Longstaff, Thomas A., & Schultz, E. Eugene, `Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code', Computers & Security, vol. 12, February 1993.

Loundy, David J., `Information Systems Law and Operator Liability Revisited', Murdoch University E-Law Journal, vol. 1, no. 3, September 1994.

McMahon, John, `Practical DECnet security', Digital Systems Journal, vol. 14, November 1992.

Melford, Robert J., `Network security; computer networks', Internal
Auditor, Institute of Internal Auditors, vol. 50, February 1993.

Natalie, D. & Ball, W, EIS Coordinator, North Carolina Emergency Management, `How North Carolina Managed Hurricane Hugo', EIS News, vol. 3, no. 11, 1988.

NorTel Australia Pty Ltd, Discovering Tomorrow's Telecommunications
Solutions, Chatswood, NSW (n.d.).

Northern Telecom, Annual Report 1993, Ontario, 1993.

Slatalla, Michelle & Quittner, Joshua, Masters of Deception,
HarperCollins, New York, 1995.

Royal Commission into Aboriginal Deaths in Custody, Report of the
Inquiry into the Death of the Woman Who Died at Ceduna, Australian
Government Publishing Service, Canberra, 1990.

Scottish Law Commission's Report on Computer Crime, no. 174, 1987.