S. Beer, Brain of the Firm, 1981.

S. Beer, The Viable System Model: Its Provenance, Development, Methodology and Pathology, Journal of the Operational Research Society, vol.35, issue.1, pp.7-25, 1984.
DOI : 10.1057/jors.1984.2

S. Beer, The Heart of Enterprise (Classic Beer Series), p.596, 1979.

K. Black, Business Statistics: Contemporary Decision Making, p.836, 2009.

J. Wiley and &. Sons, Retrieved from http

B. Iso, BSI Standards Publication Information technology ? Security techniques ? Information security incident management, 2011.

A. Da-veiga and J. Eloff, An Information Security Governance Framework, Information Systems Management, vol.34, issue.4, pp.361-372, 2007.
DOI : 10.1016/j.cose.2004.01.012

G. B. Gokhale, Organisational Information Security: A Viable System Perspective, 2002.

H. Laboratories, Security Analytics: Risk Analysis for an Organisation's Incident Management Process. Retrieved from http, 2012.

G. Lewis, A cybernetic view of environmental management: the implications for business organizations, Business Strategy and the Environment, vol.33, issue.5, pp.264-275, 1997.
DOI : 10.1002/(SICI)1099-0836(199711)6:5<264::AID-BSE122>3.0.CO;2-K

E. Ohki, Y. Harada, S. Kawaguchi, T. Shiozaki, and T. Kagaya, Information security governance framework, Proceedings of the first ACM workshop on Information security governance, WISG '09, 2009.
DOI : 10.1145/1655168.1655170

S. Posthumus, V. Solms, and R. , A framework for the governance of information security, Computers & Security, vol.23, issue.8, pp.638-646, 2004.
DOI : 10.1016/j.cose.2004.10.006

M. Schwaninger, Theories of viability: a comparison, Systems Research and Behavioral Science, vol.36, issue.3, pp.337-347, 2006.
DOI : 10.1002/sres.731

L. Skyttner, General systems theory: problems, perspectives, practice, 2005.
DOI : 10.1142/5871

T. Vinnakota, Systems approach to Information Security Governance: An imperative need for sustainability of enterprises, 2011 Annual IEEE India Conference, pp.1-8, 2011.
DOI : 10.1109/INDCON.2011.6139620

V. Solms, Information Security ? The Fourth Wave. Computers & security, pp.165-168, 2006.

V. Solms, R. , V. Solms, and S. , Information Security Governance: A model based on the Direct???Control Cycle, Computers & Security, vol.25, issue.6, pp.408-412, 2006.
DOI : 10.1016/j.cose.2006.07.005