1. Armistead, L. (2004). Information Operations, Brassey’s Inc., ISBN 157488699-1.
2. Ashenden, D. & Jones, A. (2003). Re-Interpreting Information Operations for the Private Sector, 2nd European Conference of Information Warfare.
3. Busuttil, T. & Warren, M. (2003). A Review of critical Information Infrastructure Protection within IT Security Guidelines, 4th Australian Information warfare and IT security Conference 2003.
4. Campen, A. D. and D. H. Dearth (1998). Cyberwar 2.0: Myths, Mysteries and Reality. Fairfax, Virginia, AFCEA International Press
5. Cohen, F & Lambert, D. (2001). A Framework for Deception, [online], http://all.net/journal/deception/Framework/Framework.html