S İ B E R G Ü V E N L İ K FA R K I N D A L I Ğ I , FA R K I N D A L I K Ö L Ç Ü M Y Ö N T E M V E M O D E L L E R İ
137
[10] Cherdantseva, Y., Hilton, J. (2013). A reference model of information
assurance and security.
2013 International Conference on Availability,
Reliability and Security, Regensburg,
546-555.
[11] Hambrick, D. C., Chen, M. J. (2008). New academic fields as admit-
tance-seeking social movements: The case of strategic management.
Academy of Management Review, 33(1), 32-54.
[12] Chiprianov, V., Kermarrec, Y., Rouvrais, S., ve Simonin, J. (2012). Ex-
tending enterprise architecture modelling
languages for domain
specificity and collaboration: application to telecommunication ser-
vice design.
Software & Systems Modelling, 1-12.
[13] İnternet: NIST. Information Technology
Security Training Re-
quirements: A Role- and Performance-Based Model, Spe-
cial Publication 800-16. URL: http://www.webcitation.org/
query?url=http%3A%2F%2Fnvlpubs.nist.gov%2Fnistpubs%2FLeg
acy%2FSP%2Fnistspecialpublication800-16.pdf&date=2016-11-16,
Son Erişim Tarihi: 16.11.2016.
[14] Huang, D. L., Rau, P. P. ve Salvendy, G. (2010). Perception of infor-
mation security.
Behaviour & Information Technology, 29(3), 221-232.
[15] İnternet: TÜBİTAK Ulusal Elektronik ve Kriptoloji Araştır-
ma Enstitüsü. (2007). Bilgi Güvenliği
Yönetim Sistemi Risk
Yönetim Süreci Kılavuzu. URL: http://www.webcitation.
org/query?url=https%3A%2F%2Fwww.bilgiguvenligi.gov.
tr%2Fdokuman-yukle%2Fbgys%2Fuekae-bgys0004-bgys-risk-
yonetim-sureci-kilavuzu%2Fdownload.html&date=2016-11-21,
Son Erişim Tarihi: 16.11.2016.
[16] Cardona, O. D. (2003). The need for rethinking the consepts of vulne-
rability and risk from a holistic perspective: A necessary review and
criticism for effective risk management. In G. Bankoff, G. Frerks ve
D. Hilhorst (Eds.),
Mapping vulnerability: Disasters, development and
Dostları ilə paylaş: