Anda di halaman 1dari 2

\bibitem{FAO96} Food and Agriculture Organization of the United Nations,

\emph{Rome Declaration on World Food Security}, World Food Summit, 1996.

\bibitem{ECOSOC18} Economic and Social Council of the United Nations,


\emph{World economic situation and prospects as of mid-2018}, 2018.

\bibitem{DGMTEU18} Directorate General of Mobility and Transport of the


European Commission, \emph{EU Transport in figures}, 2018.

\bibitem{WHO16} World Health Organization of the United Nations,


\emph{International Health Regulations},3rd Ed., 2016.

\bibitem{IEA18} International Energy Agency, \emph{World Energy Outlook}, 2018.

\bibitem{dAS15} C. del Arenal, J.A. Sanahuja, \emph{Teor�as de las Relaciones


Internacionales}, Tecnos, Madrid, 2015.

\bibitem{HUYSMANS98} J. Huysmans, \emph{Security! What Do You Mean?: From


Concept To Thick Signifier}, European Journal of International Relations, Vol 4
(2), pp. 226--255, 1998.

\bibitem{BALDWIN97} D.A. Baldwin, \emph{The concept of security}, Review of


International Studies, 23, pp. 5--26, British International Studies Association,
1997.

\bibitem{JONES78} R.V. Jones, \emph{The Wizard War: British Scientific


Intelligence, 1939-1945}, 1978.

\bibitem{KHAN96} D. Khan, \emph{The Codebreakers: The Comprehensive History of


Secret Communication from Ancient Times to the Internet}, 1996.

\bibitem{SEGPRIV52014} Gobierno de Espa�a, \emph{Ley 5/2014, de 4 de abril, de


Seguridad Privada}, Bolet�n Oficial del Estado, 83, 2014,
\url{https://www.boe.es/buscar/act.php?id=BOE-A-2014-3649}.

\bibitem{PIC2011} Gobierno de Espa�a, \emph{Ley 8/2011, de 28 de abril, por la


que se establecen medidas para la protecci�n de las infraestructuras cr�ticas},
Bolet�n Oficial del Estado, 102, 2011, \url{https://www.boe.es/buscar/act.php?
id=BOE-A-2011-7630}.

\bibitem{LOPD2018} Gobierno de Espa�a, \emph{Ley Org�nica 3/2018, de 5 de


diciembre, de Protecci�n de Datos Personales y garant�a de los derechos digitales},
Bolet�n Oficial del Estado, 294, 2018, \url{https://www.boe.es/buscar/act.php?
id=BOE-A-2018-16673}.

\bibitem{YOUNG15} C. S.Young, \emph{The Science and Technology of


Counterterrorism. Measuring Physical and Electronic Security Risk}, Butterworth-
Heinemann, 2015.

\bibitem{RD10} S. M. Rahman, S.E. Donahue, \emph{Convergence of Corporate and


Information Security}, International Journal of Computer Science and Information
Security, pp. 63--68, 2010.

\bibitem{CABRIC15} M. Cabric, \emph{Corporate Security Management. Challenges,


Risks, and Strategies}, Butterworth-Heinemann, 2015.

\bibitem{BERNARD15} R. Bernard, \emph{Security Technology Convergence


Insights}, The Security Executive Council, Elsevier, 2015.
\bibitem{ISO31010} International Organization for Standardization,
International Electrotechnical Commission, \emph{ISO/IEC 31010:2019, Risk
management � Risk assessment techniques focuses on risk assessment}, 2019.

\bibitem{WHITE14} J. White, \emph{Security risk assessment. Managing physical


and operational security}, Butterworth-Heinemann, 2014.

\bibitem{ISO31000} International Organization for Standardization,


\emph{ISO/IEC 31000:2018, Risk management � Guidelines}, 2018.

\bibitem{RKA13} S. Rathnayaka, F. Khan, P. Amayotte, \emph{Accident modeling


and risk assessment framework for safety critical decision-making: application to
deepwater drilling operation}, Proceedings of the Institution of Mechanical
Engineers, Part O: Journal of Risk and Reliability, 227(1), pp. 86-�105, 2013.

\bibitem{BIER99} V. M. Bier, \emph{Challenges to the Acceptance of


Probabilistic Risk Analysis}, Society for Risk Analysis Journal, Vol. 19 (4), pp.
703-�710, Kluwer Academic Publishers-Plenum Publishers, 1999.

\bibitem{LIBUSER94} C. Libuser, \emph{Managing Organizations to Achieve Risk


Mitigation}, PhD Dissertation, Andersen School of Business, University of
California, Los Angeles, 1994.

\bibitem{TALEB10} N. N. Taleb, \emph{The Black Swan: The Impact of the Highly


Improbable}, Penguin Books, 2nd Edition, 2010.

\bibitem{AWB13} A. Aleem, A. Wakefield, M. Button, \emph{Addressing the weakest


link: Implementing converged security}, Security Journal, Vol. 26 (3), pp. 236--
248, 2013.

\bibitem{AUJK15} R. Ashkenas, D. Ulrich, T. Jick, S. Kerr, \emph{The


Boundaryless Organization: Breaking the Chains of Organizational Structure}, J.
Wiley, 2015.

\bibitem{KEB16} F. Kledt, P. Evers, D. Benson, \emph{Organizational Complexity.


Contemporary Theory and Practice of Organizations},Columbia University Press, 2016.

\bibitem{CDCA17} P. Chatzoglou, G. Dimitrelos, D. Chatzoudes, V. Aggelidis,


\emph{The relationship between leadership competencies and successful
organisational change}, 10th Annual Conference of the EuroMed Academy of Business,
pp. 365--379, EuroMed Press, 2017.

\bibitem{MVdH99} H. Mintzberg, L. Van der Heyden, \emph{Organigraphs: Drawing


How Companies Really Work}, Harvard Business Review, pp. 87--94, 1999..

\bibitem{FCC10} P. K. Felkins, B. J. Chakiris, K. N. Chakiris, \emph{Change


Management: A Model for Effective Organizational Performance}, Productivity Press,
2010.

\bibitem{FOSTER16} P. A. Foster, \emph{The Open Organization: A New Era of


Leadership and Organizational Development}, Createspace Independent Publishing
Platform, 2016.

\bibitem{SOJ15} J. M. Shafritz, J. S. Ott, Y. S. Jang, \emph{Classics of


Organization Theory}, 8th Edition, Wadsworth Publishing, 2015.

Anda mungkin juga menyukai