5Gordon L A, Loeb M P. The economics of information security investment[ J]. ACM Transactions on Information and System Security, 2002, 5(4)( November 2002): 438-457.
6Bodin L, Gordon L, Loeb M. Evaluating information security investments using the analytic hierarchy proeess[ J]. Communi- catoins of The ACM, 2005, 48(2) : 79-83.
7Gordon L, Loeb M. Budgeting process for information security expenditures[ J ]. Communications of The ACM, 2006, 49 ( 1 ) : 121-125.
8Grossklags J, Christin N, Chuang J. Secure or insure: a game-theoretic analysis of information security games[ J]. Proceeding of the 17th International Conference on World Wide Web 2008, WWW08. 2008. 209-218.
9Yue W T, :akanyldrm M, Ryu Y U, et al. Network externalities, layered protection and IT security risk management[ J]. Decision Support Systems, 2007, 44( 1 ) : 1-16.
10Cremonini M, Nizovtsev D. Risks and benefits of signaling information system characteristics to strategic attackers[ J]. Journal of Management Information Systems, 2009, 26 ( 3 ) : 241-274.