[1] G.Disterer, Iso/iec 27000, 27001 and 27002 for information security management. Journal of Information Security, 4(02), 92, 2013.##
[2] A.Borek, A.K.Parlikad, J.Webb and P. Woodall, Total information risk management: Maximizing the value of data and information assets: Newnes, 2013.##
[3] C. C. Lo, & W.J Chen, A hybrid information security risk assessment procedure considering interdependences between controls. Expert Systems with Applications, 39(1), pp.247-257, 2012.##
[4] R.Yosefi zenor, A.Hasan por and P.Mosavi, eraee modeli jahate olaviat bandi riskhaye amniat etelaate sazmani ba estefade az AHP fazi v shabake bizin dar senate bankdari, Journal of Industrial Management Studies, vol.13, no.37, pp.161-185,2015. (in persian)##
[5] N.Feng, H.J. Wang and M.Li, A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis. Information sciences,vol.256, pp.57-73, 2014.##
[6] J.Webb, A.Ahmad, S.B. Maynard and G.Shanks, A situation awareness model for information security risk management. Computers & security, 44, pp.1-15, 2014.##
[7] A.Jones, A framework for the management of information security risks. BT technology journal, 25(1), pp.30-36, 2007.##
[8] E.Wheeler, Security risk management: Building an information security risk management program from the ground up: Elsevier, 2011.##
[9] R. Ross, Managing enterprise risk in today's world of sophisticated threats: A framework for developing broad-based, cost-effective information security programs. EDPAC: The EDP Audit, Control, and Security Newsletter, 35(2), pp.1-10, 2007.##
[10] P.Shedden, T.Ruighaver, and A.Ahmad, Risk management standards œ the perception of ease of use,2006.##
[11] A.Dontoh, S.Radhakrishnan, and J.Ronen, The declining value-relevance of accounting information and non‐information-based trading: An empirical analysis. Contemporary Accounting Research, 21(4),pp. 795-812,2004.##
[12] P.Shamala, R.Ahmad, A.Zolait, and M.Sedek, Integrating information quality dimensions into information security risk management (ISRM). Journal of Information Security and Applications,vol. 36,pp. 1-10, 2017.##
[13] P.Shedden, W. Smith and A.Ahmad, Information security risk assessment: Towards a business practice perspective, 2010.##
[14] J.Chen, W.Pedrycz, L.Ma, and C.Wang, A new information security risk analysis method based on membership degree. Kybernetes, 43(5),pp. 686-698, 2014.##
[15] M.Korman, T.Sommestad, J.Hallberg, J. Bengtsson and M.Ekstedt, Overview of enterprise information needs in information security risk assessment. Paper presented at the Enterprise Distributed Object Computing Conference (EDOC), 2014 IEEE 18th International, 2014.##
[16] A.Borek, A.K. Parlikad, P.Woodall, and M.Tomasella, A risk based model for quantifying the impact of information quality. Computers in Industry, 65(2),pp. 354-366, 2014.##
[17] B.Stvilia, L.Gasser, M.B. Twidale and L.C. Smith, A framework for information quality assessment. Journal of the American society for information science and technology, 58(12), pp.1720-1733, 2007.##
[18] A.Ahmadpor, S.rasekhi and z.nasiri ghale, tasir keifiat etelaat bar risk naghdinegi, Journal of Accounting and Audit Management,vol.2, no.5.pp.85-98,2013.(in persian)##
[19] C.W Fisher and B.R. Kingma, Criticality of data quality as exemplified in two disasters. Information & Management, 39(2), pp.109-116, 2001.##
[20] Ge, M and Helfert, M. (2008). Effects of information quality on inventory management. International Journal of Information Quality, 2(2), 177-191,2008.##
[21] D.P. Ballou, H.L. Pazer, Modeling data and process quality in multi-input, multi-output information systems. Management science, 31(2), pp.150-162, 1985##
[22] C. Batini, C. Cappiello, C. Francalanci, and A.Maurino, Methodologies for data quality assessment and improvement. ACM computing surveys (CSUR), 41(3), 16, 2009##
[23] B.F Lóscio, M.Batista, D. Souza, and A.C Salgado, Using information quality for the identification of relevant web data sources: A proposal. Paper presented at the Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services,2012.##
[24] R.Bergmann, Quantifying information quality, 2015.##
[25] P.Oliveira, F. Rodrigues, and P.R Henriques, A formal definition of data quality problems. Paper presented at the IQ, 2005.##
[26] C.C.Chen and Y.D Tseng, Quality evaluation of product reviews using an information quality framework. Decision Support Systems, 50(4),pp. 755-768, 2011.##
[27] M. vanki, M.R.Taghavi fard and K.Feizi,molel piadeh sazie modiriat amniat fanavari etelaat dar senate bankdari iran. Journal of Information Technology Management.vol.p, no.2, pp.379-404,2017. (in persian)##
[28] Y.Seif and N. Naderi Bani, shanasaee moalefehaye moaser bar modiriyate amniate etelaat dar fanavari atelaate sherkate nafte falate ghare iran, Journal of Information Technology Management,vol.33,pp.851-870,2018.(in Persian)##
[30] P.Shamala, R.Ahmad, and M.Yusoff, A conceptual framework of info structure for information security risk assessment (isra). Journal of Information Security and Applications, 18(1), pp.45-52, 2013.##
[31] P.Shamala, R.Ahmad, A.H.Zolait and S.bin Sahib, Collective information structure model for information security risk assessment (isra). Journal of Systems and Information Technology, 17(2),pp. 193-219, 2015.##
[32] C. E.Werts, R. L.Linn and K. G. Joreskog, Intra class reliability estimates: Testing Structural assumptions. Educational and Psychological Measurement, 34(1), pp.25-33, 1974.##
[33] I.Nunnally, Psychometric theory, 2nd Edn. New york: McGraw-Hill,1978.##
[34] W. W Chin, "Issues and Opinion on Structural Equation Modeling",MIS Quarterly (22:1), pp. 7-16, 1998.##
[35] P.Chen, Data mining applications in e-government information security. Procedia Engineering,vol. 29,pp. 235-240, 2012.##