1. Anderson, R. and Schneier, B. (2004), “Economics of information security”, available at: www.schneier.com/academic/paperfiles/paper-economics.pdf/ (accessed 19 September 2018).
2. Basel Committee on Banking Supervision (2005), “An explanatory note on the Basel II IRB risk weight functions”, available at: www.bis.org/bcbs/irbriskweight.pdf/ (accessed 16 February 2017).
3. Brecht, M. and Nowey, T. (2012), “A closer look at information security costs”, available at: www.econinfosec.org/archive/weis2012/papers/Brecht_WEIS2012.pdf (accessed 19 September 2018).
4. Buith, J. (2015), “The benefits, limits of cyber value-at-risk”, The Wall Street Journal, 4 May, available at: http://deloitte.wsj.com/cio/2015/05/04/the-benefits-limits-of-cyber-value-at-risk/ (accessed 19 September 2018).
5. Anybody can do value at risk: a teaching study using parametric computation and Monte Carlo simulation;Australasian Accounting, Business and Finance Journal,2012