7Wylder John. Strategic Information Security[M].Florida: CRC Press LLC, 2003.1~7.
8Martins A, Eloff J. Information Security Culture[A]. In: IFIP TC11, 17th International Conference on Information Security (SEC2002)[C]. Netherlands: Kluwer Academic Publishers Group,2002.203~314.
9Gerber M, Solms R V. From Risk Analysis to Security Requirements[J]. Computers and Security,2001,20(7):577~584.
10Thomson K L, Solms R V. Information Security Obedience:A Definition[J]. Computers & Security,2005,24(1):69~75.