1. Power, R. (2001), ‘2001 CSI/FBI Computer Crime and Security Survey’, Volume VII — No.1, Computer.
2. Caelli W., Longley D. and Shain M. (1991), ‘Information Security Handbook’, Stockton Press.
3. Furnell S.M., Magklaras G.B., Papadaki M. and Dowland P.S. (2001), ‘A generic taxonomy for Intrusion Specification and Response’, Proceedings of Euromedia 2001, Valencia, Spain, 18-20 April 2001.
4. Anderson, J.P. (1980), ‘Computer Security Threat Monitoring and Surveillance’, 1980.
5. Neumann, P.G. (1999), ‘The challenges of Insider Misuse’, SRI Computer Science Laboratory, Paper prepared for the Workshop on Preventing, Detecting, and Responding to Malicious Insider Misuse, 16–18 August 1999, at RAND, Santa Monica, CA.