Burns, G.M, n.d. A Recipe for a Decentralized Security Awareness Program. ISSA Access. Vol. 3,
Code of Federal Regulations. 5 CFR 930. Computer Security Training Regulation.
Flanders, D, n.d. Security Awareness - A 70% Solution. Fourth Workshop on Computer Security
Isaacson, G, 1990. Security Awareness: Making It Work. ISSA Access. 3(4). pp. 22-24.
National Aeronautics and Space Administration, n.d. Guidelines for Development of Computer
Security Awareness and Training (CSAT) Programs. Washington, DC. NASA Guide 2410.1.
Maconachy, V. Computer Security Education, Training, and Awareness: Turning a Philosophical
Key Considerations for Developing Effective Information Security Awareness and Training Programs Microsoft initiatives in the ongoing security effort to help customers March 2006 by MICROSOFT
Maconachy, V. n.d. Panel: Federal Information Systems Security Educators' Association (FISSEA).
Orientation Into Practical Reality, (1989). Proceedings of the 12th National Computer
SecurityConference. National Institute of Standards and Technology and National Computer Security Center. Washington, DC.
Suchinsky, A, n.d. Determining Your Training Needs. Proceedings of the 13th National
ComputerSecurity Conference. National Institute of Standards and Technology and National Computer
Todd, M.A. And Guitian C, (1989). Computer Security Training Guidelines. Special Publication
500-172. Gaithersburg, MD: National Institute of Standards and Technology.
U.S. Department of Energy, (1992). Computer Security Awareness and Training Guideline.
Washington, DC. DOE/MA-0320. February 1988. Issue 2, 2nd Quarter 1990. pp. 12-54 .
P.A., and R.W. Stuart. "Entrepreneurship and Technology Transfer: Key Factors in the Innovation Process." The Art and Science of Entrepreneurship. Ed. Donald L. Sexton and Raymond W. Smilor. Cambridge: Ballinger Publishing Company, 1986. 181-211.
Bracker, J.S., G.H. Van Clouse, and R.A. Thacker. "Teleconferencing business forums: an approach to linking entrepreneurs and potential investors." Entrepreneurship and Regional Development. 6 (1994): 259-274.
Brealey, Richard A., and Stewart C. Myers. Principles of Corporate Finance. 4th ed. New York: McGraw-Hill, 1991.
Krugman, Paul. "A Country Is Not a Company." Harvard Business Review. 74.1 (1996): 40-51).
Long, Norman. "Multiple Enterprises in the Central Highlands of Peru." Entrepreneurs in Cultural Context. Ed. Sidney M. Greenfield, Arnold Strickon, and Robert T. Aubey. Albuquerque: University of New Mexico Press, 1979. 123-158.
Young, Derek A., "Microentrepreneurs and the Next Stage in Microenterprise Finance: A Focus on Latin America." Professional Report: University of Texas at Austin, (1996).
Ahn, G.J. & Sandhu, R. (2000). Role-based authorization constraints speci-cation. ACM Trans.
Inf. Syst. Secur. 3(4).
Bullock, a. And Benford, S. (1999). Framework of the Access control for multi-user collaborative environments. In ACM Group. Phoenix, AZ.
Gauthier, F. & Merlo, E.(2012). Fast Detection of Access Control Vulnerabilities in PHP Applications. 2012 19th Working Conference on Reverse Engineering.
Kang, M.H., Park, J.S. And Froscher, J.N. (2001). Access control mechanisms for inter-organizational work-ow. In ACM Symposium on Access Control Model and Technology.
Layton, T.P. (2007). Information Security: Design, Implementation, Measurement, and Compliance. Boca Raton, FL: Auerbach publications. ISBN 978-0-8493-7087-8.
Lee, M. Deok, N. Lee, K. et al. (2011). Design and Implementation of am Intranet Security and Access Control Systems in UBI-COM. Computing & Informatics.
Li, N. & Tripunitara, M.V. (2006).Security analysis in role-based access control. ACM Transactions on Information and System Security (TISSEC). 9 (4): 391-420.
Stevens, G. & Wuff, V.(2009). Computer-supported access control. ACM Transactions on Computer-Human Interaction (TOCHI). 16 (3):12-26.
Stevens, G., Quaisser, G. Klann, M.(2006). Breaking it up: An industrial case study of componend-based tailorable software design. In End User Development, H. Liebermann et al.,
Eds. Springer, 269 -- 294.
Tolone, W. Ahn, G. Pai, T.et al.(2005). Access control in collaborative systems. ACM Computing Surveys (CSUR). 37(1): 29-41.
"Data Recovery Overview." (2010, December 6). Presentations & Resources. Retrieved August
2, 2012, from http://www.myharddrivedied.com/presentations-resources/data-recovery-overview
"EMC Information Risk Assessment." (2008, December). EMC Corporation. Retrieved August
2, 2012, from http://www.emc.com/collateral/services/consulting/h5990-information-risk-assessment-svo.pdf
Engel, P. (2010, August 4). Data Security: A 5-Step Risk Assessment Plan. Retrieved August 2,
2012, from http://www.smallbusinesscomputing.com/news/article.php/3896756/Data-Security-A-5Step-Risk-Assessment-Plan.htm
Maniscalchi, J. (2010, May 17). Information Security Risk Analysis. Retrieved August 2, 2012,
Wigle, D. (2010, June 16). What is Data Recovery? Is Data Recovery Software Needed?
Retrieved August 2, 2012, from http://marvintechnology.com/what-is-data-recovery-is-data-recovery-software-needed/