1. Hirschheim, R.: Information systems epistemology: an historical perspective. Res. Methods Inf. Syst. 13–35 (1985)
2. Brancheau, J.C., Janz, B.D., Wetherbe, J.C.: Key issues in information systems management: 1994–95 SIM Delphi results. MIS Q. 225–242 (1996)
3. BIS: 2013 information security breaches survey. Retrieved May 1, 2015, from
https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/191671/bis-13-p184es-2013-information-security-breaches-survey-executive-summary.pdf
(2013)
4. Yeh, Q.-J., Chang, A.J.-T.: Threats and countermeasures for information system security: a cross-industry study. Inf. Manag. 44(5), 480–491 (2007)
5. Siponen, M., Willison, R., Baskerville, R.: Power and practice in information systems security research. ICIS 2008 Proceedings: 26 (2008)