References
- Baker, W. H., Hylender, C. D., & Valentine, J. A. (2008). 2008 Data breach investigations reportVerizon Business website http://www.verizonbusiness.com/resources/security/databreachreport.pdf (Accessed: 17 November 2008 ).
- Bosworth, M. H. (2007). TJX data breach victims reach 94 millionConsumerAffairs.com website http://www.consumeraffairs.com/news04/2007/10/ tjx_data.html (Accessed: 17 November 2008 ).
- Lemos, R. (2007). Report: TJX thieves exploited wireless insecuritiesSecurityFocus.com website http://www.securityfocus.com/brief/496 (Accessed: 4 February 2009 ).
- Privacy Rights Clearinghouse. (2009). A chronology of data breachesPrivacy Rights Clearinghouse website http://www.privacyrights.org/ar/Chron DataBreaches.htm (Accessed: 4 February 2009 ).
- Symanski, S. (2008). Driver's license and identification card security Department of Revenue performance audit May 2008Colorado Office of the State Auditor website http://www.leg.state.co.us/ (Accessed: 5 November 2008 ).