1. Hayward C, Glendinning D (2010) Delivering enterprise-wide data protection controls for mobile computing devices. RSA conference 2010, San Francisco
2. Richardson R (2011) 2010/2011 CSI computer security crime and security survey. Computer Security Institute
3. Kessel PV (2009) Outpacing change: Ernst and Young’s 12th annual global information security survey. Ernst and Young
4. Forcht KA (1994) Computer security management. Boyd and Fraser, Danvers
5. Straub DW (1990) Effective is security: an empirical study. Inf Syst Res 1(3):255–276