1. Walton, R.: Balancing the insider and outsider threat. Computer Fraud & Security, November 8-11 (2006)
2. Dark, M.J.: Security education, Training and Awareness from a Human Performance Technology point of view. In: Whitman, M.E., Mattford, H.J. (eds.) Readings and Cases in the Management of Information Security, pp. 86–104. Thomson Course Technology, Boston (2006)
3. Burnett, M., Kleiman, D.: Perfect Passwords. Selection, Protection, Authentication. Syngress (2006)
4. Pfleeger, C.P., Pfleeger, S.L.: Security in Computing, 4th edn. Prentice Hall, Upper Saddle River (2007)
5. Wiedenbeck, S., Waters, J., Birget, J., Brodskiy, A., Memon, N.: PassPoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies 63, 102–127 (2005)