[1] 赵伯琪.浅谈企业信息安全治理框架[J].信息安全与技术,2013,(5):19-21. [2] 涂兰敬.专家观点:“大数据”与“庞大数据”的区别[J].网络与信息,2011,(12):37-38. [3] 郭建,顾志强.电力企业信息安全现状分析及管理对策[J].信息技术,2013,(1):180-183,187. [4] 张艳欣,符森.互联网企业用户信息安全问题探究[J].图书馆学研究,2013,(21):41-44. [5] 孙力.电力企业信息安全管理研究[D].南京邮电大学,2014. [6] 涂子沛.大数据[M].广西师范大学出版社,2012,(161):304-306. [7] 洪娟.大数据环境下商业银行“小微贷”竞争策略研究[J].南方金融, 2014,(451):80-83. [8] 巴曙松.大数据可解小微企业融资瓶颈[J].中国经济报告,2013,(6). [9] 王欣.基于大数据的企业竞争情报系统的重构[D].黑龙江大学硕士研究生学位论文,2014. [10] 黄启发,宋彪.基于协同学的企业信息安全综合评价模型[J].现代情报,2012,(8):113-117. [11] 邬贺铨.大数据时代的机遇与挑战[J].求是,2013(4):47-49. [12] 王婷婷.政府对中小企业信息安全建设中的作用研究[D].苏州大学,2014. [13] 张国力.基于模糊综合评价的国有大型企业信息安全管理研究[D].北京邮电大学,2012. [14] 冯伟.大数据时代面临的信息安全机遇和挑战[J].中国科技投资,2012,(12):24-2 5. [15] 肖棍.浅议网络环境下的企业信息安全管理[J].标准科学,2010,(8):20-23. [16] Sabherwal, R. and Chan, Y.E. (2001), “Alignment between business and IS strategies: a study of prospectors, analyzers and defenders”, Information Systems Research, Vol.12 No.1,pp.11-33. [17] Friedman, B., Kahn, P. Jr and Howe, D. (2000), “Trust online”, Communications of the ACM, Vol. 43 No.12, pp.34-40. [18] Eloff, M.M. and von Solms, S.H. (2000), “Information security management: an approach to combine process certification and product evaluation”, Computers & Security, Vol. 19 No.3,pp.698-709. [19] Dhillon, G. and Backhouse, J. (2000), “Information system security management in the new millennium”, Communications of the ACM, Vol. 43 No.7,pp.125-8. [20] S.G. Sutton, V. Arnold, T. Benford and J. Canada, Why Enterprise Risk Management is Vital: Learning from Company Experiences with Sarbanes-Oxley Section 404 Compliance, Altamonte Springs, FL: Institute of Internal Auditors Research Foundation, 2009. [21] Taylor, M. and Murphy, A. (2004), “SMEs and e-business”, Journal of Small Business and Enterprise Development, Vol.11 No.3,pp.280-289. [22] Labuschagne, L., 2006. A comparative framework for evaluating information security risk management methods. Technical report, Standard Bank Academy for Information Technology, Rand Afrikaans University. [23] Basie von Solms.Information Security---The Third Wave?.[J]Computers&Security, 2000,19:615-620. |