1. Alberts, C., and Dorofee, A., 2003, “Managing Information Security Risks”, the OCTAVE Approach, Addison Wesley, USA.
2. Anderson, A., and Shain, S., 1991, “Risk management in Information Security hand book, Macmillan publishers Ltd.
3. Bakari, J. K., 2005, “Towards A Holistic Approach for Managing ICT Security in Developing Countries: A Case Study Of Tanzania”, Ph.L thesis, Department of Computer and Systems Science, SU-KTH, Stockholm.
4. Bakari, J., Yngström, L., Magnusson, C, and Tarimo, C. N., 2005, “State of ICT Security Management in the Institutions of Higher Learning in Developing Countries: Tanzania Case study”, The 5th IEEE (ICALT 2005), Kaohsiung, Taiwan. Pp. 1007–1011
5. Baskerville, R., 1993, “Information Systems Security Design Methods: Implication for Information System Development”, ACM Computing Surveys, Vol.25, No.4.