Список литературы |
1. Arnesen D. W. & Weis, W. L. Developing an effective company policy for employee internet and email use // Journal of organizational culture, communications and Conflict, 2007, 11. P. 53–67.
2. Austin R. D. & Darby, C. A. The Myth of Secure Computing. Harvard Business Review, 2003, 81. P. 120–126.
3. Baskerville R. & Siponen, M. An information security meta-policy for emergent organizations // Information Management and Computer Security, 2002,15, Р. 337–346.
4. Besnard D. & Arief, B. Computer security impaired by legitimate users // Computers & Security, 2004, 23. P. 253–264.
5. Brynjolfsson E. & Hitt L. Paradox Lost? Firm-Level Evidence on the Returns to Information Systems // Management Science, 1996, 42. P. 541–558.
6. Calder A Van Bom, J. Implementing Information Security Based on ISO 27001/ISO 17799. Van Haren Publishing, 2006.
7. Churchill Gilbert A. Jr Marketing Research, Methodological Foundations. The Dryden Press, 1997.
8. David J. Policy enforcement in the workplace // Computers and Security, 2002, 21. P. 506–513.
9. Desouza K. C. & Vanapalli G.K. Securing knowledge in organizations: lessons from the defence and intelligence sectors // International Journal of Information Management, 2005, 25. P. 85–98.
10. Dhillon G. Managing Information Systems Security, Macmillan Press, London, 1997.
11. Dhillon G. & Backhouse J. Information System Security Management in the New Millennium // Communications of the ACM, 2000, 43. P. 125–128.
12. Dhillon G. Realizing Benefits of an information security program // Business Process Management Journal, 2004, 10, Р. 21–22.
13. Dhillon G. & Torkzadeh G. Value-Focused Assessment of Information System Security in Organizations // Information Systems Journal, 2006, 16, р. 293–314.
14. Doherty N. F., King M. & Al-Mushayt O. The impact of inadequacies in the treatment of organizational issues on information systems development projects, Information and Management, 2003, 41, р. 49–62.
15. Doherty N. F. & Fulford H. Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis // Information Resources Management Journal, 2005, 18, р. 21–38.
16. D. T. I. Information security breaches survey, Department of Trade & Industry, 2004.
17. Drucker P. F. The Coming of the New Organization // Harvard Business Review, 1988, 66, р. 45–53.
18. Fulford H. & Doherty N. F. The application of information security policies in large UK-based organizations // Information Management and Computer Security, 2003, 11, р. 106–114.
19. Gaston S. J. Information Security: Strategies for Successful Management. Toronto: CICA, 1996. Р. 18.
20. Garg A., Curtis J. & Halper H. Quantifying the financial impact of information security breaches // Information Management and Computer Security, 2003, 11, р. 74–83.
21. Hagen J.M., Albrechtsen E. & Hovden J. Implementation and effectiveness of organizational information security measures // Information Management & Computer Security, 2008, 16, р. 377–397.
22. Higgins H. N. Corporate system security: towards an integrated management approach // Information Management and computer Security, 1999, 7, р. 217–222.
23. Hinde S. Security surveys spring crop // Computers and Security, 2002, 21, р. 310–321.
24. Hone K. & Eloff J. H. P. Information security policy- what do international security standards say // Computers & Security, 2002, 21, р. 402–409.
25. Hone K. & Eloff J. H. P. What makes an effective information security policy // Network Security, 2002, 20, р. 14–16.
26. Hong K., Chi Y. Chao L. & Tang, J. An empirical study of information security policy on information security elevation on Taiwan // Information Management and Computer Security, 2006, 14, р. 104–115.
27. I.S.O Information technology – Security Techniques – Code of practice for information security management – ISO 17799. International Standards Organization, Geneva, 2005.
28. Johannessen J-A, Olsen B. Knowledge Management and sustainable competitive advantages: The impact of dynamic contextual training // International Journal of Information Management, 2003, 23, р. 277–289.
29. Karyda M. Kiountouzis E. & Kokolakis S. Information security policies: a contextual perspective // Computers & Security, 2005, 24, р. 246–260.
30. Kotulic A. J. & Clark J. G. Why there aren’t more information security research studies // Information and Management, 2004, 41, р. 597–607.
31. Lindup K. R. A new model for information security policies // Computers & Security, 1995, 14, р. 691–695.
32. Loggie K. A., Barron A. E., Gulitz E., Hohlfield T. N., Kromrey J.D. & Venable M. An analysis of Copyright policies for distance learning materials at Major Research Universities // Journal of Interactive Online Learning, 2006, 5, р. 224–231.
33. Markus M.L. Technochange management: using IT to drive organizational change // Journal of Information Technology, 2004, 19, р. 4–20.
34. Mok K. H. Fostering entrepreneurship: Changing role of government and highe education governance in Hong Kong // Research Policy, 2005, 34, р. 537–554.
35. Moule B. & Giavara L. Policies, procedures and standards: an approach for implementation // Information Management and Computer Security, 1995, 3, р. 7–16.
36. Paula R., Ding X., Dourish P., Nies K., Pillet B., Redmiles D.F. Ren J., Rode J. A. & Filho R. S. In the eye of the beholder: a visualization-based approach to information security // International Journal of Human-Computer Studies, 2005, 63, р. 5–24.
37. Peppard J. The Conundrum of IT Management // European Journal of Information Systems, 2007, 16, р. 336–345.
38. Porter M.E. & Millar, V. How Information Gives you Competitive Advantage // Harvard Business Review, 1985, 63, р. 149–160.
39. Rees J., Bandyopadhyay S. & Spafford E. H. PFIRES: A Policy Framework for Information Security // Communications of the ACM, 2003, 46, р. 101–106.
40. Saleh M. S., Alrabiah A. & Saad H. B. Using ISO 17799; 2005 Information Security Management: a STOPE View with Six Sigma Approach // International Journal of Network Management, 2007, 17, р. 85–97.
41. Sheehan N. T. & Stabell C. B. Discovering new business models for knowledgeintensive organizations // Strategy & Leadership, 2007, 25, р. 22–29.
42. Siponen M Policies for construction of information systems’ security guidelines // Proceedings of 15th International Information Security Conference (IFIPTC11/SEC2000), Beijing, China, 2000, August, р. 111–120.
43. Sircar S. & Choi J. A study of the impact of Information Technology on firm performance: a flexible production function approach // Information Systems Journal, DOI: 10.1111/j.1365-2575.2007.00274.x .
44. Solms B. & von Solms R. The ten deadly sins of information security management // Computers & Security, 2004, 23, 371–376.
45. Sterne D. F. On the buzzword ‘security policy’ // Proceedings of the IEEE Symposium on Research in Security and Privacy, 1991, р. 19–230.
46. Straub D. W. & Welke R. J. Coping with systems risk: Security planning models for management decision making // MIS Quarterly, 1998, 22, р. 441–470.
47. Toit A. S. A. Competitive intelligence in the knowledge economy: what is in it for South African manufacturing enterprises // International Journal of Information Management, 2003, 23, р. 111–120.
48. Wadlow T. A. The Process of Network Security. Reading, MA: Addison-Wesley, 2000.
49. Ward J. & Peppard J. Strategic Planning for Information Systems, Wiley: Chester, 2002.
50. Wiant T. L. Information security policy’s impact on reporting security incidents // Computers & Security, 2005, 24, р. 448–459.
51. Whitman. In defense of the realm: understanding threats to information security // International Journal of Information Management, 2004, 24, р. 3–4.
52. Zammuto R.F., Griffith T. L. Majchrzak A., Dougherty D.J. & Faraj S. Information Technology and the Changing Fabric of Organization // Organization Science, 2007, 18, р. 749–762.
53. THES (The Times Higher Education Supplement) // University World Rankings\\\\\\\'.2007, November 5. Available at: http://www.timeshighereducation.co.uk/Magazines/THES/ graphics/WorldRankings2007.pdf (date access: 01.04.2021). Text: electronic.
|