References |
1. Arnesen D. W. & Weis, W. L. Journal of organizational culture, communications and Conflic (Journal of organizational culture, communications and Conflict), 2007, 11. P. 53–67.
2. Austin R.D. & Darby C. A. Harvard Business Review (Harvard Business Review), 2003, 81. P. 120–126.
3. Baskerville R. & Siponen M. Information Management and Computer Security (Information Management and Computer Security), 2002, 15, р. 337–346.
4. Besnard D. & Arief, B. Computers & Security (Computers & Security), 2004, 23, р. 253–264.
5. Brynjolfsson E. & Hitt L. Management Science (Management Science), 1996, 42. P. 541–558.
6. Calder A Van Bom, J. Implementing Information Security Based on ISO 27001/ISO 17799 (Implementing Information Security Based on ISO 27001/ISO 17799). Van Haren Publishing, 2006.
7. Churchill, Gilbert A. Jr Marketing Research, Methodological Foundations (Marketing Research, Methodological Foundations). The Dryden Press, 1997.
8. David J. Computers and Security (Computers and Security), 2002, 21. P. 506–513.
9. Desouza K. C. & Vanapalli G.K International Journal of Information Management (International Journal of Information Management), 2005, 25. P. 85–98.
10. Dhillon G. Managing Information Systems Security (Managing Information Systems Security), Macmillan Press, London, 1997.
11. Dhillon G. & Backhouse J. Communications of the ACM (Communications of the ACM), 2000, 43. P. 125–128.
12. Dhillon G. Business Process Management Journal (Business Process Management Journal), 2004, 10, Р. 21–22.
13. Dhillon G. & Torkzadeh G. Information Systems Journal (Information Systems Journal), 2006, 16, р. 293–314.
14. Doherty N. F., King M. & Al-Mushayt O. Information and Management (Information and Management), 2003, 41, р. 49–62.
15. Doherty N. F. & Fulford H. Information Resources Management Journal (Information Resources Management Journal), 2005, 18, р. 21–38.
16. D. T. I. Information security breaches survey (Information security breaches survey), Department of Trade & Industry, 2004.
17. Drucker P. F. Harvard Business Review (Harvard Business Review), 1988, 66, р. 45–53.
18. Fulford H. & Doherty N. F. Information Management and Computer Security (Information Management and Computer Security), 2003, 11, р. 106–114.
19. Gaston S. J. Information Security: Strategies for Successful Management (Information Security: Strategies for Successful Management). Toronto: CICA, 1996. Р. 18.
20. Garg A., Curtis J. & Halper H. Information Management and Computer Security (Information Management and Computer Security), 2003, 11, р. 74–83.
21. Hagen J.M., Albrechtsen E. & Hovden J. Information Management & Computer Security (Information Management & Computer Security), 2008, 16, р. 377–397.
22. Higgins H. N. Information Management & Computer Security (Information Management and computer Security), 1999, 7, р. 217–222.
23. Hinde S. Computers and Security Computers and Security, 2002, 21, р. 310–321.
24. Hone K. & Eloff J. H. P. Computers & Security (Computers & Security), 2002, 21, р. 402–409.
25. Hone K. & Eloff J. H. P. Network Security (Network Security), 2002, 20, р. 14–16.
26. Hong K., Chi Y. Chao L. & Tang, J. Information Management & Computer Security (Information Management and Computer Security), 2006, 14, р. 104–115.
27. I.S.O Information technology – Security Techniques –. Code of practice for information security management - ISO 17799 (Information technology – Security Techniques –. Code of practice for information security management - ISO 17799). International Standards Organization, Geneva, 2005.
28. Johannessen J-A, Olsen B. International Journal of Information Management (International Journal of Information Management), 2003, 23, р. 277–289.
29. Karyda M. Kiountouzis E. & Kokolakis S. Computers & Security (Computers & Security), 2005, 24, р. 246–260.
30. Kotulic A. J. & Clark J. G. Information and Management (Information and Management), 2004, 41, р. 597–607.
31. Lindup K. R. Computers and Security (Computers & Security), 1995, 14, р. 691–695.
32. Loggie K. A., Barron A. E., Gulitz E., Hohlfield T. N., Kromrey J.D. & Venable M. Journal of Interactive Online Learning (Journal of Interactive Online Learning), 2006, 5, р. 224–231.
33. Markus M. L. Journal of Information Technology (Journal of Information Technology), 2004, 19, р. 4–20.
34. Mok K. H. Research Policy (Research Policy), 2005, 34, р. 537–554.
35. Moule B. & Giavara L. Information Management & Computer Security (Information Management and Computer Security), 1995, 3, р. 7–16.
36. Paula R., Ding X., Dourish P., Nies K., Pillet B., Redmiles D.F. Ren J., Rode J. A. & Filho R. S. International Journal of Human-Computer Studies (International Journal of Human-Computer Studies), 2005, 63, р. 5–24.
37. Peppard J. European Journal of Information Systems (European Journal of Information Systems), 2007, 16, р. 336–345.
38. Porter M.E. & Millar, V. Harvard Business Review (Harvard Business Review), 1985, 63, р. 149–160.
39. Rees J., Bandyopadhyay S. & Spafford E. H. Communications of the ACM (Communications of the ACM), 2003, 46, р. 101–106.
40. Saleh M. S., Alrabiah A. & Saad H. B. International Journal of Network Management (International Journal of Network Management), 2007, 17, р. 85–97.
41. Sheehan N. T. & Stabell C. B. Strategy & Leadership (Strategy & Leadership), 2007, 25, р. 22–29.
42. Siponen M. Proceedings of 15th International Information Security Conference (Proceedings of 15th International Information Security Conference), Beijing, China, 2000, August, р. 111–120.
43. Sircar S. & Choi J. Information Systems Journal (Information Systems Journal), DOI: 10.1111/j.1365-2575.2007.00274.
44. Solms B. & von Solms R. Computers and Security (Computers & Security), 2004, 23, 371–376.
45. Sterne D. F. Proceedings of the IEEE Symposium on Research in Security and Privacy (Proceedings of the IEEE Symposium on Research in Security and Privacy), 1991, р. 19–230.
46. Straub D. W. & Welke R. J. MIS Quarterly (MIS Quarterly), 1998, 22, р. 441–470.
47. Toit A. S. International Journal of Information Management (International Journal of Information Management), 2003, 23, р. 111–120.
48. Wadlow T. A. The Process of Network Security (The Process of Network Security). Reading, MA: Addison-Wesley, 2000.
49. Ward J. & Peppard J. Strategic Planning for Information Systems (Strategic Planning for Information Systems). Wiley: Chester, 2002.
50. Wiant T. L. Computers and Security (Computers & Security), 2005, 24, р. 448–459.
51. Whitman. International Journal of Information Management (International Journal of Information Management), 2004, 24, р. 3–4.
52. Zammuto R.F., Griffith T. L. Majchrzak A., Dougherty D.J. & Faraj S. Organization Science Organization Science, 2007, 18, р. 749–762.
53. University World Rankings\' (University World Rankings\'),2007, November 5. Available at: http://www.timeshighereducation.co.uk/Magazines/THES/ graphics/WorldRankings2007.pdf (date access: 1./04.2021). Text: electronic.
|