top of page
                                     References
 

 

ACUPA (2014). POLICY DEVELOPMENT PROCESS WITH BEST PRACTICES. Retrieved from http://www.it.umd.edu/                

units/aea/internal/policy_development _process.pdf

 

Anderson , J.(2012). The Secret To Knowing Where You Are Going: Using The Balanced Scorecard For IT. Retrieved from

http://www.slideshare.net/drjimanderson/using-a- balanced-scorecard-for-an-it-department-the-secret-to-       knowing-where-you-are- going

 

Bowman, D. (2009). Information Management IT Policy. Retrieved from http://www.information-management-              

architect.com/it-policy.html

 

Caudle, S. (2008). The Balanced Scorecard: A Strategic Tool in Implementing Homeland Security Strategies. Retrieved  

from https://www.hsaj.org/?fullarticle=4.3.2

 

Cram, A. (2007). The IT Balanced Scorecard Revisited. Retrieved from http://www.bcmglobaltech.com/scorecard.pdf

 

Enterprise risk management (2014). IT Security Policies And Procedures. Retreieved from http://www.emrisk.com/it-  

security-policies-and-procedures-design

 

ISACA (2012). COBIT5 for Information Security. Retrieved from https://www.isaca.org/ COBIT/Documents/COBIT-5-for-    

Information-Security-Introduction.pdf

 

IT Governance Institute. (2007). IT Governance Using Cobit and ValIT: Student Book, 2 Edition. Illinois, IL: IT Governance 

Institute.

 

Kaplan, S., R. & Norton, P., D. (2007). Using the Balanced Scorecard as a Strategic Management System. Retrieved from

http://hbr.org/2007/07/using-the-balanced-scorecard-as-a-strategic-management-system/ar/1

 

Leroy, P. (2012). IT Definitions and Terms. IT Professional Toolkit. Retrieved from https://sites.google.com/a/

celticfirejadespirit77.com/it-7833-professional- toolkit/it-definitions-and-terms

 

O'Rourke, P. (2012). IT Professional Toolkit, IT Strategy, Retrieved from http://itprofessionaltoolkit.wordpress.com/it-

strategy/

 

SANS Institute (2007). Information Security Policy - A Development Guide for Large and Small Companies. Retrieved    

from http://www.sans.org/reading- room/whitepapers/policyissues/information-security-policy-development-       guide- large-small-companies-1331

 

Saull, R.(2014). The IT Balanced Scorecard A Roadmap to Effective Governance of a Shared Services IT Organization.      

Retrieved from http://www.isaca.org/ Journal /Past-Issues/2000/Volume-2/Pages/The-IT-Balanced-Scorecard-     A-Roadmap-to- Effective-Governance-of-a-Shared-Services-IT-Organization.aspx

 

Seeram K., S. (2012). Introduction to COBIT5.Retrieved from http://www.itsmportal.com /columns/introduction-cobit-  

5#.U0nRvk0o-cw

 

Slater, D. (2010).Enterprise risk management: Get started in six steps. Retrieved from http://www.csoonline.com/article/

2125916/strategic-planning-erm/enterprise-risk-management--get-started-in-six-steps.html

 

Strategic Consulting Partners(2013). Ten Key Elements to Strategic Plaining. Retrieved from http://yourstrategic        

consultant.com/ten_key_planning.php

© 2014 by Ditsakarn Punyapab

FOLLOW US:

  • w-facebook
  • Twitter Clean
bottom of page