參考文獻 |
中文文獻
田秀蘭(2003)。質性研究的基本概念-研究方法概論。台北市,國立台灣師範大學。
吳芝儀、廖梅花(2001)。質性研究入門:紮根理論研究方法。嘉義市,濤石。
黃明祥、林詠章(2009)。資訊與網路安全概論:建構雲端運算安全(第四版)。台北市,東華。
顏慧蓮(2005)。台灣電子化政府之隱私權揭露現況探討[碩士論文]。國立屏東科技大學。
外文文獻
Alsmadi, D., & Prybutok, V. (2018). Sharing and storage behavior via cloud computing: Security and privacy in research and practice. Computers in Human Behavior, 85, 218-226. https://doi.org/10.1016/j.chb.2018.04.003
Alexander, N., & Doherty, A. M. (2010). International retail research: focus, methodology and conceptual development. International Journal of Retail & Distribution Management, 38, 928-942. https://doi.org/10.1108/09590551011085993
Anderson, R. (2008). Security engineering: A guide to building dependable distributed systems (2nd ed.). N.J., USA: Wiley Publishing, Inc. ISBN: 978-0-470-06852-6
Benlian, A., Kettinger, W. J., Sunyaev, A., & Winkler, T. J. (2018). Special section: The transformative value of cloud computing: A decoupling, platformization, and recombination theoretical framework. Journal of Management Information Systems, 35(3), 719-739. https://doi.org/10.1080/07421222.2018.1481634
Bulgurcu, B., Hasan, C., & Izak, B. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly: Management Information Systems, 34(3), 523-548.
Butterfield, A., Ngondi, G. E., & Kerr, A. (Eds.). (2016). A Dictionary of Computer Science (7th ed.). England, British: Oxford University Press. eISBN: 9780191768125
Cavusoglu, H. (2004). Economics of IT Security Management: Four Improvements to Current Security Practices. Communications of the Association for Information Systems, 14, 65-75. https://personal.utdallas.edu/~huseyin/paper/practice.pdf
Glaser, B. & Strauss, A. (1967). The discovery of grounded theory. Chicago, USA: Aldine. ISBN: 0-202-30260-1
Glaser, B. (1978). Theoretical sensitivity: Advances in the methodology of grounded theory. Mill Valley, British: Sociology Press. ISBN-13978-1884156014
Gollmann, D. (2011). Computer security (3rd ed.). N.J., USA: Wiley Publishing, Inc. ISBN: 978-0-470-74115-3
Hiles, A. (2010). The definitive handbook of business continuity management. N.J. USA: John Wiley & Sons. DOI:10.1002/9781119205883
Miguel, H. B., Ricardo, J. R., & José, M. (2021). A Vision for Improving Business Continuity through Cyber-resilience Mechanisms and Frameworks. https://www.researchgate.net/publication/353203872_A_Vision_for_Improving_Business_Continuity_through_Cyber-resilience_Mechanisms_and_Frameworks. DOI:10.23919/CISTI52073.2021.9476324
ISO (2013). ISO/IEC 27001:2013 Information technology-Security techniques- Information security management systems - Requirements. Geneva: ISO.
Jie, J. (2023). The Impact of Covid-19 on E-Commerce Platforms and The Opportunities and Challenges They Face. BCP Business & Management, 44, 843-849. DOI:10.54691/bcpbm.v44i.4968
Jon, J., Carte, T. A., Saunders, C. S., Butler, B. S., Henry, J. P. C., & Weijun, Z. (2002). Review: Power and Information Technology Research: A Metatriangulation Review. MIS Quarterly, 26(4), 397-459. https://doi.org/10.2307/4132315
Jones, A., & Ashenden, D. (2005). Risk Management for Computer Security: Protecting Your Network & Information Assets. Oxford, United Kingdom: Butterworth-Heinemann. ISBN-13978-0750677950
Kathuria, A., Mann, A., Khuntia, J., Saldanha, T. J., & Kauffman, R. J. (2018). A strategic value appropriation path for cloud computing. Journal of Management Information Systems, 35(3), 740-775. https://doi.org/10.1080/07421222.2018.1481635
Kiesow, C. E., & Dekker, M. (2022). A Corporate Governance Approach to Cybersecurity Risk Disclosure. European Journal of Risk Regulation, 13(3), 443–463. doi:10.1017/err.2022.10.
Kott, A., & Linkov, I. (Eds.). (2019). Cyber Resilience of Systems and Networks. Germany, Springer Science Business Media.
Lambert, P. (2018). The impact of the GDPR on corporate data governance. Journal of Data Protection & Privacy, 2(1), 37-46. ISSN (print): 2398-5100
Maxim, C., Zubair, B., & Sherali, Z. (2021). Cloud-Native Application Security: Risks, Opportunities, and Challenges in Securing the Evolving Attack Surface. DOI Bookmark: 10.1109/MC.2021.3076537
Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. NIST Special Publication800-145. https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-145.pdf
Moulika, B., & Vijay, K. D. (2017). Cloud computing: Security issues and research challenges. Journal of Network Communications and Emerging Technologies (JNCET), 7. https://www.jncet.org/Manuscripts/Volume-7/Issue-11/Vol-7-issue-11-M-12.pdf
National Institute of Standards and Technology, NIST (2020). Special Publication 800-53 Revision 5: Security and Privacy Controls for Information Systems and Organizations. https://doi.org/10.6028/NIST.SP.800-53r5
Niemimaa, E., & Niemimaa, M. (2017). Information systems security policy implementation in practice: from best practices to situated practices. European Journal of Information Systems, 26(1), 1-20. https://doi.org/10.1057/s41303-016-0025-y
Pahl, C., Brogi, A., Soldani, J., & Jamshidi, P. (2019). Cloud container technologies: a state-of-the-art review. IEEE Transactions on Cloud Computing, 7(3), 677-692. DOI: 10.1109/TCC.2017.2702586
Ponemon Institute. (2019). Cost of a Data Breach Report 2019. IBM Security. https://www.ibm.com/downloads/cas/RDEQK07R
Rahman, M. R., & Boutaba, R. (2013). SVNE: Survivable virtual network embedding algorithms for network virtualization. IEEE Transactions on Network and Service Management, 10(2), 105-118. DOI: 10.1109/TNSM.2013.013013.110202
Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero Trust Architecture (NIST Special Publication (SP) 800-207). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-207
Russell, D. & Gangemi, G.T. (2006). Computer Security Basics (2nd ed.). C.A., USA: O′Reilly Media, Inc. ISBN: 9780596006693
Sanchez-Cartas, J. M., & Leon, G. (2018). Multisided Platforms and Markets: A Literature Review. Telecommunications Policy, 45(5), 102152. https://www.researchgate.net/publication/325225786_Multisided_Platforms_and_Markets_A_Literature_Review
Sasse, M. A., & Flechais, I. (2005). Usable Security: Why Do We Need It? How Do We Get It? Security and Usability: Designing Secure Systems that People Can Use (13-30). C.A., USA: O′Reilly Media, Inc. https://www.researchgate.net/publication/316236669_Usable_Security_Why_Do_We_Need_It_How_Do_We_Get_It
Schneier, B. (2018). Click Here to Kill Everybody: Security and Survival in a Hyper-connected World. N.Y., USA: W. W. Norton & Company. ISBN-13978-0393357448
Siim, A. (2017). Dealing with an Evolving Cyber Threat Picture – Developing a Joint European Response. DOI10.3233/NHSDP190005
Simson, G. and Gene, S. (1991), Practical UNIX Security, (1st edition). C.A., USA: O.Reilly & Associates, Inc. ISBN-13978-0937175729
Snedaker, S. (2013). Business continuity and disaster recovery planning for IT professionals. C.A., USA: Syngress Publishing, Inc. ISBN-13978-0124105263
Solove, D. J. (2004). The Digital Person: Technology and Privacy in the Information Age. N.Y., USA: NYU Press. ISBN-13978-0814740378
Sonatype (2021). THE STATE OF CLOUD SECURITY 2021. https://www.sonatype.com/hubfs/State_of_Cloud_Security_2021.pdf
Stamp, M. (2011). Information security: Principles and practice (2nd ed.). N.J., USA: Wiley Publishing, Inc. ISBN-0789753251
Syed, H. J., Gani, A., Ahmad, R. W., Khan, M. K., & Ahmed, A. I. A. (2017). Cloud monitoring: A review, taxonomy, and open research issues. Journal of Network and Computer Applications, 98, 11-26. https://doi.org/10.1016/j.jnca.2017.08.021
Vacca, J. R. (2013). Computer and Information Security Handbook. London, British: Newnes. ISBN-13978-0128038437
Ware, W.H. (1970). Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security. C.A., USA: Santa Monica, RAND Corporation. https://www.rand.org/pubs/reports/R609-1.html.
Wiebe, E. (2019). Information Security: Principles and Practices. Pearson IT Certification.https://www.pearson.com/en-us/search.html/Information+Technology/IT+Certification
Zhao, C., Shi, M., Huang, M., & Du, X. (2019). "Authentication Scheme Based on Hashchain for Space-Air-Ground Integrated Network," ICC 2019 - 2019 IEEE [International Conference on Communications (ICC)], Shanghai, China, 1-6.
Zimmermann, A., Schmidt, R., Sandkuhl, K., Wißotzki, M., Jugel, D., & Möhring, M. (2015). Digital enterprise architecture-transformation for the internet of things. 2015 IEEE 19th International Enterprise Distributed Object Computing Workshop, 130-138.
網路文獻
Fortinet (2023). Secure Access Service Edge. Retrieved from https://www.fortinet.com/tw/products/sase (March 25, 2024)
Optiv (2017). What is Cloud-Delivered Security? Retrieved from https://www.optiv.com/cybersecurity-dictionary/cloud-delivered-security (April 4, 2024)
Polymer (2023). Retrieved from https://www.polymerhq.io. (April 19, 2024)
Whitman, M. E., & Mattord, H. J. (2021). Principles of Information Security (7th ed.). Cengage Learning. Retrieved from https://www.cengageasia.com/ (March 21, 2024)
Zeljka, Z. (2021). Zero Trust: A Solution to Many Cybersecurity Problems. Retrieved from https://www.helpnetsecurity.com/2021/01/25/zero-trust-a-solution-to-many-cybersecurity-problems/. (May 2, 2024) |