Amini, M., Vakili Mofrad, H., & Saberi, M. (2019). Identifying Factors Affecting Information Security Management of Libraries and Information Centers of Hamadan University of Medical Sciences. Academic Librarianship and Information Research, 3, 53. [In Persian]
Aram, Mohammadreza. (2009). Investigating and Assessing the Factors Affecting Information Security Management of Pars South Gas Company. Master's Thesis, Shahid Beheshti University. [In Persian]
Ashouri Zadeh, S. (2012). The Relationship between Organizational Culture and Information Security Management in the National Bank of Iran. Master's Thesis, Allameh Tabataba'i University. [In Persian]
Boritz, J. E. (2004). Managing enterprise information integrity: security, control, and audit issues. Isaca.
Chang, E. (2007). An Investigation of Organizational Culture on Information Security Management. Academy of Management Journal, 35, 421-438.
Chathoth, P. K., Mak, B., Sim, J., Jauhari, V., & Manaktola, K. (2011). Assessing dimensions of organizational trust across cultures: A comparative analysis of US and Indian full service hotels. International Journal of Hospitality Management, 30(2), 233-242.
Danaeefard, H., Abdali, R., & Mahmoudi Kouchaksaraei, A. A. (2020). Research on Corruption and Administrative Health in Iran: A Scoping Review. Knowledge of Auditing, 20(79), 201-218. [In Persian]
Danaeefard, H., Rajabzadeh, A., & Hasiri, A. (2009). Promoting Intra-Organizational Trust in the Public Sector: Examining the Role of Managers’ Managerial Competence. Management Research, 4, 59-90. [In Persian]
Dehghani, M., Rahmatpasand Fotideh, Z., Arasteh, Z., Shokrizadeh Bazanjani, K., & Awareness, K. (2019). Attitude and performance of employees of the health information management department of Iranian hospitals regarding health information security. Journal of Health Information Management, 1, 3-9. [In Persian]
Hadadi Harandi, A. A., Valmohammadi, C., & Salehi Sedghiani, J. (2019). Information security management in smart business. Scientific Research of Crisis Management, 8(Special Issue of Smartization), 25-33. [In Persian]
Hagen, J. M. (2011). Information security culture: an exploratory study. Information Management & Computer Security.
Hansche, S. (2001). Designing a security awareness program: Part 1. Information Systems Security, 9(6), 1-9.
Heidari, S., & Mohammadi, S. (2012). A New Model for Information Security Management in Service-Oriented Enterprise Architecture. American Journal of Scientific Research, (76), 114-132.
Ho, S. M. (2008). A Framework of Coordinated Defense. In Proceedings of the Second International Conference on Computational Cultural Dynamics (pp. 39-44).
Hong, K. S., Chi, Y. P., Chao, L. R., & Tang, J. H. (2003). An integrated system theory of information security management. Information Management & Computer Security.
Kadam, A. W. (2007). Information security policy development and implementation. Information Systems Security, 16(5), 246-256.
Kambwiri, L. (2012). An Appraisal of Information Security Management at Chancellor College, University of Malawi.
Kauspadiene, L., Cenys, A., Goranin, N., Tjoa, S., & Ramanauskaite, S. (2017). High-level self-sustaining information security management framework. Baltic Journal of Modern Computing, 5(1), 107.
Kim, S., Kim, S., & Lee, G. (2009). Structure design and test of enterprise security management system with advanced internal security. Future Generation Computer Systems, 25(3), 358-363.
Kline, R. B. (2011). Principles and practice of structural equation modeling. Guilford press.
Mitchell, R. C., Marcella, R., & Baxter, G. (1999). Corporate information security management. New Library World.
Mivald, E. (2006). Basics of Network Security. Translation: Information Technology Research Group of Jihad University of Sharif University of Technology. Tehran: Institute Is Iran Publications. [In Persian]
Mohammadi, M., Sheikh Zaheri, A., & Kermani, F. (2019). Comparison of Patient-Oriented Algorithms for Health Information Security in Health Social Networks and Cloud Environment. Journal of Modern Medical Information, 5(2), 68-79. [In Persian]
Park, E. H., Kim, J., & Park, Y. S. (2017). The role of information security learning and individual factors in disclosing patients' health information. Computers & Security, 65, 64-76.
Parsons, K., McCormac, A., Butavicius, M., Pattinson, M., & Jerram, C. (2014). Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q). Computers & Security, 42, 165-176.
Shams, Shahab al-Din; Esfandiari Moghaddam, Amir. (2015). The Relationship between Different Dimensions of Organizational Trust and Employees' Job Satisfaction. Management Studies (Improvement and Transformation), 77, 171-185. [In Persian]
Veiga, A. & Martins, N. (2017) “Defining and Identifying Dominant Information Security Cultures and Subcultures.” Computers & Security, 70: 72-94.
Vermeulen, C., & Von Solms, R. (2002). The information security management toolbox–taking the pain out of security management. Information Management & Computer Security.
Whitener, E. M. (2001). Do “high commitment” human resource practices affect employee commitment? A cross-level analysis using hierarchical linear modeling. Journal of Management, 27(5), 515-535.