期刊論文1. | 李東峰、林子銘(20020700)。資訊主管對企業資訊安全之風險控管決策。資訊管理研究. 中央大學,4(2),1-42。 延伸查詢 |
2. | 洪國興、季延平、趙榮耀(20031000)。資訊安全評估準則層級結構之研究。圖書館學與資訊科學,29(2),22-44。 延伸查詢 |
3. | Bacon, C. J.(1992)。The use of decision criteria in selecting information system/technology investment。MIS Quarterly,16(3),335-353。 |
4. | Bodin, L. D.、Gordon, L. A.、Loeb, M. P.(2008)。Information security and risk management。Communications of the ACM,51(4),64-68。 |
5. | Bojanc, R.、Jerman-Blazic, B.(2008)。An economic modeling approach to information security management。International Journal of Information Management,28(5),413-422。 |
6. | Briney, A.、Prince, F.(200207)。2002 ISM Survey。Information Security Magazine,September,36-54。 |
7. | Cavusoglu, H.、Mishra, B.、Raghunathan, R.(2004)。A model for evaluating IT security investments。Communications of the ACM,47(7),87-92。 |
8. | Chai, S.、Kim, M.、Rao, H. R(2011)。Firms ‘information security investment decisions: stock market evidence of investors’ behavior。Decision Support System,50(4),651-661。 |
9. | Chan, C. L.(2011)。Information security risk modeling using bayesian index。The Computer Journal,54(4),628-638。 |
10. | Chang, S. E.、Ho, C. B.(2006)。Organizational factors to the effectiveness of implementing information security management。Industrial Management and Data Systems,106(3),345-361。 |
11. | Chien, C.-F.、Yu, C.-M.、Hsu, S.-C.(2009)。UNISON decision analysis framework for constructing the workforce planning decision model for semiconductor manufacturing fab。Journal of Management and Systems,16(2),157-180。 |
12. | Fung, Andrew Ren-Wei、Farn, Kwo-Jean、Lin, Abe C.(2003)。A study on the certification of the information security management systems。Computer Standards and Interfaces,25(5),447-461。 |
13. | Gordon, L. A.、Loeb, M. P.(2006)。Budgeting process for information security expenditures。Communications of the ACM,49(1),121-125。 |
14. | Janz, B.、Dibrell, C.(1998)。The implementation of strategy in an innovative information service organization: an empirical comparison of theoretical frameworks。Journal of Information Technology Management,9(3),1-20。 |
15. | Mclvor, R.、McHugh, M.(2000)。Partnership Sourcing: an organization chang management perspective。The Journal of Supply Chain Management,36(3),12-20。 |
16. | Mercuri, R. T.(2003)。Analyzing security costs。Communications of the ACM,46(6),15-18。 |
17. | Mohan-Neill, S.(2006)。Online market information and environmental scanning activity by small business: the correlation between firms characteristics and online market information acquisition。Academy of Entrepreneurship Journal,12(2),85。 |
18. | Pemberton, J. D.、Stonehouse, G. H.、Barber, C. E.(2001)。Competing with CRS-generated information in the airline industry。Journal of Strategic Information Systems,10(1),59-76。 |
19. | Premkumar, G.、King, W. R.(1994)。Organizational characteristics and information systems planning: an empirical study。Information Systems Research,5(2),75-104。 |
20. | Purser, S. A.(2004)。Improving the ROI of the security management Process。Computer and Security,23(7),542-546。 |
21. | Gordon, Shelley S.、Stewart, Wayne H. Jr.、Sweo, Robert、Luker, William A.(2000)。Convergence versus strategic reorientation: the antecedents of fast-paced organizational change。Journal of Management,26(5),911-945。 |
22. | Sonnenreich, W.、Albanese, J.、Stout, B.(2006)。Return on security investment (ROSI) aractical quantitative model。Journal of Research and Practice in Information Technology,38(1),45-56。 |
23. | Tallon, P. P.、Kraemer, K. L.、Grbaxani, V.(2000)。Executives' perceptions of the business value on information technology: a process-oriented approach。Journal of Management Information Systems,16(4),145-173。 |
24. | Vermeulen, C.、Von Solms, R.(2002)。The information security management toolbox-taking the pain out of security management。Information Management and Computer Security,10(3),119-125。 |
25. | Von Solms, B.、Von Solms, R.(2004)。The 10 deadly sins of information security management。Computers and Security,23(5),371-376。 |
26. | Chien, C.-F.、Wang, H.-J.、Wang, M.(2007)。A UNISON Framework for Analyzing Alternative Strategies of IC Final Testing for Enhancing Overall Operational Effectiveness。International Journal of Production Economics,107(1),20-30。 |
27. | Weill, Peter、Olson, Margrethe H.(1989)。Managing Investment in Information Technology: Mini Case Examples and Implications。MIS Quarterly: Management Information Systems,13(1),3-17。 |
28. | Jarvenpaa, Sirkka L.、Ives, B.(1991)。Executive involvement and participation in the management of information technology。MIS Quarterly,15(2),205-227。 |
29. | Porter, Michael E.(1998)。Clusters and the New Economics of Competition。Harvard Business Review,76(6),77-90。 |
30. | Kotulic, A. G.、Clark, J. G.(2004)。Why there aren't more information security research studies?。Information and Management,41(5),597-607。 |
31. | Thong, J. Y. L.(1999)。An integrated model of information systems adoption in small businesses。Journal of Management Information Systems,15(4),187-214。 |
32. | 鄧家駒(1998)。風險管理。保險專刊,51,100-113。 延伸查詢 |
33. | Wu, Jei-Zheng、Chien, Chen-Fu(2008)。Modeling Strategic Semiconductor Assembly Outsourcing Decisions Based on Empirical Settings。OR Spectrum,30(3),401-430。 |
34. | Straub, Detmar W. Jr.、Welke, Richard J.(1998)。Coping with Systems Risk: Security Planning Models for Management Decision Making。MIS Quarterly,22(4),441-469。 |
35. | Miller, J.、Doyle, B. A.(1987)。Measuring effectiveness of computer-based information systems in the financial service sector。MIS Quarterly,11(1),107-125。 |
36. | Kelly, D.、Amburgey, T. L.(1991)。Organizational Inertia and Momentum: A Dynamic Model of Strategic Change。Academy of Management Journal,34(3),591-612。 |
37. | Gatignon, H.、Robertson, T. S.(1989)。Technology diffusion: an empirical test of competitive effects。Journal of Marketing,53(1),35-49。 |
38. | Teo, T. S. H.、Ang, J. S. K.(1999)。Critical success factors in the alignment of IS plans with business plans。International Journal of Information Management,19(2),173-185。 |
39. | Mata, Francisco J.、Fuerst, William L.、Barney, Jay B.(1995)。Information Technology and Sustained Competitive Advantage: A Resource-Based Analysis。MIS Quarterly,19(4),487-505。 |
40. | Bharadwaj, A. S.(2000)。A Resource-Based Perspective on Information Technology Capability and Firm Performance: An Empirical Investigation。MIS Quarterly,24(1),169-196。 |
41. | 簡禎富、陳勁甫、陳建宏(20090400)。Designing Performance Indices and a Novel Mechanism for Evaluating Government R&D Projects。品質學報,16(2),119-135。 |
42. | Ravichandran, T.、Lertwongsatien, C.(2005)。Effect of Information Systems Resources and Capabilities on Firm Performance: A Resource-based Perspective。Journal of Management Information Systems,21(4),237-276。 |
43. | Thong, J. Y. L.、Yap, C. S.(1995)。CEO characteristics, organizational characteristics and information technology adoption in small businesses。Omega: The International Journal of Management Science,23(4),429-442。 |
44. | Klapper, Leora F.、Love, Inessa(2004)。Corporate Governance, Investor Protection, and Performance in Emerging Markets。Journal of Corporate Finance,10(5),703-728。 |