1. Bernthal, P.: A survey of trust in the workplace. Executive summary, HR Benchmark Group, Pittsburg, PA (1997)
2. CSO Magazine, US Secret Service, Software Engineering Insistute CERT Program at Carnegie Mellon University, Deloitte: 2011 Cybersecurity Watch Survey. Tech. rep., CSO Magazine (2011)
3. Dai, C., Lin, D., Bertino, E., Kantarcioglu, M.: An approach to evaluate data trustworthiness based on data provenance. In: W. Jonker, M. Petković (eds.) Secure Data Management, vol. 5159, pp. 82–98. Springer, Berlin Heidelberg (2008)
4. Dark, M.J.: Information assurance and security ethics in complex systems: interdisciplinary perspectives. Information Science Reference, Hershey, PA (2011)
5. Demott, J.D., Sotirov, A., Long, J.: Gray Hat Hacking, Third Edition Reviews. 3edn. McGraw-Hill Companies, New York (2011)