Colwill, C., 2009. Human factors in information security: The insider threat e Who can you trust these days?, Information Security Technical Report 14.
Łuczak, J., Tyburski, M., 2010. Systemowe zarządzanie bezpieczeństwem informacji ISO/IEC 27001, Wydawnictwo Uniwersytetu Ekonomicznego w Poznaniu, Poznań.
Żywiołek, J., 2018. Monitoring of Information Security System Elements in the Metallurgical Enterprises, MATEC Web of Conferences, https://www.matec-conferences.org/articles/matecconf/pdf/2018/42/matecconf_qpi2018_01007.pdf.
Żywiołek, J., 2016. The application of value stream mapping method for identifying basic drawbacks and reducing duration of information process in a company, Production Engineering Archives, 11(2), 36-39.