ISO/IEC 27004: Information technology - Security techniques - Information security management - Measurement (2009)
ISO/IEC 25010: Systems and software engineering - Systems and software quality requirements and evaluation (SQuaRE) - System and software quality models (2011)
European Parliament legislative resolution of 12 March 2014 on the proposal for a regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) (COM(2012) 0011 - C7–0025/2012 - 2012/0011(COD)) (2014). http://www.europarl.europa.eu/sides/getDoc.do?type=TA&language=EN&reference=P7-TA-2014-0212
Borking, J.J., Raab, C.D.: Laws, PETs and other technologies for privacy protection. J. Inf. Law Technol. (JILT) 1(1), 1–14 (2001). http://www2.warwick.ac.uk/fac/soc/law/elj/jilt/20011/borking
Cavoukian, A.: Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards, chap. Privacy by Design: Origins, Meanings, and Prospects for Assuring Privacy and Trust in the Information Era, pp. 170–208. IGI Global (2012)
Chew, E., Swanson, M., Stine, K., Bartol, N., Brown, A., Robinson, W.: Performance Measurement Guide for Information Security. NIST Special Publication 800–55 Revision 1 (2008). http://csrc.nist.gov/publications/nistpubs/800-55-Rev1/SP800-55-rev1.pdf
Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J.H., Le Mètayer, D., Tirtea, R., Schiffner, S.: Privacy and Data Protection by Design - from policy to engineering. Technical report, ENISA (2014). http://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/privacy-and-data-protection-bydesign/atdownload/fullReport
European Commission: Privacy Enhancing Technologies (PETs) - the existing legal framework. MEMO/07/159, May 2007. http://europa.eu/rapid/press-releaseMEMO-07-159en.htm
European Commission: Horizon 2020 - Work Programme 2014–2015, Annex G. Technology readiness levels (TRL). European Commission Decision C (2014) 4995 of 22. Technical report (2014), July 2014. http://ec.europa.eu/research/participants/data/ref/h2020/wp/20142015/annexes/h2020-wp1415-annex-g-trlen.pdf
Hansen, M., Hoepman, J.H., Jensen, M., Schiffner, S.: Readiness Analysis for the Adoption and Evolution of Privacy Enhancing Technologies: Methodology, Pilot Assessment, and Continuity Plan. Technical report, ENISA (2015). https://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/pets
ISACA: COBIT 5 for Information Security (2012). http://www.isaca.org
Nolte, W.L.: Did I Ever Tell You About the Whale? Or Measuring Technology Maturity. Information Age Publishing, Charlotte (2008)
NSA: Tor Stinks - presentation slides as part of Edward Snowden’s NSA revelations, June 2012. https://cryptome.org/2013/10/nsa-tor-stinks.pdf
Olechowski, A.L., Eppinger, S.D., Joglekar, N.: Technology Readiness Levels at 40: A Study of State-of-the-Art Use, Challenges, and Opportunities. MIT Sloan Research Paper No. 5127–15. Technical report, MIT (2015). http://dx.doi.org/10.2139/ssrn.2588524
Smith, J.D.: An alternative to technology readiness levels for non-developmental item (NDI) software. In: Proceedings of the 38th Annual Hawaii International Conference on System Sciences - HICSS 2005 (2005)