1. Allen, D.K. and Fifield, N. (1999), “Re‐engineering change in higher education”, Information Research, Vol. 4 No. 3, available at: http://informationr.net/ir/4‐3/paper56.html.
2. Bali, R., Cockerham, G. and Bloor, C. (1999), “MISCO: a conceptual model for MIS implementation in SMEs”, Information Research, Vol. 4 No. 4, available at: http://informationr.net/ir/4‐4/paper61.html.
3. Bishop, M. (2003), “What is computer security?”, IEEE Security and Privacy, Vol. 1 No. 1, pp. 67‐9.
4. Boggs, W.B. (2004), “TQM and organizational culture: a case study”, The Quality Management Journal, Vol. 11 No. 2, pp. 42‐52.
5. Borglund, E. (2005), “Operational use of electronic records in police work”, Information Research, Vol. 10 No. 4, available at: http://InformationR.net/ir/10‐4/paper236.html.