1. Acquisti , A. Friedman , A. Telang , R. 2006, June Is there a cost to privacy breaches? An event study
2. Assessing data security: Preventing breaches and protecting sensitive information 2005 Hearing before the Committee on Financial Services, House of Representatives, 109th Congress
3. Measuring positive externalities from unobservable victim precautions: An empirical analysis of lojack;Ayres;Quarterly Journal of Economics,1998
4. Baum , K. 2006, April Identity theft, 2004. Special Report NCJ 212213 http://www.ncjrs.gov/App/Publications/abstract.aspx?ID=233686
5. Baum , K. 2007, November Identity theft, 2005 http://bjs.ojp.usdoj.gov/index.cfm?ty=pbdetail&iid=971