@article{Anderson_Moore_2006, title={The Economics of Information Security}, volume={314}, DOI={10.1126/science.1130992}, number={5799}, journal={Science}, author={Anderson, R. and Moore, T.}, year={2006}, month={Oct}, pages={610–613} }
@article{Arduini_Morabito_2010, title={Business continuity and the banking industry}, volume={53}, DOI={10.1145/1666420.1666452}, number={3}, journal={Communications of the ACM}, author={Arduini, Fabio and Morabito, Vincenzo}, year={2010}, month={Mar} }
@book{Barman_2002, address={Indianapolis, Ind}, title={Writing information security policies}, publisher={New Riders}, author={Barman, Scott}, year={2002} }
@book{Bayuk_Healey_Rohmeyer_Sachs_Schmidt_Weiss_2012, address={Hoboken, New Jersey}, title={Cyber security policy guidebook}, publisher={John Wiley & Sons}, author={Bayuk, Jennifer L. and Healey, Jason and Rohmeyer, Paul and Sachs, Marcus H. and Schmidt, Jeffrey and Weiss, Joseph}, year={2012} }
@article{Bonner_2012, title={Cyber Risk: How the 2011 Sony Data Breach and the Need for Cyber Risk Insurance Policies Should Direct the Federal Response to Rising Data Breaches}, url={http://ezproxy.lib.gla.ac.uk/login?url=http://heinonline.org/HOL/Page?public=false&handle=hein.journals/wajlp40&id=259}, number={40}, journal={Washington University Journal of Law & Policy}, author={Bonner, L.}, year={2012}, pages={257–278} }
@article{Dipert_2010, title={The Ethics of Cyberwarfare}, volume={9}, DOI={10.1080/15027570.2010.536404}, number={4}, journal={Journal of Military Ethics}, author={Dipert, Randall R.}, year={2010}, month={Dec}, pages={384–410} }
@book{Griffor_2017, address={Cambridge, MA}, title={Handbook of system safety and security: cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems}, volume={Syngress advanced topics in information security}, url={https://ezproxy.lib.gla.ac.uk/login?url=https://www.sciencedirect.com/science/book/9780128037737}, publisher={Syngress}, author={Griffor, Edward}, year={2017} }
@article{Harnik_Pinkas_Shulman-Peleg_2010, title={Side Channels in Cloud Services: Deduplication in Cloud Storage}, volume={8}, DOI={10.1109/MSP.2010.187}, number={6}, journal={IEEE Security & Privacy Magazine}, author={Harnik, Danny and Pinkas, Benny and Shulman-Peleg, Alexandra}, year={2010}, month={Nov}, pages={40–47} }
@book{Jaquith_2007, address={Upper Saddle River, N.J.}, title={Security metrics: replacing fear, uncertainty, and doubt}, publisher={Addison-Wesley}, author={Jaquith, Andrew}, year={2007} }
@book{Kizza_2013, address={London}, edition={5. ed. 2013}, title={Ethical and social issues in the information age}, volume={Texts in Computer Science}, url={https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1007/978-1-4471-4990-3}, publisher={Springer London}, author={Kizza, Joseph Migga}, year={2013} }
@book{Meadows_Wright_2009, address={London}, title={Thinking in systems: a primer}, publisher={Earthscan}, author={Meadows, Donella H. and Wright, Diana}, year={2009} }
@article{Pfleeger_Cunningham_2010, title={Why Measuring Security Is Hard}, volume={8}, DOI={10.1109/MSP.2010.60}, number={4}, journal={IEEE Security & Privacy Magazine}, author={Pfleeger, Shari Lawrence and Cunningham, Robert K}, year={2010}, month={Jul}, pages={46–54} }
@book{Refsdal_Solhaug_Stølen_SpringerLink (Online service)_2015, address={Cham}, title={Cyber-risk management}, volume={SpringerBriefs in computer science}, url={http://ezproxy.lib.gla.ac.uk/login?url=http://link.springer.com/10.1007/978-3-319-23570-7}, publisher={Springer}, author={Refsdal, Atle and Solhaug, Bjornar and Stølen, Ketil and SpringerLink (Online service)}, year={2015} }
@article{Saini_Duan_Paruchuri_2008, title={Threat modeling using attack trees}, volume={23}, url={http://ezproxy.lib.gla.ac.uk/login?url=http://dl.acm.org/citation.cfm?id=1352100}, number={4}, journal={Journal of Computing Sciences in Colleges}, publisher={Consortium for Computing Sciences in Colleges}, author={Saini, Vineet and Duan, Qiang and Paruchuri, Vamsi}, year={2008}, month={Jan}, pages={124–131} }
@article{Subashini_Kavitha_2011, title={A survey on security issues in service delivery models of cloud computing}, volume={34}, DOI={10.1016/j.jnca.2010.07.006}, number={1}, journal={Journal of Network and Computer Applications}, author={Subashini, S. and Kavitha, V.}, year={2011}, month={Jan}, pages={1–11} }
@book{Trust in the Digital World and Cyber Security and Privacy EU Form_2013, address={Heidelberg}, title={Cyber security and privacy: trust in the digital world and cyber security and privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised selected papers}, volume={Communications in Computer and Information Science}, url={https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1007/978-3-642-41205-9}, publisher={Springer}, author={Trust in the Digital World and Cyber Security and Privacy EU Form}, editor={Felici, Massimo}, year={2013} }
@book{Ulsch_2014, address={Hoboken, New Jersey}, title={Cyber threat!: how to manage the growing risk of cyber attacks}, volume={Wiley corporate F&A Series}, url={https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1002/9781118915028}, publisher={Wiley}, author={Ulsch, N. MacDonnell}, year={2014} }
@article{Warner_2012, title={Cybersecurity: A Pre-history}, volume={27}, DOI={10.1080/02684527.2012.708530}, number={5}, journal={Intelligence and National Security}, author={Warner, Michael}, year={2012}, month={Oct}, pages={781–799} }
@article{Webber, title={The GDPR’s impact on the cloud service provider as a processor}, volume={16}, url={http://www.fieldfisher.com/media/3993765/the-gdprs-impact-on-the-cloud-service-provider-as-a-processor-mark-webber-privacy-data-protection.pdf}, number={4}, journal={Privacy & Data Protection}, author={Webber, Mark} }
@article{Wood_1995, title={Writing infosec policies}, volume={14}, DOI={10.1016/0167-4048(96)81706-8}, number={8}, journal={Computers & Security}, author={Wood, Charles Cresson}, year={1995}, month={Jan}, pages={667–674} }
@book{Zobel_2004, address={London}, edition={2nd ed}, title={Writing for computer science}, publisher={Springer}, author={Zobel, Justin}, year={2004} }