[
Axelrod, C.W., Bayuk, J.L., Schutzer D. (eds.), 2009. Enterprise Information, Security and Privacy, Artech House, Norwood.
]Search in Google Scholar
[
Colwill, C., 2009. Human factors in information security: The insider threat e Who can you trust these days?, Information Security Technical Report 14.
]Search in Google Scholar
[
Griffy-Brown Ch., D. Earp, B., Rosas, O., 2018. Technology and the good society, Technology in Society, 52, 1-3.
]Search in Google Scholar
[
Horton, G., 2018. Information politics: liberation and exploitation in the digital society, Information, Communication & Society Reviews, 21(12).
]Search in Google Scholar
[
Lee, A., 2018. Towards Informatic Personhood: understanding contemporary subjects in a data-driven society, Information, Communication & Society.
]Search in Google Scholar
[
Łuczak, J., Tyburski, M., 2010. Systemowe zarządzanie bezpieczeństwem informacji ISO/IEC 27001, Wydawnictwo Uniwersytetu Ekonomicznego w Poznaniu, Poznań.
]Search in Google Scholar
[
Stewart, G., 2009. A safety approach to information security communications, Information Security Technical Report 14.
]Search in Google Scholar
[
Thomas, H., 2018. Powerful knowledge, technology and education in the future-focused good society, Technology in Society, 52, 54-59.
]Search in Google Scholar
[
Tutton, J., 2010. Incident response and compliance: A case study of the recent attacks, Information, Security Technical Report 15.
]Search in Google Scholar
[
Żywiołek, J., 2018. Monitoring of Information Security System Elements in the Metallurgical Enterprises, MATEC Web of Conferences, https://www.matec-conferences.org/articles/matecconf/pdf/2018/42/matecconf_qpi2018_01007.pdf.
]Search in Google Scholar
[
Żywiołek, J., 2016. The application of value stream mapping method for identifying basic drawbacks and reducing duration of information process in a company, Production Engineering Archives, 11(2), 36-39.
]Search in Google Scholar