1. 2009 CSI Computer Crime and Security Survey. Computer Security Institute, available at: http://www.gocsi.com/ .
2. 2008 Information security breaches survey, available at: http://www.security-survey.gov.uk .
3. Iso/iec 17799:2000 (part 1), Information technology-code of practice for information security management.
4. Spagnoletti P., Resca A. (2008), The duality of Information Security Management: fighting against predictable and unpredictable threats, Journal of Information Systems Security, Vol. 4 – Issue 3, 2008
5. Åhlfeldt R.M., Spagnoletti P. and Sindre G. (2007) Improving the Information Security Model by using TFI. In “New Approaches for Security, Privacy and Trust in Complex Environments”, IFIP Springer Series, Springer Boston, Volume 232/2007, 73–84