Arias-Aranda, D., Castro, J.L., Navarro, M., Sánchez, J.M., Zurita, J.M. (2010). A Fuzzy expert system for business management. Expert Systems with Applications, 37 (12): 7570–7580.
Aslani, H.R. (2006). Information Technology Laws. Tehran: Mizan Publications.
Awazu, Y. & Desouza, K. C. (2004). The Knowledge Chiefs: CKOs, CLOs and CPOs. European Management Journal, 22(3): 339–344.
Azar, A, Fani, A.A. & Dajkhosh, S.S. (2013). Modeling Business Ethics Using Fuzzy Analytic Network Process. Ethics in Science & Technology, ???(3): ???-???. (in Persian)
Bamberger, K.A. & Mulligan, D.K. (2011). New governance, chief privacy officers, and the corporate management of information privacy in the United States: An initial inquiry. Law & Policy, 33(4): 477-508.
Belanger, F. & Hiller, J.S. (2006). A framework for e-government: privacy implications. Business process management journal, 12 (1): 48-60.
Beldad, A., de Jong, M. & Steehouder, M. (2010). Reading the least read? Indicators of users' intention to consult privacy statements on municipal websites. Government Information Quarterly, 27(3): 238-244.
Bella, G., Giustolisi, R. & Riccobene, S. (2011). Enforcing privacy in e-commerce by balancing anonymity and trust. Computers & Security, 30 (8): 705-718.
Damghanian, H. & Siahsarani Kojuri, M. A. (2012). A Study on the Effect of Perceived Security on the Trust of Female Customers in the Internet Banking: (A Survey of the SADERAT BANK in Semnan). Journal of Information Technology Management, 4(13): 71-88. (in Persian)
Den Butter, F. A. G., Liu, J., & Tan, Y.H. (2012). Using IT to engender trust in government-to-business relationships: The Authorized Economic Operator as an example. Government Information Quarterly, 29(2): 261-274.
Dimick, C. (2012). The new privacy officer. Journal of AHIMA/American Health Information Management Association, 83(4): 20-25.
Dinev, T. & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17 (1): 61-80.
Elahi, Sh. & Hassanzadeh, A. (2009). A framework for evaluating electronic commerce adoption in Iranian companies. International Journal of Information Management, 29(1): 27–36.
Elahi, Sh., Khadivar, A. & Hassanzadeh, A. (2012). Designing a Decision Support Expert System for Supporting the Process of Knowledge Management Strategy Development . ???, 3(8): 43-62. (in Persian)
Ghodselahi, A. (2011). Designing a Fuzzy Expert system for Risk Management in Banking Industry. [Master thesis]. Supervisor: Elahi, Sha’ban. Tehran: Tarbiat Modares University, Faculty of Management and Economic.
Hasangholipour, T., Amiri, M., Fahim, F.S. & Ghaderi Abed, A. (2013). Effects of Consumer Characteristics on their Acceptance of Online Shopping: A Survey in Faculty of Management, University of Tehran. Journal of Information Technology Management, 5(4): 67-84. (in Persian)
Hashemi, M. & Malek, M.R. (2012). Protecting location privacy in mobile geoservices using Fuzzy inference systems. Computers. Environment and Urban Systems, 36(4): 311–320.
Hochberg, J., Jackson, K., Stallings, C., McClary, J.F., DuBois, D. & Ford, J. (1993). NADIR: An automated system for detecting network intrusion and misuse. Computers & Security, 12(3): 235-248.
Hosseini Dolwlat Abadi, F. (2001). The Ethical Conscience and ways of fostering it. [Master thesis]. Supervisor: Dr Hojati. Tehran: Tarbiat Modares Uni.
Jensen, C., Potts, C. & Jensen, C. (2005). Privacy practices of Internet users: Self-reports versus observed behavior. International Journal of Human-Computer Studies, 63(1–2): 203–227.
Jutla, D.N., Bodorik, P. & Zhang, Y. (2006). PeCAN: An architecture for users’ privacy-aware electronic commerce contexts on the semantic web. Information Systems, 31 (4): 295-320.
Kailay, M. P. & Peter, J. (1995). RAMeX: a prototype expert system for computer security risk analysis and management. Computers & Security, 14(5): 449–463.
Kalloniatis, Ch., Belsis, P. & Gritzalis, S. (2011). A soft computing approach for privacy requirements engineering: The Pris framework. Applied Soft Computing, 11(7): 4341–4348.
Karami, A. & Guerrero-Zapatab, M. (2015). A Fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks. Neurocomputing, 149: 1253–1269.
Le Blanc, L. A. & Jelassi, T. (1991). an evaluation and selection methodology for expert system shells. Expert Systems with Applications, 2(2–3): 201–209.
Li, J., Li, J., Chen, X., Liu, Zh. & Jia, CH. (2014). Privacy-preserving data utilization in hybrid clouds. Future Generation Computer Systems. (30): 98–106.
Liao, SH. (2005). Expert system methodologies and applications-a decade review from 1995 to 2004. Expert Systems with Applications, 28 (1): 93-103.
Longley, D. & Rigby, S. (1992). An automatic search for security flaws in key management schemes. Computers & Security. 11(1): 75-89.
Majdalawieh, M. (2010). The Integrated Privacy Model: Building a Privacy Model in the Business Processes of the Enterprise. International Journal of Information Security and Privacy archive, 4 (3): 1-21.
Miah, Sh., Kerr, D. & Gammack, J.G. (2009). A methodology to allow rural extension professionals to build target-specific expert systems for Australian rural business operators. Expert Systems with Applications. 36(1): 735–744.
Naderi, A & Ghaseminezhad, Y. (2014). Investigating the Indicators Affecting the Success of Modern Banking Services Strategies from the View Point of Managers and Experts of Ansar Bank. Journal of Iranian Technology Management, 6(3): 487-504.
Qin, B., Zhou, X., Yang, J. & Song, C. (2006). Grey-theory based intrusion detection model. Journal of Systems Engineering and Electronics, 17(1): 230–235.
Reddick, C.G. & Roy, J. (2013). Business perceptions and satisfaction with e-government: Findings from a Canadian. Government Information Quarterly, 30(1): 1-9.
Reza Karimi, M., Sepandarand, S. & Haghshenas, F. (2012). Study of the Effects of Customers’ Perceptions of Security and Trust on their Use of the Agriculture Bank of Iran’s e-Payment System. Journal of Iranian Technology Management, 4(11): 135-154.
Rezmierski, V. E. & Marshall, R. S. (2002). University systems security logging: who is doing it and how far can they go? Computers & Security, 21 (6)1: 557–564.
Shamsi, Z. (2014). Designing a Fuzzy expert system for selecting new IT product development projects. [Master thesis]. Supervisor: Elahi, Sha’ban. Tehran: Tarbiat Modares University, Faculty of Management and Economic.
Sivanandam, S. N., Sumathi, S. & Deepa, S.N. (2007). Introduction to Fuzzy Logic using MATLAB. Springer-Verlag Berlin Heidelberg.
Summers, R. C. & Kurzban, S.A. (1988). Potential applications of knowledge-based methods to computer security. Computers & Security, 7(4): 373–385.
Taghva, M.R. & Izadi, M. (2013). Investigating Security in Developed Information Systems through Service oriented Architecture (SOA). Journal of Information Technology Management, 5(3): 25-42. (in Persian)
Tajfar, A. H., Mahmoudi Maymand, M., Rezasoltani, F. & Rezasoltani, P. (2015). Ranking the barriers of implementing Information Security Management System and Investigation of readiness rate of exploration management. Journal of Information Technology Management, 6(4): 551-566. (in Persian)
Vaishnavi, V. K. & Kuechler, Jr. W. (2008). Design Science Research Methods and Patterns, Innovating Information and Communication Technology. Auerbach Publications, Taylor & Francis Group.
Vosough, M., Taghavi Fard, M. T. & Alborzi, M. (2015). Bank card fraud detection using artificial neural network. Journal of Information Technology Management, 6(4): 721-746. (in Persian)
Xidonas, P., Ergazakis, E., Ergazakis, K., Metaxiotis, K., Askounis, D., Mavrotas, G. & Psarras, J. (2009). On the selection of equity securities: An expert systems methodology and an application on the Athens Stock Exchange. Expert Systems with Applications, 36(9): 11966–11980.
Xu, D.L., Liu, J., Yang, J.B., Liu, G.P., Wang, J., Jenkinson, I. & Ren, J. (2007). Inference and learning methodology of belief-rule-based expert system for pipeline leak detection. Expert Systems with Application, 32(1): 103-113.