1. Information security policies and their relationship with the effectiveness of the management information systems of major Palestinian universities in the Gaza strip;Abdelwahed;Int. J. Info. Sci. Manage. (IJISM),2016
2. Emergence of robust information security management structure around the world wide higher education Institutions: a multifaceted security solution;Arafat;Int. J. Comput. Sci. Issues (IJCSI),2012
3. Bailey, T., Kaplan, J., & Rezek, C. (2014). Why senior leaders are the front line against cyberattacks. Retrieved 25 June 2018, fromhttps://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/why-senior-leaders-are-the-front-line-against-cyberattacks.
4. Beaver, K. (2015). The importance of a security culture across the organization. Retrieved 25 June 2018, fromhttps://securityintelligence.com/the-importance-of-a-security-culture-across-the-organization/.
5. Protecting intellectual property and sensitive information in academic campuses from trusted insiders: leveraging active directory;Bhilare,2009