1. Hoffman, Thomas. “Premium Protection: Security Breaches. Viruses. Should you amend your IT insurance plan to cover such risks?” Computerworld March 31, 2003. URL: http://www.computerworld.com/securitytopics/security/story/0,10801,79794,0 0.html (Aug 12, 2003)
2. Harrison, Ann. “Survey: Cybercrime Cost Firms $266M in 1999.” Computerworld March 27, 2000 URL: http://www.computerworld.com/news/2000/story/0,11280,44243,00.html (Aug 12, 2003).
3. National Security Institute (www.nsi.org). Employee Information Awareness Service. August 2003.URL: http://nsi.org/SSWebSite/TheService.html (Aug 12, 2003).
4. Mitnick, Kevin. “How to Hack People.” BBC NewsOnline, October 14, 2002. URL: http://news.bbc.co.uk/1/hi/technology/2320121.stm (Aug 12, 2003).
5. Winkler, Ira S. and Dealy, Brian. “Information Security Technology? …Don’t Rely on It. A Case Study in Social Engineering.” URL: http://www.usenix.org/publications/library/proceedings/security95/winkler.html (Aug 12, 2003).
6. Stevens, George. “Enhancing Defenses against Social Engineering”. GIAC Practical Repository. URL: http://www.giac.org/practical/gsec/George_Stevens_GSEC.pdf (Aug 12, 2003).
7. Mitnick, K. D. (2002). The Art of Deception: Controlling the Human Element of Security. New York, New York: Wiley Publishing.
8. Long, J. (2008). No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing. Rockland, MA: Syngress Publishing.
9. Graves, K. (2007). CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50. Indianapolis, Indiana: Sybex Publishing.
10. Rogers, M. K. and Seigfried, K. (2004), “The future of computer forensics: a needs analysis survey”, Computers & Security, 23(1), pp. 12--16.