2SCHNEIER Digital security in a networked world [ M]. [ s. l. ] : Wiley Publishing, 2004.
3KUA Cheng-Yuan, CHANGA Yi-Wen, YEN D C. National information security policy and its implementation: a case study in Taiwan [J]. Telecommunications Policy, 2009, 33 (7): 371-384.
4BOJANC R, JERMAN-BLAzlc B. Towards a standard approach for quantifying an ICT security investment [ J ]. Computer standards & Interfaces, 2008, 30 (4): 216-222.
6EOM Jung-Ho, PARK Seon-Ho, HAN Young-Ju, et al. Risk assessment method based on business process-oriented asset evaluation for information system security [M]. Heidelberg: Springer Berlin, 2007: 1024-1031.
7Gartner Inc.. Gartner says number of identity theft victims has increased more than 50 percent since 2003 [ EB/OL ]. [ 2009- 06-05]. http: //www. gartner, corn/it/page, jsp? id =501912.
8I. W. Donald,B. L. Metcalfe. The preparation, properties and applications of some glass-coated metal filaments prepared by the Taylor-wire process[J] 1996,Journal of Materials Science(5):1139~1149