References
- AS/NZS ISO/IEC 1779, 9 . 2001 . 2001: Information technology - Code of practice for information security management Standards, , Australia
- AS/NZS ISO/IEC 17799 . 2004 . 2001/Amdt 1–2004: Information technology - Code of practice for information security management Standards, , Australia
- AS/NZS 7799 . 2000 . 2000 - Information technology - Code of practice for information security management Standards, , Australia
- AS/NZS 7799.2 . 2003 . 2003 - Information Security Management - Part 2: Specification for Information Security Management Systems Standards, , Australia
- Backhouse , J. and Dhillon , G. 2001 . Current direction in IS security research: towards socio-organizational perspectives . Information Systems Journal , 11 : 127 – 153 .
- Baird Jamieson , A. R. and Cerpa , N. 2002 . “ Development of a framework for risks and Security in B2C E-Business ” . In Towards the Knowledge Society: eCommerce, eBusiness and eGovernment , Edited by: Monteiro , J L , Swatman , P M C and Tavares , L V . 399 – 414 . Kluwer Academic Publishers .
- Bell , G. 2001 . Information Security Risk and Assessment , 2001 UNC Charlotte Symposium on Information Security and Privacy, http://www.sis.uncc.edu/LIISP/slides01/Greg-Bell.pdf (Accessed 28 April 2005)
- Blaikie , N. 2000 . Designing Social Research , Cambridge, UK : Polity .
- BS 7799-2 . 2002 . 2002 : Information security management. Specification with guidance for use Standards, , Australia
- Evans , N. 2003 . Information Security Guideline for NSW Government - Part 1 Information Security Risk Management . Office of Information and Communication Technology Sydney , http://www.oict.nsw.gov.au/pdf/4.4.16.IS1.pdf (Accessed 28 April 2005)
- Frank , D. 2003 . Policy would secure users, transactions . Federal Computer Week, Falls Church, Jan 27 , 17 ( 2 ) : 10
- Gartner . 2002 . Executive Presentation of Business Recovery Planning , New York State Forum . 02 Consulting, http://www.nysfirm.org/documents/ppt/bc_02/8–13GartnerBCP% 20Pres.ppt (Accessed 28 April 2005)
- Kraemer , K. L. and Dedrick , J. 2000 . “ European E-Commerce Report ” . In Working Paper Center for Research on Information Technology and Organizations , Irvine : University of California . August 2000. http://www.crito.uci.edu/git/publications/pdf/european-e-commerce-report2.pdf (accessed 28 April 2005)
- NSTISSC . 1999 . National Security Telecommunications and Information Systems Security Committee (NSTISSC) . NSTISSI No. 4009 National Information Systems Security (INFOSEC) Glossary , : 4
- OICT . 2004 . Office of Information and Communications Technology - connect.NSW: an Internet Strategy for NSW , http://www.oict.nsw.gov.au/content/1.3.1.Imp _Frame_Summary.asp (Accessed 28 April 2005)
- Ross , K. L. 2004 . Foundationalism and Hermeneutics , http://www.friesian.com/hermenut.htm (Accessed 28 April 2005)
- Schmidt , R. , Lyytinen , K. , Keil , M. and Cule , P. 2001 . Identifying software project risks: An international Delphi Study , 17 ( 4 ) : 5 – 36 . Journal of Management Information Systems, Spring
- Scott , R.W. 2003 . Planners need to plan for disaster , 18 – 20 . New York : Accounting Today . Jan 2003
- Spinellis , D. , Kokolakis , S. and Gritzalis , S. 1999 . Security requirements, risks and recommendations for small enterprise and home-office environments . Information Management & Computer Security , 7 ( 3 ) : 121 – 128 .
- Straub , D. W. and Welke , R. J. 1998 . Coping with systems risk: Security planning models for management decision-making . MIS Quarterly , 22 ( 4 ) : 441 – 469 . December 1998
- Teo , H. H. , Wei , K. K. and Benbasat , I. 2003 . Predicting intention to adopt interorganizational linkages: An institutional perspective . Management Information Systems Quarterly , 27 ( 1 ) : 19 – 49 .
- Worthington , J. 2005 . Flying blind . Risk Management , : 16 – 17 .