1. Karin P. Badenhorst, Jan H.P. Eloff (1994), TOPM: A formal approach to optimization of information technology risk management, Computers & Security 13 411–435.
2. CCTA (1993), The CCTA Risk Analysis and Management Method (CRAMM) User Guide, Version 2.1, CCTA.
3. Alison Classe (1994), Hazard Warning, Computers & Security 13 568.
4. CLUSIF (1994), Management of the Information Security Master Plan - MARION, CLUSIF, Paris.
5. CLUSIF (1988), Les Projects Prioritaires arpes le Schema Directeur Security, CLUSIF, Paris.