6Greenstein M, Feiman T M. Electronic commerce - security、risk、management and control[M]. New York: McGraw-Hill Company, InC., 2000.131 - 192.
7Fischer T R. Hacker proof: the ultimate guide to network secuity[M]. Washington: James Press, 1997.79 - 96; 197 -235.
8Ba S, Lang K R, Whinston A B. Enterprinse decision support using Intranet technology[J]. Decision Support System, 1997,20(2) :99 - 134.
9Post G, Kagan A. Management tradeoffs in anti-virus strategies[ J]. Information & Management, 2000, 37 ( 1 ): 13- 24.
10Janvrin D, Morrison J. Using a structured design approach to reduce risks in end user spreadsheet development [ J ].Information & Management, 2000, 37(1): 1 - 12.