T. Healy, The Unanticipated Consequences of Technology, " articled posted at Santa Clara University website, 2011.

C. Perrow, Accidents, Normal, 1999.
DOI : 10.1016/B0-08-043076-7/04509-5

E. Tenner, Why Things Bite Back: Technology and the Revenge of Unintended Consequences, Vintage Books, 1996.

N. Taleb, The Black Swan, The Impact of the Highly Improbable, Random House, 2007.

D. Dörner, The logic of failure, 1989.
DOI : 10.1093/acprof:oso/9780198521914.003.0002

J. L. Flatley, Is Canada's iPod Tax Back?, 2010.

R. L. Antognini, The law of unintended consequences: HIPAA and liability insurers; at first glance, the Privacy Regulations appear to be adverse to insurers and defense counsel, but McCarran-Ferguson and exceptions may save the day, Defense Counsel Journal, vol.69, issue.3, pp.296-305, 2002.

M. Kapushian, Hungry, Hungry HIPPA: When Privacy Regulations Go Too Far, Fordham Urban Law Journal, vol.31, issue.6, pp.1483-1506, 2004.

P. Vogel, US Law Against Online Gambling Makes it the Biggest Loser E- Commerce Times, 2010.

K. Cameron, More Unintended Consequences of Browser Leakage, 2011.

G. Wondracek and T. Holz, A Practical Attack to De-anonymize Social Network Users, 2010 IEEE Symposium on Security and Privacy, 2011.
DOI : 10.1109/SP.2010.21

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.697.9914

P. Eckersley, How Unique Is Your Web Browser?, eff.org/browser-uniqueness.pdf 16. Schumacher, E.F., Small is Beautiful ? Economics as if People Mattered, 1975.
DOI : 10.1007/978-3-642-14527-8_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.381.1264

S. Gaudin, TJ Maxx Breach Costs Hit $17 Million, 2011.

S. J. Levy, Hackers: Heroes of the Computer Revolution ? 25 th Anniversary Edition, 2010.

T. Metzger, Prank Uses Obama in Attempt to Obtain Centurion Blingthe-amex-centurion-card.php 22. As explained at https, 2008.

. Lin, EXAM: a comprehensive environment for the analysis of access control policies, International Journal of Information Security, vol.9, issue.3, 2008.
DOI : 10.1007/s10207-010-0106-1

N. Damianou, Tools for domain-based policy management of distributed systems, NOMS 2002. IEEE/IFIP Network Operations and Management Symposium. ' Management Solutions for the New Communications World'(Cat. No.02CH37327), pp.213-218, 2002.
DOI : 10.1109/NOMS.2002.1015565

E. Siren, Automated Policy Analysis: HIPAA, XACML and OWL, http://weblog.clarkparsia.comautomated-policy-analysis-hipaa-xacml-and-owl, 2008.