REFERENCES
- Badiger, S., & Laxman, R. (2013). Total quality management and organisational development. International Journal of Business and Management Invention, 2, 34–37.
- Baker, W., & Wallace, L. (2007). Is information security under control? Security and Privacy, IEEE, 5, 36–44.
- Feigenbaum, A. V. (1983). Total quality control. New York, NY: McGraw-Hill.
- Floridi, L. (2013). Information quality. Philosophy and Technology, 26, 1–6. Retrieved, from http://link.springer.com.jproxy.lib.ecu.edu/article/10.1007%2Fs13347-013-0101-3#
- Gillies, A. (2011). Improving the quality of information security management systems with ISO27000. TQM Journal, 23(4), 367–376. doi:http://dx.doi.org/10.1108/17542731111139455
- Gordon, L., & Loeb, M. (2002). The economics of information security investment. ACM Transactions on Information and System Security, 5(4),438–457.
- Information security principles. (2008). Swindon: BCS Learning & Development Limited.Retrieved from http://search.proquest.com.jproxy.lib.ecu.edu/docview/189252270?accountid=10639
- Martínez-Lorente, A., Dewhurst, F., & Dale, B. (1998). Total quality management: Origins and evolution of the term. The TQM Magazine, 10(5),378–386. doi:10.1108/09544789810231261
- nCircle presents “security benchmarking” webinar. (2012). Entertainment Close-Up. Retrieved from http://search.proquest.com.jproxy.lib.ecu.edu/docview/1038553433?accountid=10639
- Payne, S. C. (2006). A guide to security metrics. Bethesda, MD: Sans Institute. Retrieved from http://www.sans.org/reading_room/whitepapers/auditing/guide-security-metrics_55
- Plan-Do-Check-Act (PDCA): Implementing new ideas in a controlled way. (n.d.). Plan-Do-Check-Act (PDCA). Retrieved from http://www.mindtools.com/pages/article/newPPM_89.htm
- Riley, M., Elgin, B., Lawrence, D., & Matlack, C. (2014, March 13). Missed alarms and 40 million stolen credit card numbers: How Target blew it. Retrieved from http://www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data
- Rosoff, M. (2012, February 1). Mark Zuckerberg’s letter to Facebook investors. Business Insider. Retrieved from http://www.businessinsider.com/mark-zuckerberg-explains-the-hacker-way-to-facebook-investors-2012-2
- Stoneburner, G., Goguen, A. & Feringa, A. (2002). Risk management guide for information technology systems. National Institute of Standards and Technology Special Publication. Retrieved from http://webharvest.gov/peth04/20041027044131/http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf
- The Risk of Social Engineering on Information Security: A Survey of IT Professionals. (2011, January 1). Retrieved from http://www.checkpoint.com/press/downloads/social-engineering-survey.pdf