1. Amoroso, E. G. (1994), Fundamentals of Computer Security Technology, Prentice-Hall PTR, Upper Saddle River, NJ, 1994.
2. Aslam, Krsul, and Spafford (1996), “A Taxonomy of Security Vulnerabilities”, Proceedings of the 19th National Information Systems Security Conference, pages 551–560, Baltimore, Maryland, October.
3. Ayres and Levitt (1998), “Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack”, The Quarterly Journal of Economics, Vol. 113, p 43–77. February.
4. Coase, R.H. (1960). “The problem of social cost”, Journal of Law and Economics, Vol. 3, pp. 1–44.
5. President’s Commission on Critical Infrastructure Protection, Critical Foundations: Protecting America’s Infrastructure: The Report of the President’s Commission on Critical Infrastructure Protection, 1997, President’s Commission on Critical Infrastructure Protection, Washington DC.