| 期刊論文1. | Straub, Detmar Jr.、Nance, William D.(1990)。Discovering and Disciplining Computer Abuse in organizations: A Field Study。MIS Quarterly: Management Information Systems,14(1),45-60。 | 2. | Whitmyer, Claude F.(1987)。Computer Security: Some Problems, Some Solutions。The Office,1987(Dec.),27。 | 3. | Weber, Austin(1985)。Effective Security Programs Start with Awareness。Data Management,1985(Nov.),34。 | 4. | Smid, Miles E.(1991)。Integrating the Data Encryption Standard into Computer Networks。IEEE Transactions on Communications,29(6),762-772。 | 5. | Southard, C. D. IV(1989)。Individual Privacy and Governmental Efficiency: Technology's Effect on the Government's Ability to Gather, Store, and Distribute Information。Computer/Law Journal,9,359-374。 | 6. | Menkus, Belden(1980)。Crime Prevention in System Design。Journal of Systems Management,1991(May),19。 | 7. | Chaum, David(1985)。Security Without Identification: Transaction Systems to Make Big Brother Obsolete。Communications of the ACM,28(10),1030-1044。 | 8. | Chaum, David(1992)。Achieving Electronic Privacy。Scientific American,1992(Aug.),96-101。 | 9. | Axner, David H.(1992)。Access and Authentication: Key Issues in Network Security。Business Communications Review,1992(Mar.),61-66。 | 10. | Clement, John(1987)。Rethinking Security。Government Data Systems,1987(Mar./Apr.),45-46。 | 11. | Danca, Richard A.(1992)。EPA Juggles LAN Security, Access。Federal Computer Week,1992(Jan.),34。 | 12. | Hains, David(1992)。LAN Security: Are You Taking It Seriously?。Computer Control Quality,10(1),7-11。 | 13. | Forcht, Karen A.(1985)。Data Security Concerns in the Microcomputer Environment。The journal of Data Education,1985(Summer),14-16。 | 14. | Forcht, Karen A.、Thomas, Daphyne、Wigginton, Karen(1987)。Computer Crime: Assessing the Lawyer's Perspective。Journal of Business Ethics,8(4),243-251。 | 15. | Fitzgerald, Kevin(1991)。Computer Crime Detection。Computer Control Quarterly,9(3),41-49。 | 16. | Mckibbin, Wendy(1983)。Who Gets the Blame for Computer Crime?。Infosystems,1983(Jul.),34-36。 | 17. | Loch, Karen D.、Carr, Houston H.、Warkentin, Merril(1991)。Why Won't Organizations Tell You About Computer Crime?。Information Management Bulletin,1991(Feb.),5-6。 | 18. | Laurance, Robert(1988)。Managing Security。Journal of Data Computer Communications,1988(Summer),77-79。 | 19. | Schwartz, Michael(1984)。Data Authentication。Data Security Management,84-03-06,1-12。 | 20. | Johnston, Robert E.(1989)。Solving the Mystery of Network Security。Access,1989(2nd Quarter),16-18。 | 21. | Smith, Cherie(1989)。Marketing Security Acquisition to Management。ISSA Access,1989(1st Quarter),10+42。 | 圖書1. | Russell, Deborah、Gangemi, G. T. Jr.(1991)。Computer security basics。Sebastopol, California:O'Reilly and associates Inc.。 | 2. | Forcht, Karen A.(1994)。Computer Security Management。Danvers, MA:Boyd & Fraser。 | 3. | Schweitzer, James A.(1986)。Computer crime and Business Information. A Practical Guide for Managers。New York:Elsevier Publishing。 | 4. | Wofsey, Marvin M.(1983)。Advances in Computer Security Management。New York:John Wiley & Sons。 | 5. | 行政院研考會(1995)。公務員之資訊法規須知。行政院研考會。 延伸查詢 | 6. | 吳琮璠(1992)。會計師辦理所得稅電腦查核工作底稿示範。 延伸查詢 | 7. | (1994)。Systems Auditability and Control。Institute of Internal Auditors Research Foundation。 | 8. | 葉誌崇(1985)。EDP審計之研究。國立成功大學會計系。 延伸查詢 | 9. | 陳淑卿(1994)。建立電腦稽核制度之研究。 延伸查詢 | 10. | 吳琮璠(1995)。審計部電腦審計作業規畫研究。 延伸查詢 | 11. | 吳琮璠(1993)。公司會計電腦化環境下查核規畫指引。 延伸查詢 | 12. | 李克蘇(1992)。北美地區金融業電腦稽核技術發展。 延伸查詢 | 13. | 張振芳(1992)。資訊先進國家金融業之電腦稽核及內部控制。 延伸查詢 | 14. | 李毓萍(1989)。銀行電腦稽核制度之改進與實施。 延伸查詢 | 15. | Bloombecker, Jay(1986)。Computer Crime, Computer Security, Computer Ethics。Los Angeles:National Center for Computer Crime Data。 | 16. | CIPFA(1994)。Computer Audit Guidelines。 | 17. | Rullo, Thomas A.(1980)。Advances in Computer Security Management。Philadelphia, PA:Heyden。 | 其他1. | 陳章正(1989)。美國電腦稽核作業及災害復原計畫考察報告。 延伸查詢 | 2. | 郭學武(1991)。電腦稽核與應用研習報告。 延伸查詢 | 圖書論文1. | Debutts, John(1987)。Securing Our Future Through Technology。Computer Security Issues and Trends。Computer Security Institute。 | 2. | Davies, Donald(1987)。Confidentiality, Integrity, and Continuity。Computer Security Issues and Trends。Computer Security Institute。 | 3. | Kesim, Susan N.。Securing Computer: A Checklist。Security Systems。 | |