@inproceedings{Anderson_2001, title={Why information security is hard - an economic perspective}, url={http://ieeexplore.ieee.org/document/991552/}, DOI={10.1109/ACSAC.2001.991552}, booktitle={Seventeenth Annual Computer Security Applications Conference}, publisher={IEEE Comput. Soc}, author={Anderson, R.}, year={2001}, pages={358–365} }
@book{Daniel J. Solove_2011, address={New Haven}, title={Nothing to hide the false tradeoff between privacy and security}, url={https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3976770}, publisher={Yale University Press}, author={Daniel J. Solove}, year={2011} }
@book{Krugman_Wells_Graddy_2009, address={New York}, edition={European ed}, title={Economics}, publisher={Worth}, author={Krugman, Paul R. and Wells, Robin and Graddy, Kathryn Jo}, year={2009} }
@book{Lawrence A. Gordon_Martin P. Loeb, title={Managing Cybersecurity Resources}, publisher={McGraw-Hill}, author={Lawrence A. Gordon and Martin P. Loeb} }
@article{Moor_1990, title={The Ethics of Privacy Protection}, url={http://hdl.handle.net/2142/7714}, author={Moor, J. H.}, year={1990} }
@book{Cybersecurity                                What Everyone Needs to Know Paper_2013, publisher={Oxford University Press, USA}, year={2013} }
@book{Security Engineering: A Guide to Building Dependable Distributed Systems, url={http://www.cl.cam.ac.uk/~rja14/book.html} }
@misc{WEIS Archives, url={http://econinfosec.org/weis-archive/} }
@misc{Module Moodle Page, url={https://moodle.ucl.ac.uk/course/view.php?id=40195} }