1. Return to sender;Anon;Economist,2000
2. Why information security is hard – an economic perspective;Anderson,2001
3. Cryptography and competition policy issues with “trusted computing”;Anderson;Computer Security Journal,2004
4. Product liability and firm value: the experience of American and Japanese automakers, 1973–1992;Barber;Journal of Political Economy,1996
5. The code red worm;Berghel;Communications of the ACM,2001