References
- British Standards Institute . 1999 . “ Code of practice for information security management, BS 7799 ” . London
- Burrows , M. , Abadi , M. and Needham , R. M. 1990 . A Logic of Authentication . ACM Transactions on Computer Systems , 8 February : 18 – 36 .
- Carayon , P. and Kraemer , S. 2003 . Human Factors in E-security: The business viewpoint , Madison, WI : University of Wisconsin-Madison . Centre for Quality and Productivity and Improvement), No. Technical Report 184, November
- Denning , D. E. 1982 . Cryptography and Data Security , Reading, MA : Addison-Wesley .
- Denning , D. E. 1999 . Information Warfare and Security , New York, NY : Addison Wesley .
- Dutta , A. 2003 . Managing IT with systems thinking . IEEE Computer , 36 March : 96 – 97 .
- Editorial . 2002 . System administrators patch too late . Network Security , 12 : 3
- Gonzalez , J. J. , ed. 2003 . “ From modeling to managing security ” . In Research series no. 35 , Kristiansand : Hoyskole Forlegat AS . 2003
- Haims , C. M. and Carayon , P. 1998 . Theory and practice for the implementation of ‘in-house’ continuous improvement participatory ergonomic programs . Applied Ergonomics , 29 December : 461 – 472 .
- Makridakis , S. , Andersen , A. , Carbone , R. , Fildes , R. , Hibon , M. , Lewandowski , R. , Newton , J. , Parzen , E. and Winkler , R. 1984 . The Forecasting Accuracy of Major Time Series Methods , New York : John Wiley & Sons .
- Schneier , B. 1996 . Applied Cryptography , New York : John Wiley & Sons .
- Schneier , B. 2000 . Secrets and Lies. Digital Security in a Networked World , New York : John Wiley & Sons .
- Spivey , J. M. 1989 . The Z Notation: A Reference Manual , London : Prentice-Hall .
- Sterman , J. D. 2000 . Business Dynamics , Boston, MA : McGraw Hill .
- Trček , D. 2003 . An integral framework for information systems security management . Computers & Security , 22 June : 337 – 359 .
- US Department of Defense . 1983 . “ Trusted Computer System Evaluation Criteria ” . DoD standard CSC-STD-00l-83