[1]
Daniel J. Solove, Nothing to hide the false tradeoff between privacy and security. New Haven: Yale University Press, 2011 [Online]. Available: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3976770
[2]
Lawrence A. Gordon and Martin P. Loeb, Managing Cybersecurity Resources. McGraw-Hill.
[3]
P. R. Krugman, R. Wells, and K. J. Graddy, Economics, European ed. New York: Worth, 2009.
[4]
Cybersecurity                                What Everyone Needs to Know Paper. Oxford University Press, USA, 2013.
[5]
Security Engineering: A Guide to Building Dependable Distributed Systems. [Online]. Available: http://www.cl.cam.ac.uk/~rja14/book.html
[6]
R. Anderson, ‘Why information security is hard - an economic perspective’, in Seventeenth Annual Computer Security Applications Conference, 2001, pp. 358–365, doi: 10.1109/ACSAC.2001.991552 [Online]. Available: http://ieeexplore.ieee.org/document/991552/
[7]
J. H. Moor, ‘The Ethics of Privacy Protection’, 1990 [Online]. Available: http://hdl.handle.net/2142/7714
[8]
‘WEIS Archives’. [Online]. Available: http://econinfosec.org/weis-archive/
[9]
‘Module Moodle Page’. [Online]. Available: https://moodle.ucl.ac.uk/course/view.php?id=40195