1. How Internet Security Breaches Harm Market Value
2. Cybersecurity: Stakeholder incentives, externalities, and policy options
3. Briody, D. (2007, April 01). Full Coverage: How to hedge your cyber risk. Retrieved May 31, 2010 from Inc. Web site: http://www.inc.com/magazine/20070401/technology-insurance.html
4. Canadian Radio-television and Telecommunications Commission. (2009). Frequently asked questions. Retrieved June 23, 2010 from the Canadian Radio-television and Telecommunications Commission Web site: http://www.crtc.gc.ca/eng/faqs.htm.