1.
Daniel J. Solove. Nothing to hide the false tradeoff between privacy and security [Internet]. New Haven: Yale University Press; 2011. Available from: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3976770
2.
Lawrence A. Gordon, Martin P. Loeb. Managing Cybersecurity Resources. McGraw-Hill;
3.
Krugman PR, Wells R, Graddy KJ. Economics. European ed. New York: Worth; 2009.
4.
Cybersecurity                                What Everyone Needs to Know Paper. Oxford University Press, USA; 2013.
5.
Security Engineering: A Guide to Building Dependable Distributed Systems [Internet]. Available from: http://www.cl.cam.ac.uk/~rja14/book.html
6.
Anderson R. Why information security is hard - an economic perspective. Seventeenth Annual Computer Security Applications Conference [Internet]. IEEE Comput. Soc; 2001. p. 358–365. Available from: http://ieeexplore.ieee.org/document/991552/
7.
Moor JH. The Ethics of Privacy Protection. 1990; Available from: http://hdl.handle.net/2142/7714
8.
WEIS Archives [Internet]. Available from: http://econinfosec.org/weis-archive/
9.
Module Moodle Page [Internet]. Available from: https://moodle.ucl.ac.uk/course/view.php?id=40195