Anderson, R., and T. Moore. 2006. ‘The Economics of Information Security’. Science 314(5799):610–13. doi: 10.1126/science.1130992.
Arduini, Fabio, and Vincenzo Morabito. 2010. ‘Business Continuity and the Banking Industry’. Communications of the ACM 53(3). doi: 10.1145/1666420.1666452.
Barman, Scott. 2002. Writing Information Security Policies. Indianapolis, Ind: New Riders.
Bayuk, Jennifer L., Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt, and Joseph Weiss. 2012. Cyber Security Policy Guidebook. Hoboken, New Jersey: John Wiley & Sons.
Bonner, L. 2012. ‘Cyber Risk: How the 2011 Sony Data Breach and the Need for Cyber Risk Insurance Policies Should Direct the Federal Response to Rising Data Breaches’. Washington University Journal of Law & Policy (40):257–78.
Dipert, Randall R. 2010. ‘The Ethics of Cyberwarfare’. Journal of Military Ethics 9(4):384–410. doi: 10.1080/15027570.2010.536404.
Griffor, Edward. 2017. Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems. Vol. Syngress advanced topics in information security. Cambridge, MA: Syngress.
Harnik, Danny, Benny Pinkas, and Alexandra Shulman-Peleg. 2010. ‘Side Channels in Cloud Services: Deduplication in Cloud Storage’. IEEE Security & Privacy Magazine 8(6):40–47. doi: 10.1109/MSP.2010.187.
Jaquith, Andrew. 2007. Security Metrics: Replacing Fear, Uncertainty, and Doubt. Upper Saddle River, N.J.: Addison-Wesley.
Kizza, Joseph Migga. 2013. Ethical and Social Issues in the Information Age. Vol. Texts in Computer Science. 5. ed. 2013. London: Springer London.
Meadows, Donella H., and Diana Wright. 2009. Thinking in Systems: A Primer. London: Earthscan.
Pfleeger, Shari Lawrence, and Robert K. Cunningham. 2010. ‘Why Measuring Security Is Hard’. IEEE Security & Privacy Magazine 8(4):46–54. doi: 10.1109/MSP.2010.60.
Refsdal, Atle, Bjornar Solhaug, Ketil Stølen, and SpringerLink (Online service). 2015. Cyber-Risk Management. Vol. SpringerBriefs in computer science. Cham: Springer.
Saini, Vineet, Qiang Duan, and Vamsi Paruchuri. 2008. ‘Threat Modeling Using Attack Trees’. Journal of Computing Sciences in Colleges 23(4):124–31.
Subashini, S., and V. Kavitha. 2011. ‘A Survey on Security Issues in Service Delivery Models of Cloud Computing’. Journal of Network and Computer Applications 34(1):1–11. doi: 10.1016/j.jnca.2010.07.006.
Trust in the Digital World and Cyber Security and Privacy EU Form. 2013. Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers. Vol. Communications in Computer and Information Science. edited by M. Felici. Heidelberg: Springer.
Ulsch, N. MacDonnell. 2014. Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks. Vol. Wiley corporate F&A Series. Hoboken, New Jersey: Wiley.
Warner, Michael. 2012. ‘Cybersecurity: A Pre-History’. Intelligence and National Security 27(5):781–99. doi: 10.1080/02684527.2012.708530.
Webber, Mark. n.d. ‘The GDPR’s Impact on the Cloud Service Provider as a Processor’. Privacy & Data Protection 16(4).
Wood, Charles Cresson. 1995. ‘Writing Infosec Policies’. Computers & Security 14(8):667–74. doi: 10.1016/0167-4048(96)81706-8.
Zobel, Justin. 2004. Writing for Computer Science. 2nd ed. London: Springer.