1. Boehme, R., and Kataria, G. "Models and Measures for Correlation in Cyber-Insurance," The Fifth Workshop on the Economics of Information Security, Cambridge, UK, June 2006.
2. Dwork, C., and Naor, M. Pricing via Processing or Combatting Junk Mail, Lecture Notes in Computer Science (740), Springer, Berlin/Heidelberg, August 1992, pp. 139-147.
3. Dynes, S., Brechbuhl, H., and Johnson, M. E. "Information Security in the Extended Enterprise: Some Initial Results from a Field Study of an Industrial Firm," The Fourth Workshop on the Economics of Information Security, Cambridge, MA, June 2005.
4. Geer, D. E. “Making Choices to Show ROI,” Secure Business Quarterly (1:2), 2001, Q4.
5. Gordon, L.A., and Loeb, M.P. "The Economics of Information Security Investment," ACM Transactions on Info rmation and System Security (5:4), November 2002, pp. 438-457.