[1]
Anderson, R. and Moore, T. 2006. The Economics of Information Security. Science. 314, 5799 (Oct. 2006), 610–613. DOI:https://doi.org/10.1126/science.1130992.
[2]
Arduini, F. and Morabito, V. 2010. Business continuity and the banking industry. Communications of the ACM. 53, 3 (Mar. 2010). DOI:https://doi.org/10.1145/1666420.1666452.
[3]
Barman, S. 2002. Writing information security policies. New Riders.
[4]
Bayuk, J.L. et al. 2012. Cyber security policy guidebook. John Wiley & Sons.
[5]
Bonner, L. 2012. Cyber Risk: How the 2011 Sony Data Breach and the Need for Cyber Risk Insurance Policies Should Direct the Federal Response to Rising Data Breaches. Washington University Journal of Law & Policy. 40 (2012), 257–278.
[6]
Dipert, R.R. 2010. The Ethics of Cyberwarfare. Journal of Military Ethics. 9, 4 (Dec. 2010), 384–410. DOI:https://doi.org/10.1080/15027570.2010.536404.
[7]
Griffor, E. 2017. Handbook of system safety and security: cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems. Syngress.
[8]
Harnik, D. et al. 2010. Side Channels in Cloud Services: Deduplication in Cloud Storage. IEEE Security & Privacy Magazine. 8, 6 (Nov. 2010), 40–47. DOI:https://doi.org/10.1109/MSP.2010.187.
[9]
Jaquith, A. 2007. Security metrics: replacing fear, uncertainty, and doubt. Addison-Wesley.
[10]
Kizza, J.M. 2013. Ethical and social issues in the information age. Springer London.
[11]
Meadows, D.H. and Wright, D. 2009. Thinking in systems: a primer. Earthscan.
[12]
Pfleeger, S.L. and Cunningham, R.K. 2010. Why Measuring Security Is Hard. IEEE Security & Privacy Magazine. 8, 4 (Jul. 2010), 46–54. DOI:https://doi.org/10.1109/MSP.2010.60.
[13]
Refsdal, A. et al. 2015. Cyber-risk management. Springer.
[14]
Saini, V. et al. 2008. Threat modeling using attack trees. Journal of Computing Sciences in Colleges. 23, 4 (Jan. 2008), 124–131.
[15]
Subashini, S. and Kavitha, V. 2011. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications. 34, 1 (Jan. 2011), 1–11. DOI:https://doi.org/10.1016/j.jnca.2010.07.006.
[16]
Trust in the Digital World and Cyber Security and Privacy EU Form 2013. Cyber security and privacy: trust in the digital world and cyber security and privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised selected papers. Springer.
[17]
Ulsch, N.M. 2014. Cyber threat!: how to manage the growing risk of cyber attacks. Wiley.
[18]
Warner, M. 2012. Cybersecurity: A Pre-history. Intelligence and National Security. 27, 5 (Oct. 2012), 781–799. DOI:https://doi.org/10.1080/02684527.2012.708530.
[19]
Webber, M. The GDPR’s impact on the cloud service provider as a processor. Privacy & Data Protection. 16, 4.
[20]
Wood, C.C. 1995. Writing infosec policies. Computers & Security. 14, 8 (Jan. 1995), 667–674. DOI:https://doi.org/10.1016/0167-4048(96)81706-8.
[21]
Zobel, J. 2004. Writing for computer science. Springer.