Anderson, R., & Moore, T. (2006). The Economics of Information Security. Science, 314(5799), 610–613. https://doi.org/10.1126/science.1130992
Arduini, F., & Morabito, V. (2010). Business continuity and the banking industry. Communications of the ACM, 53(3). https://doi.org/10.1145/1666420.1666452
Barman, S. (2002). Writing information security policies. New Riders.
Bayuk, J. L., Healey, J., Rohmeyer, P., Sachs, M. H., Schmidt, J., & Weiss, J. (2012). Cyber security policy guidebook. John Wiley & Sons.
Bonner, L. (2012). Cyber Risk: How the 2011 Sony Data Breach and the Need for Cyber Risk Insurance Policies Should Direct the Federal Response to Rising Data Breaches. Washington University Journal of Law & Policy, 40, 257–278. http://ezproxy.lib.gla.ac.uk/login?url=http://heinonline.org/HOL/Page?public=false&handle=hein.journals/wajlp40&id=259
Dipert, R. R. (2010). The Ethics of Cyberwarfare. Journal of Military Ethics, 9(4), 384–410. https://doi.org/10.1080/15027570.2010.536404
Griffor, E. (2017). Handbook of system safety and security: cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems: Vol. Syngress advanced topics in information security [Electronic resource]. Syngress. https://ezproxy.lib.gla.ac.uk/login?url=https://www.sciencedirect.com/science/book/9780128037737
Harnik, D., Pinkas, B., & Shulman-Peleg, A. (2010). Side Channels in Cloud Services: Deduplication in Cloud Storage. IEEE Security & Privacy Magazine, 8(6), 40–47. https://doi.org/10.1109/MSP.2010.187
Jaquith, A. (2007). Security metrics: replacing fear, uncertainty, and doubt. Addison-Wesley.
Kizza, J. M. (2013). Ethical and social issues in the information age: Vol. Texts in Computer Science (5. ed. 2013) [Electronic resource]. Springer London. https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1007/978-1-4471-4990-3
Meadows, D. H., & Wright, D. (2009). Thinking in systems: a primer. Earthscan.
Pfleeger, S. L., & Cunningham, R. K. (2010). Why Measuring Security Is Hard. IEEE Security & Privacy Magazine, 8(4), 46–54. https://doi.org/10.1109/MSP.2010.60
Refsdal, A., Solhaug, B., Stølen, K., & SpringerLink (Online service). (2015). Cyber-risk management: Vol. SpringerBriefs in computer science. Springer. http://ezproxy.lib.gla.ac.uk/login?url=http://link.springer.com/10.1007/978-3-319-23570-7
Saini, V., Duan, Q., & Paruchuri, V. (2008). Threat modeling using attack trees. Journal of Computing Sciences in Colleges, 23(4), 124–131. http://ezproxy.lib.gla.ac.uk/login?url=http://dl.acm.org/citation.cfm?id=1352100
Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1–11. https://doi.org/10.1016/j.jnca.2010.07.006
Trust in the Digital World and Cyber Security and Privacy EU Form. (2013). Cyber security and privacy: trust in the digital world and cyber security and privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised selected papers: Vol. Communications in Computer and Information Science (M. Felici, Ed.). Springer. https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1007/978-3-642-41205-9
Ulsch, N. M. (2014). Cyber threat!: how to manage the growing risk of cyber attacks: Vol. Wiley corporate F&A Series. Wiley. https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1002/9781118915028
Warner, M. (2012). Cybersecurity: A Pre-history. Intelligence and National Security, 27(5), 781–799. https://doi.org/10.1080/02684527.2012.708530
Webber, M. (n.d.). The GDPR’s impact on the cloud service provider as a processor. Privacy & Data Protection, 16(4). http://www.fieldfisher.com/media/3993765/the-gdprs-impact-on-the-cloud-service-provider-as-a-processor-mark-webber-privacy-data-protection.pdf
Wood, C. C. (1995). Writing infosec policies. Computers & Security, 14(8), 667–674. https://doi.org/10.1016/0167-4048(96)81706-8
Zobel, J. (2004). Writing for computer science (2nd ed). Springer.