Business continuity planning methodology
暂无分享,去创建一个
[1] Jim Goldman,et al. Metrics based security assessment (MBSA): combining the ISO 17799 standard with the systems security engineering capability maturity model (SSE-CMM) , 2004 .
[2] Robert D. Gilbreath. PLANNING FOR THE UNEXPECTED , 1987 .
[3] W. Roberts. Business Continuity Planning for Disasters is Just Good Planning , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[4] Mikko T. Siponen,et al. Information security management standards: Problems and solutions , 2009, Inf. Manag..
[5] Michael R. Grimaila. Maximizing business information security's educational value , 2004, IEEE Security & Privacy Magazine.
[6] Christopher W. Johnson,et al. What are emergent properties and how do they affect the engineering of complex systems? , 2006, Reliab. Eng. Syst. Saf..
[7] John Lindström,et al. A MODEL FOR EXPLAINING STRATEGIC IT- AND INFORMATION SECURITY TO SENIOR MANAGEMENT , 2009 .
[8] Malcolm W. Warren. Training for Results; a Systems Approach to the Development of Human Resources in Industry , 1969 .
[9] Nancy G. Leveson,et al. An Approach to Design for Safety in Complex Systems , 2004 .
[10] Timothy Grance,et al. Contingency Planning Guide For Information Technology Systems: Recommendations Of The National Institute Of Standards And Technology , 2004 .
[11] W. Lam. Ensuring business continuity , 2002 .
[12] Irwin L. Goldstein,et al. Training in organizations: Needs assessment, development, and evaluation , 1986 .
[13] Edward Toomer,et al. Qualitative Methods in Management Research , 1989 .
[14] M. Bazerman. Judgement in Managerial Decision Making , 2003 .
[15] P. Senge. The Fifth Discipline Fieldbook: Strategies and Tools for Building a Learning Organization , 2014 .
[16] Ann Hägerfors,et al. Computer supported business games , 2004 .
[17] H. Bradbury,et al. Handbook of action research : participative inquiry and practice , 2001 .
[18] 日本規格協会. 情報技術 : 情報セキュリティ管理実施基準 : 国際規格 : ISO/IEC 17799 = Information technology : code of practice for infromation security management : international standard : ISO/IEC 17799 , 2000 .
[19] Denis D. Smith. For Whom the Bell Tolls: Imagining Accidents and the Development of Crisis Simulation in Organizations , 2004 .
[20] Qingxiong Ma,et al. ISO 17799: "Best Practices" in Information Security Management? , 2005, Commun. Assoc. Inf. Syst..
[21] David F. Anderson. A Proactive Model for Training Needs Analysis (Действенная модель для анализа потребностей в тренинге) , 1994 .
[22] P. Fallara. Disaster recovery planning , 2004 .
[23] Bruce C. Lierman,et al. How to Develop a Training Simulation. , 1994 .
[25] Nancy G. Leveson,et al. Incorporating Safety Risk in Early System Architecture Trade Studies , 2009 .
[26] Juha Röning,et al. Senior Executives Commitment to Information Security - from Motivation to Responsibility , 2006, 2006 International Conference on Computational Intelligence and Security.
[27] Remko Helms,et al. An integral IT continuity framework for undisrupted business operations , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[28] Timothy T. Baldwin,et al. TRANSFER OF TRAINING: A REVIEW AND DIRECTIONS FOR FUTURE RESEARCH , 1988 .