個人都應嚴加防範,電子時報,民國九十七年。
[12]張詠翔,結合BS7799與資訊安全藍圖建構資訊安全評估機制之研究,27頁,民國九十三年。
[13]張保隆、鄭文英,「決策屬性具相關之分析層級統計模式」,交大管理學報,1(10),159-171,民國七十九年。
[14]葉牧青,AHP 層級結構設定問題之探討,交通大學管科研究所碩士論文,民國七十八年六月。[15]Avizienis, A. et al., Basic Concepts and Taxonomy of Dependable and Secure Computing, IEEE Transactions on Dependable and Secure Computing, IEEE ,Vol.1, No.1, pp.11~33, 2004.
[16]BSI (2005), “Information security management-- Part 1: Code ofpractice for information security management", BS 7799-1:2005, BSI.
[17]BSI (2005), “Information security management systems—Part2:Specification with guidance for use" , BS 7799-2:2005, BSI.
[18]Belton ,V . and A.E. Gear (), The Legitimacy of Rank Reversal-A Comment, Omega, 13(3),227-230. 1985.
[19]Caelli, W., D. Longley & M. Shain, Information Security for Managers,Stockton Press, New York. , 1989.
[20]Icove, Seger, and VonStorch, Computer Crime – A Crimefighter’s Handbook, California, CA : O’Reilly & Associates, 1995.
[21]Lacity, M. C., Willcocks, L. P. & Frrny, D. F., “The value of selective IT sourcing”, Sloan management Review, pp. 13-25, Spring. , 1996.
[22]McDaniel, George, ed. IBM Dictionary of Computing. New York, NY: McGraw-Hill, Inc., 1994.
[23]Millet, I. and P. T. Harker., Globally Effective Questioning In the Analytic Hierarchy Process, European Journal of Operational Research, 48,88-97,1990.
[24]Miller, G.A., “The Magical Number Seven Plus or Minus Two Some Limits on our Capacity for rocessing Information”, Psychological Rev., vol. 63, pp.81~97 , 1956.
[25]National Security Telecommunications and Information System Security Instruction, No. 4011.
[26]OECD, Guidelines for the Security of Information Systems and Networks - Towards a Culture of Security, Paris: OECD, July 2002. www.oecd.org
[27]Rackham, Lawerence Frifdman & Richard Ruff, Getting Partnering Right: How Market Leaders Are Creating Long-term Competitive Advantage, McGraw-Hill, New York , 1995.
[28]Smith, M. “Computer Security – Threats, Vulnerabilities and Countermeasures,” Information Age, pp.205-210, Oct. 1989.
[29]Saaty, T. L., The Analytic Hierarchy Process, New York: McGrae-Hill.,1980.
[30]Vargas, Luis G., “An overview of the Analytic Hierarchy Process and its applications,” European Journal of Operation Research, Vol. 48, No. 1, pp.2-8 , 1990.
[31]Zahedi F., “The Analytic Hierarchy Process: A Survey of the Method and its Applications”, Interfaces, vol.16, pp.96-108. , 1986.