[
Alina Mihaela Dima, Simona Vasilache (2009). ANN model for corporate credit risk assessment, 2009 International Association of Computer Science and Information Technology Spring Conference (IACSIT-SC2009), International Conference on Information and Financial Engineering (ICIFE2009), Singapore, 17-19 April 2009, pp. 94-98.
]Search in Google Scholar
[
Paul Cichonski, Thomas Millar, Tim Grance, Karen Scarfone (2012). Computer Security Incident Handling Guide [NIST SP 800-61 Rev. 2], Retrieved from https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf
]Search in Google Scholar
[
Calder Alan, Watkins Steve G. (2009), Information Security Risk Management for ISO27001 / ISO27002, IT Governance Publishing, ISBN 978-1-84928-044-0
]Search in Google Scholar
[
Heru Susanto, Mohammad Nabil Almunawar, Yong Chee Tuan (2012), Information Security Challenge and Breaches: Novelty Approach on Measuring ISO 27001 Readiness Level, International Journal of Engineering and Technology Volume 2 No. 1
]Search in Google Scholar
[
By Barnaby Lewis (2019), How to tackle today’s IT security risks, retrieved from https://www.iso.org/news/ref2360.html
]Search in Google Scholar
[
Carol Hsu, Tawei Wang, Ang Lu (2016), The Impact of ISO 27001 Certification on Firm Performance, Koloa, HI, USA, ISBN 978-0-7695-5670-310.1109/HICSS.2016.600
]Search in Google Scholar
[
Eleni Philippoua, Sylvain Frey, Awais Rashid (2020), Contextualising and aligning security metrics and business objectives: A GQM-based methodology, Computers & Security, Volume 8810.1016/j.cose.2019.101634
]Search in Google Scholar
[
Jaya Sharma, Why do organizations need ISO 27001?, Retrieved from https://kratikal.com/blog
]Search in Google Scholar
[
ISO. (2017). ISO Survey. Retrieved from www.iso.org
]Search in Google Scholar
[
ISO27000. (2018). Information technology. Security techniques. Information security management systems. Overview and vocabulary. Retrieved from www.iso.org
]Search in Google Scholar
[
ISO27001. (2013). Information technology. Security techniques. Information security management systems. Requirements. Retrieved from www.iso.org
]Search in Google Scholar
[
ISO27002. (2013). Information technology. Security techniques. Code of practice for information security controls. Retrieved from www.iso.org
]Search in Google Scholar
[
ISO27005. (2016). Information technology. Security techniques. Information security risk management. Retrieved from www.iso.org
]Search in Google Scholar
[
LukeBriner (2018), Making information security easier, Computer Fraud & Security, Issue 4, 10-1410.1016/S1361-3723(18)30033-2
]Search in Google Scholar