1. Amoroso, D. and P. Cheney (1992) Quality end user developed applications: some essential ingredients, Database
23 (1) (Winter) 1–12.
2. Avison, D. and G. Fitzgerald (1988) Information Systems Development: Methodologies, Techniques and Tools. Oxford: Blackwell Scientific.
3. Bansler, J. and K. Bedker (1993) A reappraisal of structured analysis: Design in an organizational context, ACM Transactions on Information Systems
11 (2) 165–193.
4. Baskerville, R. (1988) Designing Information Systems Security. Chichester: Wiley.
5. Baskerville, R. (1992) The developmental duality of information systems security, Journal of Management Systems
4 (1) 1–12.