1-Ahmadi, H. (2016). Information Technology Infrastructure Library(ITIL)for Managers, Experts, Professors and Students. Tehran: Sahadanesh publisher. (In Persian)
3_ BS 7799, & BS ISO/IEC, 2. (2005). Information technology-Security techniquesInformation security management systems.
4-Carter-Steel, A. (2009). summary of ITIL aadoption survery responenses thicnical Report. itSMF Australia 2009 Conference.University of Southen Australia.
5-Esteves, R. & Alves, P. (2013). Implementation of an Information Technology Infrastructure Library Process – The Resistance to Change. Procedia Technology (9), pp.505-510.
6-Efta document. (2007). Strategic security document for the information exchange of the country. Ministry of Communications and Information Technology.Iran. (In Persian)
7-Fornell, C., & Larcker, D. (1981). Evaluating Structural Equation Models with Unobservable Variables and Measurement Error. Journal of Marketing Research, 18(1), pp. 39-50.
8-Haji zadeh, A., & khayami, S. (2017). Investigation of the Infrastructure Information Technology Library at(ITIL) Iranian Universities. Third Conference on Computer Science and Information Technology.Tehran. (In Persian)
9-Haufe, K., Colomo-Palacios, R., Dzombeta, S., Brandis, K.& Stantchev, V. (2016). ISMS core processes: A study. Procedia Computer Science 100,pp.339-346.
10-Humphreys, E. (2008). Information security Management standards: Compliance, governance risk management. Information security Technical Report, ,13(4),pp.247-255.
11-ISO/IEC 17799, BS7799-2.(2002).ISMS-Specification with guidance for use ISO/IEC 17799 Information Technology-Code of practice for information security.
12-ISO/IEC27001. (2013). Information technology — Security techniques —Information security management systems—Requirements. <http://www.iso.org/iso/iso_catalogue/catalogue_ics/catalogue_detail>[05/02/2017].
13-ITIL.(2011).The ITILToolkit. www.itil.org.uk/kit.html>[25/06/2017].
14-Karimi Balan, Z. (2009). ITIL IT Service Management Information Management Model. Second International Electronic Conference, Tehran Research Institute for Information and Communication Technology (JIT). (In Persian)
15-Kraemer, S. (2006). An adversarial viewpoint of human and organizational factors in computer and information security. A dissertation for the degree of Doctor Philosophy at the university of Wisconsin-Madison.
16-Laudon, K., & Laudon, J. (2010). Management Information Systems. (S. Mostafavi, & S. Hosseini, Trans.) Tehran: Fadak Isatis. (In Persian)
17-Lee, J.& Kim, Y. (1999). Effect of partnership quality on IS outsourcing success: conceptual frameworkand empirical validation. Journal of Management information systems, 15(4), pp. 29-61.
18-Liljander, V., Polsa, P.& Van Riel, A. (2009). Modeling consumer responses to an apparel store band: Store image as a risk reducer. journal of retailing and Consumer Services, 16(4), pp. 281- 290.
19-De Barros, M. D., Alberto Leite Salles, C., Francisco Simões, C., Alexandre da Silva, R. & Gomes Costa., H. (2015). Mapping of the Scientific Production on the ITIL Application. Procedia Computer Science, 55,pp.102-111.
20-Mehrabiyon Mohammadi, M., Shahryari, G. R & Zare Ravasan, A., (2014). Identifying and categorizing critical success factors Implementing the Information Technology Infrastructure Library in Iran. Quarterly Journal of Information Technology Management, 5,pp. 41-71
21-NIST. April 2013. Security and Privacy Controls for Federal Information Systems and Organizations. 53-800.< https://www.nist.gov/ >.[25/02/2017]
22-Norita, A., Noha, T., Faten, Q., & Faten, A. (2013). Technology adoption model and a road map to successful implementation of ITIL. Journal of Enterprise Information Management, 26(5),pp.553-576.
23-obrien, J. (2006). Introduction to Management information Systems. (A. Maniyan, M. Fatahi, & B. Vasegh, Trans.) Tehran: Negah danesh. (In Persian)
24-Office of the Information Security Management System(Nama). (2015). Collection of information security security and data encoding in executive agencies. Tehran: Iran Information Technology Organization. (In Persian)
25-Omidifar, M. (Feb.2015). A Survey and Prioritizing of Information Security Management System Elements in the Telecommunication Company of Khorasan. The Dissertation of M.Sc. in Information technology management, The University of Sistan & Baluchestan. (In Persian)
26-Sarika, S., Pravin, A., Vijayakumar, A., & Selvamani, K. (2016). Security Issues In Mobile Ad Hoc Networks. Conference Organized by Interscience Institute of Management and Technology(92),pp. 329 – 335.
27-Siyadat, S., & Saghafi, N. (2015). Identify the Challenges of Implementing Information Security Management System (ISMS) in the organization. First International Information Technology Conference.Tehran. (In Persian)
28-Siyadat, S., Salehi pour, S., & Athari fard, A. (2017). The Challenges of Implementing Information Security Management System in the Banking System. Fourth International Conference on Knowledge Based Research in Computer Engineering and Information Technology.Tehran. (In Persian)
29-Steinberg, R. (2014). Operation of ITIL service. (B. Taheri, & F. Narimani, Trans.) Tehran: Tehran University Publisher. (In Persian)
30-Songyang, W., Yong, Z., & Wei, C. (2017). Network security assessment using a semantic reasoning and graph based approach. Computers and Electrical Engineering,000, pp.1–14.
31-Taj Far, A., Mahmoudi, M., Reza Soltani, F., & Reza Soltani, P. (2014). Ranking barriers to implementation of information security management system and exploring readiness of exploration management. Information Technology Management - Faculty of Management, University of Tehran, 4(6), 551-566. (In Persian)
32-Wen,& Wu, S. (2010). Linking Bayesian networks and PLS path modeling for causal analysis. Export Systems with Applications(37), pp.134-139.
33-Whitman, M& Mattord, H. (2011). Principles of Information Security. Course Technology.
34-Wixom, B.&, Watson, H. (2001). A empirical investigation of the factors affecting data warehousing success. MIS Quarterly, 25(1), pp. 17-41.
35-Yaghoubi, N., shokouhi, J., & Salavati, A. (2015). Management information systems with strategic integration and alignment approach. mashhad: Marandiz Publisher. (In Persian)