4BOEHM B. A spiral model of software development and enhancement[J]. IEEE Computer, 1988,21(5) :61-72.
5BOOYSEN H, ELOFF J. Information safety management [ M ]. [ S.1. ] :[s.n.],1995:114-119.
6FISCHER-HUBNER S. IT-safety and privacy : design and use of privacyenhancing safety mechanisms : Lecture Notes in Computer Science[ C]. [ S. 1. ] :Springer, 2001:46-47.
7HICHINGS J. Achieving an integrated design: the way forward for information safety[ C].//ELOFF J H P,SOLMS S H. Information security:the next decade :proc. of the 11 th International Conference on Information Security. [ S. 1. ] : Chapman and Hall, 1995:79.
8SIPONEN M. An analysis of the recent IS safety development approaches[ C]//lnformation safety management: global challenges in the new millennium. [ S. 1. ] :Idea Group,2001:242-245.
9BACKHOUSE J, DHILON G. Structures of responsibilities and safety of information system [J]. European Journal of Information Systems, 1996,5( 1 ) :21-24.