1. Why information security is hard - an economic perspective
2. Auchard, E. (2015, September 16). Cisco router break-ins bypass cyber defenses. Reuters. Retrieved from http://www.bbc.com/news/technology-28602997
3. Bigelow, P. (2015, May 20). General Motors says it owns your car's software. Autoblog. Retrieved from https://www.gov.uk/government/news/cyber-security-myths-putting-a-third-of-sme-revenue-at-risk
4. Bureau of Justice Statistics. (2011, November 30). Identity Theft Reported by Households Rose 33 Percent from 2005 to2010. Retrieved from http://www.bjs.gov/content/pub/press/itrh0510pr.cfm
5. COMPUTER-AIDED MONITORING: ITS INFLUENCE ON EMPLOYEE JOB SATISFACTION AND TURNOVER