References & Acknowledgements

This is a collection of the information, links, reference, and people referred to or used in the creation of this website and its resources.

References

Accenture. (2012). Developing effective it governance to unleash business value. Retrieved from http://www.migevents.com/caworldexpo/ppt/Developing_Effective_IT_Governance_to_Unleash_Business_Value_(Jouni_Hakanen).pdf

Balanced Scorecard Institute. (2014). Balanced Scorecard Basics. Retrieved from http://www.balancedscorecard.org/bscresources/aboutthebalancedscorecard/tabid/55/default.aspx

Barclays. (2014). The Board Committees. Retrieved from http://group.barclays.com/about-barclays/about-us/the-board-committees


Chun, M. (2005). IT Matters: The IT Governance Road Map. Graziadio Business Review. Retrieved fromhttp://gbr.pepperdine.edu/2010/08/the-it-governance-road-map/

ControlRisks. (2013). Managing Security Risks. Retrieved from http://www.controlrisks.com/Services/Security/Pages/Home.aspx

Dalhousie University. (2013,). Examples for ACM, APA & IEEE. Retrieved from http://dal.ca.libguides.com/content.php?pid=860&sid=11818#webpxacm.

Discini, S. (2006). Developing Security Policies: Rules vs. Risk. Retrieved from http://www.esecurityplanet.com/best_practices/article.php/3629626/Developing-Security-Policies-Rules-vs-Risk.htm

Gartner. (2013). Hunting and harvesting in a Digital World: The 2013 CIO Agenda.

Heller, M. (2012,). Five best practices for it governance. CFO Publishing. Retrieved from http://www3.cfo.com/article/2012/8/it-value_cfo-leadership-governance-it-roi

Heier, H., Borgman, H.P., & Mileos, C. (2009). Examining the relationship between IT governance software, processes, and business value: a quantitative research approach. Proceedings of the 42nd Hawaii International Conference on System Sciences (HICSS), 1-11. doi:10.1109/HICSS.2009.203

Hipaa security rule toolkit. (2011). Retrieved from http://scap.nist.gov/hipaa/

Horne, A., & Foster, B. (2013). IT Governance is killing innovation. Harvard Business Review. Retrieved fromhttp://blogs.hbr.org/2013/08/it-governance-is-killing-innov/

Investopedia. (2013). Return On Investment. Retrieved from http://www.investopedia.com/terms/r/returnoninvestment.asp

IT Governance Institute. (2007). Governance IT Resources. IT Governance Using COBIT and VAL IT: Student Book, 2nd Edition.

ISACA. (2014). Glossary. Retrieved from http://www.isaca.org/Pages/Glossary.aspx

Johnson, D. (2012). 4 Keys Elements: Strategic IT Plans. Retrieved from http://www.informationweek.com/it-leadership/4-key-elements-strategic-it-plans/d/d-id/1107531

Kemper, A., Uren, R., Clark, S. (2006, July). Adoption of Electronic Health Records in Primary Care Pediatric Practices. Pediatrics Volume 118, 22. 

Mcloughlin, D. (2011). IT Governance. Retrieved fromhttp://www.governance.ie/attachments/Dera_McLoughlin.pdf

Moore Stephens. IT Assurance. Retrieved from http://www.moorestephens.co.uk/IIG_IT_assurance.aspx

The Devon Information Security Partnership (DISP). (2007). DISP information security policy. Retrieved from http://g3ctoolkit.net/ia/SecPol/disp.html

Schiller, D. & Miller, L. (2012). Where business and technology meet. Teradata Magazine Online, Retrieved fromhttp://www.teradatamagazine.com/v12n04/Connections/Where-Business-and-Technology-Meet/

Schoemaker, P. (1992). How to link strategic vision to core capabilities. Retrieved fromhttp://sloanreview.mit.edu/article/how-to-link-strategic-vision-to-core-capabilities/

Scholtz , T. (2008). Strategic Security Architecture Principles Worksheet. Retrieved from https://www.gartner.com/doc/713209/toolkit-strategic-security-architecture-principles

Sparx Systems. (2004). The Business Process Model. Retrieved from http://www.sparxsystems.com/downloads/whitepapers/The_Business_Process_Model.pdf

Taylor, L. (2001). Seven elements of highly effective security policies. Retrieved fromhttp://www.zdnet.com/news/seven-elements-of-highly-effective-security-policies/297286


ValuAdder. (2014). Business Value Definition. Retrieved frohttp://www.valuadder.com/glossary/business-value-definition.html

Walt, C. (2001). Introduction to Security Policies. Retrieved http://www.symantec.com/connect/articles/introduction-security-policies-part-one-overview-policies
Zhengjie, Y. (2010) The study of Economics of Information. 1020 International Conference, 24-26. doi:10.1109/ICMSS.2010.5578356

Wikipedia (2013). Information Economics. Retrieved from http://en.wikipedia.org/wiki/Information_economics

Wikipedia (2014). Business IT Alignment. Retrieved from http://en.wikipedia.org/wiki/Business-IT_alignment

0 comments:

Post a Comment