1. Davenport, T.: Putting the Enterprise into the Enterprise System. Harvard Business Review 76(4), 121–131 (1998)
2. Sherr, I.: Sony Faces Lawsuit Over PlayStation Network Breach (April 28, 2011),
http://online.wsj.com/article/BT-CO-20110428-720452.html
(accessed on April 30, 2011)
3. Cyber-Ark Snooping Survey (April 2011),
http://www.cyber-ark.com/downloads/pdf/2011-Snooping-Survey-data.pdf
(accessed on April 30, 2011)
4. Boss, S., Kirsch, L., Angermeier, I., Shingler, R., Boss, R.: If Someone is Watching, I’ll Do What I’m Asked: Mandatoriness, Control, and Information Security. European Journal of Information Systems 18(2), 151–164 (2009)
5. Keller, S., Powell, A., Horstmann, B., Predmore, C., Crawford, C.: Information Security Threats and Practices in Small Businesses. Information Systems Management 22(2), 7–19 (2005)