1. Anderson R. Why information security is hard: An economic perspectiveProc. 17th Annual Comput. Security Appl. Conf.(2001) Washington, D.C.IEEE Computer Society358365
2. Arora A., Krishnan R., Telang R., Yang Y. An empirical analysis of vendor response to disclosure policyFourth Workshop Econom. Inform. Security Proc.(2005) Boston
3. Network Software Security and User Incentives
4. Beattie S., Arnold S., Cowan C., Wagle P., Wright C., Shostack A. Timing the application of security patches for optimal uptimeProc. LISA '02: Sixteenth Systems Admin. Conf.(2002) Berkeley, CA233242