1. Anderson, K. A. (2012). A case for a partnership between information security and records information management. ISACA Journal, 12(2), 40-44. https://www.isacajournal-digital.org/isacajournal/2012vol2?pg=46#pg46
2. Association for Information and Image Management International (AIIM). (2009). Recommended practice: Analysis, selection, and implementation of electronic document management systems (EDMS). AIIM International.
3. Blanding, S. F. (2004). An introduction to LAN/WAN security. H.F. Tipton ve M. Krause (Ed.) Information security management handbook (5. bs.) içinde. Auerbach Publications. http://index-of.co.uk/Computer-Security/CRC%20Press%20%20Information%20Security%20Management%20Handbook,%20Fifth%20.pdf
4. Brooks, R. (2019). What is the CIA triad? https://blog.netwrix.com/2019/03/26/the-cia-triad-and-its-real-world-application/
5. Canbek, G. ve Sağıroğlu, Ş. (2006). Bilgi, bilgi güvenliği ve süreçleri üzerine bir inceleme. Politeknik Dergisi, 9(3), 165-174. https://dergipark.org.tr/tr/download/article-file/384578