1. Aceituno, V.C. (2004),ISM3 1.0. – Information Security Management Maturity Model, Institute for Security and Open Methodology, available at: http://isecom.securenetltd.com/Security_Maturity_Model_v3.0.pdf.
2. Information Security Governance
3. Andress, M. (2000), “Manage people to protect data”,InfoWorld, Vol. 22 No. 46.
4. Berinato, S. (2003), “After the storm, reform”,CIO Magazine, available at: www.cio.com/archive/121503/securityfuture.html (accessed 19 October 2004).
5. Borck, J.R. (2000), “Enterprise strategies: advice for a secure enterprise: implement the basics and see that everyone uses them”,InfoWorld, Vol. 22 No. 46, November.