1. Bandyopadhyay, T. (2011). A model for B2B IT security: Multilayer defense facing interdependent cyber risk. In Proceedings of the Southern Association of Information Systems Conference, Atlanta, GA.
2. Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest
3. Boyson, S., Corsi, T., & Rossman, H. (2009). Building a cyber supply chain assurance reference model. Retrieved October 1, 2011 from http://www.saic.com/news/resources/Cyber_Supply_Chain.pdf
4. Camp, L. J., & Wolfram, C. (2004). Pricing security. Retrieved October 1, 2011, from http://www.ljean.com/files/isw.pdf
5. REENGINEERING CHANNEL REORDERING PROCESSES TO IMPROVE TOTAL SUPPLY‐CHAIN PERFORMANCE