E. R. Muller, Veiligheid, Studies over inhoud, organisatie en maatregelen, 2004.

G. W. Blarkom, . Van, J. J. Borking, and J. G. Olk, Handbook of Privacy and Privacy- Enhancing Technologies, The Case of Intelligent Software Agents, www.cbpweb.nl/downloads technologie/pisa handboek.pdf cfr. Fritsch L. & Abie H., A Road Map to the Management of Privacy Risks in Information Systems, 2003.

D. H. Flaherty, Privacy Impact Assessments: An Essential Tool for Data Protection in, Privacy Law & Policy Reporter, vol.7, issue.5, 2000.

B. Schneier, Threat Modeling and Risk Assessment, in H.Baumler, E-privacy, 2000.

J. J. Borking, Privacyrecht is Code, Over het gebruik van privacy Enhancing Technologies, 2010.

J. Borking, R. Hes, and J. Borking, Der Identity Protector', Datenschutz und Datensicherheit Privacy-Enhancing Technologies: The Path to Anonymity The Hague, 1996.

T. Tsiakis and G. Stephanides, The economic approach of information security, Computers & Security, vol.24, issue.2, 2005.
DOI : 10.1016/j.cose.2005.02.001

S. Chapman and G. S. Dhillon, Privacy and the Internet, 2002.
DOI : 10.4018/978-1-930708-11-2.ch006

A. Fairchild and P. Ribbers, Privacy-Enhancing Identity Management in Business, in Privacy and Identity Management for Europe, 2008.

B. Blakley, E. Mcdermott, and D. Geer, Information management is Information Risk Management in Proceeding NSPW'01, 2002.

W. Sonnenreich, J. Albanese, and B. Stout, Return on Security Investment (ROSI) ? A Practical Approach, Journal of Research and Practice in Information Technology, vol.38, issue.1, 2006.

L. Cardholm, Adding Value to business performance through cost benefit analyses of information security management, 2006.