Anderson, R., and T. Moore. ‘The Economics of Information Security’. Science 314.5799 (2006): 610–613. Web.
Arduini, Fabio, and Vincenzo Morabito. ‘Business Continuity and the Banking Industry’. Communications of the ACM 53.3 (2010): n. pag. Web.
Barman, Scott. Writing Information Security Policies. Indianapolis, Ind: New Riders, 2002. Print.
Bayuk, Jennifer L. et al. Cyber Security Policy Guidebook. Hoboken, New Jersey: John Wiley & Sons, 2012. Print.
Bonner, L. ‘Cyber Risk: How the 2011 Sony Data Breach and the Need for Cyber Risk Insurance Policies Should Direct the Federal Response to Rising Data Breaches’. Washington University Journal of Law & Policy 40 (2012): 257–278. Web. <http://ezproxy.lib.gla.ac.uk/login?url=http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/wajlp40&amp;id=259>.
Dipert, Randall R. ‘The Ethics of Cyberwarfare’. Journal of Military Ethics 9.4 (2010): 384–410. Web.
Griffor, Edward. Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems. Syngress advanced topics in information security. Cambridge, MA: Syngress, 2017. Web. <https://ezproxy.lib.gla.ac.uk/login?url=https://www.sciencedirect.com/science/book/9780128037737>.
Harnik, Danny, Benny Pinkas, and Alexandra Shulman-Peleg. ‘Side Channels in Cloud Services: Deduplication in Cloud Storage’. IEEE Security & Privacy Magazine 8.6 (2010): 40–47. Web.
Jaquith, Andrew. Security Metrics: Replacing Fear, Uncertainty, and Doubt. Upper Saddle River, N.J.: Addison-Wesley, 2007. Print.
Kizza, Joseph Migga. Ethical and Social Issues in the Information Age. 5. ed. 2013. Texts in Computer Science. London: Springer London, 2013. Web. <https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1007/978-1-4471-4990-3>.
Meadows, Donella H., and Diana Wright. Thinking in Systems: A Primer. London: Earthscan, 2009. Print.
Pfleeger, Shari Lawrence, and Robert K Cunningham. ‘Why Measuring Security Is Hard’. IEEE Security & Privacy Magazine 8.4 (2010): 46–54. Web.
Refsdal, Atle et al. Cyber-Risk Management. SpringerBriefs in computer science. Cham: Springer, 2015. Web. <http://ezproxy.lib.gla.ac.uk/login?url=http://link.springer.com/10.1007/978-3-319-23570-7>.
Saini, Vineet, Qiang Duan, and Vamsi Paruchuri. ‘Threat Modeling Using Attack Trees’. Journal of Computing Sciences in Colleges 23.4 (2008): 124–131. Web. <http://ezproxy.lib.gla.ac.uk/login?url=http://dl.acm.org/citation.cfm?id=1352100>.
Subashini, S., and V. Kavitha. ‘A Survey on Security Issues in Service Delivery Models of Cloud Computing’. Journal of Network and Computer Applications 34.1 (2011): 1–11. Web.
Trust in the Digital World and Cyber Security and Privacy EU Form. Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers. Ed. Massimo Felici. Communications in Computer and Information Science. Heidelberg: Springer, 2013. Web. <https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1007/978-3-642-41205-9>.
Ulsch, N. MacDonnell. Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks. Wiley corporate F&A Series. Hoboken, New Jersey: Wiley, 2014. Web. <https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1002/9781118915028>.
Warner, Michael. ‘Cybersecurity: A Pre-History’. Intelligence and National Security 27.5 (2012): 781–799. Web.
Webber, Mark. ‘The GDPR’s Impact on the Cloud Service Provider as a Processor’. Privacy & Data Protection 16.4 n. pag. Web. <http://www.fieldfisher.com/media/3993765/the-gdprs-impact-on-the-cloud-service-provider-as-a-processor-mark-webber-privacy-data-protection.pdf>.
Wood, Charles Cresson. ‘Writing Infosec Policies’. Computers & Security 14.8 (1995): 667–674. Web.
Zobel, Justin. Writing for Computer Science. 2nd ed. London: Springer, 2004. Print.