Page 314 - 捷運技術 第28期
P. 314

308                                                28         92    2



              39.Reid,R.C. & Floyd, S.A. (2001),    Extending the Risk Analysis Model to Include Market-
                 Insurance  , Computers & Security, Vol.20, No.4, PP.331-339.
              40.Robbins, S.P. (1994), Management, 4th Ed., Prentice-Hall International.

              41.Rusell, D. & Gangemi, G.T. (1992), Computer Security Basics, California, USA, O  Reilly &
                 Associates Inc., 1992.
              42.Schendel, D. & Hofer, C.W. (eds) (1979), Strategic Management: A New View of Business Policy
                 and Planning, (Little, Brown & Company, Boston).

              43.Schultz, E.E., Proctor, R.W., Lien, M.C. (2001),   Usability and Security: An Appraisal of
                 Usability Issues in Information Security Methods  , Computer & Security, Vol.20, No.7, PP.620-
                 634.
              44.Sherwood, J. (1996),   SALSA: A method for developing the enterprise security architecture and
                 Strategy   , Computer & Security, Vol.2, No.3, PP.8-17.

              45.Smith, M. (1989),    Computer Security-Threats, Vulnerabilities and Countermeasures      ,
                 Information Age, October, PP.205-210.
              46.TCSEC(1985),    Trusted Computer Systems Evaluation Criteria,US DoD5200.28-STD, December
                 1985.

              47.Tryfonas, T., Kiountouzis, E. & Poulymanakou, A. (2001),   Embedding Security Practices in
                 Contemporary Information Systems Development Approaches       , Information Management &
                 Computer Security, PP.183-197.

              48.Von Solms, R., Van Haar, H., Von Solms, S.H. & Caelli, W.J. (1994),     A Framework for
                 Information Security Evaluation  , Information & Management, 26, PP.143-153.

              49.Von Solms, R. (1996),   Information Security Management: The Second Generation  , Computer
                 & Security, Vol.15, No.4, PP.281-288.
              50.Weber, R. (1999), Information System Control and Audit, Prentice Hall, Upper Saddle River, New
                 Jersey, USA.

              51.Wright,M. (1999),   Third Generation Risk Management Practices  , Computer Fraud & Security,
                 Feb., PP.9-12.

              52.Yin, R. (1989), Case Study Research   Design and Methods, Newburry park California, Sag
                 Publications, 1989 (rev.).
   309   310   311   312   313   314   315   316   317   318   319