1. The Economist (2010) Cyberwar: The threat from the internet. The Economist, July 1st 2010, (pp. 23-26). downloaded: http://www.economist.com/node/16481504 on July, 31th 2010.
2. Barr, J. G. (2010). Setting Security Priorities. Faulkner Information Services. downloaded: http://www.faulkner.com.ezproxy.piedmont.edu/products/faulknerlibrary/ on May, 3rd 2010.
3. Ertul, L., Braithwaite T. et al. (2010) Enterprise Security Planning (ESP), downloaded: http://mgovernment.alfabes.com/resurces/euromgov2005/PDF/15_S036EL-S13.pdf on May, 24th 2010.
4. Zachman, J. A., (2004) Primer for Enterprise Engineering and Manufacturing. In The Zachman Framework for Enterprise Architecture e-book. downloaded: http://www.businessrulesgroup.org/BRWG_RFI/ZachmanBookRFIextract.pdf on June 4th 2010.
5. Gonzalez, J. & Sawicka, A. (2002) A Framework for Human Factors in Information Security. WSEAS International Conference on Information Security, Rio de Janeiro, Brazil.