1. Collins, Mauri (1992). Flaming: The relationship between social context cues and uninhibited verbal behavior in computer-mediated communication. On-line document, http://star.ucc.nau.edu/∼mauri/papers/flames.html
2. Einwechter, N. (2002) Preventing and detecting insider attacks using IDS. On-line document, http://online.securityfocus.com/infocus/1558
3. Annual FBI and Computer Security Institute survey on computer crime (2002). On-line document, http://www.gocsi.com/press/20020407.html
4. Gudaitis, T.M. (1999). The missing link in information security: Three dimensional profiling. CyberPsychology and Behavior, Vol 1, 4.
5. Morahan-Martin, Janet. (1998). Women and girls last: Females and the Internet. Paper presented at IRISS conference, 25–27 March, Bristol, UK.