MANAGEMENT 8
References
Yildirim, E. Y., Akalp, G., Aytac, S., & Bayram, N. (2011). Factors influencing information
security management in small-and medium-sized enterprises: A case study from
Turkey. International Journal of Information Management, 31(4), 360-365.
Stallings, W., Brown, L., Bauer, M. D., & Bhattacharjee, A. K. (2012). Security: principles and
practice (pp. 978-0). Pearson Education.
Pieters, W. (2011). Representing humans in system security models: An actor-network
approach. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable
Applications, 2(1), 75-92.
Newman, E. (2010). Critical business security studies. Review of International Studies, 36(1),
77-94.
Mithas, S., Ramasubbu, N., & Sambamurthy, V. (2011). How information management
capability influences firm performance. MIS quarterly, 237-256.
Tipton, H. F., & Nozaki, M. K. (2013). Information security management handbook. CRC press.
Von Solms, B. (2011). Information security—a multidimensional discipline. Computers &
Security, 20(6), 504-508.
Quigley, M. (Ed.). (2007). Encyclopedia of information ethics and security. IGI Global.