1. Ashurizadeh. S (2012). The relationship between organizational culture and information security management in Bank Melli. Master Thesis in Public Management. Allameh Tabatabai College. Faculty of Management and Account-ing.(Persian)
2. Boranbayev, A., Boranbayev, S., & Nurbekov, A. (2020).Evaluating and Applying Risk Remission Strategy Approaches to Prevent Prospective Fail-ures in Information Systems. In 17th Interna-tional Conference on Information Technology-New Generations (647-651). Springer, Cham. [
DOI:10.1007/978-3-030-43020-7_87]
3. Cheng,K.(2005).Surviving hacker attacks proves that every cloud has a Silver Lining.Computers in Libraries.25(3). 6-8, 52-6.
4. Doroudi.F. Jamshidi ,Z.(2021). Assessing the Com-ponents of Information Security in Accessing & Use of Digital Libraries.Iranian Research Institute for Information Science and Technolo-gy(IranDoc). 37(1). 117-134. (Persian). [
DOI:10.52547/jipm.37.1.117]
5. https://jipm.irandoc.ac.ir/article-1-4499-en.html
6. Dea Elias, J . Wazoel Lubua, E. (2021). The Im-pact of Usability, Functionality and Reliability on Users' Satisfaction During Library System Adop-tion .The Journal of Informatics, 1(1). 13-21.
7. https://www.researchgate.net/publication/350709661.
8. Ghazizadeh, H. (2008). Criteria for the capability of a library software to cover the needs of the lending sector with an emphasis on information management. Library and information. 12 (1). 118- 99. (Persian). http://lis.aqr-libjournal.ir/article_43635.html
9. Gloria Ogheneghatowho Oyovwe-Tinuoye, Satur-day U. Omeluzor, Ijiekhuamhen Osaze Patrick. (2021).influence of ICT skills on job perfor-mance of librarians in university libraries of South-South, Nigeria. First Published, . 37(3), 345-358. [
DOI:10.1177/0266666920983393]
10. Ghasemi Shabankareh, K. Mokhtari, V. Amini La-ri, M (2006). Security and e-commerce. Fourth National Conference on Electronic Commerce. (Persian). https://www.sid.ir/Fa/Seminar/ViewPaper.aspx?ID=5257
11. Haji-Zeinolabedini, M; Pazouki, F; Davoodzadeh Salestani, D (2011). Library Software in Iran, Tehran: Publisher. (Persian)
12. Habibi, S. Haji-Zeinolabedini, M.Asnafi, AR Imra-ni, I .(2017). Study of the status of intra-organizational performance of library software in Iran. Library and information. 21 (4). 90-67. (Persian). http://ensani.ir/fa/article/446938 Doi: 10.30481 / lis.2019.74170.
13. Khaki Ardakani, M. Morvati Sharifabadi, A. Zan-jirchi, SM. (2013). Modeling an agile production system using a system dynamics approach. In-dustrial Management Studies. Issue 32. 201.(Persian)https://www.noormags.ir/view/fa/articlepage/1089991/ .
14. Kadivar,A.Nazari Nodooshan, K.(2015). Infor-mation systems security management with a dy-namic modeling approach. National Conference on Innovation in Systems Management and In-formation Technology with Business Intelligence Approach. (Per-sian).https://www.sid.ir/fa/seminar/ViewPaper.aspx?ID=38203
15. Malekalkalami, M. (2013). Evaluating the perfor-mance of information security management at the central libraries of public universities in Teh-ran: according to the international standard-ISO / IEC. Journal of Information Processing and Management, 28(4): 895-916. (Persian)
16. Mahmoudzadeh, I. Rad raJabi, M. (2005). Securi-ty management in information systems. Iranian Journal of Management Sciences.4 (1). 112-78. (Persian) http://ensani.ir/fa/article/76548/.
17. Mohammadnejad, M. Saboohi Laki, Be (2015). Investigate the importance of information securi-ty management system and its standards. The First World Conference on Management, Ac-counting Economics and Humanities at the be-ginning of the third millennium. (Per-sian)https://www.sid.ir/fa/seminar/ViewPaper.aspx?ID=38274
18. Nazareth ,D L.Cho,J.(2015). A system dynamics model for information security management. In-formation & Management.25(1).123-134.https://www.sciencedirect.com/science/article/abs/pii/S0378720614001335. [
DOI:10.1016/j.im.2014.10.009]
19. Rezvani, S.(2017). Designing an information secu-rity management model in digital libraries. Jour-nal of Library and Information Science.8 (1). 356-337. (Persian). https://www.sid.ir/fa/journal/ViewPaper.aspx?id=514055
20. Shafiee Nikabadi, M. Hakaki, A Gholamshahi, S. (2020).A dynamic model for evaluating infor-mation systems security using the systems dy-namics approach. Quarterly Journal of Technol-ogy Development.16 (64). 61-52. (Persian). https://www.sid.ir/fa/Journal/ViewPaper.aspx?id=55233. [
DOI:10.52547/jstpi.20820.16.64.52]
21. Tajfar, Amir H. Mahmoudi Meymand, Mo R Soltani, F. (2013). Ranking the obstacles to the implementation of information security man-agement system and examining the readiness of the exploration management of the National Iranian Oil Company in the implementation of this system. Master Thesis. Payame Noor Univer-sity of Tehran Province. (Persian).
22. Tajeddini, O. Sadat Moosavi, A.(2009). Books of the Central Library of Shahid Bahonar Universi-ty of Kerman: Thematic Dispersion and Usage Report. 21 (3). 163-152. (Per-sian).http://nastinfo.nlai.ir/?_action=article&au=10624&_au.
23. Tintamusik. yanarong (2010). Examining the rela-tionship between organization systems and in-formation security awareness. Dissertion for the degree of doctor of business administration. Northcentral universiry
24. Yousefi Zanouz, R. Sajjadi Khosraghi, F. (2016).Risk assessment in the implementation of hospital information system: a case study, health management. 20 (67). 23-7. (Per-sian).https://www.sid.ir/fa/journal/ViewPaper.aspx?id=470075