1. Anderson, E.E.
and
Choobineh, J.
(2008), “Enterprise information security strategies”, Computers & Security, Vol. 27 Nos 1/2, pp. 22-29.
2. Attri, R.
,
Dev, N.
and
Sharma, V.
(2013), “Interpretive structural modelling (ISM) approach: an overview”, Research Journal of Management Sciences, Vol. 2 No. 2, pp. 3-8.
3. Bajaj, K.
(2010), The Cybersecurity Agenda – Mobilizing for International Action, The EastWest Institute, New York, NY, available at: www.ewi.info (accessed June 2013).
4. BIC
(2013), “D2.5 - final report of the working groups activities”, Building International Cooperation for Trustworthy ICT: Security, Privacy and Trust in Global Networks & Services, available at: www.bic-trust.eu
5. Bolaňos, R.
,
Fontela, R.E.
and
Pastor, P.
(2005), “Using interpretive structural modeling in strategic decision-making groups”, Management Decision, Vol. 43 Nos 5/6, pp. 877-895.