1. Austin, R. and Darby, C. (2003), “The myth of secure computing”, Harvard Business Review, June, pp. 2‐7.
2. Brook, S. (2005), “Spoof suicide bomber ad sparks global row”, Guardian Unlimited, available at: http://media.guardian.co.uk/site/story/0,14173,1394517,00.html (accessed 29 January 2005).
3. Brzuszkiewicz, J. and Lenart, D. (2006), “NFZ włamywał się do lekarskich komputerów?”, Gazeta Wyborcza, available at: http://serwisy.gazeta.pl/wyborcza/2029020,34513,3109009.html (accessed 10 December 2006).
4. Fox, S. and Madden, M. (2006), “Riding the waves of ‘Web 2.0’”, Pew Internet Project, available at: www.pewinternet.org/pdfs/PIP_Web_2.0.pdf (accessed 26 October 2006).
5. Gazeta Wyborcza (2007), “Kompania Piwowarska ofiarę ataku”, Gazeta Wyborcza, 8 June, p. 27.