[1. Baesens, B., Mues, C., Martens, D., Vanthienen, J. (2009), “50 years of data mining and OR: upcoming trends and challenges“, Journal of the Operational Research Society, Vol. 60, pp. S16-S23.]Search in Google Scholar
[2. Bose, R. (2006), “Intelligent technologies for managing fraud and identity theft“, in Third International Conference on Information Technology: New Generations, (ITNG 2006), IEEE, pp. 446-451.10.1109/ITNG.2006.78]Search in Google Scholar
[3. Chen, W. H., Hsu, S. H., Shen, H. P. (2005), “Application of SVM and ANN for intrusion detection“, Computors & Operations Research, Vol. 32 No. 10, pp. 2617-2634.10.1016/j.cor.2004.03.019]Search in Google Scholar
[4. Chen, Y., Abraham, A., Yang, B. (2007), “Hybrid flexible neural‐tree‐based intrusion detection systems”, International Journal of Intelligent Systems, Vol. 22 No. 4, pp. 337-352.10.1002/int.20203]Search in Google Scholar
[5. Dlamini, M. T., Eloff, J. H., Eloff, M. M. (2009), “Information security: The moving target“, Computers & Security, Vol. 28 No. 3-4, pp. 189-198.10.1016/j.cose.2008.11.007]Search in Google Scholar
[6. Fienberg, S. E. (2006), “Privacy and confidentiality in an e-commerce world: Data mining, data warehousing, matching and disclosure limitation”, Statistical Science, Vol. 21 No. 2, pp. 143-154.10.1214/088342306000000240]Search in Google Scholar
[7. Greene, S. S. (2006). Security Policies and Procedures, New Jersey, Pearson Education.]Search in Google Scholar
[8. Herath, T., Rao, H. R. (2009), “Protection motivation and deterrence: a framework for security policy compliance in organisations“, European Journal of Information Systems, Vol. 18 No. 2, pp. 106-125.10.1057/ejis.2009.6]Search in Google Scholar
[9. Ishiguro, M., Tanaka, H., Matsuura, K., Murase, I. (2006), “The effect of information security incidents on corporate values in the Japanese stock market”, in International Workshop on the Economics of Securing the Information Infrastructure (WESII).]Search in Google Scholar
[10. Kim, J., Bentley, P. J., Aickelin, U., Greensmith, J., Tedesco, G., Twycross, J. (2007), “Immune system approaches to intrusion detection - a review”, Natural computing, Vol. 6 No. 4, pp. 413-466.10.1007/s11047-006-9026-4]Search in Google Scholar
[11. Kim, Y., Chang, H. (2014), “The industrial security management model for SMBs in smart work”, Journal of Intelligent Manufacturing, Vol. 25 No. 2, pp. 319-327.10.1007/s10845-012-0651-8]Search in Google Scholar
[12. Matatov, N., Rokach, L., Maimon, O. (2010), “Privacy-preserving data mining: A feature set partitioning approach”, Information Sciences, Vol. 180 No. 14, pp. 2696-2720.10.1016/j.ins.2010.03.011]Search in Google Scholar
[13. Mlitwa, N. B. W., Birch, D. (2011), “The role of intrusion detection systems in electronic information security: From the activity theory perspective”, Journal of Engineering, Design and Technology, Vol. 9 No. 3, pp. 296-312.10.1108/17260531111179915]Search in Google Scholar
[14. Mohammad, M. N., Sulaiman, N., Abdulkarim Muhsin, O. (2011), “A Novel Intrusion Detection System by using Intelligent Data Mining in Weka Environment“, Procedia Computer Science, Vol. 3 No. 5, pp. 1237-1242.10.1016/j.procs.2010.12.198]Search in Google Scholar
[15. Pejic-Bach, M. (2010), “Profiling Intelligent Systems Applications in Fraud Detection and Prevention: Survey of Research Articles“, 2010 International Conference on Intelligent Systems, Modelling and Simulation (ISMS), IEEE, pp. 80-85.10.1109/ISMS.2010.26]Search in Google Scholar
[16. Sayed, M., Jradi, F. (2014), “Biometrics: Effectiveness and Applications within the Blended Learning Environment”, Computer Engineering and Intelligent Systems, Vol. 5 No. 5, pp. 1-8.]Search in Google Scholar
[17. Stoel, M. D., Muhanna, W. A. (2011), “IT internal control weaknesses and firm performance: An organizational liability lens“, International Journal of Accounting Information Systems, Vol. 12 No. 4, pp. 280-304.10.1016/j.accinf.2011.06.001]Search in Google Scholar
[18. Thamaraiselvi, G., Kaliammal, A. (2004), “Data mining: concepts and techniques”, SRELS Journal of Information Management, Vol. 41 No. 4, pp. 339-348.]Search in Google Scholar
[19. Theoharidou, M., Kokolakis, S., Karyda, M., Kiountouzis, E. (2005), “The insider threat to information systems and the effectiveness of ISO17799“, Computers & Security, Vol. 24 No. 6, pp. 472-484.10.1016/j.cose.2005.05.002]Search in Google Scholar
[20. Toval, A., Nicolás, J., Moros, B., García, F. (2002), “Requirements reuse for improving information systems security: a practitioner’s approach”, Requirements Engineering, Vol. 6 No. 4, pp. 205-219.10.1007/PL00010360]Search in Google Scholar
[21. Trompeter, C. M., Eloff, J. H. P. (2001), “A framework for the implementation of socio-ethical controls in information security”, Computers & Security, Vol. 20 No. 5, pp. 384-391.10.1016/S0167-4048(01)00507-7]Search in Google Scholar
[22. Viega, J. (2009), “Cloud computing and the common man“, Computer, Vol. 42 No. 8, pp. 106-108.10.1109/MC.2009.252]Search in Google Scholar
[23. Vigna, G., Kemmerer, R. A. (1999), “NetSTAT: A network-based intrusion detection system”, Journal of computer security, Vol. 7 No. 1, pp. 37-71.10.3233/JCS-1999-7103]Search in Google Scholar
[24. Von Solms, B., Von Solms, R. (2004), “The 10 deadly sins of information security management”, Computers & Security, Vol. 23 No. 5, pp. 371-376.10.1016/j.cose.2004.05.002]Search in Google Scholar
[25. Whitman, M. E., Mattord, H. J. (2010). Principles of information security, Cengage Learning.]Search in Google Scholar
[26. Willison, R. (2006), “Understanding the perpetration of employee computer crime in the organisational context“, Information and organization, Vol. 16 No. 4, pp. 304-324.10.1016/j.infoandorg.2006.08.001]Search in Google Scholar
[27. Workman, M. (2007), “Gaining access with social engineering: An empirical study of the threat“, Information Systems Security, Vol. 16 No. 6, pp. 315-331.10.1080/10658980701788165]Search in Google Scholar
[28. Yeh, Q. J., Chang, A. J. T. (2007), “Threats and countermeasures for information system security: A cross-industry study“, Information & Management, Vol. 44 No. 5, pp. 480-491.10.1016/j.im.2007.05.003]Search in Google Scholar
[29. Yen, E. C. (2007), “Warning signals for potential accounting frauds in blue chip companies - An application of adaptive resonance theory“, Information Sciences, Vol. 177 No. 20, pp. 4515-4525.10.1016/j.ins.2007.03.034]Search in Google Scholar
[30. Yu, Z., Tsai, J. J. P. (2007), “An Automatically Tuning Intrusion Detection System“, IEEE Transactions on Systems, Man, and Cybernetics - Part B: Cybernetics, Vol. 37 No. 2, pp. 373-384.10.1109/TSMCB.2006.885306]Search in Google Scholar
[31. Zhu, D., Premkumar, G., Zhang, X., Chu, C-H. (2001), “Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods“, Decision Sciences, Vol. 32 No. 4, pp. 635-660.10.1111/j.1540-5915.2001.tb00975.x]Search in Google Scholar