1.
Zobel J. Writing for Computer Science. 2nd ed. Springer; 2004.
2.
Warner M. Cybersecurity: A Pre-history. Intelligence and National Security. 2012;27(5):781-799. doi:10.1080/02684527.2012.708530
3.
Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications. 2011;34(1):1-11. doi:10.1016/j.jnca.2010.07.006
4.
Bonner L. Cyber Risk: How the 2011 Sony Data Breach and the Need for Cyber Risk Insurance Policies Should Direct the Federal Response to Rising Data Breaches. Washington University Journal of Law & Policy. 2012;(40):257-278. http://ezproxy.lib.gla.ac.uk/login?url=http://heinonline.org/HOL/Page?public=false&handle=hein.journals/wajlp40&id=259
5.
Refsdal A, Solhaug B, Stølen K, SpringerLink (Online service). Cyber-Risk Management. Vol SpringerBriefs in computer science. Springer; 2015. http://ezproxy.lib.gla.ac.uk/login?url=http://link.springer.com/10.1007/978-3-319-23570-7
6.
Pfleeger SL, Cunningham RK. Why Measuring Security Is Hard. IEEE Security & Privacy Magazine. 2010;8(4):46-54. doi:10.1109/MSP.2010.60
7.
Wood CC. Writing infosec policies. Computers & Security. 1995;14(8):667-674. doi:10.1016/0167-4048(96)81706-8
8.
Arduini F, Morabito V. Business continuity and the banking industry. Communications of the ACM. 2010;53(3). doi:10.1145/1666420.1666452
9.
Anderson R, Moore T. The Economics of Information Security. Science. 2006;314(5799):610-613. doi:10.1126/science.1130992
10.
Saini V, Duan Q, Paruchuri V. Threat modeling using attack trees. Journal of Computing Sciences in Colleges. 2008;23(4):124-131. http://ezproxy.lib.gla.ac.uk/login?url=http://dl.acm.org/citation.cfm?id=1352100
11.
Dipert RR. The Ethics of Cyberwarfare. Journal of Military Ethics. 2010;9(4):384-410. doi:10.1080/15027570.2010.536404
12.
Webber M. The GDPR’s impact on the cloud service provider as a processor. Privacy & Data Protection. 16(4). http://www.fieldfisher.com/media/3993765/the-gdprs-impact-on-the-cloud-service-provider-as-a-processor-mark-webber-privacy-data-protection.pdf
13.
Harnik D, Pinkas B, Shulman-Peleg A. Side Channels in Cloud Services: Deduplication in Cloud Storage. IEEE Security & Privacy Magazine. 2010;8(6):40-47. doi:10.1109/MSP.2010.187
14.
Meadows DH, Wright D. Thinking in Systems: A Primer. Earthscan; 2009.
15.
Griffor E. Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems. Vol Syngress advanced topics in information security. Syngress; 2017. https://ezproxy.lib.gla.ac.uk/login?url=https://www.sciencedirect.com/science/book/9780128037737
16.
Ulsch NM. Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks. Vol Wiley corporate F&A Series. Wiley; 2014. https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1002/9781118915028
17.
Barman S. Writing Information Security Policies. New Riders; 2002.
18.
Bayuk JL, Healey J, Rohmeyer P, Sachs MH, Schmidt J, Weiss J. Cyber Security Policy Guidebook. John Wiley & Sons; 2012.
19.
Jaquith A. Security Metrics: Replacing Fear, Uncertainty, and Doubt. Addison-Wesley; 2007.
20.
Trust in the Digital World and Cyber Security and Privacy EU Form. Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers. Vol Communications in Computer and Information Science. (Felici M, ed.). Springer; 2013. https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1007/978-3-642-41205-9
21.
Kizza JM. Ethical and Social Issues in the Information Age. Vol Texts in Computer Science. 5. ed. 2013. Springer London; 2013. https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1007/978-1-4471-4990-3