
14. ISO/IEC27001, ISO/IEC 27001, Information Technology - Security Techniques Information 
security management systemys - Requirements. 2005. 
15. ISO/IEC20000, ISO/IEC20000, Service Management IT. 2005. 
16. ITILv3.0, ITIL, Information Technology Infrastructure Library., C.C.a.T.A. (CCTA). Edi-
tor. 2007. 
17. COBITv4.0, Cobit Guidelines, Information Security Audit and Control Association. 2006. 
18. ISM3, Information security management matury model (ISM3 v.2.0). 2007, ISM3 Consor-
tium. 
19. Eloff, J. and M. Eloff, Information Security Management - A New Paradigm. Annual re-
search conference of the South African institute of computer scientists and information 
technologists on Enablement through technology SAICSIT´03, 2003: p. 130-136. 
20. Areiza, K.A., et al., Hacia un modelo de madurez para la seguridad de la información. 3er 
Congreso Iberoamericano de seguridad Informática, 2005a. Nov, (2005): p. 429 - 442. 
21. Dojkovski, S., S. Lichtenstein, and M.J. Warren. Challenges in Fostering an Information 
Security Culture in Australian Small and Medium Sized Enterprises. in 5th European Con-
ference on Information Warfare and Security. 2006. Helsinki, Finland: 1-2 June. 
22. Sneza, D., L. Sharman, and W. Matthew John. Fostering information security culture in 
small and medium size enterprises: An interpretive study in australia. in the Fifteenth Eu-
ropean Conference on Information Systems. 2007. University of St. Gallen, St. Gallen. 
23. Linares, S. and I. Paredes (2007) IS2ME: Information Security to the Medium Enterprise.  
Volume,   
24. Wiander, T. and J. Holappa, Managing Information Security in Small and Medium-sized 
Organization, in Handbook of Research on Information Security and Assurancence. 2007. 
25. Carey-Smith, M.T., K.J. Nelson, and L.J. May. Improving Information Security Manage-
ment in Nonprofit Organisations with Action Research. in Proceedings of The 5th Australi-
an Information Security Management Conference. 2007. Perth, Western Australia: School 
of Computer and Information Science. Edith Cowan University. 
26. Tawileh, A., J. Hilton, and S. McIntosh, Managing Information Security in Small and Me-
dium Sized Enterprises: A Holistic Approach, in ISSE/SECURE 2007 Securing Electronic 
Business Processes, Vieweg, Editor. 2007. p. 331-339. 
27. Batista, J. and A. Figueiredo, SPI in very small team: a case with CMM. Software Process 
Improvement and Practice, 2000. 5(4): p. 243-250. 
28. Hareton, L. and Y. Terence, A Process Framework for Small Projects. Software Process 
Improvement and Practice, 2001. 6: p. 67-83. 
29. Tuffley, A., B. Grove, and M. G, SPICE For Small Organisations. Software Process 
Improvement and Practice, 2004. 9: p. 23-31. 
30. Calvo-Manzano, J.A., Método de Mejora del Proceso de desarrollo de sistemas de infor-
mación en la pequeña y mediana empresa (Tesis Doctoral). Universidad de Vigo
. 2000. 
31. Mekelburg, D., Sustaining Best Practices: How Real-World Software Organizations Im-
prove Quality Processes. Software Quality Professional, 2005. 7(3): p. 4-13. 
32. Sánchez, L.E., et al., MGSM-PYME: Metodología para la gestión de la seguridad y su 
madurez en las PYMES., in V Congreso Iberoamericano de Seguridad Informática. 2009: 
Montevideo, Uruguay. 
33. Awad, E. and H. Ghaziri, Knowledge Management, ed. P. Hall. 2003. 
158