1. Basu, A., & Muylle, S. (2003). Authentication in E-commerce. Communications of the ACM, 46(12), 159--166.
2. Bean, M. (2007), Human Error at the Center of IT Security Breaches. Newhorizons.com, February 2008. Online at http://www.newhorizons.com/elevate/network%20defense%20contributed%20article.pdf. Accessed on 23 January 2014.
3. Brostoff, A. (2004), Improving password systems effectiveness. PhD thesis, UCL, UK, unpublished.
4. Bubb, H. (2005). Human reliability: a key to improved quality in manufacturing. Human Factors and Ergonomics in Manufacturing, 15(4) 353--368; Wiley Periodical.
5. Business Software Alliance (2002). Information Security Governance: Toward a Framework for Action. http://www.bsa.org/country/Research%20and%20Statistics/~/media/BD05BC8FF0F04CBD9D76460B4BED0E67.ashx. Accessed 20 February 2013.