Anderson, R. and Moore, T. (2006) ‘The Economics of Information Security’, Science, 314(5799), pp. 610–613. Available at: https://doi.org/10.1126/science.1130992.
Arduini, F. and Morabito, V. (2010) ‘Business continuity and the banking industry’, Communications of the ACM, 53(3). Available at: https://doi.org/10.1145/1666420.1666452.
Barman, S. (2002) Writing information security policies. Indianapolis, Ind: New Riders.
Bayuk, J.L. et al. (2012) Cyber security policy guidebook. Hoboken, New Jersey: John Wiley & Sons.
Bonner, L. (2012) ‘Cyber Risk: How the 2011 Sony Data Breach and the Need for Cyber Risk Insurance Policies Should Direct the Federal Response to Rising Data Breaches’, Washington University Journal of Law & Policy, (40), pp. 257–278. Available at: http://ezproxy.lib.gla.ac.uk/login?url=http://heinonline.org/HOL/Page?public=false&handle=hein.journals/wajlp40&id=259.
Dipert, R.R. (2010) ‘The Ethics of Cyberwarfare’, Journal of Military Ethics, 9(4), pp. 384–410. Available at: https://doi.org/10.1080/15027570.2010.536404.
Griffor, E. (2017) Handbook of system safety and security: cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems [electronic resource]. Cambridge, MA: Syngress. Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://www.sciencedirect.com/science/book/9780128037737.
Harnik, D., Pinkas, B. and Shulman-Peleg, A. (2010) ‘Side Channels in Cloud Services: Deduplication in Cloud Storage’, IEEE Security & Privacy Magazine, 8(6), pp. 40–47. Available at: https://doi.org/10.1109/MSP.2010.187.
Jaquith, A. (2007) Security metrics: replacing fear, uncertainty, and doubt. Upper Saddle River, N.J.: Addison-Wesley.
Kizza, J.M. (2013) Ethical and social issues in the information age [electronic resource]. 5. ed. 2013. London: Springer London. Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1007/978-1-4471-4990-3.
Meadows, D.H. and Wright, D. (2009) Thinking in systems: a primer. London: Earthscan.
Pfleeger, S.L. and Cunningham, R.K. (2010) ‘Why Measuring Security Is Hard’, IEEE Security & Privacy Magazine, 8(4), pp. 46–54. Available at: https://doi.org/10.1109/MSP.2010.60.
Refsdal, A. et al. (2015) Cyber-risk management. Cham: Springer. Available at: http://ezproxy.lib.gla.ac.uk/login?url=http://link.springer.com/10.1007/978-3-319-23570-7.
Saini, V., Duan, Q. and Paruchuri, V. (2008) ‘Threat modeling using attack trees’, Journal of Computing Sciences in Colleges, 23(4), pp. 124–131. Available at: http://ezproxy.lib.gla.ac.uk/login?url=http://dl.acm.org/citation.cfm?id=1352100.
Subashini, S. and Kavitha, V. (2011) ‘A survey on security issues in service delivery models of cloud computing’, Journal of Network and Computer Applications, 34(1), pp. 1–11. Available at: https://doi.org/10.1016/j.jnca.2010.07.006.
Trust in the Digital World and Cyber Security and Privacy EU Form (2013) Cyber security and privacy: trust in the digital world and cyber security and privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised selected papers. Edited by M. Felici. Heidelberg: Springer. Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1007/978-3-642-41205-9.
Ulsch, N.M. (2014) Cyber threat!: how to manage the growing risk of cyber attacks. Hoboken, New Jersey: Wiley. Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1002/9781118915028.
Warner, M. (2012) ‘Cybersecurity: A Pre-history’, Intelligence and National Security, 27(5), pp. 781–799. Available at: https://doi.org/10.1080/02684527.2012.708530.
Webber, M. (no date) ‘The GDPR’s impact on the cloud service provider as a processor’, Privacy & Data Protection, 16(4). Available at: http://www.fieldfisher.com/media/3993765/the-gdprs-impact-on-the-cloud-service-provider-as-a-processor-mark-webber-privacy-data-protection.pdf.
Wood, C.C. (1995) ‘Writing infosec policies’, Computers & Security, 14(8), pp. 667–674. Available at: https://doi.org/10.1016/0167-4048(96)81706-8.
Zobel, J. (2004) Writing for computer science. 2nd ed. London: Springer.