J. Backhouse and G. Dhillon, Structures of responsibility and security of information systems, European Journal of Information Systems, vol.5, issue.1, pp.2-9, 1996.
DOI : 10.1057/ejis.1996.7

G. Dhillon, Managing information system security, 1997.
DOI : 10.1007/978-1-349-14454-9

A. Giddens, The consequence of modernity, 1990.

E. T. Hall, The silent language Anchor Books, 1959.

T. Helokunnas and R. Kuusisto, Information security culture in a value net, IEMC '03 Proceedings. Managing Technologically Driven Organizations: The Human Side of Innovation and Change, pp.190-194, 2003.
DOI : 10.1109/IEMC.2003.1252258

A. B. Ruighaver, S. B. Maynard, and S. Chang, Organisational security culture: Extending the end-user perspective, Computers & Security, vol.26, issue.1, pp.56-62, 2007.
DOI : 10.1016/j.cose.2006.10.008

A. Segev, J. Porra, and M. Roldan, Internet security and the case of Bank of America, Communications of the ACM, vol.41, issue.10, pp.81-87, 1998.
DOI : 10.1145/286238.286251

V. Solms and B. , Information Security?The Third Wave? Computers & Security, pp.615-620, 2000.

C. Vroom, V. Solms, and R. , Towards Information Security Behavioral Compliance. Computers & Security, pp.191-198, 2004.

G. Walsham, Interpreting information systems in organizations, 1993.