[Acquisti, A., Grossklags, J., 2007. When 25 cents is enough: willingness to pay and willingness to accept for personal information. In: Workshop on the Economics of Information Security (WEIS).]Search in Google Scholar
[Beresford, A., Kübler, D., Preibusch, S., 2012. Unwillingness to pay for privacy: a field experiment. Econ. Lett. 117 (1), 25–27.10.1016/j.econlet.2012.04.077]Search in Google Scholar
[Bischoff P. (2018), Passports on the dark web: how much is yours worth?, Retrieved from: https://www.comparitech.com/blog/vpn-privacy/passports-on-the-dark-web-how-much-is-yours-worth/.]Search in Google Scholar
[Commission Staff Working Document, Impact Assessment Accompanying the document Proposals for Directives of the European Parliament and of the Council (1) on certain aspects concerning contracts for the supply of digital content, COM/2015/0634 final.]Search in Google Scholar
[Dima, A., Hadad, S., Luchian, I., (2017), “Review on the dimensions of business-university alliances”, Proceedings of the 11th International Conference on Business Excellence, pp. 64-73, DOI: 10.1515/picbe-2017-0007.10.1515/picbe-2017-0007]Open DOISearch in Google Scholar
[Dimyati, M. and Subagio, N.A. (2018), “Customer trust as mediator in the creation of customer relationship intention”, Management & Marketing. Challenges for the Knowledge Society, Vol. 13, No. 1, pp. 710-729, DOI: 10.2478/mmcks-2018-0001.10.2478/mmcks-2018-0001]Open DOISearch in Google Scholar
[Fligner Z. (2014), These are the websites where hackers flip stolen credit card data after an attack, Retrieved from: https://qz.com/260716/these-are-the-websites-where-hackers-flip-stolen-credit-card-data-after-an-attack/.]Search in Google Scholar
[Fonseca, L.M. and Domingues, J.P., (2017), “How to succeed in the digital age? Monitor the organizational context, identify risks and opportunities, and manage change effectively”, Management & Marketing. Challenges for the Knowledge Society, Vol. 12, No. 3, pp. 443-455. DOI: 10.1515/mmcks-2017-0027.10.1515/mmcks-2017-0027]Open DOISearch in Google Scholar
[Huberman, B., Adar, E., Fine, L., 2005. Valuating privacy. Secur. Priv. IEEE 3 (5), 22–25.10.1109/MSP.2005.137]Search in Google Scholar
[Infosec Institute (2018), Hacking communities in the Deep Web, Retrieved from: https://resources.infosecinstitute.com/hacking-communities-in-the-deep-web/#gref.]Search in Google Scholar
[IntSights Cyber Intelligence, Financial Services Threat Landscape Report, July 2018, retrieved from: https://www.prnewswire.com/news-releases/new-research-from-intsights-cyber-intelligence-finds-135-year-over-year-increase-in-bank-data-for-sale-on-dark-web-black-markets-300678803.html, (accessed on 23 November 2018).]Search in Google Scholar
[More-with-mobile, ‘Prices and Value of Consumer Data’ (2013) http://www.more-with-mobile.com/2013/06/prices-and-value-of-consumer-data.html (accessed 12 October 2018).]Search in Google Scholar
[OECD, Data-driven Innovation for Growth and Well-being, Interim Synthesis Report (2014).]Search in Google Scholar
[Secureworks (2018), The Underground Hacker Markets are Booming with Counterfeit Documents, Premiere Credit Cards, Hacker Tutorials and 100% Satisfaction Guarantees. Retrieved from: https://www.secureworks.com/resources/wp-underground-hacking-markets-report.]Search in Google Scholar
[Onete B C, Vasile V, Vargas V, 2018, Online Business Models and Typologies, New Trends in Sustainable Business and Consumption, BASIQ 2018.]Search in Google Scholar
[Secureworks (2018), Underground Hacker Report Database Value Calculator, Retrieved from: https://www.secureworks.com/resources/rp-database-risk-calculator.]Search in Google Scholar
[Webroot (2013), New underground E-shop offers access to hundreds of hacked PayPal accounts, Retrieved from: https://www.webroot.com/blog/2013/02/20/new-underground-e-shop-offers-access-to-hundreds-of-hacked-paypal-accounts/.]Search in Google Scholar