1. Aleem, A. (2013) Cyber Security: A Guide to Fraud Prevention and Building a Secure Framework. Chichester, UK: Wiley.
2. Aleem, A. and Sprott, C. (2013) Let me in the cloud: Analysis of the benefit and risk assessment of cloud platform. Journal of Financial Crime 20 (1): 6–24.
3. ASIS International. (2010) Enterprise Security Risk Management: How Great Risks Lead to Great Deeds: A Benchmarking Survey and White Paper. Alexandria, VA: ASIS International, Online:
http://www.asisonline.org/education/docs/CSORT_ESRM_whitepaper_2010-04.pdf
.
4. Beck, A. (2006) Shrinkage and radio frequency identification (RFID): Prospects, problems and practicalities. In: M. Gill (ed.) The Handbook of Security. Basingstoke, UK: Palgrave Macmillan.
5. Beck, A. (2007) The emperor has no clothes: What future role for technology in reducing retail shrinkage? Security Journal 20 (1): 57–61.