R. Fredriksen, B. A. Gran, K. Stølen, and I. Djordjevic, Experiences from application of mod-el-based risk assessment, Proceedings of the European conference on safety and reliability (ESREL'2003, pp.643-691, 2003.

G. L. Reniers, K. Cremer, and J. Buytaert, Continuously and simultaneously optimizing an organization???s safety and security culture and climate: the Improvement Diamond for Excellence Achievement and Leadership in Safety & Security (IDEAL S&S) model, Journal of Cleaner Production, vol.19, issue.11, pp.1239-1249, 2011.
DOI : 10.1016/j.jclepro.2011.03.002

L. Piètre-cambacédès and C. Chaudet, The SEMA referential framework: Avoiding ambiguities in the terms ???security??? and ???safety???, International Journal of Critical Infrastructure Protection, vol.3, issue.2, pp.55-66, 2010.
DOI : 10.1016/j.ijcip.2010.06.003

S. H. Jore and A. Egeli, Risk management methodology for protecting against malicious acts ? are probabilities adequate means for describing terrorism and other security risks? Safety and Reliability of Complex Engineering Systems, pp.807-814, 2015.

K. Petersen, The corporate security professional: A hybrid agent between corporate and national security, Security Journal, vol.42, issue.3, pp.222-235, 2013.
DOI : 10.1177/0010836707079934

A. P. Mcgraw, A. Todorov, and H. Kunreuther, A policy maker???s dilemma: Preventing terrorism or preventing blame, Organizational Behavior and Human Decision Processes, vol.115, issue.1, pp.25-34, 2011.
DOI : 10.1016/j.obhdp.2011.01.004

F. Hommedal, See it coming: The Four M's of Digital Espionage, 2014.