Brain of the Firm, 1981. ,
The Viable System Model: Its Provenance, Development, Methodology and Pathology, Journal of the Operational Research Society, vol.35, issue.1, pp.7-25, 1984. ,
DOI : 10.1057/jors.1984.2
The Heart of Enterprise (Classic Beer Series), p.596, 1979. ,
Business Statistics: Contemporary Decision Making, p.836, 2009. ,
Retrieved from http ,
BSI Standards Publication Information technology ? Security techniques ? Information security incident management, 2011. ,
An Information Security Governance Framework, Information Systems Management, vol.34, issue.4, pp.361-372, 2007. ,
DOI : 10.1016/j.cose.2004.01.012
Organisational Information Security: A Viable System Perspective, 2002. ,
Security Analytics: Risk Analysis for an Organisation's Incident Management Process. Retrieved from http, 2012. ,
A cybernetic view of environmental management: the implications for business organizations, Business Strategy and the Environment, vol.33, issue.5, pp.264-275, 1997. ,
DOI : 10.1002/(SICI)1099-0836(199711)6:5<264::AID-BSE122>3.0.CO;2-K
Information security governance framework, Proceedings of the first ACM workshop on Information security governance, WISG '09, 2009. ,
DOI : 10.1145/1655168.1655170
A framework for the governance of information security, Computers & Security, vol.23, issue.8, pp.638-646, 2004. ,
DOI : 10.1016/j.cose.2004.10.006
Theories of viability: a comparison, Systems Research and Behavioral Science, vol.36, issue.3, pp.337-347, 2006. ,
DOI : 10.1002/sres.731
General systems theory: problems, perspectives, practice, 2005. ,
DOI : 10.1142/5871
Systems approach to Information Security Governance: An imperative need for sustainability of enterprises, 2011 Annual IEEE India Conference, pp.1-8, 2011. ,
DOI : 10.1109/INDCON.2011.6139620
Information Security ? The Fourth Wave. Computers & security, pp.165-168, 2006. ,
Information Security Governance: A model based on the Direct???Control Cycle, Computers & Security, vol.25, issue.6, pp.408-412, 2006. ,
DOI : 10.1016/j.cose.2006.07.005