1. Users are not the enemy
2. Ajami, R. , Ramadan, N. , Mohamed, N. and Al-Jaroodi, J. (2011), “Security challenges and approaches in online social networks: a survey”, International Journal of Computer Science and Network Security, Vol. 11 No. 8, pp. 1-12.
3. Akhawe, D. , Barth, A. , Lam, P.E. , Mitchell, J. and Song, D. (2010), “Towards a formal foundation of web security”, Proceedings of the 23rd IEEE Computer Security Foundations Symposium (CSF), pp. 290-304.
4. Web 2.0 Technologies and Social Networking Security Fears in Enterprises
5. Anderson, J. , Bonneau, J. and Stajano, F. (2010), “Inglorious installers: security in the application marketplace”, Proc. 9th Workshop Economics of Information Security, available at: http://weis2010.econinfosec.org/papers/session3/weis2010_anderson_j.pdf.