1. Cybenko G. & Landwehr C. E. "Security Analytics and Measurements" IEEE Security & Privacy Journal, 2012, Vol. 10, No. 3, pp. 5--8.
2. ISACA. "An introduction to the business model for information security". (2009) http://www.isaca.org/Knowledge-Center/BMIS/Documents/IntrotoBMIS.pdf
3. ISO/IEC 27000 Series. Geneva, Switzerland: International Standard Organization. (2009) http://www.27000.org/
4. Johnson B., Laszka A., Grossklags J., "How many down?: toward understanding systematic risk in networks", Proceedings of the 9th ACM symposium on Information, computer and communications security, (2014)
5. Kajava, J., Anttila, J., Varonen, R., Savola, R., & Roning, J. "Information security standards and global business", Proceeding of IEEE International Conference on Industrial Technology, 2006, p. 2091--2095.