Information security implemented in: The theory on stock market efficiency, Markowitz's portfolio theory and porter's value chain
暂无分享,去创建一个
[1] C. D. Daykin,et al. Practical Risk Theory for Actuaries. , 1994 .
[2] W. Caelli,et al. Information Security for Managers , 1989, Palgrave Macmillan UK.
[3] M. Porter,et al. How Information Gives You Competitive Advantage , 1985 .
[4] M. Porter. Competitive Advantage: Creating and Sustaining Superior Performance , 1985 .
[5] M. Kendall,et al. The Logic of Scientific Discovery. , 1959 .
[6] Van Horne,et al. Financial Management and Policy , 1968 .
[7] Christer Carlsson. New Instruments for Management Research , 1991 .
[8] Martin R. Smith. Commonsense Computer Security , 1994 .
[9] Kalle Kangas. A Resource-based Analysis of Perceived Core Competencies: Applying the Vrio Framework in A Case of the Russian Trade of A Finnish Corporation , 1997, ECIS.
[10] Donald R. Cooper,et al. Business Research Methods , 1980 .
[11] Liliane Pintelon,et al. Book reviewRisk: Analysis, assessment and management: Wiley, Chichester, 1992, 220 pages, £24.95 , 1994 .
[12] Thomas Finne. The information security chain in a company , 1996, Comput. Secur..
[13] E. Fama. EFFICIENT CAPITAL MARKETS: A REVIEW OF THEORY AND EMPIRICAL WORK* , 1970 .
[14] Charles Cresson Wood. Effective information security management , 1991 .
[15] D. Parker. Computer Security Management , 1981 .
[16] T. Finne. A DSS for information security analysis: computer support in a company's risk management , 1996, 1996 IEEE International Conference on Systems, Man and Cybernetics. Information Intelligence and Systems (Cat. No.96CH35929).