1. Aral, S., Muchnik, L., & Sundararajan, A. (2009). Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. Proceedings of the National Academy of Sciences, 106(51), 21544–21549.
2. Arora, A., Telang, R., & Xu, H. (2005). Optimal policy for software vulnerability disclosure.
3. Banerjee, A. V. (1992). A simple model of herd behavior. The Quarterly Journal of Economics, 107(3), 797–817.
4. Bose, I., & Leung, A. C. M. (2007). Unveiling the mask of phishing: Threats, preventive measures, and responsibilities. Communications of AIS, 19(1), 544–566.
5. Brenner, J. (2012). Social networking. Pew Internet & American Life Project, November 13, 2012, http://pewinternet.org/Commentary/2012/March/Pew-Internet-Social-Networking-full-detail.aspx , accessed on November 28, 2012.