[1]
|
E. Humphreys, “Information Security Management System Standards,” Datenschutz und Datensicherheit, Vol. 35, No. 1, 2011, pp. 7-11.
doi:10.1007/s11623-011-0004-3
|
[2]
|
BSI, “IT-Sicherheitsmanagement und IT-Grundschutz, BSI-Standards zur IT-Sicherheit,” K?ln, 2005.
|
[3]
|
C. Pelnekar, “Planning for and Implementing ISO 27001,” ISACA Journal, Vol. 4, No. 4, 2011, pp. 1-8.
|
[4]
|
ISO/Nielsen, “The ISO Survey of Certifications,” International Organization for Standardization ISO, Geneve, 2011.
|
[5]
|
Deloitte, “Financial Services Global Security Study,” Deloitte, London, 2010.
|
[6]
|
G. Disterer, “Zertifizierung der IT Nach ISO 20000,” Wirtschaftsinformatik, Vol. 51, No. 6, 2009, pp. 530-534.
|
[7]
|
M. Winniford, S. Conger and L. Erickson-Harris, “Confusion in the Ranks,” Information Systems Management, Vol. 26, No. 2, 2009, pp. 153-163.
doi:10.1080/10580530902797532
|
[8]
|
ISO 27001, “Information Technology, Security Techniques, Information Security Management Systems, Requirements,” International Organization for Standardization ISO, Geneve, 2005.
|
[9]
|
ISO 27000, “Information Technology, Security Techniques, Information Security Management Systems, Overview and Vocabulary,” International Organization for Standardization ISO, Geneve, 2009.
|
[10]
|
Y. Barlette and V. Fomin, “Exploring the suitability of IS Security Management Standards for SMEs,” In: R. H. Sprague, Ed., Proceeding of 41st Hawaii International Conference on System Sciences (HICSS), Los Alamitos, 2008, pp. 308-317.
|
[11]
|
ISO 27002, “Information Technology, Security Techniques, Code of Practice for Information Security Management,” International Organization for Standardization ISO, Geneve, 2005.
|
[12]
|
A. Teubner and T. Feller, “Informationstechnologie, Governance und Compliance,” Wirtschaftsinformatik, Vol. 50, No. 5, 2008, pp. 400-407.
doi:10. 1007/s11576-008-0081-6
|
[13]
|
R. Richardson, “CSI Computer Crime and Security Survey,” Computer Security Institute and Federal Bureau of Investigation, Washington, 2008.
|
[14]
|
J. D’Arcy and A. Hovav, “Deterring internal information systems misuse,” Communications of the ACM, Vol. 50, No. 10, 2007, pp. 113-117.
doi:10.1145/1290958.1290971
|
[15]
|
“ISO IT Security Techniques,” 8 August 2012.
www.iso.org
|