1.
Zobel, J. Writing for computer science. (Springer, 2004).
2.
Warner, M. Cybersecurity: A Pre-history. Intelligence and National Security 27, 781–799 (2012).
3.
Subashini, S. & Kavitha, V. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34, 1–11 (2011).
4.
Bonner, L. Cyber Risk: How the 2011 Sony Data Breach and the Need for Cyber Risk Insurance Policies Should Direct the Federal Response to Rising Data Breaches. Washington University Journal of Law & Policy 257–278 (2012).
5.
Refsdal, A., Solhaug, B., Stølen, K., & SpringerLink (Online service). Cyber-risk management. vol. SpringerBriefs in computer science (Springer, 2015).
6.
Pfleeger, S. L. & Cunningham, R. K. Why Measuring Security Is Hard. IEEE Security & Privacy Magazine 8, 46–54 (2010).
7.
Wood, C. C. Writing infosec policies. Computers & Security 14, 667–674 (1995).
8.
Arduini, F. & Morabito, V. Business continuity and the banking industry. Communications of the ACM 53, (2010).
9.
Anderson, R. & Moore, T. The Economics of Information Security. Science 314, 610–613 (2006).
10.
Saini, V., Duan, Q. & Paruchuri, V. Threat modeling using attack trees. Journal of Computing Sciences in Colleges 23, 124–131 (2008).
11.
Dipert, R. R. The Ethics of Cyberwarfare. Journal of Military Ethics 9, 384–410 (2010).
12.
Webber, M. The GDPR’s impact on the cloud service provider as a processor. Privacy & Data Protection 16,.
13.
Harnik, D., Pinkas, B. & Shulman-Peleg, A. Side Channels in Cloud Services: Deduplication in Cloud Storage. IEEE Security & Privacy Magazine 8, 40–47 (2010).
14.
Meadows, D. H. & Wright, D. Thinking in systems: a primer. (Earthscan, 2009).
15.
Griffor, E. Handbook of system safety and security: cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems. vol. Syngress advanced topics in information security (Syngress, 2017).
16.
Ulsch, N. M. Cyber threat!: how to manage the growing risk of cyber attacks. vol. Wiley corporate F&A Series (Wiley, 2014).
17.
Barman, S. Writing information security policies. (New Riders, 2002).
18.
Bayuk, J. L. et al. Cyber security policy guidebook. (John Wiley & Sons, 2012).
19.
Jaquith, A. Security metrics: replacing fear, uncertainty, and doubt. (Addison-Wesley, 2007).
20.
Trust in the Digital World and Cyber Security and Privacy EU Form. Cyber security and privacy: trust in the digital world and cyber security and privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised selected papers. vol. Communications in Computer and Information Science (Springer, 2013).
21.
Kizza, J. M. Ethical and social issues in the information age. vol. Texts in Computer Science (Springer London, 2013).