[1] B. Hočevar and ;Melamin plc Kočevje, “Assessing Benefits of Business Intelligence Systems – A Case Study,” J. Contemp. Manag., vol. 15, no. 1, 2010.
[2] L. Belli, S. Cirani, L. Davoli, G. Ferrari, L. Melegari, and M. Picone, “Applying Security to a Big Stream Cloud Architecture for the Internet of Things,” Int. J. Distrib. Syst. Technol., vol. 7, no. 1, p. 22, 2016.
[3] K. Parsons, A. McCormac, M. Butavicius, M. Pattinson, and C. Jerram, “Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q),” Comput. Secur., vol. 42, pp. 165–176, May 2014.
[4] J. SathishKumar and D. R. Patel, “A Survey on Internet of Things: Security and Privacy Issues,” Int. J. Comput. Appl., vol. 90, no. 11, pp. 20–26, Mar. 2014.
[5] L. Uden and P. Del Vecchio, “Transforming the stakeholders’ Big Data for intellectual capital management,” Meditari Account. Res., vol. 26, no. 3, pp. 420–442, Aug. 2018.
[6] M. La Torre, J. Dumay, and M. A. Rea, “Breaching intellectual capital: critical reflections on Big Data security,” Meditari Account. Res., vol. 26, no. 3, pp. 463–482, Aug. 2018.
[7] A. Narain Singh, M. P. Gupta, and A. Ojha, “Identifying factors of ‘organizational information security management,’” J. Enterp. Inf. Manag., vol. 27, no. 5, pp. 644–667, Sep. 2014.
[8] V. Charles and T. Gherman, “Achieving Competitive Advantage Through Big Data. Strategic Implications,” Middle-East J. Sci. Res., vol. 16 (8), pp. 1069–1074, 2013.
[9] ع. ا. انصاری, “تحلیلی بر ضرورت تعیین راهبردها و راهکارهای ملی داده های عظیم با رویکرد توسعه اقتصادی,” اولین همایش داده های عظیم, 1394 ص 64-69
[10] M. James et al., “Big data: The next frontier for innovation, competition, and productivity,” McKinsey Global Institute, 2011.
[11] ع. ا. ح. هرندی, “ارائه مدل سنجش سرمایه فکری و هوش کسب و کار با استفاده از رویکرد سیستم دادینامیک,” دانشگاه آزاد اسلامی واحد تهران جنوب, 1397.
[12] A. A. H. Harandi, M. Safdari, and S. Esmaeili, “IPv6; A Critical Threat Reduction Strategy,” in he First Cyber Defense Conference, 2016.
[13] R. von Solms, “Information security management: The second generation,” Comput. Secur., vol. 15, no. 4, pp. 281–288, Jan. 1996.
[14] D. International, DAMA-DMBOK : Data Management Body of Knowledge (2nd Edition). Technics Publications, 2017.
[15] A. Narain Singh, M. P. Gupta, and A. Ojha, “Identifying factors of ‘organizational information security management,’” J. Enterp. Inf. Manag., vol. 27, no. 5, pp. 644–667, Sep. 2014.
[16] H. Abbas, C. Magnusson, L. Yngstrom, and A. Hemani, “Addressing dynamic issues in information security management,” Inf. Manag. Comput. Secur., vol. 19, no. 1, pp. 5–24, Mar. 2011.
[17] H. R. K. A. Hamidreza Arkian, Atefeh Pourkhalili, “Security and Privacy in the Internet of Things,” Biannu. J. Monadi Cybersp. Secur., vol. 4, no. 2, pp. 13–35, 2016.
[18] Marcia J. Bates, “The information professions: knowledge, memory, heritage,” Inf. Res., vol. 20, no. 1, 2015.
[19] P. Brooks, O. El-Gayar, and S. Sarnikar, “A Framework for Developing a Domain Specific Business Intelligence Maturity Model: Application to Healthcare.,” Int. J. Inf. Manage., no. 35, pp. 337–345, 2015.
[20] Ö. Işık, M. Jones, and A. Sidorova, “Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment.,” BI Congress II: Pre-ICIS. 2010.
[21] I. A. Jamaludin and Z. Mansor, “Review on Business Intelligence (BI) Success Determinants in Project Implementation,” Int. J. Comput. Appl., vol. 33, no. 8, pp. 24–27, 2011.
[22] م. محمودزاده و ا. رادرجبی،, “مدیریت امنیت در سیستم های اطلاعاتی,” فصلنامه علوم مدیریت ایران. سال اول شماره 4 ص 78-112، 1385
[23] ح. اسماعیلپور, “شناسایی و رتبه بندی عوامل و شاخص های کلیدی موثر بر بهبود سیستم مدیریت امنیت اطلاعات,” پایان نامه کارشناسی ارشد، دانشگاه شهید بهشتی., 1388.
[24] ف. ر. نیارکی، و ب. عبدی, “ارائه راهکارهایی برای مدیریت امنیت اطلاعات با رویکرد مدیریت استراتژیک فناوری اطلاعات.,” دومین کنفرانس بین المللی پارادایمهای نوین مدیریت نوآوری و کارآفرینی. تهران, 1395.
[25] L. T. Moss and S. Atre, Business Intelligence Roadmap: The Complete Project Lifecycle for Decision-Support Applications. Addison-Wesley Professional, 2003.
[26] A. B. Sangar and N. B. A.Iahad, “Critical Factors That Affect The Success Of Business Intelligence Systems (BIS) Implementation In An Organization,” Int. J. Sci. Technol. Res., vol. 2, no. 2, pp. 176–180, 2013.
[27] S. Olbrich, J. Pöppelbuß, and B. Niehaves, “Critical Contextual Success Factors for Business Intelligence: A Delphi Study on Their Relevance, Variability, and Controllability,” in 45th Hawaii International Conference on System Sciences, 2012, pp. 4148–4157.
[28] A. Popovič, R. Hackney, P. S. Coelho, and J. Jaklič, “Towards Business Intelligence Systems Success: Effects of Maturity and Culture on Analytical Decision Making.,” Decis. Support Syst., vol. 54, no. 2012, pp. 729–739, 2012.
[29] C. Valmohammadi and M. S. Mazaheri, “Clarification of factors affecting the decision to use cloud computing among IRIB employees based on a Technology Acceptance Model,” IT Management Studies., vol. 5, no. 19, pp. 105–124, Apr. 2017.
[30] A. PourEbrahimi, M. B. Nia, and A. A. H. Harandi, “Architectural design The safety system is a macro security data management to manage the defenses and advanced threats to organizations,” Era Inf. Technol., vol. 11, no. 113, pp. 113–120, 2016.