Page 50 - 捷運技術 第32期
P. 50
40 洪國興 季延平 趙榮耀 資訊安全多準則評估之研究-捷運等相關個案
42. Ettinger, J. E. (1993), Key Issues in Information Security, Information Security, Chapman &
Hall, London, PP.1-10.
43. Finne, T. (2000), Information Systems Risk Management : Key Concepts and Business
Processes, Computers & Security, Vol.19, No.3, PP.234-242.
44. Gehrke, M. , Pfitzmann, A. & Rannenberg, K. (1992), Information Technology Security
Evaluation Criteria (ITSEC)-A Contribution to Vulnerability?, INFORMATION
PROCESSING 92-Proc. IFIP 12th World Computer Congress Madrld, Spain, Sept, PP.7-11.
45. Hinde, S. (2003) The law, Cybercrime, Risk Assessment and Cyber Protection, Computer &
Security, Vol.22, No.2, PP.90-95.
46. Hong, K.S., Chi, Y.P., Chao, L.R. & Tang, J.H. (2003), An Integrated System Theory of
Information Security Management, Information Management & Computer Security,
Vol ,11,No.5,PP.243-248.
47. Huber, G.P. (1980), Managerial Decision Making, Scott Foresman and Company.
48. Hwang, C.L. & Lin, M.J. (1987), Group Decision Making Under Multiple Criteria : Methods
and Application, Lecture Notes in Economics and Mathematical Systems 281.
49. ISO / IEC 17799 (2000), Information technology-code of practice for information security
management.
50. Panda, B. & Giordano, J. (1999), Defensive Information Warfare, Communications of the
ACM, Vol.42, No.7, PP.31-32.
51. Rackham, L. F. & Richard, R. (1995), Getting Partnering Right : How Market Leaders Are
Creating Long-term Competitive Advantage, by McGraw-Hill Int’l Enterprises Inc.
52. Saaty, T. L. (1980), The Analytic Hierarchical Process, New York : McGraw-Hill.
53. Saaty, T. L. & Bennett, J. P. (1977), A Theory of Analytical Hierarchies Applied to Political
Candidacy, Behavioral Science, 22, PP.237-245.
54. Saaty, T. L. & Vargas, L.G. (1980), Hierarchical Analysis of Behavior in Competition :
Prediction in Chess, Behavioral Science, 25, PP.180-191.
55. Saaty, T. L. & Vargas, L.G. (1982), The Logic of Priorities, Boston : Kluwer- Nijhoff.
56. Schneider, E. C. & Gregory, W. T. (1990), How Secure Are Your System? Avenues to
Automation, Nov.
57. Schultz, E. E., Proctor, R. W., Lien, M. C. & Salvendy, G. (2001), Usability and Security An
Appraisal of Usability Issues in Information Security Methods, Computer & Security, Vol.20,
No.7, PP.620-634.
58. Smith, M. (1989), Computer Security-Threats, Vulnerabilities and Countermeasures,
Information Age, October, PP.205-210.
59. Van Duyn, J. (1985), The Human Factor in Computer Crime, Petrocelli Books, Inc., Princeton,
NJ.