Adams, Anne, Martina Angela Sasse, and Peter Lunt. (1997).
Making passwords secure and usable. In: People and Computers XII - Proc. of the 7th International Conference on Human-Computer Interaction (HCI'97), Springer.
Arora, Ashish, Anand Nandkumar, and Rahul Telang. (2006). Does information security attack frequency increase with vulnerability disclosure? An empirical analysis.
Information Systems Frontiers, Vol. 8 (5), 350-362.
Collins, J. D., Vincenzo A. Sainato, and David N. Khey. (2011). Organizational Data Breaches 2005-2010: Applying SCP to the Healthcare and Education Sectors.
International Journal of Cyber Criminology Vol. 5(1), 794-810.
Cornish, Derek B., & Clarke, R. V. G. (2003). Opportunities, precipitators, and criminal decisions: A reply to Wortley's critique of situational crime prevention. In: Martha J. Smith and Derek B. Cornish (Guest Eds.).
Theory for practice in situational crime. Willan.
Dali, Alex and Christopher Lajtha. (2012). ISO 31000 Risk Management - "The Gold Standard."
EDPACS, Vol. 45(5), 1-8.
Eloff, M. M. and J. H. P. Eloff. (2002). Human Computer Interaction: An Information Security Perspectives. In: M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi and Heba K. Aslan.
Security in the Information Society: Visions and perspectives. Springer.