1. Amoroso, E.: Hearing before the US Senate Commerce, Science, and Transportation Committee. Senate Hearing, pp. 111–143. U.S. Senate Committee on Commerce, Science, and Transportation (2009).
http://www.commerce.senate.gov/public/index.cfm?p=Hearings&ContentRecord_id=d59f00d0-0ad9-41cd-bde8-b96babb08b7e&ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&Group_id=b06c39af-e033-4cba-9221-de668ca1978a&YearDisplay=2009
2. Anderson, R.: Why information security is hard – an economic perspective. In: ACSAC’01: Proceedings of the 17th Annual Computer Security Applications Conference, New Orleans, pp. 358–365. IEEE Computer Society (2001)
3. Barthélemy, J.: The hidden costs of IT outsourcing. Sloan Manage. Rev. 42(3), 60–69 (2001)
4. Berinato, S.: Finally, a Real Return on Security Spending. CIO Magazine (2002). Available Online:
http://www.cio.com.au/article/52650/finally_real_return_security_spending/
5. Capgemini: IT-Trends (2008)