4GORDON L A,LOEB M P,LUCYSHYN W,et al.CSI/FBI computer crime and security survey. http://duecare.biz/cgi-bin/mt/mt-tb.cgi/64 . 2009
5MUKHOPADHYAY A,CHAKRABARTI B B,SAHA D,et al.E-risk management through self insurance:An option model. Proceedings of the40th Hawaii International Conference on System Sciences . 2007
6Mercuri R T.Analyzing Security Costs. Communications of the ACM . 2003
7T. A. Longstaff,C. Chittister,R. Pethia,Y. Y. Haimes.Are we forgettingthe risks of information technology?. IEEE Computer . 2000
8Jorion P Value at Risk.The New Benchmark for Controlling Market Risk. . 1997