Page 50 - 捷運技術 第32期
P. 50

40              洪國興  季延平  趙榮耀  資訊安全多準則評估之研究-捷運等相關個案

            42.  Ettinger, J. E. (1993), Key Issues in Information Security, Information Security, Chapman &
                 Hall, London, PP.1-10.
            43.  Finne, T. (2000), Information Systems Risk Management : Key Concepts and Business
                 Processes, Computers & Security, Vol.19, No.3, PP.234-242.
            44.  Gehrke, M. , Pfitzmann, A. & Rannenberg, K. (1992), Information Technology Security
                 Evaluation Criteria (ITSEC)-A Contribution to Vulnerability?, INFORMATION
                 PROCESSING 92-Proc. IFIP 12th World Computer Congress Madrld, Spain, Sept, PP.7-11.
            45.  Hinde, S. (2003) The law, Cybercrime, Risk Assessment and Cyber Protection, Computer &
                 Security, Vol.22, No.2, PP.90-95.
            46.  Hong, K.S., Chi, Y.P., Chao, L.R. & Tang, J.H. (2003), An Integrated System Theory of
                 Information Security Management, Information Management & Computer Security,
                 Vol ,11,No.5,PP.243-248.
            47.  Huber, G.P. (1980), Managerial Decision Making, Scott Foresman and Company.
            48.  Hwang, C.L. & Lin, M.J. (1987), Group Decision Making Under Multiple Criteria : Methods
                 and Application, Lecture Notes in Economics and Mathematical Systems 281.
            49.  ISO / IEC 17799 (2000), Information technology-code of practice for information security
                 management.
            50.  Panda, B. & Giordano, J. (1999), Defensive Information Warfare, Communications of the
                 ACM, Vol.42, No.7, PP.31-32.
            51.  Rackham, L. F. & Richard, R. (1995), Getting Partnering Right : How Market Leaders Are
                 Creating Long-term Competitive Advantage, by McGraw-Hill Int’l Enterprises Inc.
            52.  Saaty, T. L. (1980), The Analytic Hierarchical Process, New York : McGraw-Hill.
            53.  Saaty, T. L. & Bennett, J. P. (1977), A Theory of Analytical Hierarchies Applied to Political
                 Candidacy, Behavioral Science, 22, PP.237-245.
            54.  Saaty, T. L. & Vargas, L.G. (1980), Hierarchical Analysis of Behavior in Competition :
                 Prediction in Chess, Behavioral Science, 25, PP.180-191.
            55.  Saaty, T. L. & Vargas, L.G. (1982), The Logic of Priorities, Boston : Kluwer- Nijhoff.
            56.  Schneider, E. C. & Gregory, W. T. (1990), How Secure Are Your System? Avenues to
                 Automation, Nov.
            57.  Schultz, E. E., Proctor, R. W., Lien, M. C. & Salvendy, G. (2001), Usability and Security An
                 Appraisal of Usability Issues in Information Security Methods, Computer & Security, Vol.20,
                 No.7, PP.620-634.
            58.  Smith, M. (1989), Computer Security-Threats, Vulnerabilities and Countermeasures,
                 Information Age, October, PP.205-210.
            59.  Van Duyn, J. (1985), The Human Factor in Computer Crime, Petrocelli Books, Inc., Princeton,
                 NJ.
   45   46   47   48   49   50   51   52   53   54   55