[1]
B.Kiviat, How to Fix the Housing Market, Times Magazine (2009). Available on: http://www.time.com/time/magazine/article/0,9171,1879184-2,00.html.
Google Scholar
[2]
Research and markets,IT Security Market Report 2007 (2007), UK. Available on: http://www.bharatbook.com/productdetail.asp?id=11035.
Google Scholar
[3]
Symantec, Symantec Report on the Underground Economy (2008), Whitepaper. Available on: eval.symantec.com/mktginfo/enterprise/white_papers/bwhitepaper_ underground_economy_report_11-2008-14525717.
Google Scholar
[4]
R. Anderson and T. Moore, The Economics of Information Security, Science 314(5799), (2006) pp.610-613.
DOI: 10.1126/science.1130992
Google Scholar
[5]
C. Ioannidis, D. Pym, and J. Williams, Investments trade-offs in the Economics of Information Security, the thirteenth Proceedings of the conference of Financial Cryptography and Data Security, Barbados, USA. (2009).
DOI: 10.1007/978-3-642-03549-4_9
Google Scholar
[6]
G. Chapman, Cybercrime losses top $US1 trillion (2009). Available on: http://www.australianit.news.com.au/story/0,24897,24997483- 24169,00.html.
Google Scholar
[7]
E.Goetz, and M.E. Johnson, Embedding Information Security Risk Management into the Extended Enterprise: An Executive Workshop (2006), MacNamee Center for Digital Strategies, Tuck School of Business at Dartmouth University, USA.
Google Scholar
[8]
R. Anderson, Why Information Security is Hard-An Economic Perspective, the 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, USA. (2001).
DOI: 10.1109/acsac.2001.991552
Google Scholar
[9]
C.D. Huang, Q. Hu, and R.S. Behara, Economics of Information Security Investment in the Case of Simultaneous Attacks, The Fifth Workshop on the Economics of Information Security, Robinson College, University of Cambridge, England. (2006).
Google Scholar
[10]
Z.Wang, and H.Song, Towards an optimal information security investment strategy, IEEE Conference on Networking, Sensing and Control, (2008) pp.756-761.
DOI: 10.1109/icnsc.2008.4525317
Google Scholar
[11]
B.Srinidhi, J.Yan, and G.K. Tayi, Firm-level Resource Allocation to Information Security in the Presence of Financial Distress, Working paper Series 2008-17, School of Economic Sciences, Washington State University, USA. (2008).
Google Scholar
[12]
J. Willemson, On the Gordon and Loeb Model for Information Security Investment, presented at The Fifth Workshop on the Economics of Information Security, University of Cambridge, UK. (2006).
Google Scholar
[13]
M.T. Dlamini, M.M. Eloff, J.H.P. Eloff and K.Hone, BC3I-Towards Requirements Specification For Preparing an Information Security Budget, Proceedings of the ISSA 2009 Conference, Johannesburg, South Africa, (2009).
Google Scholar
[14]
A.Rolfsdotter Karlsson, Managing Performance Measurement: A study of how to select and implement performance measures on a strategic, tactical and operational level, Master's Thesis, University of Gävle, Sweden. (2008).
Google Scholar
[15]
S.A. Butler, Security Attribute Evaluation Method, PhD Thesis, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA 15213, USA. (2003).
Google Scholar