5. Goldfarb, A., The medium-term effects of unavailability Journal Quantitative Marketing
and Economics 2006. 4(2): p. 143-171
6. Telang, R. and S. Wattal. Impact of Vulnerability Disclosure on Market Value of Software
Vendors: An Empirical Analysis. in 4h Workshop on Economics and Information Security.
2005. Boston.
7. Sant-Germain, R., Information Security Management Best Practice Based on ISO/IEC
17799. Setting Standars, The information Management JournaL, 2005. 39(4): p. 60-62, 64-
66.
8. Areiza, K.A., A.M. Barrientos, R. Rincón, and J.G. Lalinde-Pulido. Hacia un modelo de
madurez para la seguridad de la información. in IV Congreso Internacional de Auditoría y
Seguridad de la Información. 2005.
9. COBIT, Cobit Guidelines, Information Security Audit and Control Association. 2000.
10. Aceituno, V., Ism3 1.0: Information security management matury model. 2005.
11. Barrientos, A.M. and K.A. Areiza, Integración de un sistema de gestión de seguridad de la
información conun sistema de gestión de calidad., in Master’s thesis. 2005, Universidad
EAFIT.
12. Eloff, J. and M. Eloff. Information Security Management - A New Paradigm. in Annual
research conference of the South African institute of computer scientists and information
technologists on Enablement through technology SAICSIT´03. 2003.
13. Lee, J., J. Lee, S. Lee, and B. Choi. A CC-based Security Engineering Process Evaluation
Model. in Proceedings of the 27th Annual International Computer Software and Applica-
tions Conference (COMPSAC). 2003.
14. Areiza, K.A., A.M. Barrientos, R. Rincón, and J.G. Lalinde-Pulido. Hacia un modelo de
madurez para la seguridad de la información. in 3er Congreso Iberoamericano de seguri-
dad Informática. 2005.
15. Walton, J.P. Developing an Enterprise Information Security Policy. in 30th annual ACM
SIGUCCS conference on User services. 2002.
16. Lund, M.S., F.d. Braber, and K. Stolen, Proceedings of the Seventh European Conference
On Software Maintenance And Reengineering (CSMR’03). IEEE, 2003.
17. MageritV2, Metodología de Análisis y Gestión de Riesgos para las Tecnologías de la
Información, V2. 2005.
18. Siegel, C.A., T.R. Sagalow, and P. Serritella, Cyber-Risk Management: Technical and
Insurance Controls for Enterprise-Level Security. Security Management Practices, 2002.
sept/oct: p. 33-49.
19. Garigue, R. and M. Stefaniu, Information Security Governance Reporting. Information
Systems Security, 2003. sept/oct: p. 36-40.
20. Von Solms, B. and R. Von Solms, Incremental Information Security Certification. Com-
puters & Security, 2001. 20: p. 308-310.
21. Stephenson, P., Forensic Análisis of Risks in Enterprise Systems. Law, Investigation and
Ethics, 2004. sep/oct: p. 20-21.
244