1. Andrews, W.C. (1990), “Contingency planning for physical disasters’’, Journal of Systems Management, pp. 28‐32.
2. Information Technologies and Business Value: An Analytic and Empirical Investigation
3. Bidgoli, H. and Azarmsa, R. (1989), “Computer security: new managerial concern for the 1980s and beyond”, Journal of Systems Management, pp. 21‐7.
4. Dryden, P. (1995), “Managers beef up network security with AuditTrack’’, Computerworld, Vol. 29 No. 16, pp. 53‐5.
5. A comparative framework for risk analysis methods