[1]
J. Zobel, Writing for computer science, 2nd ed. London: Springer, 2004.
[2]
M. Warner, ‘Cybersecurity: A Pre-history’, Intelligence and National Security, vol. 27, no. 5, pp. 781–799, Oct. 2012, doi: 10.1080/02684527.2012.708530.
[3]
S. Subashini and V. Kavitha, ‘A survey on security issues in service delivery models of cloud computing’, Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1–11, Jan. 2011, doi: 10.1016/j.jnca.2010.07.006.
[4]
L. Bonner, ‘Cyber Risk: How the 2011 Sony Data Breach and the Need for Cyber Risk Insurance Policies Should Direct the Federal Response to Rising Data Breaches’, Washington University Journal of Law & Policy, no. 40, pp. 257–278, 2012 [Online]. Available: http://ezproxy.lib.gla.ac.uk/login?url=http://heinonline.org/HOL/Page?public=false&handle=hein.journals/wajlp40&id=259
[5]
A. Refsdal, B. Solhaug, K. Stølen, and SpringerLink (Online service), Cyber-risk management, vol. SpringerBriefs in computer science. Cham: Springer, 2015 [Online]. Available: http://ezproxy.lib.gla.ac.uk/login?url=http://link.springer.com/10.1007/978-3-319-23570-7
[6]
S. L. Pfleeger and R. K. Cunningham, ‘Why Measuring Security Is Hard’, IEEE Security & Privacy Magazine, vol. 8, no. 4, pp. 46–54, Jul. 2010, doi: 10.1109/MSP.2010.60.
[7]
C. C. Wood, ‘Writing infosec policies’, Computers & Security, vol. 14, no. 8, pp. 667–674, Jan. 1995, doi: 10.1016/0167-4048(96)81706-8.
[8]
F. Arduini and V. Morabito, ‘Business continuity and the banking industry’, Communications of the ACM, vol. 53, no. 3, Mar. 2010, doi: 10.1145/1666420.1666452.
[9]
R. Anderson and T. Moore, ‘The Economics of Information Security’, Science, vol. 314, no. 5799, pp. 610–613, Oct. 2006, doi: 10.1126/science.1130992.
[10]
V. Saini, Q. Duan, and V. Paruchuri, ‘Threat modeling using attack trees’, Journal of Computing Sciences in Colleges, vol. 23, no. 4, pp. 124–131, Jan. 2008 [Online]. Available: http://ezproxy.lib.gla.ac.uk/login?url=http://dl.acm.org/citation.cfm?id=1352100
[11]
R. R. Dipert, ‘The Ethics of Cyberwarfare’, Journal of Military Ethics, vol. 9, no. 4, pp. 384–410, Dec. 2010, doi: 10.1080/15027570.2010.536404.
[12]
M. Webber, ‘The GDPR’s impact on the cloud service provider as a processor’, Privacy & Data Protection, vol. 16, no. 4 [Online]. Available: http://www.fieldfisher.com/media/3993765/the-gdprs-impact-on-the-cloud-service-provider-as-a-processor-mark-webber-privacy-data-protection.pdf
[13]
D. Harnik, B. Pinkas, and A. Shulman-Peleg, ‘Side Channels in Cloud Services: Deduplication in Cloud Storage’, IEEE Security & Privacy Magazine, vol. 8, no. 6, pp. 40–47, Nov. 2010, doi: 10.1109/MSP.2010.187.
[14]
D. H. Meadows and D. Wright, Thinking in systems: a primer. London: Earthscan, 2009.
[15]
E. Griffor, Handbook of system safety and security: cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems, vol. Syngress advanced topics in information security. Cambridge, MA: Syngress, 2017 [Online]. Available: https://ezproxy.lib.gla.ac.uk/login?url=https://www.sciencedirect.com/science/book/9780128037737
[16]
N. M. Ulsch, Cyber threat!: how to manage the growing risk of cyber attacks, vol. Wiley corporate F&A Series. Hoboken, New Jersey: Wiley, 2014 [Online]. Available: https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1002/9781118915028
[17]
S. Barman, Writing information security policies. Indianapolis, Ind: New Riders, 2002.
[18]
J. L. Bayuk, J. Healey, P. Rohmeyer, M. H. Sachs, J. Schmidt, and J. Weiss, Cyber security policy guidebook. Hoboken, New Jersey: John Wiley & Sons, 2012.
[19]
A. Jaquith, Security metrics: replacing fear, uncertainty, and doubt. Upper Saddle River, N.J.: Addison-Wesley, 2007.
[20]
Trust in the Digital World and Cyber Security and Privacy EU Form, Cyber security and privacy: trust in the digital world and cyber security and privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised selected papers, vol. Communications in Computer and Information Science. Heidelberg: Springer, 2013 [Online]. Available: https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1007/978-3-642-41205-9
[21]
J. M. Kizza, Ethical and social issues in the information age, 5. ed. 2013., vol. Texts in Computer Science. London: Springer London, 2013 [Online]. Available: https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1007/978-1-4471-4990-3