1. Baker, W., Hutton, A., Hylender, C., Novak, C., Porter, C., Sartin, B., Tippett, P. and Valentine, J. (2009), 2009 Data Breach Investigations Report, available at: http://verizonbusiness.com/resources/security/reports/2009_databreach_rp.pdf (accessed 12 August 2010).
2. Belsis, P., Kokolakis, S. and Kiountouzis, E. (2005), “Information systems security from a knowledge management perspective”, Information Management & Computer Security, Vol. 13 No. 3, pp. 189‐202.
3. CERT (2008), Governing for Enterprise Security, Computer Emergency Readiness Team, available at: http://cert.org/governance (accessed 12 August 2010).
4. Choi, N., Kim, D., Goo, J. and Whitmore, A. (2008), “Knowing is doing: an empirical validation of the relationship between managerial information security awareness and action”, Information Management & Computer Security, Vol. 16 No. 5, pp. 484‐501.
5. Curtin, M. and Ayres, L. (2008), “Using science to combat data loss: analyzing breaches by type and industry”, I/S: A Journal of Law and Policy for the Information Society, Vol. 4 No. 3, pp. 569‐601.