[1]
Abbas Toloie Eshlaghy, Alireza Pourebrahimi, Babak Zendehdel Nobari, Presenting a Model for Ranking Organizations Based on the Level of the Information Security Maturity, Computer and Information Science, Vol. 4, No. 1, (2011) 72-78.
DOI: 10.5539/cis.v4n1p72
Google Scholar
[2]
CGTF, Information Security Governance: A Call to Action, Corporate Governance Task Force Report, 2004. (Information on http://www.cccure.org/Documents/Governance/InfoSecGov4_04.pdf)
Google Scholar
[3]
EDUCAUSE, Information Security Governance Assessment Tool For Higher Education, (2004). (Information on http://net.educause.edu/ir/library/pdf/SEC0421.pdf)
Google Scholar
[4]
Entrust, Information Security Governance (ISG): An Essential Element of Corporate Governance (2004). (Information on http://download.entrust.com/resources/download.cfm/21431/)
Google Scholar
[5]
ITGI, Information Security Governance: Guidance for Boards of Directors and Executives Management (2nd ed.), IT Governance Institute (2006). (Information on http://www.isaca.org/Knowledge-Center/Research/Documents/InfoSecGuidanceDirectorsExecMgt.pdf)
Google Scholar
[6]
John P. Pironti, Developing Metrics for Effective Information Security Governance, Information Systems Control Journal, Vol. 2, (2007) 1-5.
Google Scholar
[7]
Kenneth J. Knapp, R. Franklin Morris Jr., Thomas E. Marshall, Terry Anthony Byrd, Information Security Policy: An Organizational-level Process Model, Computer & Security, (2009) 1-16.
DOI: 10.1016/j.cose.2009.07.001
Google Scholar
[8]
Marthie Lessing, S.H. von Solms, Building a World Class Information Security Governance model, Proceedings of IST-Africa 2008 Conference.
Google Scholar
[9]
Peter Weill, Jeanne W. Ross, IT Governance on One Page, MIT Sloan School of Management Center for Information Systems Research , CISR WP No.349 (2004).
Google Scholar
[10]
Richard Boes, Tom Cramer, Vicky Dean, Roger Hanson, Nan Mckenna, Campus IT Security: Governance, Strategy, Policy, and Enforcement, EDUCAUSE Center for Applied Research (2006:17). (Information on http://net.educause.edu/ir/library/pdf/ERB0617.pdf)
Google Scholar
[11]
Rolf Moulton, Robert S. Coles, Applying Information Security Governance, Computers & Security (22:7), (2003) 580-584.
DOI: 10.1016/s0167-4048(03)00705-3
Google Scholar
[12]
Rossouw von Solmsa, Sebastiaan H. von Solms, Information Security Governance: A model based on the Direct-Control Cycle, Computers & Security, Vol. 25, (2006) 408-412.
DOI: 10.1016/j.cose.2006.07.005
Google Scholar
[13]
Shaun Posthumus, Rossouw von Solms, A Framework for the Governance of Information Security, Computers & Security, Vol. 23, (2004) 638-646.
DOI: 10.1016/j.cose.2004.10.006
Google Scholar
[14]
Taiwan's Science and Technology Advisory Group of Executive Yuan, An Integrated Study on Information Security Development Policy: Information Security Governance Mechanism and the Continuous Developing Plan, Science and Technology Advisory Group of the Executive Yuan in Taiwan (2008), 7-43.
Google Scholar
[15]
Taiwan's Science and Technology Advisory Group of the Executive Yuan, 2010 Information and Communication Security Policy White Paper, Taiwan's Executive Yuan (2010).
Google Scholar
[16]
Zuraini Ismail, Maslin Masrom, Rabiah Ahmad, Haniza Sharif, Addressing Information Security for Academic Environment: A Confirmatory Factor Analysis, MASAUM Journal of Computing (1:2), (2009) 109-115.
Google Scholar