1. Users are not the enemy
2. Al-Awadi, M., & Renaud, K. (2007, July 3-6). Success factors in information security implementation in organizations. In Kommers, P., Isaias, P., & Chen, N. S. (Eds.), In Proceedings of the IADIS International Conference e-Society, Lisbon, Portugal.
3. Handbook of Research on Open Source Software
4. Basic concepts and taxonomy of dependable and secure computing
5. Aytes, K., & Connolly, T. (2003, August 4-6). A research model for investigating human behavior related to computer security. In Proceedings of the Ninth Americas Conference on Information Systems, Tampa, FL.