1. Abstraction and refinement of layered security policy;Abrams,1995
2. Information security governance in saudi organizations: an empirical study;Abu-Musa;Inf. Manage. Comput. Secur.,2010
3. A qualitative study on users' view on information security;Albrechtsen;Comput. Secur.,2007
4. A security policy model for clinical information systems;Anderson,1996
5. Strategies for developing policies and requirements for secure electronic commerce systems;Anton,2000