Semaine 4
Semaine 10
- Ashenden, D. (2008). Information Security Management: A Human Challenge? Information Security Technical Report, Volume 13, Issue 4, November 2008, Pages 195–201
- M.T. Dlaminia, J.H.P. Eloffa, M.M. Eloff (2008). Information security: The moving target. Computers & Security 28 (2009) 189–198.
- Von Solms et von Solms (2004). The 10 deadly sins of information security management, Computers & Security, Volume 23, Issue 5, July 2004, Pages 371–376
Semaine 11
- Pasquero, J. (2007) Éthique, responsabilité sociale et gouvernance : démêler l’écheveau, Gestion, (32 : 1), 112-116.
- Pinder (2006). Preparing Information Security for legal and Regulatory Compliance, Information Security Technical Report, Volume 11, Issue 1, 2006, Pages 32–38
Semaine 12
- Gerber et von Solms (2008). Information security requirements – Interpreting the legal aspects, Computers & Security, Volume 27, Issues 5–6, October 2008, Pages 124–135
- Humphreys (2008). Information security management standards: Compliance, governance and risk management, Information Security Technical Report,Volume 13, Issue 4, November 2008, Pages 247–255
- S.H. (Basie) von Solms (2005). Information Security Governance - Compliance management vs operational management. Computers & Security (2005) 24, 443-447.
- Travis D. Breaux, David L. Baumer (2011). Legally “reasonable” security requirements: A 10-year FTC retrospective. Computers & Security 30 (2011) 178-193.