1. Ajzen, I., Fishbein, M.: Understanding attitudes and predicting social behaviour. Englewood Cliffs, Prentice-Hall, NJ (1980).
2. Akers, R.L.: Deviant behavior: a social learning perspective. Belmont, CA (1977)
3. Anderson, R.H., Bozek, T., Longstaff, T., Meitzler, W., Skroch, M., Van Wyk, K.: Research on Mitigating the Insider Threat to Information Systems - no.2, RAND Conference Proceedings (2000)
4. Ashenden, D.: Information Security management: A human challenge? Information Security Technical Report.13 (4), 195–201 (2008)
5. Balfe, S., Reidt, S.: Key Deactivation Strategies in MANETs: A Survey (2008) Available online.
http://www.sreidt.com/wp-content/uploads/2009/01/reidt2008\ textunderscorerevocation.pdfCited20July2009