1. J.D. Meier, A. Mackman, and B. Wastell, “How to: Create a Threat Model for a Web Application at Design Time,” http://msdn.microsoft.com/en-us/library/ff647894.aspx
2. M. Wilson, J. Hash, “Building an Information Technology Security Awareness and Training Program,” http://csrc.nist.gov/publications/nistpubs/800-50/NIST-SP800-50.pdf
3. “Information technology — Security techniques — Code of practice for information security management,” http://www.iso27001security.com/html/27002.html
4. A. Evfimievski, “Randomization in privacy preserving data mining,” ACM SIGKDD Explorations Newsletter, Vol. 4, No. 2, Dec. 2002.
5. Y. Zhu, and L. Liu, “Optimal randomization for privacy preserving data mining,” Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, 2004.