Wilson, M.
, deZafra, D.
, Pitcher, S.
, Tressler, J.
and Ippolito, J.
(1998),
Information Technology Security Training Requirements: A Role- and Performance-Based Model, Special Publication (NIST SP), National Institute of Standards and Technology, Gaithersburg, MD, [online], https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=151633
(Accessed October 7, 2024)