1. Abrams, M.D. and Bailey, D. (1995), “Abstraction and refinement of layered security policy”, in Abrams, M.D, Jajodia, S. and Podell, H.J. (Eds), Information Security – An integrated Collection of Essays, IEEE Computer Society Press, New York, NY.
2. Anderson, R. (1996), “A security policy model for clinical information systems”, 1996 IEEE Symposium on Security and Privacy.
3. Backhouse, J. and Dhillon, G. (1996), “Structures of responsibilities and security of information systems”, European Journal of Information Systems, Vol. 5 No. 1, pp. 2‐10.
4. Baskerville, R. (1992), “The developmental duality of information systems security”, Journal of Management Systems, Vol. 4 No. 1, pp. 1‐12.
5. Baskerville, R. (1993), “Information systems security design methods: implications for information systems development”, ACM Computing Surveys, Vol. 25 No. 4, December, pp. 375‐414.