insurance, 64(4), pp.713-18.
Edward, P. & David, E., 2007. Operational approaches to risk management in financial
instituations; A technique for commerical banks? pp.15-20.
Elke, W., 2003. Mobile Banking and Brokerage systems - managing risks in the 21st
century. In department of information system and information management, u.o.C.G., ed.
16th Bled Ecommerce Conference eTransformation. Slovenia, 2003.
Eloff, J. & Eloff, M., 2003. Information security management- A new Paradigm. pp.130-
36.
Feng, J., Wasson, G. & Humphery, N., 2007. Resource usage policy expression and
inforcement in grid computing. pp.66-73.
Fisher, C., 2007. Researching and writing a dissertation for business students. London:
McGraw Hill.
Fontnouvelle, P.D., Rueff, V.D., Jordan, J. & Rosengren, E., 2003. Using loss data to
quantify operational risks. pp.1-32.
Furssell, R.S., n.d. Protecting information security availability via self - adapting
intelligent agents. pp.1-6.
Geneiatakis, D. et al., 2009. A first order logic security verification model for SIP. pp.1-6.
Greener, S., 2008. Business Research Methods. Frederiksberg, Denmark: Ventos
Publishing ApS.
47
Hackley, C., 2003. Doing research projects in marketing, management and consumer
research. pp.75-80.
Hagen, J.M., Sivertsen, T.K. & Rong, C., 2007. Information security threats and access
control practices in norwegian businesses. pp.1-7.
Hedenstad, O.E., 2009. Security model for resource availability-subject and object type
inforcement. pp.1-7.
Herold, R., 2005. Managing an information security and privacy awareness and training
program. 1st ed. New York: Auerbach Publications.
Huber, M., Sunyaev, A. & Krcmar, H., n.d. Security analysis of the health care telematics
infrastructure in germany. pp.144-53.
Humphreys, T., 2006. State-of-the-art information security management systems with
ISO/IEC 27001;2005. pp.15-18.
Hussain, A., 2000. Managing operational risk in financial markets. Oxford Butterworth
Heinemann.
Kajava, J. et al., 2006. Information security standards and global business. pp.2092-95.
Kotulic, A.G. & Clark, J.G., 2004. Why there aren't more information security research
studies. Information management, 41(5).
Kovarik, D., 2006. Risk Assessment: Finding Security Maturity & Raising Awareness.
[Online]
Northwestern
University
Available
at:
http://www.cacubo.org/proDevOpp/Risk%20Assessment%20and%20Awareness%20v4.p
pt
[Accessed 19 May 2010].
Lachello, G., n.d. Protecting personal data; Can IT security management standard help?
pp.1-10.
Landoll, D.J., 2005. The Security Risk Assesment HandBook. 1st ed. New York: Auerbach
Publications.
48
Marshall, C., 2001. Measuring and managing operational risks in financial instituations.
Singapore: John Wiley & Sons Ltd.
Miles, M.B. & Huberman, A.M., 1994. Qualitative data analysis. 2nd ed. Thousands
Oaks, CA: Sage.
Mitrovic, P., 2005. handbok i IT - Sak ER hat.
Norman, A.A. & Yasin, N.M., 2009. An analysis of information systems security
management (issm); The Hierarchical Organizations Vs emergent Organizations. pp.1-8.
O'Brien, N., Smith, B. & Allan, N., 1999. The Case of quantification, finance wise.
[Online] Available at:
www.financewise.com/public/edit/riskm/oprisk/opr-models.htm
[Accessed 13 April 2010].
Olzak, T., 2007. Risk management for reasonable information asset protection. [Online]
Available at:
http://blogs.techrepublic.com/security/?p=158
[Accessed 4 April 2010].
Philip, H.M., 2009. As risk management involves, is operational risk management
important?. Journal of operationa risk, 4(4), pp.75-84.
Sandhu, R. & Bertino, E., 2005. Database security - Concepts Approaches and
Challenges. pp.2-19.
Saran, M. & Zavarsky, P., 2009. A study of the methods for improving internet usage
policy compliance. pp.371-78.
saunders, A., 2000. Financial instituations management; A modern perspective.
NewYork: The McGraw Hill Companies.
Shimpi, P., 1999. Integrating corporate risk management. New york: Texere LLC.
Shukla, P., 2008. Marketing research: An Introduction. Frederiksberg, Denmark: Ventus
publishing ApS.
49
Solms, R.v., 1999. Information security management; why standards are important.
pp.50-57.
Solms, R.v., Technikon, P.E. & Elizabeth, P., 1998. Information security management
(1); why information security is so important. Information management and computer
security, 4(6), pp.174-77.
Taylor, J., 2004. Managing Information Technology Projects; Applying project
management strategies to software-harware, and integration initivatives. AMACOM, A
Devision of American management association.
Varafort, B., Humbert, J.E. & Poggi, S., n.d. Information security management and
ISO/IEC 15504; The link opportunity between security and quality. pp.1-9.
VOZROZHDENIE BANK, 2009. Risk of Business Reputation Loss. [Online] Available
at:
http://www.vbank.ru/en/investors/riskmanagement/reputation-risk/
[Accessed 16 May
2010].
Wen, Z. & Wu, D., n.d. Three - Layers Role- Based access control framework in large
financial web systems. pp.1-4.
Wood, C.C., 1997. A secure password storage policy. pp.79-80.
Zhongping, Z., Tao, C. & Yi, Z., 2008. E-Government information security in the web
environment based on Role Based Acess Control technology. pp.210-13.
Do'stlaringiz bilan baham: |