1. [1] J.S. Broderick, “ISMS, Security Standards and Security Regulations,” Int. J. Information Security Technical Report, vo1.11, no.1, pp.26-31, Jan. 2002.
2. [2] International Organization for Standardization, “ISO/IEC 27001: Information Technology-Security Techniques-Information Security Management Systems-Requirements,” 2005.
3. [3] A.I.H. Suhaimi, Y. Goto, and J. Cheng, “An analysis of software supportable tasks in information security management system life cycle processes,” Proc. 2013 International Conference on Information and Social Science, Nagoya, Japan.
4. [4] A.I.H. Suhaimi, Y. Goto, and J. Cheng, “An engineering environment for supporting information security management systems,” Proc. 2012 International Conference on Security Technology, Jeju Island, Korea, Communications in Computer and Information Science, vol.339, pp.30-37, Springer-Verlag, 2012.
5. [5] Jr. H.R. Sprague, “Electronic document management: Challenges and opportunities for information systems managers,” MIS Quarterly, vol.19, no.1, pp.29-49, 2005.