[1]
Hao Gao, Tao Zhu, et al., Empirical Study on IT Governance Mechanisms for China's Enterprises, Enterprise Management. 4 (2010) 162-167, in Chinese.
Google Scholar
[2]
International Organization for Standardization, Corporate governance of information technology (ISO/IEC 38500), 2008.
Google Scholar
[3]
ISACA, COBIT 5: A Business Framework for the Governance and Management of Enterprise IT, 2012.
Google Scholar
[4]
ISACA, COBIT 4.1: Control Objectives for Information and related Technology, 2007.
Google Scholar
[5]
Weill. P, Ross. J, IT governance: How top performers manage IT decision rights for superior results, Boston: Harvard Business School Press, 2004, pp.13-16.
Google Scholar
[6]
Li Zhu, Yan Bai, Comparative Research on the International IT Governance Framework under E-government, Information Science. 29 (2011)820-829, in Chinese.
Google Scholar
[7]
De Haes, S, Van Grembergen, W, IT governance structure, processes and relational mechanisms: Achieving IT/ business alignment in a major Belgian financial group, Proceedings of the 38th Hawaii International Conference on System.
DOI: 10.1109/hicss.2005.362
Google Scholar
[8]
Xiaowen Liu, Kejin Hu, et al., A Model and Support System for IT Governance Measurement Based on IT Process, Journal of intelligence. 28 (2009)76-79.
Google Scholar
[9]
Cuihua Xu, Jiajun Lin, XueqinZhang, An Information Security Evaluation Model Based on Evidence Reasoning Model and Evaluation Cases, Journal of East China University of Science and Technology (Natural Science Edition). 12 (2010)818-824, in Chinese.
Google Scholar
[10]
ITGI. Control Objectives for Information and Related Technology 4. 1 Edition, (2007)
Google Scholar
[11]
Xueqin Zhang, Changqing Jiang, et al., RS-UM based information system security assurance evaluation model , Journal of Chongqing University. 35(2012)147-154, in Chinese.
Google Scholar