1. 1) Asai, T.: Information Security and Business Activities, Kameda Book Services, Niigata (2007).
2. 2) Solms, V.: Information security governance — Compliance management vs. operational management, Journal of Computer and Security, Vol.24, pp.443-447 (2005).
3. 3) Bean, M.: Human error at the center of IT security breach. http://www.newhorizons.com/elevate/network%20defense%20contributed%20article.pdf
4. 4) Hofstede, G. and Hofstede, G.J.: Cultures and Organizations: Software of the Mind, McGraw-Hill New York, 2nd edition (2004).
5. 5) Pronin, E.: Perception and misperception of bias in human judgment, Journal of Trends in Cognitive Sciences, Vol.11, pp.33-43 (2006).