14. ISO/IEC27001, ISO/IEC 27001, Information Technology - Security Techniques Information
security management systemys - Requirements. 2005.
15. ISO/IEC20000, ISO/IEC20000, Service Management IT. 2005.
16. ITILv3.0, ITIL, Information Technology Infrastructure Library., C.C.a.T.A. (CCTA). Edi-
tor. 2007.
17. COBITv4.0, Cobit Guidelines, Information Security Audit and Control Association. 2006.
18. ISM3, Information security management matury model (ISM3 v.2.0). 2007, ISM3 Consor-
tium.
19. Eloff, J. and M. Eloff, Information Security Management - A New Paradigm. Annual re-
search conference of the South African institute of computer scientists and information
technologists on Enablement through technology SAICSIT´03, 2003: p. 130-136.
20. Areiza, K.A., et al., Hacia un modelo de madurez para la seguridad de la información. 3er
Congreso Iberoamericano de seguridad Informática, 2005a. Nov, (2005): p. 429 - 442.
21. Dojkovski, S., S. Lichtenstein, and M.J. Warren. Challenges in Fostering an Information
Security Culture in Australian Small and Medium Sized Enterprises. in 5th European Con-
ference on Information Warfare and Security. 2006. Helsinki, Finland: 1-2 June.
22. Sneza, D., L. Sharman, and W. Matthew John. Fostering information security culture in
small and medium size enterprises: An interpretive study in australia. in the Fifteenth Eu-
ropean Conference on Information Systems. 2007. University of St. Gallen, St. Gallen.
23. Linares, S. and I. Paredes (2007) IS2ME: Information Security to the Medium Enterprise.
Volume,
24. Wiander, T. and J. Holappa, Managing Information Security in Small and Medium-sized
Organization, in Handbook of Research on Information Security and Assurancence. 2007.
25. Carey-Smith, M.T., K.J. Nelson, and L.J. May. Improving Information Security Manage-
ment in Nonprofit Organisations with Action Research. in Proceedings of The 5th Australi-
an Information Security Management Conference. 2007. Perth, Western Australia: School
of Computer and Information Science. Edith Cowan University.
26. Tawileh, A., J. Hilton, and S. McIntosh, Managing Information Security in Small and Me-
dium Sized Enterprises: A Holistic Approach, in ISSE/SECURE 2007 Securing Electronic
Business Processes, Vieweg, Editor. 2007. p. 331-339.
27. Batista, J. and A. Figueiredo, SPI in very small team: a case with CMM. Software Process
Improvement and Practice, 2000. 5(4): p. 243-250.
28. Hareton, L. and Y. Terence, A Process Framework for Small Projects. Software Process
Improvement and Practice, 2001. 6: p. 67-83.
29. Tuffley, A., B. Grove, and M. G, SPICE For Small Organisations. Software Process
Improvement and Practice, 2004. 9: p. 23-31.
30. Calvo-Manzano, J.A., Método de Mejora del Proceso de desarrollo de sistemas de infor-
mación en la pequeña y mediana empresa (Tesis Doctoral). Universidad de Vigo
. 2000.
31. Mekelburg, D., Sustaining Best Practices: How Real-World Software Organizations Im-
prove Quality Processes. Software Quality Professional, 2005. 7(3): p. 4-13.
32. Sánchez, L.E., et al., MGSM-PYME: Metodología para la gestión de la seguridad y su
madurez en las PYMES., in V Congreso Iberoamericano de Seguridad Informática. 2009:
Montevideo, Uruguay.
33. Awad, E. and H. Ghaziri, Knowledge Management, ed. P. Hall. 2003.
158