6Fry, B. G. P. and Main, W. F. , A. Conceptual Methodology for Evaluating Security Requirements for Data Assets [J]. Comput- er and Security, 1983, (2).
7Straub, D. w. Jr. , Welke, R. J. Coping with Systems Risk: Security for Management Decision Making [ J ]. MIS Quarterly, De- cember, 1998.
8Post, G. , Kagan, A. Management Tradeoffs in Anti-Virus Strategies [J]. Information ang Management, 2000, (37).
9Committee of Sponsoring Organizations (COSO) of the Treadway Commission, Internal Control--Integrated Framework [ EB ]. USA, 1994.
10Committee of Sponsoring Organizations (COSO) of the Treadway Commission, Enterprise Risk Management--Integrated Framework [EB]. USA, 2004.