1
Zobel J. Writing for computer science. 2nd ed. London: : Springer 2004.
2
Warner M. Cybersecurity: A Pre-history. Intelligence and National Security 2012;27:781–99. doi:10.1080/02684527.2012.708530
3
Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 2011;34:1–11. doi:10.1016/j.jnca.2010.07.006
4
Bonner L. Cyber Risk: How the 2011 Sony Data Breach and the Need for Cyber Risk Insurance Policies Should Direct the Federal Response to Rising Data Breaches. Washington University Journal of Law & Policy 2012;:257–78.http://ezproxy.lib.gla.ac.uk/login?url=http://heinonline.org/HOL/Page?public=false&handle=hein.journals/wajlp40&id=259
5
Refsdal A, Solhaug B, Stølen K, et al. Cyber-risk management. Cham: : Springer 2015. http://ezproxy.lib.gla.ac.uk/login?url=http://link.springer.com/10.1007/978-3-319-23570-7
6
Pfleeger SL, Cunningham RK. Why Measuring Security Is Hard. IEEE Security & Privacy Magazine 2010;8:46–54. doi:10.1109/MSP.2010.60
7
Wood CC. Writing infosec policies. Computers & Security 1995;14:667–74. doi:10.1016/0167-4048(96)81706-8
8
Arduini F, Morabito V. Business continuity and the banking industry. Communications of the ACM 2010;53. doi:10.1145/1666420.1666452
9
Anderson R, Moore T. The Economics of Information Security. Science 2006;314:610–3. doi:10.1126/science.1130992
10
Saini V, Duan Q, Paruchuri V. Threat modeling using attack trees. Journal of Computing Sciences in Colleges 2008;23:124–31.http://ezproxy.lib.gla.ac.uk/login?url=http://dl.acm.org/citation.cfm?id=1352100
11
Dipert RR. The Ethics of Cyberwarfare. Journal of Military Ethics 2010;9:384–410. doi:10.1080/15027570.2010.536404
12
Webber M. The GDPR’s impact on the cloud service provider as a processor. Privacy & Data Protection;16.http://www.fieldfisher.com/media/3993765/the-gdprs-impact-on-the-cloud-service-provider-as-a-processor-mark-webber-privacy-data-protection.pdf
13
Harnik D, Pinkas B, Shulman-Peleg A. Side Channels in Cloud Services: Deduplication in Cloud Storage. IEEE Security & Privacy Magazine 2010;8:40–7. doi:10.1109/MSP.2010.187
14
Meadows DH, Wright D. Thinking in systems: a primer. London: : Earthscan 2009.
15
Griffor E. Handbook of system safety and security: cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems. Cambridge, MA: : Syngress 2017. https://ezproxy.lib.gla.ac.uk/login?url=https://www.sciencedirect.com/science/book/9780128037737
16
Ulsch NM. Cyber threat!: how to manage the growing risk of cyber attacks. Hoboken, New Jersey: : Wiley 2014. https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1002/9781118915028
17
Barman S. Writing information security policies. Indianapolis, Ind: : New Riders 2002.
18
Bayuk JL, Healey J, Rohmeyer P, et al. Cyber security policy guidebook. Hoboken, New Jersey: : John Wiley & Sons 2012.
19
Jaquith A. Security metrics: replacing fear, uncertainty, and doubt. Upper Saddle River, N.J.: : Addison-Wesley 2007.
20
Trust in the Digital World and Cyber Security and Privacy EU Form. Cyber security and privacy: trust in the digital world and cyber security and privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised selected papers. Heidelberg: : Springer 2013. https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1007/978-3-642-41205-9
21
Kizza JM. Ethical and social issues in the information age. 5. ed. 2013. London: : Springer London 2013. https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1007/978-1-4471-4990-3