This is a collection of the information, links, reference, and people referred to or used in the creation of this website and its resources.
References
Accenture. (2012). Developing effective it governance to unleash business value. Retrieved from http://www.migevents.com/caworldexpo/ppt/Developing_Effective_IT_Governance_to_Unleash_Business_Value_(Jouni_Hakanen).pdf
Balanced Scorecard Institute. (2014). Balanced Scorecard Basics. Retrieved from http://www.balancedscorecard.org/bscresources/aboutthebalancedscorecard/tabid/55/default.aspx
Barclays. (2014). The Board Committees. Retrieved from http://group.barclays.com/about-barclays/about-us/the-board-committees
Chun, M. (2005). IT Matters: The IT Governance Road Map. Graziadio Business Review. Retrieved fromhttp://gbr.pepperdine.edu/2010/08/the-it-governance-road-map/
Barclays. (2014). The Board Committees. Retrieved from http://group.barclays.com/about-barclays/about-us/the-board-committees
Chun, M. (2005). IT Matters: The IT Governance Road Map. Graziadio Business Review. Retrieved fromhttp://gbr.pepperdine.edu/2010/08/the-it-governance-road-map/
ControlRisks. (2013). Managing Security Risks. Retrieved from http://www.controlrisks.com/Services/Security/Pages/Home.aspx
Dalhousie University. (2013,). Examples for ACM, APA & IEEE. Retrieved from http://dal.ca.libguides.com/content.php?pid=860&sid=11818#webpxacm.
Discini, S. (2006). Developing Security Policies: Rules vs. Risk. Retrieved from http://www.esecurityplanet.com/best_practices/article.php/3629626/Developing-Security-Policies-Rules-vs-Risk.htm
Gartner. (2013). Hunting and harvesting in a Digital World: The 2013 CIO Agenda.
Heller, M. (2012,). Five best practices for it governance. CFO Publishing. Retrieved from http://www3.cfo.com/article/2012/8/it-value_cfo-leadership-governance-it-roi
Heier, H., Borgman, H.P., & Mileos, C. (2009). Examining the relationship between IT governance software, processes, and business value: a quantitative research approach. Proceedings of the 42nd Hawaii International Conference on System Sciences (HICSS), 1-11. doi:10.1109/HICSS.2009.203
Hipaa security rule toolkit. (2011). Retrieved from http://scap.nist.gov/hipaa/
Horne, A., & Foster, B. (2013). IT Governance is killing innovation. Harvard Business Review. Retrieved fromhttp://blogs.hbr.org/2013/08/it-governance-is-killing-innov/
Investopedia. (2013). Return On Investment. Retrieved from http://www.investopedia.com/terms/r/returnoninvestment.asp
IT Governance Institute. (2007). Governance IT Resources. IT Governance Using COBIT and VAL IT: Student Book, 2nd Edition.
ISACA. (2014). Glossary. Retrieved from http://www.isaca.org/Pages/Glossary.aspx
Johnson, D. (2012). 4 Keys Elements: Strategic IT Plans. Retrieved from http://www.informationweek.com/it-leadership/4-key-elements-strategic-it-plans/d/d-id/1107531
Kemper, A., Uren, R., Clark, S. (2006, July). Adoption of Electronic Health Records in Primary Care Pediatric Practices. Pediatrics Volume 118, 22.
Johnson, D. (2012). 4 Keys Elements: Strategic IT Plans. Retrieved from http://www.informationweek.com/it-leadership/4-key-elements-strategic-it-plans/d/d-id/1107531
Kemper, A., Uren, R., Clark, S. (2006, July). Adoption of Electronic Health Records in Primary Care Pediatric Practices. Pediatrics Volume 118, 22.
Mcloughlin, D. (2011). IT Governance. Retrieved fromhttp://www.governance.ie/attachments/Dera_McLoughlin.pdf
Moore Stephens. IT Assurance. Retrieved from http://www.moorestephens.co.uk/IIG_IT_assurance.aspx
Moore Stephens. IT Assurance. Retrieved from http://www.moorestephens.co.uk/IIG_IT_assurance.aspx
The Devon Information Security Partnership (DISP). (2007). DISP information security policy. Retrieved from http://g3ctoolkit.net/ia/SecPol/disp.html
Schiller, D. & Miller, L. (2012). Where business and technology meet. Teradata Magazine Online, Retrieved fromhttp://www.teradatamagazine.com/v12n04/Connections/Where-Business-and-Technology-Meet/
Schoemaker, P. (1992). How to link strategic vision to core capabilities. Retrieved fromhttp://sloanreview.mit.edu/article/how-to-link-strategic-vision-to-core-capabilities/
Schoemaker, P. (1992). How to link strategic vision to core capabilities. Retrieved fromhttp://sloanreview.mit.edu/article/how-to-link-strategic-vision-to-core-capabilities/
Scholtz , T. (2008). Strategic Security Architecture Principles Worksheet. Retrieved from https://www.gartner.com/doc/713209/toolkit-strategic-security-architecture-principles
Sparx Systems. (2004). The Business Process Model. Retrieved from http://www.sparxsystems.com/downloads/whitepapers/The_Business_Process_Model.pdf
Sparx Systems. (2004). The Business Process Model. Retrieved from http://www.sparxsystems.com/downloads/whitepapers/The_Business_Process_Model.pdf
Taylor, L. (2001). Seven elements of highly effective security policies. Retrieved fromhttp://www.zdnet.com/news/seven-elements-of-highly-effective-security-policies/297286
ValuAdder. (2014). Business Value Definition. Retrieved from http://www.valuadder.com/glossary/business-value-definition.html
Walt, C. (2001). Introduction to Security Policies. Retrieved http://www.symantec.com/connect/articles/introduction-security-policies-part-one-overview-policies
Walt, C. (2001). Introduction to Security Policies. Retrieved http://www.symantec.com/connect/articles/introduction-security-policies-part-one-overview-policies
Zhengjie, Y. (2010) The study of Economics of Information. 1020 International Conference, 24-26. doi:10.1109/ICMSS.2010.5578356
Wikipedia (2013). Information Economics. Retrieved from http://en.wikipedia.org/wiki/Information_economics
Wikipedia (2014). Business IT Alignment. Retrieved from http://en.wikipedia.org/wiki/Business-IT_alignment
0 comments:
Post a Comment