共 58 条
[21]
Dhillon G., 1997, Managing information system security
[22]
Emory C. W., 1991, BUSINESS RES METHODS, V4 th
[23]
Fischer-Hubner S., 2001, IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms
[24]
GIBSON Q, 1960, LOGIC SOCIAL INQUIRY
[25]
Giddens A., 1976, NEW RULES SOCIOLOGIC
[26]
HITCHINGS J, 1996, INFORM SYSTEMS SECUR, P3
[28]
Karyda M, 2003, INT FED INFO PROC, V122, P145
[29]
Keeney R.L., 1992, VALUE FOCUSED THINKI