1. Information security: protecting your business assets, BERR, Available from: www.berr.gov.uk.
2. Botha RA, Eloff JHP. Separation of duties for access control enforcement in workflow environments.
3. Federal Trade Commission, Pretexting: your personal information revealed.
4. ISMS risk management;Humphreys,2008
5. Implementing the ISO/IEC 27001 information security management system standard;Humphreys,2007