1. “Computer Security Management”;Parker;Reston Publishing Co, Inc.,1981
2. “Delivering enterprise-wide data protection controls for mobile computing devices”.;Hayward;RSA conference,2010
3. “Outpacing change: Ernst and Young's 12th annual global information security survey”;Kesel;Ernst and Young,2009
4. “Discovering and disciplining computer abuse in organizations: a field study”;Straub;MIS Q,1994