1. Bauer, J., van Eeten, M.: Cybersecurity: stakeholder incentives, externalities, and policy options. Telecommun. Policy 33(10–11), 706–719 (2009)
2. Boettke, P., Coyne, C., Leeson, P.: Comparative historical political economy. J. Inst. Econ. 9(3), 285–301 (2013)
3. Lecture Notes in Computer Science;P Eden,2016
4. European Union Agency for Network and Information Security (ENISA): Cyber Security Information Sharing: An Overview of Regulatory and Non-regulatory Approaches. Report/Study, Heraklion (2015)
5. European Union Agency for Network and Information Security (ENISA): Information Sharing and Common Taxonomies Between CSIRTs and Law Enforcement. Report/Study, Heraklion (2016)