1. Aagedal JØ, Braber FD, Dimitrakos T, Gran BA, Raptis D, Stölen K. Model-based risk assessment to improve enterprise security. In: Paper presented at the proceedings of the sixth international enterprise distributed object computing conference (EDOC'02); 2002.
2. Anderson RH. Research and development initiatives focused on preventing, detecting, and responding to insider misuse of critical defense information systems. In: Paper presented at the results of a three-day workshop, RAND, Santa Monica, CA; 1999.
3. Anderson RH, Bozek T, Longstaff T, Meitzer W, Skroch M, Van Wyk K. Research on mitigating the insider threat to information systems – #2. In: Proceedings of a Workshop, RAND, Santa Monica, CA; August 2000.
4. Developing a common nursing practice model;Bachman;Nursing Management,1998
5. Barber B, Louwerse K, Davey J. White paper on health care information security. ISHTAR White Paper Retrieved 19 January 2006, 1998; Available from: .