1. Adobe (2010) Making the case PDF/A and Adobe Acrobat. White paper, Adobe Systems Incorporated., Available: http://goo.gl/F4ZkL - Accessed 2013 Jun 22.
2. Gupta R, Karayil A, Rajendran R (2008) Contract lifecycle management. White paper, Infosys, Available: http://goo.gl/aEQj9 - Accessed 2013 Jun 22.
3. Villars SFRL (2006) The information lifecycle management imperative. White paper, IDC Information and data, Available: http://goo.gl/4aOqo - Accessed 2013 Jun 22.
4. Berghel H (2012) Wikileaks and the matter of private manning. Computer 45: : 70–73.
5. Coles-Kemp L, Theoharidou M (2010) Insider threat and information security management. In:Probst CW, Hunker J, Gollmann D, Bishop M, editors, Insider Threats in Cyber Security, Springer US, volume 49 of Advances in Information Security. pp.45–71.