1. Al‐Awadi, M. (2009), “A study of employees' attitudes towards organizational information security policies in the UK and Oman”, PhD thesis, University of Glasgow, Glasgow.
2. Alkaff, A.S. (2009), “Case studies show value of ISO/IEC 27001 conformity”, ISO Management Systems, January/February, pp. 33‐38.
3. Arcade, J., Godet, M., Meunier, F. and Roubelat, F. (2003), Structural Analysis with MICMAC Method & Actors' Strategy with MACTOR Method, available at: www.agriperi.ir/AKHBAR/cd1/FORESIGHT%20METHODOLOGY%20&%20FORECASTING/FORESIGHT%20METHODOLOGY/related%20articles/books/Future%20Research%20Methodology/4‐stranal.pdf.
4. Australia (2009), “Cyber security strategy”, available at: www.ag.gov.au/www/agd/rwpattach.nsf/VAP/%284CA02151F94FFB778ADAEC2E6EA8653D%29∼AG+Cyber+Security+Strategy+‐+ for+website.pdf/$file/AG+Cyber+Security+Strategy+‐+for+website.pdf.
5. Avolio, F.M. (2000), “Best practices in network security”, Network Computing, Vol. 60 No. 20.