1. Anderson, J. E., Schwager, P. H. (2002). Security in the information systems curriculum: Identification & status of relevant issues. Journal of Computer Information Systems, 3(16), 16–24.
2. Calkins, M. M. (2000). They shoot Trojan horses, don’t they? An economic analysis of anti-hacking regulatory models. Georgetown Law Journal, 89, 171–224.
3. Casey, E. (2006). Investigating sophisticated security breaches. Communications of the ACM, 49(2), 48–54.
4. Cegielski, C. G. (2008). Toward the development of an interdisciplinary information assurance curriculum: Knowledge domains and skill sets required of information assurance professionals. Decision Sciences Journal of Innovative Education, 6(1), 29–49.
5. Connolly, P. (2000). Privacy as global policy. InfoWorld, 22(37), 49–50.