1. Petrosyan, A. (2023) Number of Data Breaches and Victims U.S. 2022. Statista. https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/
2. Olsen, K.A (2010) Two Cases of Bad Web Usability: Banking and Employee Self Service, UniTech 2010, Oslo, Tapir Forlag (19.05). http://medialt.no/pub/uikt/u2010/035-Olsen/index.html
3. Caballero, C. (2019) Software Architecture: Therac-25 the Killer Radiation Machine.https://www.carloscaballero.io/software-architecture-therac-25/
4. Ladkin, P.B. (1998) The Ariane 5 Accident: A Programming Problem? http://www.rvs.uni-bielefeld.de/publications/Incidents/DOCS/Research/Rvs/Misc/Additional/Reports/ariane.html
5. Khandelwal, S. (2015) These Top 10 Programming Languages Have Most Vulnerable Apps on the Internet.https://thehackernews.com/2015/12/programming-language-security.html