1. R. J. Anderson, Comm. ACM37, 32 (1994).
2. H. Varian The New York Times 1 June 2000 (www.nytimes.com/library/financial/columns/060100econ-scene.html).
3. T. Moore paper presented at the Fourth Workshop on the Economics of Information Security Cambridge MA 2 to 3 June 2005 (www.infosecon.net/workshop/pdf/18.pdf).
4. G. Danezis, R. J. Anderson, IEEE Secur. Privacy3, 45 (2005).
5. D. Goodhart Prospect February 2004 (www.guardian.co.uk/race/story/0 11374 1154684 00.html).