- آذر، عادل؛ میرفخرالدینی، سید حیدر و علی اصغر انواری رستمی(1387). بررسی مقایسه ای تحلیل دادهها در شش سیگما، با کمک ابزارهای آماری و فنون تصمیم گیری چند شاخصه، مجله مدرس علوم انسانی. 12(4) : 36-1.
- تقوا، محمدرضا؛ حسینی بامکان، سیدمجتبی؛ فلاح لاجیمی، حمیدرضا(1392). تأثیر بکارگیری فناوری اطلاعات بر عملکرد سازمانی و مزیت رقابتی ، فصلنامه مطالعات مدیریت فناوری اطلاعات. 2(5):17-1.
- خیرگو، منصور؛ شکوهی، جواد(1396). شناسایی و رتبه بندی عوامل کلیدی مؤثر بر اثربخشی سیستم های اطلاعاتی در سازمان های دولتی. پژوهشنامه پردازش و مدیریت اطلاعات، 32(3) : 712-695.
- سیف، یاسر؛ نادری بنی، ناهید(1396). شناسایی مؤلفههای مؤثر بر مدیریت امنیت اطلاعات در فناوری اطلاعات شرکت نفت فلات قاره ایران. مجله مدیریت فناوری اطلاعات، 9(3) : 870-851.
- شاه حسینی بیده، شیما؛ مروتی شریف آبادی، علی و سید محمود زنجیرچی(1393). مقایسهی عملکرد سازمانها در پیادهسازی مدیریت ارتباط با مشتری با استفاده از رویکرد ترکیبی NAP و DEMATEL فازی. فصلنامهی بازاریابی نوین، 4(3): 212-195.
- Abduljalil, S. & Abdulhamid, R. (2005 & 2007). ISMS Pilot Program Experiences: Benefits, Challenges & Recommendations. 2013, from http://cybersecurity. my/data/content_files/11/23.pdf.
- Al-Awadi, M. & Renaud, K. (2007). Success factors in information security implementation in organizations. Paper presented at the IADIS International Conference e-Society 2007, Available in: http://www.dcs.gla.ac.uk /~karen/ Papers/sucessFactors2.pdf.
- Beck, Cheryl Tatano. (2002)"Postpartum depression: A metasynthesis." Qualitative Health Research, 12(4): 453-472.
- Birman, K.P. (2000). The next-generation internet: unsafe at any speed. IEEE computer, 33(8), 54-60.
- Bellone, J, Basquiat, S. D., Rodriguez, J. (2008). Reaching escape velocity: A practiced approach to information security management system implementation, Information Management & Computer Security, 16 (1), 49- 57.
- Bhattacharya, D. (2011). Leadership styles and information security in small businesses. Information Management & Computer Security, 19(5), 300-312.
- Chau, J. (2005). Skimming the technical and legal aspects of BS7799 can give a false sense of security. Computer Fraud & Security, 9: 8-10.
- Choi, N., Kim, D. & Goo, J. (2008). Knowing is doing: An empirical validation of the relationship between managerial information security awareness and action. Information Management & Computer Security, 16 (5): 484-485.
- Dhillon, G. (2001). Information security management: global challenges in the new millennium, IGI Global, DOI: 10.4018/978-1-878289-78-0.
- Elliott, G., and Starkings, S. (2008). Business Information Technology: Systems, Theory and Practice, England: Longman.
- Emmett, Stuart.(2015). Excellence in Warehouse Management. Haw to minimize costs and maximize value : TJ, International Ltd, Paststow, Cornwall, UK.
- Fomin, V., DeVries, H., Barlette, Y. (2008). ISO/IEC 27001 Information systems security management standards: Exploring the reasons for low adoption. RSM Erasmus University, Netherland.
- Grant, A. E. and Meadows, J.H. (2018), Communication Technology Update and Fundamentals. 11th Edition, Focal Press, USA.
- Honan, B. (2006). IT security-commoditized, badly Infosecurity Today, 3 (5): 41.
- Huber, G. P. (2018). A theory of the effects of advanced information technology on organizational design, intelligence, and decision making. Academy of Management Review, Vol.6,No.25:71-87.
- Huang, Shi-Ming, Ou Chin-Shyh, Chen, Chyi-Miaw, Lin, Binshan,(2018). «An Empirical Study of Relationship Between IT Investment and Firm Performance: A Resource – Based Perspective», European Journal of Operational Research; Vol.175.
- Jean, R., Sinkovics, R., Kim, D. (2018). Information technology and organizational performance within international business to business relationships: a review and an integrated conceptual framework. International Marketing Review, 5(25): 563-583
- Kakkar, A., Punhani, R. & Madan, S. (2012). Implementation of ISMS and its Practical Shortcomings. International Refereed Research Journal ISSN:1839-6518,Vol. 02, No. 01, www.irj.iars.info.
- Kazemi, M., Khajouei, H. & Nasrabadi, H. (2012). Evaluation of information security management system success factors: Case study of Municipal organization. African Journal of Business Management, 6(14): 4982-4989.
- Kouziokas, G.N. (2016). Technology-based management of environmental organizations using an Environmental Management. Environmentat Technology & Innovation, 5, 106–116.
- Kraemer, S.B. (2006). An adversarial viewpoint of human and organizational factors in computer and information security. A dissertation for the degree of Doctor Philosophy at the university of Wisconsin-Madison.
- Kritzinger, E. & Smith, E. (2008). Information security management: An information security retrieval and awareness model for industry. Computers Security, 27 (5): 224-231.
- Ku, C., chang, Y., Yen, D. (2009). National information security policy and its implementation: A case study in Taiwan. Telecommunications Policy, 33 (7(: 371-384
- Meskell, P., Burke, E., Kropmans, T. J., Byrne, E., Setyonugroho, W. & Kennedy, K.M. (2015). Back to the future: An online OSCE Management Information System for nursing OSCEs. Nurse Education Today, 35(11), 1091-1096.
- Mivald, A. (2004). Computer network security, Translated by Seyyed Ahmad Safai, The first edition, Daneshparvar, Tehran. (in Persian).
- Moore K.A. (2017).Value mapping frame work involving stakeholders for supply chain improvement when implementing information technology projects, Ph.D thesis, M.S. University of Central Florida .
- Nikrerk J.F. and Solms, Van.(2017). Information security culture: a management perspective. Computer & security, 5, 142-144.
- Pathari, V., Sonar, R. (2012). Identifying linkages between statements in information security policy, procedures and controls. Information Management & Computer Security, 20(4), 264-280.
- Saha,Parmitha(2018). Government e-Service Delivery: Identification of Success Factors from Citizens Perspective.Doctoral thesis Lula University of Technology Department of Business Administration and Social Sciences Division Industrial Marketing e-Commerce and Logistics.
- Shreeram, V.; Suban, M.; Shanthi, P.; Manjula, K. (2010). Anti-phishing detection of phishing attacks using genetic algorithm. IEEE International Conference on Communication Control and Computing Technologies(ICCCCT).
- Sandelowski, Margarete, and Julie Barroso. (2006)Handbook for synthesizing qualitative research. Springer Publishing Company.
- Sleezer C. M., Wentling T. L., Cude R. L.(2018). Human Resource Development and InformationTechnology: Making global Connections. Norwell, Massachusetts: Kluwer AcademicPublishers.
- Thomson, K. & Van Niekerk, J. (2012). Combating information security apathy by encouraging prosocial organisational behavior. Information Management & Computer Security, 20(1), 39-46.
- Turban E. Leidner, McLean E. Wetherbe J.(2018), Information technology for management, New York: John Willy and Sons.
- Wolf, J., Wolfe, B. (2003). Management strategies for implementing forensic security measures. Information Security Technical Report. 8(2), 55-64.
- Zuccato, A. (2007). Holistic security management framework applied in electronic commerce. Computers and Security, 26 (3), 256-265.
- Zhang, H., Liu, G., Chow, T. W. S., Liu, W. (2011). Textual and Visual Content-Based Anti-Phishing: A Bayesian Approach. IEEE Transactions on Neural Network .pages 1532 - 1546 .
- Zimmer, Lela. (2006)"Qualitative meta‐synthesis: a question of dialoguing with texts." Journal of advanced nursing ,53(3):311-318.
|