Christina Costa Information technology outsourcing in Australia: a literature review. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2001, v:9, n:5, pp:213-224 [Journal]
Martin Botha, Rossouw von Solms The utilization of trend analysis in the effective monitoring of information security. Part 1: the concept. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2001, v:9, n:5, pp:237-242 [Journal]