احمدی، ح. (1394). ترسیم و تحلیل شبکه مفهومی و هستیشناسی ساختار دانش حوزه علمسنجی ایران بر اساس رویکرد تحلیل حوزه [رساله دکتری منتشر نشده]. دانشگاه شهید چمران اهواز.
آرینپور، م. (1395). میزان رعایت استانداردهای آی ای اس 27002 و 27019 در حوزه مدیریت امنیت اطلاعات در سازمان اسناد و کتابخانه ملی ایران [پایاننامه کارشناسی ارشد منتشر نشده]. دانشگاه الزهرا.
حاجی زینالعابدینی، م.، و رفعتی، م. (1396). بررسی نظام مدیریت امنیت اطلاعات در کتابخانههای مرکزی دانشگاههای دولتی شهر تهران،
پژوهشهای نظری و کاربردی در علم اطلاعات و دانششناسی، 7 (1)، 257-279.
https://doi.org/10.22067/RIIS.V7I1.55215
حریری، ن.، و نظری، ز. (1391). امنیت اطلاعات در کتابخانههای دیجیتالی ایران، کتابداری و اطلاعرسانی، 16 (2)، 61-90. https://lis.aqr-libjournal.ir/article_43010.html
خضریپور، ف. (1392). ارائه یک مدل برای بهبود مدیریت امنیت داراییهای اطلاعاتی سازمان در سیستم مدیریت امنیت اطلاعات ادارات دولتی شهر کرمان [پایاننامه کارشناسی ارشد منتشر نشده]. دانشگاه پیام نور.
داوری، ع.، و رضازاده، آ. (1393). مدلسازی معادلات ساختاری با نرمافزار pls، تهران: جهاد دانشگاهی.
سیف، ی.، و نادری بنی، ن. (1396). شناسایی مؤلفههای مؤثر بر مدیریت امنیت اطلاعات در فناوری اطلاعات شرکت نفت فلات قاره ایران، مدیریت فناوری اطلاعات، 9 (4)، 851-870. https://www.sid.ir/paper/140422/fa
شیرواندهی، ش. (1397). سنجش عملکرد مدیریت امنیت اطلاعات در کتابخانه دیجیتال سازمان اسناد کتابخانه ملی ایران، [پایاننامه کارشناسی ارشد منتشر نشده]. دانشگاه آزاد اسلامی علوم تحقیقات تهران.
فروزنده، ح. (۱۳۹۰). مدیریت پایگاه داده. تهران: عابد.
کوکبی، م.، و کوهی رستمی، م. (1394). امنیت اطلاعات سامانههای تحت وب نهاد کتابخانههای عمومی کشور،
تحقیقات اطلاعرسانی و کتابخانههای عمومی، 21 (80)، 89-107.
https://doi.org/20.1001.1.26455730.1394.21.1.5.9
مازا، ر. (1393). مقدمهای بر دیداریسازی اطلاعات. ترجمة فریده عصاره، مازیار نصیری، سپیده قلمباز و حمید احمدی. همدان: نشر سپهر.
Abubakar, F., & Aduku, B. S. (2016). Approaches to security of information resources in academic libraries in Niger State, Nigeria. Samaru Journal of Information Studies, 16(1), 12-24. https://www.ajol.info/index.php/sjis/article/view/174811
Ahmadi, H, (2016). Mapping and Analysis of Iranian Conceptual Network of the Structure of Scientometrics [Unpublished doctoral dissertation], Shahid Chamran university of Ahvaz [In Persian].
Alshboul, Y., & Streff, K.)2015). Analyzing Information Security Model for Small-Medium Sized Businesses. Proceeding of Americas Conference on Information Systems (AMCIS) in Information systems security, Assurance and privacy (SIGSEC), June 26, Corpus ID: 41307801. https://www.researchgate.net/publication/281079574_Analyzing_Information_Security_Model_for_Small-Medium_Sized_Businesses
Anwar, M.A., Rongting, Z., Dong, W., Asmi, F., & Meissner, R. (2018). Mapping the knowledge of national security in 21st century a bibliometric study.
Cogent Social Sciences,
4(1).
https:/doi.org/10.1080/23311886.2018.1542944
Arianpour, M. (2017). Examining compliance with IES 27002 and 27019 standards in information security management in the National Library and Documents Organization of Iran [Unpublished master dissertation], Alzahra university [In Persian].
Brandão, A. J. S. (2006). Using Ontologies to Classify Vulnerabilities on Security Systems [Unpublished master dissertation], ICMC-USP. São Carlos-SP-Brazil. https://protege.stanford.edu/conference/2005/submissions/posters/poster-martimiano.pdf
Calder, A., & Steve, W. G. (2007). A Dictionary of Information Security Terms, Abbreviation and Acronyms, IT Governance publishing, United Kingdom.
Cheng, K. (2005). Surviving hacker attacks proves that every cloud has a silver lining. computers in libraries, 25(3), 52-56. https://www.researchgate.net/publication/234576575_Surviving_Hacker_Attacks_Proves_That_Every_Cloud_Has_a_Silver_Lining
Da Veiga, A., Martins, N., & Eloff, J. H. (2007). Information security culture-validation of an assessment instrument. Southern African business Review, 11(1), 147-166. https://www.researchgate.net/publication/235526018_Information_security_culture_-_Validation_of_an_assessment_instrument
Daconta, M.C., Obrst, L.J., & Smith, K.T. (2003). The Semantic Web: A Guide to the Future of XML, Web Services, and Knowledge Management, Wiley. Publisher: WileyISBN: 978-0-471-43257-9
Davari, A., & Rezazadeh, A. (2015), Structural equation modeling with pls software. Tehran: Jahad Daneshgahi [In Persian].
Dawar, V. (2016). DIGITAL INFORMATION SECURITY FOR ACADEMIC LIBRARIES
, Proceedings of TIFR-BOSLA National Conference on Future Librarianship: Innovation for Excellence, (April), 22-23, Mumbai, India.
https://www.researchgate.net/publication/335389774_DIGITAL_INFORMATION_SECURITY_FOR_ACADEMIC_LIBRARIES
Dictionary of IBM & computing technology (2010). New York: IBM.
Ekelhart, A., & Fenz, S. (2009و March). Ontology-Based Decision Support for Information Security Risk Management.
Proceedings of 4th International Conference on Systems (ICONS), 1-6, Gosier, France.
https://doi.org/10.1109/ICONS.2009.8.
Faruzandeh, H. (2019). Database management. Tehran: Abed. [In Persian].
Gattiker, U. E. (2004). THE INFORMATION SECURITY DICTIONARY Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology, KLUWER ACADEMIC PUBLISHERS, NEW YORK.
Hariri, N., & Nazari, Z. (2012). Information security in Iran’s digital libraries,
library and information Science,
15(2), No 58.
https://lis.aqr-libjournal.ir/article_43010.html [In Persian].
Henderson, H. (2009). Encyclopedia of computer science and technology, Facts on File, New York.
Henseler, J., Ringle, C. M., & Sinkovics, R. R. (2009). The use of partial least squares path modeling in international marketing. In
New challenges to international marketing, Vol. 20, pp. 277-319). Emerald Group Publishing Limited.
https:/doi.org/10.1108/S1474-7979(2009)0000020014
Herzog, A., Shahmehri, N., & Duma, C. (2007) An Ontology of Information Security,
International Journal of Information Security and Privacy. 1(4), 1-23.
https:/doi.org/10.4018/jisp.2007100101
Ismail, R., & Zainab, A. N.(2011). Information systems security in special and public libraries: an assessment of status,
Malaysian Journal of Library & Information Science,
1(2), 45-62.
https://www.researchgate.net/publication/234813293_Information_systems_security_in_special_and_public_libraries_An_assessment_of_status
Khezripour, F (2014). Model for improving the security management of the organization’s information assets in the information security management system of Kerman government departments [Unpublished master dissertation], Payame Noor University. [In Persian].
Kissel, R. (Ed.). (2011). Glossary of key information security terms. Diane Publishing.
Kokabi, M., & Kohi Rostami, M. (2015). Information security of Web-based systems in Iran Institution of public libraries.
Research on Information Science and Public Libraries, 21 (1), 89-107.
[In Persian]. https:/doi.org/ 20.1001.1.26455730.1394.21.1.5.9
Manoilov, G., & Radichkova, B. (2007). Elsevier’s Dictionary of Information Security. Elsevier.
Mazza, R. (2013). An introduction to information visualization. Translated by Osareh, F. et al. Hamedan: Sepehr Publishing. [In Persian].
McGuinness, D. L. (2017). Ontologies for the Modern Age, Slide share, Slide 4.
Parvin, S., Sadoughi, F., Karimi,A., Mohammadi, M., & Aminpour, F.(2019). Information Security from a Scientometric Perspective,
Webology, 16(1), 196-209.
https://www.webology.org/data-cms/articles/20200515032131pma187.pdf
Razzaq, A., Anvar, Z., Farooq Ahmad, H., Latif, K., & Munir, F.(2014). Ontology for attack detection: An intelligent approach to web application security.
Computers & Security, 45, 124-146.
https://doi.org/10.1016/j.cose.2014.05.005
Rigdon, J. C. (2016). Dictionary of computer and internet terms, Eastern Digital Resources, Cartersville.
Seif, Y. & Nadery Bany, N. (2018). Identifying the effective components on information security management in the information technology of Iranian continental shelf oil company,
Management Information Technology, 9(4), 851-870.
https://doi.org/10.22059/JITM.2017.239211.2127 [In Persian].
Shirvandehi, S. (2017). Measuring the performance of information security management in the digital library of the National Library of Iran [Unpublished master dissertation], Islamic Azad University of Research Sciences, Tehran branch. [In Persian].
Slade, R. (2006). Dictionary of Information Security, Syngress, Rockland.
Spaccapietra, S., Parent, C., Vangenot, C., & Cullot, N. (2004). On Using Conceptual Modeling for Ontologies. In: Bussler, C.,
et al. Web Information Systems – WISE 2004 Workshops. WISE 2004. Lecture Notes in Computer Science, vol 3307. Springer, Berlin: Heidelberg.
https://doi.org/10.1007/978-3-540-30481-43
Wetzels, M., Odekerken-Schröder, G., & Van Oppen, C. (2009). Using PLS path modeling for assessing hierarchical construct models: Guidelines and empirical illustration.
MIS quarterly, 177-195.
https://doi.org/10.2307/20650284
Zeinolabedini, M., & Rafati, M. (2018). Survey of Information Security Management System in the Central Library of the Universities in Tehran,
Theoretical and applied researches in information science and epistemology, 7(1).
https://doi.org/10.22067/RIIS.V7I1.55215 [In Persian].
Zhao, L., Zhang, L., & Wang, D. (2018, July). Security Management and Operation Mechanism of Digital Libraries in Military Academies. In
3rd International Conference on Contemporary Education, Social Sciences and Humanities (ICCESSH 2018), 019-1022, Atlantis Press.
https:/doi.org/ 10.2991/iccessh-18.2018.231