1 |
BoanNews, "The CISO should manage Security Organization," 2014.
|
2 |
Oh, S. H., "Organization Theory," Pakyoungsa, 2011.
|
3 |
Bob, B., "Information Security is Information Risk Management," The 2001 workshop on New security paradigms, pp. 97-104, 2001.
|
4 |
Bruns, W. J., "Budgetary Control and Organization Structure," Journal of Accounting Research, Vol. 13, No. 2, pp. 177-203, 1975.
DOI
|
5 |
COSO, "Enterprise Risk Management: Integrated Framework: Executive Summary," 2004.
|
6 |
Dr. Gerald, K., "Establishing an Information Systems Security Organization (ISSO)," Computers and Security, Vol. 17, No. 7, pp. 600-612, 1998.
DOI
|
7 |
Evan Wheeler, "Organizational Stricture What Works," 2011.
|
8 |
Forrester, "Security Organization 2.0: Building a Robust Security Organization," 2010.
|
9 |
Gartner, "Determining Whether the CISO Should Report Outside of IT," 2014.
|
10 |
Gartner, "Difference between governance, management, operation," 2011.
|
11 |
IBM, "Introducing the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security," 2009.
|
12 |
ISO/IEC, ISO/IEX 27000: Information security management systems: Overview and vocabulary, 2013.
|
13 |
Jay, R. Galbraith, Designing Organizations, Pfeiffer, 2001.
|
14 |
Kang, M. A., Son, J. Y., and Kim, H. J., "A Study on applicability of Mixed-methodology," "Korean Public Administration Review," Vol. 41, No. 4, pp. 415-437. 2007.
|
15 |
Pennings, J. M., "Structural contingency theory: A reappraisal," Research In Organizational Behavior, Vol. 14, pp. 267-309, 1992.
|
16 |
Richard, H. H., "Intraorganizational Structural Variation: Application of the Bureaucratic Model," Sage Publications, Inc., Vol. 7, No. 3, pp. 295-308, 1962.
DOI
ScienceOn
|
17 |
Richard, L., Organization Theory and Design, Cengage Learning, 2012.
|
18 |
Stephen, P., Robbins, Organizational Behavior, Prentice Hall, 2014.
|
19 |
Yoo, J. H., "Comparison of Information Security Controls by Leadership of Top Management," The Journal of Society for e-Business Studies, Vol. 19, No. 1, pp. 63-78, 2014.
|