Mapping (E-VSM). Journal of Cleaner Production, 180,
335–348.
Geiger, M., Harrer, S., Lenhard, J., and Wirtz, G. (2018).
BPMN 2.0: The state of support and implementation.
Future Generation Computer Systems, 80, 250–262.
Gonzalez, J. J., and Sawicka, A. (2002). A Framework for
Human Factors in Information Security. In:
Proceedings of WSEAS International Conference on
Information Security.
Große, C. (2016). Towards an Integrated Framework for
Quality and Information Security Management in Small
Companies. Luleå University of Technology.
Hariyanti, E., Djunaidy, A. and Siahaan, D.O. (2018): A
Conceptual Model for Information Security Risk
Considering Business Process Perspective. In: 4th
International Conference on Science and Technology.
IEEE, pp. 1–6.
Houngbo, P. J. and Hounsou, J. T. (2015). Measuring
Information Security: Understanding and Selecting
Appropriate Metrics. International Journal of
Computer Science and Security, 9(2), 108-120.
Hwang, I., and Cha, O. (2018). Examining technostress
creators and role stress as potential threats to
employees’ information security compliance.
Computers in Human Behavior, 81, 282–293.
International Organization for Standardization (ISO)
(2013). ISO/IEC 19510:2013. Information technology
— Object Management Group Business Process Model
and Notation.
International Organization for Standardization (ISO)
(2018). ISO/IEC 27000:2018. Information technology
— Security techniques — Information security
management systems — Overview and vocabulary.
Komanduri, S., Shay, R., Kelley, P. G., Mazurek, M. L.,
Bauer, L., Christin, N., Cranor, L. F., and Egelman, S.
(2011). Of passwords and people: Measuring the effect
of password-composition policies. Proceedings of the
2011 Annual Conference on Human Factors in
Computing Systems, 2595.
Lawrence, G. W., Kehoe, W. R., Rieger, O. Y., Walters, W.
H. and Kenney, A. R (2000). Risk management of digital
information: A file format investigation. Washington,
D.C: Council on Library and Information Resources.
Laybats, C., and Tredinnick, L. (2016). Information
security. Business Information Review, 33(2), 76–80.
Lertworasirikul, S., Fang, S.-C., Nuttle, H. L. W. and
Joines, J. A. (2003). Fuzzy BCC Model for Data
Envelopment Analysis. Fuzzy Optimization and
Decision Making, 2(4), 337–358.
Lundgren, B., and Möller, N. (2019). Defining Information
Security. Science and Engineering Ethics, 25(2), 419–441.
Mecit, E. D. and Alp, I. (2013). A new proposed model of
restricted data envelopment analysis by correlation
coefficients. Applied Mathematical Modelling 37,
3407-3425.
Metalidou, E., Marinagi, C., Trivellas, P., Eberhagen, N.,
Skourlas, C., and Giannakopoulos, G. (2014). The
Human Factor of Information Security: Unintentional
Damage Perspective. Procedia - Social and Behavioral
Sciences, 147, 424–428.
Mitrovic, P. (2005). Handbok i IT-säkerhet (4th ed.).
Sundbyberg: Pagina Förlags AB.
Nyman, M. and Große, C. (2019).Are You Ready When It
Counts? IT Consulting Firm’s Information Security
Incident Management. In: Proceedings of the 5th
International Conference on Information Systems
Security and Privacy, 26-37.
Opricović, S., and Tzeng, G.-H. (2008). A comparative
analysis of the DEA-CCR model and the VIKOR
method. Yugoslav Journal of Operations Research, 18.
Paliszkiewicz, J. (2019). Information Security Policy
Compliance: Leadership and Trust. Journal of
Computer Information Systems, 59(3), 211–217.
Pereira T. and Santos H. (2015). Insider Threats: The Major
Challenge to Security Risk Management. In: Tryfonas,
T., Askoxylakis, I. (eds) Human Aspects of Information
Security, Privacy, and Trust 2015. Lecture Notes in
Computer Science, vol 9190. Springer, Cham.
Seiford, L. M., and Zhu, J. (1999). An investigation of
returns to scale in data envelopment analysis. Omega,
27(1), 1–11.
Stolfo, S., Bellovin, S. M. and Evans, D. (2011). Measuring
Security. In: Varadharajan, V. and Cohen, F. (eds) On
the Horizon. IEEE Security & Privacy 5/6 2011, 60-65
Taubenberger, S. and Jürjens, J. (2008). IT Security Risk
Analysis based on Business Process Models enhanced
with Security Requirements. In: Proceedings of the
Workshop on Modeling Security 2008 at International
Conference on Model Driven Engineering Languages
and Systems. Paper 14.
Taubenberger, S., Jurjens, J., Yu, Y. and Nuseibeh, B.
(2013). Resolving vulnerability identification errors
using security requirements on business process
models. Information Management and Computer
Security, 21(3), 202–223.
Venegas, C. (2007). Flow in the Office—Implementing and
sustaining Lean improvements. CRC Press.
Vroom, C., and von Solms, R. (2004). Towards information
security behavioural compliance. Computers &
Security, 23(3), 191–198.
Wang, Y.-M., and Luo, Y. (2006). DEA efficiency
assessment using ideal and anti-ideal decision making
units. Applied Mathematics and Computation, 173(2),
902–915.
Wood, C. C. (1983). Effective information system security
with password controls. Computers & Security, 2(1), 5–
10.
Zalewski, J., Drager, S., McKeever, W. and Kornecki, A.J.
(2014): Measuring Security. A Challenge for the
Generation. In: Federated Conference on Computer
Science and Information Systems. pp. 131–140.
Zheng, X. B. and Park, N. K. (2016). A Study on the
Efficiency of Container Terminals in Korea and China.
The Asian Journal of Shipping and Logistics, 32(4),
213–220.
Zhu, J. (2014). Quantitative models for performance
evaluation and benchmarking: Data Envelopment
Analysis with Spreadsheets. 3
rd
ed. Springer
International Publishing.