| 期刊論文1. | Schwartz, Melvin(1990)。Computer Security: Planning to Protect Corporate Assets。Journal Of Business Strategy,11。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Yarberry, William Jr.(1988)。11 Ways to a Faster Applications Audit。EDPACS,16。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Dwyer, James P.(1988)。The Role of the DSO in Systems Development。EDPACS,15。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | Wong, Ken(1987)。Computer Disasters and their Business Impact。EDPACS,14。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 5. | Wong, Ken(1987)。Watch out for the New Computer Criminals!。EDPACS,14。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 圖書1. | Bryan, Wilkin Son(19830301)。Separation of Duties in the Data Center。Auerbach Publishers, Inc.。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | (1982)。Computer Audit Control & Security Manual。The Institute of Internal Auditors。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | |