1. Arnab, A., Hutchison, A.: Requirement Analysis of Enterprise DRM Systems. In: Proceedings Information Security, South Africa, Hotel Balalaika Sandton, Johannesburg (2005)
2. Elisabeth, H.: How enterprise DRM works: Everything you need to know about information rights management. Computer World (April 27, 2010)
3. Chongthammakun, R., Jackson, S.J.: Boundary Objects, Agents, and Organizations: Lessons from E-Document Systems Development in Thailand. In: Proceedings of 2012 45th Hawaii International Conference on Systems Sciences, Hawaii (2012)
4. Markany, Method and Apparatus of watermark embedding and extraction from text docu-ments, patent, filed at October 2002, and registered at January 14, 2005, No. 10-0467930, Korea Patent Office
5. Cheng, W., Feng, H., Yang, C.: A robust text digital watermarking algorithm based on fragments regrouping strategy. In: 2010 IEEE International Conference on Information Theory and Information Security (ICITIS), pp. 600–603 (2010)