1. Three Models to Measure Information Security Compliance
2. Amato-McCoy, D. M. (2009). The next phase of PCI security. Chain Store Age, 48-49.
3. Quality model mania.;G. H.Anthes;Computerworld,2004
4. Baker, W., Dahn, M., Greiner, T., Hutton, A., Hylender, C. D., Lindstrom, P., et al. (2010). Verizon 2010 payment card industry compliance report. Retrieved from http://www.verizonbusiness.com/resources/reports/rp_2010-payment-card-industry-compliance-report_en_xg.pdf
5. Cater-Steel, A., & Tan, W.-G. (2005). Implementation of IT infrastructure library (ITIL) in Australia: Progress and success factors. Paper presented at the International IT Governance Conference, Auckland, New Zealand.