1. Birman, K. P., 2000, The next generation internet: Unsafe at any speed. IEEE Computer, 33(8), 54–60.
2. BS 7799, 1999, BS 7799: Code of Practice for Information Security Management as a base for Certification.
3. Corporate Governance Task Force, 2004, Information Security Governance: A Call To Action. Available from: http://www.cyberpartnership.org/InfoSecGov4_04.pdf.
4. Entrust, 2004, Information Security Governance (ISG): An Essential Element of Corporate Governance. Available from: http://itresearch.forbes.com/detail/RES/1082396487_702.html.
5. Gerber, M., & von Solms, R., 2001, From risk analysis to security requirements. Computers and Security, 20(7), 577–584.