1. Information security policies and their relationship with the effectiveness of the management information systems of major Palestinian universities in the Gaza Strip;International Journal of Information Science and Management (IJISM),2016
2. Users are not the enemy;Communication of the ACM,1999
3. Albors, J. (2016), “Application not compatible’: Bayrob may be stealing your info [online]”, welivesecurity: ESET, available at: www.welivesecurity.com/2016/01/28/application-not-compatible-bayrob-may-be-stealing-your-info/ (accessed 1 May 2018).