//-->
Hackers' self-selection in crowdsourced bug bounty programs
Jo, Arrah-Marie, (2020)
Data redundancies and cyber attacks
Garratt, Rod, (2024)
Secure electronic commerce : building the infrastructure for digital signatures and encryption
Ford, Warwick, (2001)
Software failure: management failure : amazing stories and cautionary tales
Flowers, Stephen, (1996)
Use in the context of outsourcing : the view from downstream
Flowers, Stephen, (2009)
Organizational capabilities and technology acquisition : why firms know less than they buy
Flowers, Stephen, (2007)