1
Daniel J. Solove, Nothing to hide the false tradeoff between privacy and security, Yale University Press, New Haven, 2011.
2
Lawrence A. Gordon and Martin P. Loeb, Managing Cybersecurity Resources, McGraw-Hill.
3
P. R. Krugman, R. Wells and K. J. Graddy, Economics, Worth, New York, European ed., 2009.
4
Cybersecurity                                What Everyone Needs to Know Paper, Oxford University Press, USA, 2013.
5
Security Engineering: A Guide to Building Dependable Distributed Systems, .
6
R. Anderson, in Seventeenth Annual Computer Security Applications Conference, IEEE Comput. Soc, 2001, pp. 358–365.
7
J. H. Moor, .
8
WEIS Archives, http://econinfosec.org/weis-archive/.
9
Module Moodle Page, https://moodle.ucl.ac.uk/course/view.php?id=40195.